Small lexicon about cybercrime

Small lexicon about cybercrime

lexicon
To avoid being confronted with cybercrime, it is best to understand the different forms it can take and there is a lexicon for that. Here are some key words to identify what cybercriminals concocted to defraud users.
Hacking / Malware In the lexicon, the term hacker is an individual who has mastered IT and acting in a malicious mode tries to break into your system (often called a “hacker”) in order to install programs to steal confidential data or distribute spam. Cybercriminals will try to install malware on your system. After installing the malware, it will thus be able to retrieve the data you typed on your keyboard (such as your passwords or your credit card numbers). The cybercriminal can also turn your computer into a “bot” that is to say, use it to send spam, attack other computer infrastructure (DDOS) or even perform an illegal activity by pretending that your computer is the source of offense. To protect yourself, you should install an antivirus system on your computer or mobile phone and keep the system updated. Also install the latest updates for your operating system. Do not disclose personal information to someone you do not know and be sure to install only programs from a trusted source.
Internet sales
In addition to targeting potential buyers, cybercriminals also target vendors who use online auction sites or classified ads. In general, the interested buyer wants to pay by check will turn out to be a fake. Before trying to sell an item to a potential buyer, first check if the seller is clearly identifiable. The seller must be able to provide accurate and verifiable information (name, address, phone number). If the person wishes to pay by check, get some garranty, as this is the mode of payment often favored by scammers.
 
Internet shopping
Purchasing goods on Internet platforms has become popular but has also attracted many scammers looking to get money from potential buyers. These platforms may involve online auction sites, classified ads and websites selling electronic equipment, etc … The typical scam follows this classic place, the victim noticed a section that looks at a particularly attractive price. It then pays the agreed amount, but never receives the item which was bought. Before trying to buy something on the Internet, you should be alerted by four questions: Is the offer too good to be true? Does the site seem trustworthy? Can the seller be clearly identifiable? Does the payment mode look reliable? If you have a single doubt in answering these questions, avoid this site to find a good deal.
 

Phishing In the lexicon, the English term is a contraction of the words “Password” (password) and “Fishing” (fish). It is practiced by cyber criminals to access confidential data such as access to an e-mail account data, auction sites or bank connection (e-banking). To do this, the scammers send a lot of emails that indicate the potential victim’s that his/her login details (username and password) to an auction site, for example, are no safer or not up-to-date, and must be reconfirmed via a link in the message. The address of the sender has been falsified, the link in question does not therefore take the user to the page the legitimate site (in this case the auction site), but on a very similar page designed by the scammers. If the user entered personal information on this page, he/she immediately becomes a victim, and cybercriminals will not wait to use this personal data as soon as possible. So do not click on links in messages that seem odd, even if it comes from a relative or friend.

Spam
In the lexicon, spam is unsolicited bulk messages sent via email or SMS. Sending can reach a large number of recipients in a short time and at low cost, as it is automated. You can never completely avoid spam, but please email with your email address. Use a second address for newsgroups or mailing lists.
Using passwords
Your passwords are the keys to your privacy and your Internet access. You must be vigilant to prevent them from being guessed or hacked. The minimum length of a password must be eight signs you can switch letters, numbers and special characters to make them more complex. Do not write your passwords on your computer or on your mobile phone. Your password should not be identical or similar to your username and must be different depending on your access. Finally, be sure to regularly change your passwords (every three months) or whenever you assume that third parties may have known them.
If you want your Internet connection to be secure and anonymous, choose a VPN service: it encrypts your Internet connections and keeps secret the sites that you have visited and the information you have left on these sites. This protects all your Internet activities with a secure VPN virtual tunnel, which includes an extremely strong military encryption system. Indeed, all traffic through the VPN uses AES-256 to encrypt data. AES stands for “Advanced Coding Standards” – a symmetric encryption standard adopted by the U.S. government. It has a fixed block length of 128 bits, with key lengths of 256 bits. The AES figure has been extensively tested and analyzed. It is now used worldwide.
AES is the first publicly available figure approved by the NSA – National Security Agency – for information classified “top secret.” Therefore, any connection or pirate decryption of data through the VPN tunnel is strictly impossible. Check our lexicon to learn more about all the terms you don’t know.
spring-season-100x95

SPRING SALE

GET 3 YEARS FOR $79.99

NO LOGS

100+ LOCATIONS

P2P ALLOWED

Easy To Use

30-Day Money Back

Friendly Support

Bitcoin Accepted

Ultra High Speeds

Leave Comment