123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Technology,-Gadget-and-Science >> View Article

Busted : Common Web Security Myths

Profile Picture
By Author: Wisemonkeys
Total Articles: 277
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Hi Everyone Today we are going to describe the most common web security myths that we all have came across. Also we will describe how true the myths are and the fact behind it. So let's Start :

Myth : You only get viruses from the shady areas of the internet.

Fact : Not all malware and viruses come from torrent sites or adult websites. While user who frequently visit more obscure areas of the web may be more likely to get infected, hackers are increasingly taking advantage of mainstream websites to infect visitors. Hackers infect more popular sites by attacking ad networks and inserting malware into ads. Even if the site itself has a good reputation, if it runs ads that your network security is not actively verifying , you could be a victim of drive-by malware. ADVICE : Careful where you click, especially when it comes to ads.

Myth : No one will hack me. I don't have anything.

Fact : If you think there's nothing of value in your laptop or smartphone, think again. it's not just banking credentials cyber criminals are after. Bad Guys target individual employees to gain corporate account credentials ...
... that can be used as a doorway to get deeper inside a corporate network. Small organizations are increasingly targeted because they are less likely to have sophisticated security plans in place. ADVICE : Use Secured and varied passwords for all your accounts.

Myth : I have a MAC, they don't get viruses or malware.

Fact : For years MAC users have bragged about their impenetrable laptops, and for good reasons. Compared to the virus riddled world of PC's MAC's have remained unaffected by a large amount of attacks. But now MAC's are found to be vulnerable by various trojans ( like the Flashback trojan ), making them penetrable. Security firms are taking greater action to protect apple products too including your iPhone and tablet. ADVICE : Stay in sync with the recent updates of your security softwares and remember that all devices are vulnerable.

Myth : I am safer on my phone then on my desktop.

Fact : Smartphone users may feel safe when navigating apps and websites, but it actually is an ideal environment to execute phishing attacks. In many cases, best practice to identify phishing scams no longer apply in mobile mail client. It's hard to authenticate a sender or mouse over a hyperlinked text to identify destination domain. ADVICE : Visit websites by directly entering url through browser and not through some forwarded message.

Myth : I have an antivirus, I don't have to worry about anything.

Fact : Antivirus relies on the previous knowledge of a threat to protect you. And the truth is, threats have always evolved a step ahead of technologies that seek to protect against them. Antivirus repositories are filled with about a hundred million digital signatures and yet a new threat arises every day. ADVICE : Don't completely rely on just antivirus. Building a complete secure network or a security strategy requires multiple layers of protection. Antivirus is just one of them. You should have vpn, configured firewalls, honeypots and database backups to stay secure. Found it Interesting? Got Something to ask?? Follow me : Taha Chatriwala(https://www.tahachatriwala.in/)

Launched to world in 2017, Wisemonkeys(https://wisemonkeys.info/) is now a robust Learning management system.
Just follow a 3-step registration process and get connected. Since we appreciate genuine users and do not encourage spammers we follow small registration process:
1.Sign up(https://me.wisemonkeys.info/login)
2.Confirm your email. (for the first time the email might fall in your spam/junk/promotion folder. Please mark it not spam and confirm the link).
3.Login and get started.
4.Or Login via Google/Microsoft.

Our hardworking team is thriving hard to make this platform better and better. If you have any suggestions and feedback, then do write to us at: genius@wisemonkeys.info

Total Views: 169Word Count: 626See All articles From Author

Add Comment

Technology, Gadget and Science Articles

1. The Benefits Of Outsourcing To Architectural Rendering Companies
Author: Vizent

2. Custom Gpt Development: A Reverse Engineering Approach To Success
Author: Sonu Kumar

3. Best Drone Camera Price In Dubai
Author: Rohit

4. Upgrade Your Charging Game: Shield's 200w & 165w Gan Chargers Now Available On Flipkart & Amazon
Author: Tiitan

5. Call Planning In Pharma: Strategies For Boosting Sales Success
Author: Jesvira

6. Why Ios App Development Services Are Essential For Your Business
Author: Perfectiongeeks

7. Enterprise Web Applications Drive Innovation In Mobile Application Development
Author: Khurath

8. Reducerea Cheltuielilor și Creșterea Performanței Prin Închirierea Unui Copiator Color
Author: CopyService Total

9. Secure Your Business With Microsoft 365 Services By Entrust Network
Author: Entrust Network Services

10. The Role Of Architectural 3d Modeling In Virtual Reality Applications
Author: Vizent

11. The Role Of Erp Software In Modernizing Colleges, Institutes, And Universities Operations
Author: Libsys Ltd

12. Unlock New Opportunities At The Triple Play Realtor Convention & Trade Expo 2024
Author: Andy Kowalski

13. Why 3d Product Rendering Services Are Essential For High-end Furniture Brands
Author: Vizent

14. Unlock The Full Potential Of Your Tractor With The New Holland Tn55, Tn65, Tn70, Tn75 Tractor Shop Service Repair Manual Pdf
Author: Heavy Equipment Manual

15. Call Answering Services For Small Businesses: A Cost-effective Solution
Author: Eliza Garran

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: