Security on this website and on the internet in general
You should always make sure that you are entering the data on a secure web page .
We advise you to follow the following security measures whenever personal data is requested while browsing the Internet:
1. Verify that the connection is through a secure server
You can do it in the following ways:
Using the address (URL) of the server
A secure server starts with https and not just http .
Look in your browser and look for a green padlock (in the field where you enter the address of the page, for example www.example.com) or the drawing of a whole key (it is not broken), which is in one of the corners from the bottom of the screen
Check the security certificates of the website:
To do this, press the padlock icon that appears when accessing a secure area, in the lower right (or left) of your browser, and check that the expiration date and domain of the security certificate are up to date.
The detailed information shows the issuer, the period of validity and for whom the certificate has been issued.
For this reason, there are people or platforms that do not act ethically and morally and try to take advantage of users on the network through various techniques. For this reason, from this page we will try to show the reader from the most common deceptions committed on the Internet, to tips to be able to navigate in a more secure way.
What are the most common deceptions on the web?
Next, we are going to list what are those tricks with which some hackers can endanger the safety of Internet users:
Nigerian fraud is a type of scam in which the victim receives an email with false information from “alleged” Nigerian officials. It explains that the user has money in that country that he cannot collect. But they would solve it if he pays a percentage of some debts that affect them.
Credit Card or Loan Prepayment Fraud
This case is one of the most common. A bank or a banking or financial entity informs a user that the money they have requested has been approved. However, to continue with the operation you must make a prior payment.
As in the previous cases, an Internet user receives an email –that to give it credibility, is often falsely sent by Microsoft executives-, in which they are informed that they have won a lottery ticket. And that to collect it you must pay a sum to pay for the shipping.
Phishing or identity theft
This form of fraud, phishing, is considered the most widespread on the web. It is based on obtaining personal information of the victims through false hacking notices. With these data, criminals can carry out illegal activities under a false identity.
SMS and call fraud
In this case, the victims are contacted by phone calls or text messages. Apparently they are well-known people, but who really seek to take advantage of it economically. On some occasions, answering these calls or messages may imply an extra cost on the telephone bill.
False donations or solidarity aid to collaborate with natural disasters
After a natural catastrophe (floods, earthquakes, etc.) there are many platforms of NGOs or other non-profit organizations that try to raise funds to help the affected country / city. Taking advantage of this situation, fraudulent people develop websites of non-existent or even known institutions to receive donations destined to collaborate with the victims of the disaster.
It is one of the classic frauds - and also by email. A person receives an email in their inbox where they are informed of a trip or rental of a property abroad at a great price. Of course, the question is that the offer is until that same day.
Ponzi or investment of money in a fake business
Scam consisting of an offer to a person, in which he is given the opportunity to join an investment to carry out a business. This person would pay for certain expenses but would be rewarded with the benefits of the same. However, it is all a lie.
Fraud Become a millionaire fast
It is the typical scam where a person is offered the possibility of getting a lot of money weekly without doing any work.
This scam is another of the most common on the web. Since the Internet has become a large market where a large number of various items are bought and sold, scammers have taken this opportunity to "sell" non-existent items, and collect the money in advance. Even if a card payment is made, personal data could be stolen.
How can risks on the Internet be prevented?
One of the tips that can best come to us, to users of web applications, mobile, or with profiles on social networks, is to close the session when you finish using it. Otherwise, any person with illegal purposes who enters the browser in which said personal session has been opened, can have access to that account.
- Another of the best tips to avoid hacking is to avoid typing easy or predictable passwords. Therefore it is recommended:
- Use sequences of numbers and letters, exchanging these with uppercase and lowercase and other types of symbolic characters. On the other hand, these should not be less than 6 digits.
- Furthermore, they should not be saved in digital notes, word processors, or in any document uploaded to the cloud.
- Change the password every little bit : avoid getting stuck with the same password. For this reason, it must be modified periodically - more or less every 3 months. And it should not be used for more than one account.
- Use safe browsers:
Chrome, Firefox or Safari browsers are safer browsers, which do not receive as many attacks from digital pests (spyware, viruses, etc.) as older ones.
Caution with discharges
On many occasions, Internet users have file download programs (such as Torrent, Emule, Ares, etc) on their computers. You should always check those downloads that are made, as they may contain any virus or plague that manages to steal data. And the same happens with those websites that need the installation of programs to be able to be executed.
Stay away from websites with questionable content:
Some web pages contain dangerous elements that search for problems in the Internet user's computer in order to access their system.
Caution of attachments in unknown emails
As the name of the epigraph indicates, care must be taken when receiving emails from strangers, whose content is doubtful and strange. And more, if it has any type of file attached, which can cause a virus to interfere with the software.
Keep your computer's antivirus and antispyware updated
Many users believe that having these programs installed on their computer is enough. However, harmful elements are created and renewed over time, so your antivirus must be updated to keep up with new dangers.
Keep your operating system up to date
The same as the previous point happens with the operating system of your computer. Keeping it updated makes it possible to avoid security flaws that could make it possible to hack, or introduce any type of digital plague.
Be discreet about the information you provide on the network
To avoid being more accessible to hackers or those who profit from fraud to third parties, you should try to avoid uploading personal information to social networks: home address, telephone number, and even photographs that may reveal any personal data.
What precautions should be taken when communicating with others on the network?
- Do not trust people you know on the Internet . Well, even though you've had a relationship with it for a long time, you don't have to be who you say you are.
- Not for the fact of referring to a person through the network should they be disrespected.
- Personal information should never be exchanged between Internet users such as: email, telephone number, name of work or school, residence address ... it can put the user's own safety at risk.
- Avoid meeting anyone you meet online. As we mentioned before, nobody confirms that he is who he says he is. And it can jeopardize your safety.
- Check the Google report for the website. Here you can see the transparency report of feminaust.org