22

Check your computer’s security: 10 steps to improve protection against hackers

Since the beginning of the full-scale Russian invasion, Ukrainians have increasingly become targets for cybercriminals. Among the recently discovered threats is a malware program from the Armageddon group, which is downloaded by opening attachments in emails supposedly from the National Academy of the Security Service of Ukraine (SBU).

Moreover, new online fraud schemes regularly appear on the Internet, particularly, scammers have been spreading messages about “Red Cross assistance” with phishing links in popular messengers. To steal login data for online banking, scammers disguised themselves as representatives of Ukrainian banks.

Considering the constant cyberattacks and fraud targeting Ukrainian users, ESET specialists have prepared a list of the most common online threats and effective computer security tips.

1. Phishing attacks

Attacks on Ukrainian users.
As a rule, cybercriminals disguise themselves as legitimate and trustworthy sources, including representatives of banks, technology companies, and retailers. The goal of the attackers is to convince the victims to click on a link or open attachments in the email. After that, users are directed to a fake website that asks them to enter certain personal information, such as account or financial details, or secretly downloads a threat onto their device.

2. Dangerous downloads and malicious ads

In some cases, visiting an infected website or a resource with dangerous advertising can lead to the download of malicious software. As a rule, well-known websites are not attacked due to their enhanced security, but this is not always the case. Therefore, it is important to use a solution for computer and laptop security that provides protection against online threats, as well as to check the correctness of the browser’s privacy settings.

3. Digital skimming

Hackers can also compromise the payment pages of e-commerce sites using malicious software to collect card data as the user enters it. It is difficult to protect against this type of threat because the problem is related to the provider. However, making purchases on verified websites can reduce the risk of data theft by malicious actors.

4. Malicious programs and files

Cybercriminals also disguise malware as seemingly legitimate programs. Most of these applications are available on online forums and other third-party platforms. Therefore, you should only download programs from reliable sources and use an effective solution to check for malware on your device.

How to improve computer security

Set up automatic updates for the operating system and all applications on the computer.
Check the device for unknown applications and remove the applications you do not use. Since the fewer applications on a computer, the lower the likelihood of their vulnerabilities being exploited by malicious actors.
Install a multi-layered computer security solution.
Set up and perform regular data backups, which should be stored on a separate device.
Protect your browser by configuring privacy and security settings, and ensuring you have the latest version.
Enable and configure the firewall on the operating system and home router, and also check the correctness of its settings, including the installation of a strong password.
Use multi-factor authentication to protect accounts from hijacking through phishing attacks and other threats.
Avoid using unknown USB drives, as they may contain malware.
Use a password manager to store unique credentials that are hard to crack.
Download applications and files only from trusted sources, and avoid using pirated materials, which often can spread malware.
However, even following all these recommendations, the risk of online threats remains. Therefore, always exercise caution, do not respond to unwanted emails and online messages, and ensure proper protection of important data on your device, particularly with a solution that includes encryption features.

Add a Comment

Your email address will not be published. Required fields are marked *