YouMMe Movie: Web Privacy
Identity theft
Background information
Identity theft means that an unknown person receives the victim’s personal information and begins acting on their behalf. In most cases, the environment is deceived and / or the reputation is damaged. With access to images, bank, health insurance or other information, these can also be misused. How can this happen?
- When we reveal our email or Facebook password (wanted or unwanted).
- With phishing or data theft if an email brings us to provide our user information.
- By infecting the computer with a virus (“keylogger”), which records the keystroke and sends the intercepted passwords to the attacker. For fraudsters, publicly available computers are the most popular target.
The greatest danger here is unauthorized access to the mailbox, so that all emails of the victim are intercepted. Is the user’s email address linked to other online services, e.g. Facebook, the perpetrators can also access further passwords and information, which they can then misuse.
Phishing
During phishing, the perpetrators get fake websites, e-mails or short messages to a user’s personal data (e.g. credit card number, user name and password, digital certificates and other data) in order to commit theft of accounts, for example, with the data received.
Pharming-Attack
Pharming is a technical attack that is based on manipulating DNS requests from websites. The user is convinced that he is on the right page because he uses the right URL address, which leads him to the wrong page. There he then enters his personal information in the forms contained on such pages.
Social Engineering
Here, social manipulation, i.e. interpersonal influence, is used to induce certain behaviors in the victim, e.g. B. the disclosure of confidential information such as personal or identification data or the release of funds. Social engineering takes advantage of people in precarious situations (e.g. under pressure). It is also a practice of political and social influence through communication, e.g. in politics.
Viruses, computer worms and Trojan horses – Trojans
These terms stand for malicious codes that are in files. When infected files are opened, the virus spreads on the computer. This allows you to control the infected computer, delete files, or steal personal information. Around 500 new viruses are found every week. The most common are spam emails.
Spyware (Spyware)
These are programs that exploit the security gaps of your browser when surfing the Internet to infect the computer. Sometimes spyware is also hidden in freeware (free programs) or screen savers. Spyware can change settings, store usernames and passwords, and send other sensitive information to offenders.
Basic cyber hygiene guidelines – passwords, updates and backups:
- Use password manager and, if necessary, activate the confirmation in two steps to receive an additional password for your user account by SMS or via a special APP.
- Change your passwords regularly!
- Do not use the same password twice!
- Do not give your password to anyone!
- Keep your devices up to date and think of regular backups.
4 cyber hygiene rules:
- Don’t believe big promises!
Be vigilant on promises that are “too good to be true”: particularly low prices in online shops or large inheritances, cheap loans, prize money that will be announced by email. Often these are attempts at fraud. Do not reply to such emails and leave dubious shop pages.
- Make a backup copy
Back up your data on an additional hard drive that is not permanently connected to your PC. Even if you access your computer, you won’t lose your data.
- Store passwords securely
If you have to write down your passwords, do not keep the note near the PC or use a password safe in the cell phone
- It doesn’t have to be a profile picture
Most criminals search for their victims on Facebook or Instagram, where they publish a fake profile with appealing pictures. You send a friend request, start a conversation, and build a relationship. This can lead to harassment, money requests or extortion. Do not accept friend requests from strangers. Never share confidential or intimate records with strangers you’ve only met online!
Online scammers play with our fears, even if we know that we have done nothing wrong. Do not respond to threats if you receive an email claiming your computer is infected with a virus that has recorded them through your camera.
Helpful Tips for parents
Find a conversation with your children and let them know that online, like in real life, there are people who want to harm them or their family. Above all, give them the security that they can always contact you when they need help.
- Show them examples that they themselves perceived as attempts to access your data, e.g. Inheritance emails etc.
- Protect your computer and mobile device with a firewall and antivirus software that you update regularly. If you can’t install it yourself, get help.
- Place your computer in the living room and explore the Internet with your children. Let them also teach you about new technologies.
- A general internet ban is not a solution. Talk to your kids about what they’re doing online. Let your children trust their feelings – if they feel uncomfortable with anything online, let them tell you about them.
- Children should not post personal information online. You should e.g. use a nickname in chat that doesn’t reveal their identity.
- Teach your children that not everything they read or see on the Internet has to be true. Encourage them to ask and check other sources if they are unsure.
- Do not allow your children to meet “friends” on the Internet without your knowledge. Explain to them that Internet friends may not be what they present themselves as.