Every day, millions of people become victims of cybercrime. These are usually not targeted by professional hackers, but fall victim to large-scale attacks by chance.
How does something like that happen? The attack vectors are versatile:
- Phishing emails
- modified files
- Drive-by downloads
- Bad passwords
- Physical access
- Removable media (e.g. BadUSB)
Attackers constantly scan the Internet for vulnerable systems in order to abuse them for their own purposes (e.g. distribute malicious code via drive-by downloads) or regularly send phishing emails to purchased mail listings.
I refer to these types of ‘attacks’ as background noise, as they occur in large numbers, but usually only compromise poorly protected systems.
In my circle of acquaintances I am often asked how I protect myself on the Internet. My response includes the following recommendations, while emphasizing that they only protect against the background noise mentioned above.
#1 Up to Date
There is no easier target for hackers than outdated systems, because exploits have often already been published for these systems, enabling them to be compromised in a very short time. Example Wannacry
Always keep software up to date!
I have already explained this in a past blog post. In summary, you should avoid the following things (excerpt blog)
Choose secure passwords!
#3 Virus protection
Again and again there is a discussion about the usefulness of virus scanners. In short: Yes these are powerless when professional hackers are involved (also here there is already a good blog post😉 – No these are not useless if we want to protect ourselves against the background noise. It should be noted, however, that only paid virus scanners offer acceptable protection. Which manufacturers to choose? See for yourself:
Use paid virus protection!
Common sense is another essential aspect that will significantly increase your level of protection. Regarding PhishingMails I have already created a nice blog post. Other things which should be considered:
Calls from cops, Microsoft/Apple employees, PayPal, etc. Follow 98% other views than to help. In these cases, get the person’s contact information and end the call. Then call the official phone number of the provider, which you can find on the respective website (e.g. Microsoft) and describe your case. This quickly clarifies whether or not this was an authorized call.
Think first, then click!
Most private WLAN routers have authorization via WPS enabled by default. Most users don’t know about this feature and this standard often has sensitive security holes. These are two good reasons to disable this mode. Use your router’s guest WLAN feature for devices you don’t fully trust (e.g. SmartTV) or friends’ devices to separate your important systems (e.g. computer, network storage, etc.).
Use the security functions of the router!
#6 User accounts
If the computer is compromised, the hacker usually gains the rights of the logged-in user. Therefore please create at least 2 users on your system. An administrator and a user without administrator rights. Uses the normal user for all activities. The administrator is only used when setting up the computer or a password query is made when new software is installed. This also has the advantage that other people in the household (e.g. children) cannot install the wrong software 😉
Select different user accounts!
#7 Selection of hardware and software
Other ways to install unwanted software (possibly malware):
- download illegal videos (e.g. VLC Player)
- Third-party download portals (e.g. installers with adware)
- Cheap hardware (e.g. backdoored smartphones)
Hardware and software from trustworthy sources!
Provided that the above recommendations are implemented, you can successfully defend yourself against the background noise and move relatively safely on the net. If you have any questions, please feel free to contact me.
If you liked this post, I would be happy to add you as a new follower on Twitter😉