Beyond the popular threats security cyberspace, such as ransomware and long-range data leaks, there are lesser-known threats that nevertheless do not cease to be dangerous to your personal data. Here are some of them:
A small USB the stick may not look like much dangerous, but these portable drives can carry many threats to your device - especially if they are specifically designed for this purpose. You should be cautious when connecting a USB to computer if you are not sure where it comes from.
In our time it is customary to have many accounts in various sites. It's important to take the time to close these accounts and not just uninstall the connected app from our phones when we no longer need them. So if one of them gets a data breach for example, our data will not be included in the leaked data. It is also worth checking regularly for third party applications and services linked to the main accounts.
Unreliable browser extensions
Proper browser extensions can add useful features and features to your browser, but these add-ons need to be controlled like any other software, since they can see everything you do online if they want. If you choose the wrong extension for it browser it can lead to your browsing data being leaked, harassing you with ads, or installing unwanted software. We recommend that you minimize the number of browser extensions you have installed and select only the extensions you know and trust.
They may seem harmless and fun, but they can also be used to collect your personal information. These quizzes can be used to create more detailed profiles of users and their friends, collecting not only quiz responses but also other information stored in linked accounts Facebook. Just think about how often they request personal data.
Be careful with anything that asks for personal information or personal photos from you or that requires a connection to one of your social media accounts.
There's nothing wrong with posting photos to your favorite networks, but think twice about what other people can collect from the photos you've published - especially in the places where you live and work.
While many applications like Instagram and Facebook automatically remove location data stored with photos, some others such as Google Photos, can keep this data built into the file. Information such as where you work or where you live can help someone commit an identity theft scam or even come home. The less your public photos say about you, the better.
Our homes are getting smarter, which gives them hacker and malware vendors a new set of devices to target. To avoid such a case, start by choosing well-known, trusted brands with a strong track record. After that, make sure that both your smart home and your router are updated with the latest software.
If your smart home and accounts need passwords, make sure you choose a complex and difficult password that you don't use anywhere else and enable two-factor authentication, if available, as an additional level of protection.
Malicious charging cables
The usual charging cables that come with your gadgets are designed for charging, but there are also specially designed cables that look very much like them and can be used for malicious actions.
These cables are very similar to genuine products, but can give hackers remote access to a device once connected. All you need to do to stay safe is to use the cables that come with your devices or from reliable sources. As in the case of USB stick, do not assume that any cable out there is secure.