Telegram lock and deadline for memes: 5 of the loudest scandals of the IT industry lately
Last year was rich in various scandals in the world of information technology. What is it worth blocking Telegram Roskomnadzor messenger or data leakage of 87 million Facebook social network…

Continue reading →

Hacking sites and CC
It's no secret that there are quite a few hackers on the modern Internet. Some of them are really high-class specialists, well versed in many technologies. Others, on the contrary,…

Continue reading →

"Half a Century in Space - The Epoch of Search"
On the eve of the atrium of the Novinsky Passage shopping center, Google held an exhibition “Half a Century in Space - Search Epoch”, timed to coincide with the 50th…

Continue reading →

8 things that in no case can not be done on the Internet, so as not to lose personal data

With the spread of the Internet, the era of accessible content, fast exchange of information and rapid communication at any distance began. However, along with all this came the problems, in particular, cybernetic crime. Malefactors on the Web can be incredibly creative in their quest to gain access to the user’s financial information or any other personal data. Here are a few things that you definitely never do on the Web.

1. Reply to suspicious emails.
Hackers just love to send fake notifications from different banks. Most often used for this message that the user must reset the password or his account was hacked. The victim may also offer to open the attachment. Using such letters, hackers not only collect data, but can also infect a computer. Remember, banks never solve issues in this way and never ask for your details.

2. Pay by card is not clear where
You should always pay attention to the URL of the place where you are going to pay by card. Attackers can fake whole resources by changing several characters in the name. Therefore, proven places should be added to your bookmarks. It is also recommended to enter the address manually. In addition, the site must have a secure connection “https”. You can check the site with the help of Whois services, which provide data and the owner of the domain, as well as information about how paid it is.

3. Agree to “upgrade browser”
Any messages on the Internet in the spirit of “Your browser is outdated” should be ignored. It is almost always an attempt by criminals to spread malware or steal data. Remember that most modern applications are updated on their own (if they are licensed).

4. Transfer money to a friend
One of the most common methods of fraud in social networks. Hackers hack a user account, and then ask his friends in one form or another to help financially, even “put money on the phone.” You should not give money to anyone until you communicate with your friend personally outside the social network.

5. Agree to pay for unlocking a PC
In recent years, extortion programs have become incredibly popular. They limit the work of the PC, blocking files and systems, and require a “ransom.” Most often it is a small amount in cryptocurrency. Paying hackers is not worth it, since they almost never unlock anything, and getting them money only motivates them to continue to commit such crimes.

If you become a victim of such a hack, you should use special tools from anti-virus companies. For example, Kaspersky WindowsUnlocker (it is absolutely free). In addition, you should regularly update the system and software, install an antivirus and use only licensed software.

6. Leave too much information about yourself
Technology has gone very far, and today the user can become a victim of even the digital theft of his identity. Most often this happens if he leaves too much information about himself, and also uploads too many photos to the network. In addition, it is not recommended to leave a personal phone number on the network, as it may be included in the spam mailing lists.

7. Install a pirate sofa

Needless to say that using unlicensed software is bad. Anyone who still does this gets minus five points to karma. If karma motivation is not enough, then it is worth remembering that hackers love to insert malicious code into software distributed through third-party sources.
In official stores, however, caution should also be exercised. No need to install alternative versions of known programs for the sake of gaining access to “enhanced functionality”.

8. Transmit important data through public Wi-Fi
When using an unprotected network at home or in public places, you should not only transfer any important data, but even enter account names and passwords, make purchases, enter the online bank. It is worth using only a secure connection or your mobile Internet. Free cheese is only in a mousetrap!

Are you interested in cyber security issues? Here is a little romance, about 10 unsurpassed hackers in the history of mankind who have left their mark on history.

Ordering a SERM service: the principles of online reputation management and the price of a question
It is quite difficult to earn a good reputation in the market of any company, including financial, and sometimes it takes more than one year. But often the company's brilliant…


How to increase blog traffic
At this stage of the development of the Internet, the blogosphere is of serious interest from the business. Thus, the value of one unit of the blogosphere, that is, the…


10 effective ways to "squeeze" the maximum out of your Wi-Fi router
What could be worse in the daily life of a person of the 21st century than a slow Internet? The fall in Internet speed leads to the destruction of nerve…


Fathers and Sons of the Digital Millennium: Another Brick in the Wall
The emergence of the Internet not only connected nations and continents in a globalized rush, but also inserted its small brick into the eternal wall separating fathers and children, as…