Cybersecurity Specialist: attackers are ready to wait for your mistakes for months



[ad_1]

Although the Lithuanian Court of Appeal ordered service providers to prohibit their customers from accessing the Linkomania website, such a decision does not frighten internet users. The electronic space away from comments on how to get around bans or other illegal ways to get free content.

"A free cheese – only in traps" – recalls a well-known saying to a cybersecurity specialist, an badociate professor at the Kaunas University of Technology's (KTU IF) School of Computer Science, best known under the pseudonym Guido in the electronic space.

Cybersecurity Specialist: attackers are ready to wait for your mistakes for months

In a message to the media, he warns that our cyber security is closely tied to the daily habits we use with computers or mobile devices. The guide lists the three most common elementary errors and their consequences. According to him, for the consumers, the simple indifference to the recommendations of the specialists is hindered.

Free Content – How to refine the bomb

According to the guide, Lithuanian Internet users like to download free programs, games and movies, often infected by various malicious viruses.

In addition, citizens are not only looking for entertainment content, but also "more serious things" online.

"A very common case when using free operating system antivirus programs, which are already damaged or not detected by all malicious viruses." By accident, users themselves install malware on their computer. devices, "he explains.

"The problem is that IT users use a wide variety of computer equipment depending on the type of hardware. Smart hackers will always find a loophole in your computer system and will eventually have access to a network device, "says KTU's cybersecurity specialist.

According to the Guide, this could be easily avoided if users used trusted Internet sources to restrict access rights to the connection and to use administrator permissions on computers. Another option is to rely on service provider recommendations, but consumers often discourage additional financial costs.

Nevertheless, a cybersecurity specialist recommends a reliable antivirus firewall (. Firewall and antivirus) and install it correctly. "If it's too complicated for you, you can call on IT professionals. They are quite numerous in Lithuania, "said the interviewer.

According to him, the specialist will install the necessary software packages. For mobile devices, this is supported by service providers. Of course, this is usually done for an additional fee, which is why consumers are not satisfied.

Collective warnings are sent unnecessarily

The guide cites another inappropriate habit: a junk computer user, even after installing a reliable antivirus, responds indifferently to outgoing program messages.

"If the user ignores messages indicating that the source is not trustworthy or if the downloadable file is infected with viruses, it will eventually infect his own device and the user will suffer." he observes.

A computer scientist in this situation sees a greater threat than it seems at first glance.

"The most dangerous thing is that the user can infect other devices by exchanging data with other users, by the way. It is here that is created a network of infested devices, which can already be used to produce large-scale cyber attacks, "warns the interlocutor.

This looks like a very common type of attack where the actions are based on an interaction with a network or computer user in which the attackers want to penetrate. Hackers try to force the victim to enter their data into a phishing site, called phishing site.

All available methods are used for this purpose: malicious links, infected documents, programs, etc. For example, a user uses a website that is not convinced of its authenticity, but in reality, the data may be disclosed to the hands of the initiators of the attack.

"Even an experienced user may not be able to separate the fraudulent site from the original because the copies are very convincing and, given the pace of our lives, it's sometimes not enough to notice a difference, even slight, "explains the interlocutor.

According to a security specialist, attackers are now very patient, sometimes ready to wait months before the user opens access to their devices or IT services. It depends a lot on the object attacked, but most often politicians, businessmen or other known personalities fall into the horror of the pest.

"Users of personal computers and work equipment should be aware of this risk and understand their responsibilities. Work computers should only be used for business purposes and should use proven software, "he said.

Security companies should pay particular attention to reducing the risk of piracy via browsers, e. e-mail clients, software, USB, etc. This would make it more difficult for hackers to commit data attacks, attacks.

Pbadwords should not be repeated

Another mistake of IT service users is the indifference to pbadwords. Current conditions allow users to access various computer peripherals, services requiring combinations of characters for authentication. Most users do not pay enough attention or interest in this subject. They continue to misuse unreliable and easy-to-guess pbadwords.

"Very often, computer users choose a pbadword too simple," observes the interlocutor. – Often, the same pbadword is used in different devices or services, the same combination of characters is used in email. e-mail, social networks and access to online banking.

According to the Associate Professor, many companies' security policies require employees to change their pbadword every few months. "However, most changes made by employees are not enough, only another number or symbol is entered at the end of the same pbadword," notes the KTU specialist.

According to the guide, consumers have trouble remembering many pbadwords. Choose easy-to-remember phrases, words with multiple symbols or numbers. However, these pbadwords are very easy to guess for malicious people.

According to him, each device and computer service requires a different pbadword. It must consist of different letters, numbers, and non-repeating characters. Different IT tools, such as Secure Pbadword Generator or others, can be used to create them.

Pbadword management programs can be used to manage many pbadwords required by the user. KeePbad, LastPbad, Roboform and others are some of the most popular.

The guide also recommends the prudent use of public Wi-Fi access, which increases the risk of hacking. According to him, the public Wi-Fi network allows to connect without pbadword, that is to say. that is, does not provide authentication functionality.

"Maliciously, you can easily compromise the settings of such a device and a user request can be directed to a fake source, a web page, or a connection information, such as the specification of an email address and the verification of the pbadword ", warns the specialist.

According to him, those who use payment via public Wi-Fi access to pay for tickets, goods and services, such as at airports, taxis, etc., are the riskiest.

15min.lt

[ad_2]
Source link