Cybercriminals are constantly looking for new ways to manipulate victims online. With the right software in place and a general awareness of online threats, you can feel more guarded against an attack. Here’s a handy checklist to help you minimise your risk of being compromised.
1. Install quality antivirus
File sharing involves using technology to share files that are located on computers. You can use peer-to-peer (P2P) applications to share music, movies and games, or cloud storage services such as Dropbox or Google Drive to share files.
What is P2P?
Peer-to-peer (or P2P) technology works by connecting individual computers directly to share files across the Internet. P2P networking is popular in homes as the software is usually free and gives people easy access to download many types of files.
The popular use of online communications has given rise to online sexual predators who come up with creative ways to take advantage of unsuspecting men, women and teens. These predators use various methods to seduce or pressure a victim to perform sexual favors, and often threaten the victim with embarrassment if they don’t do it.
Online sexual blackmail is sometimes called Sextortion, or Romance Scam. Victims are usually lured through social media sites, and the blackmailers are often part of criminal gangs from foreign countries.
Spam are unwanted bulk messages sent through electronic messaging systems. The most widely recognized form of spam is sent through email, but can also refer to bulk messages sent through other media such as:
- Instant messaging spam
- Search engine spam
- Mobile phone text messages
- Junk fax transmissions
- File sharing spam
As businesses and individuals rely on emails for communication, it is critical to protect the information contained in emails against threats. Email is one of the most popular mediums for phishing attempts or virus distribution, especially through email attachments.
Email security threats
Ransomware is a type of malware that stops you from using your computer, and holds your data hostage. Typically, it will do this by encrypting your personal files or locking your computer screen. It may then require you to pay a ransom via a credit card payment, money transfer or cryptocurrency in order to unlock and use your computer. But even if you pay the ransom, there’s no guarantee it won’t happen again.