How to avoid and defend against spoofing - Spoofing?

Who I am
Philippe Gloaguen
@philippegloaguen
Author and references

In the face of great innovations, big problems often come. Information technology and the Internet have had a strong impact on the pace of life of the company.

One of the biggest drawbacks is undoubtedly the high probability of suffering a digital or cyber attack. Few are aware of the big threats that can hide behind a web platform, file or program.

What is spoofing?

One of the biggest risks anyone can take when on the Internet is identity theft. As? Well, social networks are the easiest target, a place where you don't really know who is on the other side and what they are capable of doing.



Posting photos, videos and sharing different data and information allows other people to assume your identity for any purpose: from creating a fake profile to having multiple interactions or something more serious like a scam or harassment where you could end up suffering the consequences.

How to avoid identity theft?

Fortunately, there are a large number of steps you can take when it comes to increase the security rates of your social networks, email and any other platform where you can download documents, programs or any other type of file.

website address

What's the best way (besides being the easiest) to know that a page is safe? Through its URL. You just have to make sure it has the protocollo “https”. The security of this protocol is a favorite of banking platforms to protect against any attack and protect you from information leakage.

Email

The files may contain del malware specializes in collecting information from your computer to send it to third parties. So when you get a weird email, please keep the following in mind:



  • Email address of the sender of the message.
  • Which page does it refer you to? It is not recommended to log in to Web pages in which it is necessary to fill in forms with personal data (much less if they ask for information about their cards or bank accounts!).
  • Before downloading a file, you can open it on the platform, for example from Google Drive. This tool allows you to check that the document (Word, Excel, PDF) is virus-free.

Secure connections

Another important aspect is the type of network you are connecting to. Many cafes, restaurants or squares keep public networks available to anyone, but… can this affect you?

The answer is yes. It is always recommended to maintain a connection to networks with secure access settings: WPA, WPA 2 or WEP.

However, in case it is really necessary to establish a connection to a public network, pay attention to the security of the Web sites you visit or the applications you use.

Defense mechanisms

You don't have to wait for this type of situation to transcend the legal field (as it is a crime). Nothing better than protecting yourself to avoid bad times. Tools? Have remained! And here are the most important.

Up-to-date software, secure software

Malware develops alongside software, but the second element is usually more powerful than the first. Smartphones, tablets, computers, and other devices can be vulnerable if they keep a outdated operating system.


What to do with passwords?

Surely you have carried out, with great annoyance, some process of updating your passwords. But everything is for the best: the combination of letters, numbers, symbols and parameters such as not being similar to the five passwords used previously or not including personal data are of enormous importance.


To access the web platforms, we recommend the use of tools such as the password manager.

This feature is built into browsers and can be quite intuitive to use do not perform the autofill process a because of a threat on the page ... if so, exit.

Don't be part of the statistics

Every year millions of people suffer from spoofing. But thanks to these tips, you have what it takes to not fall for it. Share and protect others from spoofing!

TagsTutorial Internet
add a comment of How to avoid and defend against spoofing - Spoofing?
Comment sent successfully! We will review it in the next few hours.