
DEFEND FROM HACKERS
DEFEND YOURSELF
How to defend yourself from hackers
Cyber security is an increasingly hot topic due to the exponential growth of threats, especially from email. In fact, one of the favorite means of virus writers to nest malware on computers and systems is e-mail.
Spam campaigns, which change quickly to avoid detection, use various methods, such as sending Trojan keyloggers or links to pirated websites, in order to steal confidential, personal and business information. While there are products and solutions to defend yourself, sometimes common sense is enough and adopting these few and simple rules when receiving an email.
Phishing
Most cyber attacks that exploit social engineering techniques are identifiable as phishing. But what does such a virus look like? Simple, it's almost always an email that appears to come from the bank or insurance. It looks urgent and includes a clickable link. However, if we look closely at the email, we quickly spot some suspicious clues. Such as wrong URLs, gross grammar errors and commercial logos different from the official ones. To understand if the link in the message is reliable or not, just hover over it with the mouse cursor (but don't click) and check the name of the link. Or insert it into one antivirus scanner specific.
LINK
• Beware of links and attachments
• Change your password and scan your device periodically
• Create an effective password
CREATE PASSWORD
Create an efficient password
To create a password with medium-high efficiency it is advisable to follow these precautions:
1 • Make sure you do not enter a previously used password.
2 • Do not use words or numbers and dates that can lead you to yourself.
2 • Create passwords by mixing numbers, uppercase and lowercase letters, and special characters such as symbols and punctuation marks.
3 • Create a password that has at least 12-15 characters.
4 • Do not use the same password on multiple platforms, services or accounts.
5 • REMEMBER: to keep your password efficient, it is not enough to create a difficult password, it must be changed periodically. An old password is more at risk of being stolen.
Read our instructions for changing your password.
If in doubt, or for assistance, write to USER200_2006@LIBERO.IT or fill out the form at the bottom of this page
CHANGE PASSWORD
Change your password and scan your device periodically
Devices that access the web can be victims of viruses.
It is a good idea to periodically carry out a full antivirus scan of all PCs, mobile phones, tablets that you own. Some antivirus also allow periodic scheduling. It is also advisable to change your passwords periodically: an old password is more exposed to the risk of being stolen.
When you notice strange behavior of the device, it is advisable to perform an antivirus update and force a new scan so as to exclude that malicious traces have nested in the device. Once you have ruled out the presence of malware, change your passwords.
ATTACKS
Syntactic attacks and semantic attacks
There are two large families of hacker attacks: syntactic and semantic. The first are those who use a malicious piece of software to infect our devices. These include viruses, the aforementioned worms and Trojans. Viruses are mainly spread with email attachments and malicious file downloads. Worms, on the other hand, are mostly found on untrustworthy websites, while Trojans are almost always spread via email. Among the semantic hacker attacks we find, however, phishing attempts and above all ransomware. For those unfamiliar with them, the term ransomware in computer science means a type of malware that limits access to the device it infects, requiring a ransom (ransom in English) to be paid to remove the limitation.

Contact
Like what you see? Get in touch to learn more.