Connect to free Wi -Fi networks, grant excessive permissions in the ‘apps’ or create weak passwords and reuse them on different platforms are some of Online mistakes that Internet users comment daily and that allow cybercounts to access their personal information.
Mobile phones and computers are electronic devices that have become essential for people’s day -to -day Search for information and access social networksbut also for carry out financial activities and communicate with friends and familyaccording to the report ‘The Digital Society 2024’, of the National Observatory of Technology and Society (ONTSI).
This extended use of electronic devices to access the Internet and the proliferation of digital services and platforms also means that Internet users They manage a lot of personal datawhich can be exposed in case of cyber attacks, but also due to daily practices that impact security.
Everyday ‘online’ errors
For example, connect to Wi -Fi networks in coffee shops, airports or shopping centers It is a way to save on the use of contracted mobile data, especially if you do not have an unlimited plan or is abroad. But this action involves “a great risk”, as the researchers from Check Point Software warm.
“When connecting to a public wifi network, cybercriminals They can intercept the connection and access personal data without the user“They explain. Therefore, they advise to use a virtual private network (VPN) to encrypt the connection and deactivate the automatic connection to Wi -Fi networks. In addition, they insist that, when you have to deal with vulnerable information, you better opt for mobile data .
Applications usually request permission to access sensitive elements of the ‘smartphone’, such as the camera, the microphone or the contact agendain order to enable their basic functions. However, there are ‘apps’ that ask for unnecessary permits, which are not fundamental for their operation.
From the security firm they explain that “this can lead to The improper use of personal data or in your sale to third parties without users being aware “, and therefore advise reviewing the permits that the application will request before installation and deactivate those that are not essential.
Another error is related to passwords. The use of a simple key or always repeat the same in different digital services “remains a usual practice”, Experts point out, who also refer their risks in suede a filtration or a security gap.
“To be safe in the face of any violation it is necessary to put several measures in motion: create unique passwords for each service, use a password manager and activate two steps (2FA) verification for greater security,” they advise.
They also underline the need for Have protection measures on the electronic device itself, as a pin key, a pattern or biometric recognition (fingerprint or face). “Without adequate security measures, anyone could access emails, social networks, bank data and personal documents,” they warn.
Check Point researchers do not forget artificial intelligence (AI), whose use through The ‘chatbots’, such as Gemini or Chatgptit helps to boost productivity, but its misuse can put sensitive data in risks.
“Some people They introduce sensitive data without considering the consequences“, they explain. This information can be stored in the ‘chatbot’ or be used in AI training, so that it can appear later in response to some consultation.
“To use them in a safe way, you have to avoid sharing confidential information in AI chats, review the privacy policies of each tool and, when using it in corporate environments, versions with higher guarantees of safety must be used,” they point out.
This is bound that cybercriminals also use AI to create more sophisticated attacks, As emails of highly personalized phishing or ‘Deepfakes’ -Manipulations of images, videos and audios- convincing.
In the case of ‘phishing’ attacks, with artificial intelligence the cybercriminals They mimic messages of banks, shipping companies or even personal contacts. They usually include a link or file to download, and click on these elements “can expose passwords, install malware or allow identity theft”, warn from Check Point.
To avoid falling into the trap, they always verify the address of the sender, not click on suspicious links and, in doubt, directly contact the company or person who has supposedly contacted.
“The tips to stay safe when navigating the Internet may seem basic and repetitive, but there are still many users who tell these errors every day without knowing the risk they run,” said Check Point Software technical director for Spain and Portugal, Eusebio Nieva, on the occasion of the Safe Internet Daywhich is celebrated this Tuesday, February 11.
dancerabbott1981 – My blog
622weigher | Ofertizer.com
Page not found – Tutunde
스포츠 베팅의 가장 일반적인 유형은 무엇입니까?
Sol Wesler – Skills Hub
messyhabituallaverna – Aerokings Pvt Ltd
Health Center Turkey – Find best clinic for your health | Add Clinic
Mywheels: Buy & Sell Cars, Bikes & Autoparts -Find Car
Author Profile | Good Soil
My Profile – TIDYMYROOM.COM
My Profile – Remembering Alex – Our Grand Master
wealthyarrogantmelina626 – Career | Momentum group INC
كاظم الياسري للاعلان
privatewilliamhudson60 – Rise Real Estate Aruba
aldoscup – Career Spotlight
Author Profile | Blue Locator
Heroes In Waiting
분수, 소수점, 머니 라인 배당률의 차이점은 무엇입니까?
helplesspainfulrhonda82 – Terraltos
Author Profile – Ben Colman – Elders Real Estate
Author Profile –
Auto OnlineList Car
2022slopeshadiack – Ask a Mud Pro