Internet security

Security on this website and on the internet in general

You should always make sure that you are entering the data on a secure web page .

We advise you to follow the following security measures whenever personal data is requested while browsing the Internet:

1. Verify that the connection is through a secure server

You can do it in the following ways:

Using the address (URL) of the server
A secure server starts with https and not just http .

Look in your browser and look for a green padlock (in the field where you enter the address of the page, for example www.example.com) or the drawing of a whole key (it is not broken), which is in one of the corners from the bottom of the screen

Check the security certificates of the website:

To do this, press the padlock icon that appears when accessing a secure area, in the lower right (or left) of your browser, and check that the expiration date and domain of the security certificate are up to date.
The detailed information shows the issuer, the period of validity and for whom the certificate has been issued.

At feminaust.org we are certified by COMODO CA Limited . In addition .

Today, millions of people routinely use the Internet on a daily basis. And many of these carry out operations in which personal data, account numbers, debit or credit cards etc. are needed.
For this reason, there are people or platforms that do not act ethically and morally and try to take advantage of users on the network through various techniques. For this reason, from this page we will try to show the reader from the most common deceptions committed on the Internet, to tips to be able to navigate in a more secure way.

What are the most common deceptions on the web?

Next, we are going to list what are those tricks with which some hackers can endanger the safety of Internet users:

Nigerian fraud

Nigerian fraud is a type of scam in which the victim receives an email with false information from “alleged” Nigerian officials. It explains that the user has money in that country that he cannot collect. But they would solve it if he pays a percentage of some debts that affect them.

Learn more

Credit Card or Loan Prepayment Fraud

This case is one of the most common. A bank or a banking or financial entity informs a user that the money they have requested has been approved. However, to continue with the operation you must make a prior payment.

Fake lotteries

As in the previous cases, an Internet user receives an email –that to give it credibility, is often falsely sent by Microsoft executives-, in which they are informed that they have won a lottery ticket. And that to collect it you must pay a sum to pay for the shipping.

Phishing or identity theft

This form of fraud, phishing, is considered the most widespread on the web. It is based on obtaining personal information of the victims through false hacking notices. With these data, criminals can carry out illegal activities under a false identity.

Learn more

SMS and call fraud

In this case, the victims are contacted by phone calls or text messages. Apparently they are well-known people, but who really seek to take advantage of it economically. On some occasions, answering these calls or messages may imply an extra cost on the telephone bill.

False donations or solidarity aid to collaborate with natural disasters

After a natural catastrophe (floods, earthquakes, etc.) there are many platforms of NGOs or other non-profit organizations that try to raise funds to help the affected country / city. Taking advantage of this situation, fraudulent people develop websites of non-existent or even known institutions to receive donations destined to collaborate with the victims of the disaster.

Travel scams

It is one of the classic frauds - and also by email. A person receives an email in their inbox where they are informed of a trip or rental of a property abroad at a great price. Of course, the question is that the offer is until that same day.

Ponzi or investment of money in a fake business

Scam consisting of an offer to a person, in which he is given the opportunity to join an investment to carry out a business. This person would pay for certain expenses but would be rewarded with the benefits of the same. However, it is all a lie.

Learn more

Fraud Become a millionaire fast

It is the typical scam where a person is offered the possibility of getting a lot of money weekly without doing any work.

Online shopping

This scam is another of the most common on the web. Since the Internet has become a large market where a large number of various items are bought and sold, scammers have taken this opportunity to "sell" non-existent items, and collect the money in advance. Even if a card payment is made, personal data could be stolen.

How can risks on the Internet be prevented?

Log out

One of the tips that can best come to us, to users of web applications, mobile, or with profiles on social networks, is to close the session when you finish using it. Otherwise, any person with illegal purposes who enters the browser in which said personal session has been opened, can have access to that account.

Difficult passwords

  • Another of the best tips to avoid hacking is to avoid typing easy or predictable passwords. Therefore it is recommended:
  • Use sequences of numbers and letters, exchanging these with uppercase and lowercase and other types of symbolic characters. On the other hand, these should not be less than 6 digits.
  • Furthermore, they should not be saved in digital notes, word processors, or in any document uploaded to the cloud.
  • Change the password every little bit : avoid getting stuck with the same password. For this reason, it must be modified periodically - more or less every 3 months. And it should not be used for more than one account.
  • Use safe browsers:

Chrome, Firefox or Safari browsers are safer browsers, which do not receive as many attacks from digital pests (spyware, viruses, etc.) as older ones.

Caution with discharges

On many occasions, Internet users have file download programs (such as Torrent, Emule, Ares, etc) on their computers. You should always check those downloads that are made, as they may contain any virus or plague that manages to steal data. And the same happens with those websites that need the installation of programs to be able to be executed.

Stay away from websites with questionable content:

Some web pages contain dangerous elements that search for problems in the Internet user's computer in order to access their system.

Caution of attachments in unknown emails

As the name of the epigraph indicates, care must be taken when receiving emails from strangers, whose content is doubtful and strange. And more, if it has any type of file attached, which can cause a virus to interfere with the software.

Keep your computer's antivirus and antispyware updated

Many users believe that having these programs installed on their computer is enough. However, harmful elements are created and renewed over time, so your antivirus must be updated to keep up with new dangers.

Keep your operating system up to date

The same as the previous point happens with the operating system of your computer. Keeping it updated makes it possible to avoid security flaws that could make it possible to hack, or introduce any type of digital plague.

Be discreet about the information you provide on the network

To avoid being more accessible to hackers or those who profit from fraud to third parties, you should try to avoid uploading personal information to social networks: home address, telephone number, and even photographs that may reveal any personal data.

What precautions should be taken when communicating with others on the network?

  • Do not trust people you know on the Internet . Well, even though you've had a relationship with it for a long time, you don't have to be who you say you are.
  • Not for the fact of referring to a person through the network should they be disrespected.
  • Personal information should never be exchanged between Internet users such as: email, telephone number, name of work or school, residence address ... it can put the user's own safety at risk.
  • Avoid meeting anyone you meet online. As we mentioned before, nobody confirms that he is who he says he is. And it can jeopardize your safety.
  • Check the Google report for the website. Here you can see the transparency report of feminaust.org

More information about internet safety

Internet privacy and security guide

Internet Safety - Google

How to improve internet security - La Vanguardia

Computer data theft and cryptographic protection

Contact us | Frequently Asked Questions | Privacy

About the author

Sashia Margaret Applby

Autor: Sashia Margaret ApplbyMy passion is to create content that informs and really helps our users.
I am a journalist. Graduated from the Economical University of Lagos and Master in International Relations and Communication from the Joan Eversmith Applby University of Lagos. Responsible for blog content and user relations at feminaust.org.

LinkedIn

Leave a comment

thirteen - two =

This site uses Akismet to reduce spam. Learn how your comment data is processed .

Use of cookies

We use our own and third-party cookies to improve services, obtain statistical information and display personalized advertising through the analysis of your browsing. If you continue browsing, we consider that you accept our cookie policy , click the link for more information. TO ACCEPT

Cookie Notice
en