那里有成千上万的网络安全威胁(thousands of cybersecurity threats),并且不断出现新的变种。这就是为什么学习如何保护您的计算机免受黑客攻击、欺诈、恶意软件、隐私侵犯和其他形式的网络安全攻击很重要的原因。
本文将汇编有用的提示,以保护您自己、您的在线帐户和数据免受未经授权的个人的侵害。它还将提供安全工具和资源的汇编。最后,您将学习大量在线保护和安全提示(online protection and safety tips)。
强密码很重要
门上的锁可以防止窃贼。密码执行类似的功能,防止未经授权访问您的设备和在线帐户。但是,弱密码与没有任何密码一样好(或更糟)。这就像有一扇门的锁很弱。
您的密码不必复杂或过长。它们只需要是唯一的(或困难的),未知方就可以假设、猜测或破坏。理想情况下,您应该使用您可以制定的最安全的密码(most secure password you can formulate)。避免(Avoid)使用您的姓名、生日、孩子姓名、宠物姓名、出生地、伴侣姓名、结婚纪念日等个人信息作为密码。这些细节是公共知识,专业黑客可以轻松访问。
强密码应包括数字、大写字母和小写字母、符号等。我们建议您查看有关创建强密码的综合指南以(comprehensive guide on creating a strong password)获得更多指针。
除了使用强密码保护您的帐户外,请避免在多个网站、帐户和设备上使用相同的密码。如果您难以记住或记住密码,请考虑使用密码管理应用程序(或密码管理器)。(Password Manager)除了保护您的密码安全之外,许多密码管理器还可以帮助创建独特且强大的密码(password managers can help create unique and strong passwords)。
使用双重身份验证(Two-Factor Authentication)保护您的在线(Online) 帐户(Accounts)
两步验证(Authentication)(2FA) 或两步验证(Authentication)是保护您的在线帐户免受黑客攻击的(protect your online accounts from hackers)另一种有效方法。激活后,您需要在输入帐户密码后提供安全代码(发送到您的电话号码或电子邮件)。
前往您帐户的安全部分以启用双重身份验证。通过本教程了解双因素身份验证的工作原理以及如何在(tutorial to learn how two-factor authentication works)LinkedIn、Instagram、Twitter和Facebook上激活安全措施。
还有专门的 2FA 应用程序(例如Google Authenticator)可在移动设备和 PC 上运行。即使没有互联网连接或智能手机,这些身份验证器应用也会向您发送 2FA 代码。2FA 为您的在线帐户增加了一层额外的保护,从而使黑客更难访问您的数据。
购买或下载恶意软件扫描软件(Download Malware Scanning Software)
黑客开发了伪装合法系统程序的恶意软件,以访问您的个人计算机、文件、文档和帐户。尽管现代操作系统附带了可删除恶意软件的内置安全工具(built-in security tools),但它们通常不够复杂,无法保护您的计算机。
我们建议在您的设备上安装第三方防病毒软件,作为额外的安全层。这些防病毒程序可针对更广泛的恶意软件提供强大的实时保护。最好的防病毒软件将比您设备的内置安全系统更快地消除恶意文件和软件。您甚至可以将防病毒配置为在操作系统启动之前扫描您的计算机(scan your computer before the operating system boots)。
如果您使用 macOS 驱动的设备,请查看一些适用于 Mac 的最佳防病毒选项(best antivirus options for Mac)。对于 Linux 设备,这些免费的防病毒程序(these free antivirus programs)可提供针对恶意软件的最佳保护。在这份针对 Chromebook 的最佳防病毒软件(best antivirus for Chromebook)汇编中,您将学习如何使用第三方安全工具来保护您的Chrome OS设备。在Windows上,这些恶意软件扫描程序可以保证清除任何病毒(malware scanners are guaranteed to nuke any virus)。这篇关于在 Windows 上删除顽固恶意软件的(removing stubborn malware on Windows)文章是我们推荐的另一个有用资源。
使用虚拟借记卡(Use Virtual Debit Cards)进行在线购物(Online Purchases)
网络犯罪分子入侵您的在线帐户的原因有很多,其中之一是窃取卡或银行信息。黑客可以通过间谍软件、网络钓鱼工具(假网站、电子邮件和应用程序)和公共Wi-Fi网络非法获取这些详细信息。不要在每个网站上都使用您的卡,以免成为信用卡欺诈或盗窃的受害者。同样(Likewise),不要在公共Wi-Fi网络上使用您的银行应用程序。
在任何在线支付网关上输入您的卡详细信息之前,请确认该网站是安全且合法的。更好(Better)的是,仅在受信任和信誉良好的网站、应用程序和平台上使用您的卡。如果您经常在多家电子商务商店购物,请考虑使用虚拟卡或一次性卡。这些卡易于创建,使用方便,最重要的是保护您的主要银行卡免受网络犯罪分子的侵害。
如果您是第一次在网站上购物,请使用资金有限的虚拟卡或一次性卡。我们建议您拥有一张专门用于在线购物的虚拟卡,一张用于订阅,另一张用于其他电子支付。除了保护您的主要银行卡免受黑客和潜在的数据泄露外,虚拟卡还有助于资金管理、计划和预算。
想(Want)开始使用虚拟卡吗?有关更多信息,请参阅信誉良好的一次性信用卡提供商的汇编。(compilation of reputable disposable credit card providers)当您使用它时,您还应该查看这个关于发现虚假网站的综合教程(comprehensive tutorial on spotting fake websites)——不要让骗子愚弄您。
如果您怀疑您的卡详细信息被泄露,请立即向您的银行或发卡公司报告。
远离公共电脑
从公共计算机访问您的在线帐户类似于将您公寓的钥匙交给入侵者。与您的个人设备不同,黑客很容易获得您在公共计算机上输入的任何信息。因此,尽可能避免使用公共计算机。
如果您想在公共计算机上访问互联网,请在“隐身”或“私人浏览”模式下进行。最重要的是,确保在完成后清理您的信息痕迹。清除浏览器的cookies、浏览历史记录等。请参阅这篇关于安全使用公用电脑的文章,(article on using a public computer safely)了解更多预防技巧。
使用一次性电子邮件地址
使用您的主电子邮件地址在每个网站、在线服务、应用程序试用等上进行注册都存在安全风险。您的收件箱会暴露在来自黑客和网络犯罪分子的各种垃圾邮件中。将一次性电子邮件(也称为临时(Temporary)或一次性(Throw-Away)电子邮件地址)用于不重要的或一次性的活动是防止垃圾邮件和网络钓鱼电子邮件远离收件箱(keep spam messages and phishing emails away from your inbox)的好方法。
如果您不确定请求您的电子邮件地址的网站的真实性,我们建议您提供您的临时电子邮件地址,而不是您的常规电子邮件地址。如果该网站被证明是欺诈性的,您可以确保您的真实/个人电子邮件地址信息是安全的。
有些电子邮件客户端允许您创建临时地址,有效期从几分钟到几天、几周或几个月不等。有些甚至允许您创建没有过期日期的一次性电子邮件帐户。最好的(和免费的)一次性电子邮件帐户提供商(best (and free) disposable email account providers)的汇编包含您需要知道的一切。
保护您的(Protect Your) 网络摄像头(Webcam),保护您的(Protect Your)隐私
网络摄像头(Webcam)黑客攻击是另一种新兴的隐私侵犯形式,主要是由于越来越多地采用物联网(Internet)( IoT ) 设备,例如婴儿监视器、智能门铃和其他带有网络摄像头的设备。(Things)黑客可以渗透您的网络并远程控制您设备的网络摄像头。
如果网络摄像头在不使用时亮起,则可能表明该设备已被黑客入侵(a sign that the device’s been hacked)。那么你能做些什么呢?激活您设备的网络摄像头 killswitch——它是一个物理开关或按钮,可切断网络摄像头的电源。如果您的设备没有网络摄像头终止开关,请购买网络摄像头保护套(invest in a webcam cover)——它们的价格在 2 美元到 5 美元之间。
保护您的网络摄像头免受黑客攻击的另一种方法是确保您的网络没有恶意软件。阅读本指南以检查您的路由器是否存在恶意软件(this guide on checking your router for malware)。
让您的应用程序保持最新
旧(Old)的和过时的应用程序通常存在漏洞和错误,黑客利用这些漏洞和错误作为您设备和帐户的入口点。建议在有新版本可用时立即更新您的应用程序。更好(Better)的是,在您设备的应用商店或应用的设置菜单中启用自动更新。
还有更多工作要做
尽管上面强调的建议将减少您的计算机被黑客入侵的机会,但值得一提的是更多的预防措施和工具。例如,基于在线的病毒扫描程序(online-based virus scanners)可以检测并从您的计算机中删除各种恶意文件和程序。加密您的存储设备(Encrypting your storage devices)还可以防止您的文件落入坏人之手。
黑客可以劫持您的手机,以破坏您帐户的双重身份验证。阅读本教程中有关保护您的手机和 SIM 卡免受黑客攻击( tutorial on protecting your phone and SIM card from hackers)的预防建议。
How to Protect Yourself from Hackers Online
Therе are thousands of cybersecurity threats out there, and new variants spring up all the time. This is why it’s important to learn how to protect your computer from hacking, fraud, malware, privacy invasion, and other forms of cybersecurity attacks.
This article will be a compilation of useful tips to protect yourself, your online accounts, and data from unauthorized individuals. It will also provide a compilation of security tools and resources. Lastly, you’ll learn a bunch of online protection and safety tips.
Strong Passwords Are Important
The locks on your doors keep burglars away. Passwords perform similar functions, preventing unauthorized access to your devices and online accounts. However, a weak password is as good (or worse) as not having any password. It’s like having a door with a weak lock.
Your passwords don’t have to be complex or excessively long. They only need to be unique (or difficult) for an unknown party to assume, guess, or break. Ideally, you should use the most secure password you can formulate. Avoid using personal details like your name, birthday, kids’ name, pet’s name, birthplace, partner’s name, wedding anniversary, etc. as your password. These details are public knowledge and can be easily accessed by a professional hacker.
A strong password should include numbers, capital, and lowercase letters, symbols, etc. We recommend checking this comprehensive guide on creating a strong password for more pointers.
Besides securing your account with a strong password, avoid using the same password across multiple websites, accounts, and devices. Consider using a password management app (or Password Manager) if you have difficulty remembering or memorizing passwords. In addition to keeping your passwords safe, many password managers can help create unique and strong passwords.
Secure Your Online Accounts with Two-Factor Authentication
Two-Factor Authentication (2FA) or Two-Step Authentication is another effective way to protect your online accounts from hackers. When activated, you’ll need to provide a security code (sent to your phone number or email) after entering your account’s password.
Head to the security section of your account to enable two-factor authentication. Go through this tutorial to learn how two-factor authentication works and how to activate the security measure on LinkedIn, Instagram, Twitter, and Facebook.
There are also dedicated 2FA apps (e.g. Google Authenticator) that work on mobile and PC. These authenticator apps send you 2FA codes even without an internet connection or a smartphone. 2FA adds an extra layer of protection to your online accounts, thereby making it a little more difficult for a hacker to access your data.
Purchase or Download Malware Scanning Software
Hackers develop malicious software that camouflage legitimate system programs to access your personal computer, files, documents, and accounts. Although modern-day operating systems ship with built-in security tools that remove malware, they’re usually not sophisticated enough to safeguard your computer.
We recommend having a third-party antivirus on your device to serve as an added layer of security. These antivirus programs offer robust and real-time protection against a wider range of malware. The best antivirus software out there will eliminate malicious files and software faster than your device’s built-in security system. You can even configure your antivirus to scan your computer before the operating system boots.
If you use a macOS-powered device, check out some of the best antivirus options for Mac. For Linux devices, these free antivirus programs provide the best protection against malware. In this compilation of the best antivirus for Chromebook, you’ll learn how to use third-party security tools to safeguard your Chrome OS device. On Windows, these malware scanners are guaranteed to nuke any virus. This article on removing stubborn malware on Windows is another useful resource we recommend.
Use Virtual Debit Cards for Online Purchases
Cybercriminals hack your online accounts for many reasons, one of which is to steal card or banking information. A hacker can illegally obtain these details through spyware, phishing tools (fake websites, emails, and apps), and public Wi-Fi networks. Don’t use your cards on just every website to avoid falling victim to credit card fraud or theft. Likewise, don’t use your banking apps on public Wi-Fi networks.
Before inputting your card details on any online payment gateway, confirm that the website is secure and legitimate. Better yet, use your cards only on trusted and reputable websites, apps, and platforms. If you often shop on multiple ecommerce stores, consider using virtual or disposable cards. These cards are easy to create, convenient to use, and most importantly shield your primary bank card from cybercriminals.
If you’re shopping on a website for the first time, use a virtual or disposable card with limited funds. We recommend having a virtual card dedicated to online shopping, one for subscriptions, and another for other e-payments. Besides safeguarding your primary bank card from hackers and potential data breaches, virtual cards also help with money management, planning, and budgeting.
Want to get started with virtual cards? Refer to this compilation of reputable disposable credit card providers for more information. While you’re at it, you should also check out this comprehensive tutorial on spotting fake websites–don’t let scammers fool you.
If you suspect that your card details are compromised, report to your bank or the card-issuing company immediately.
Shy Away from Public Computers
Accessing your online accounts from a public computer is akin to handing an intruder the keys to your apartment. Unlike your personal devices, it’s very easy for a hacker to obtain whatever information you input on a public computer. So, as much as you can, avoid using public computers.
If you want to access the internet on a public computer, do so in “Incognito” or “Private Browsing” mode. Most importantly, make sure you clean up traces of your information when you’re done. Clear the browser’s cookies, browsing history, etc. Refer to this article on using a public computer safely for more precautionary tips.
Use a Disposable Email Address
There’s a security risk attached to using your primary email address to sign up on every website, online service, app trial, etc. Your inbox becomes exposed to all sorts of spam messages from hackers and cybercriminals. Using disposable emails (also known as Temporary or Throw-Away email addresses) for unimportant or one-off activities is a good way to keep spam messages and phishing emails away from your inbox.
If you’re unsure about the authenticity of a website requesting your email address, we recommend providing your temporary email address–not your regular email address. If the website turns out to be fraudulent, you can be sure your true/personal email address information is safe.
There are email clients that allow you to create temporary addresses with validity ranging from minutes to days, weeks, or months. Some even let you create disposable email accounts without an expiration date. This compilation of the best (and free) disposable email account providers has everything you need to know.
Protect Your Webcam, Protect Your Privacy
Webcam hacking is another rising form of privacy invasion, mostly due to the increased adoption of Internet of Things (IoT) devices like baby monitors, smart doorbells, and other devices with a webcam. A hacker can infiltrate your network and remotely control your device’s webcam.
If a webcam lights up when not in use, that could be a sign that the device’s been hacked. So what can you do about this? Activate your device’s webcam killswitch–it’s a physical switch or button that cuts off power to the webcam. If your device doesn’t have a webcam killswitch, invest in a webcam cover–they cost between $2 – $5.
Another way to protect your webcam from hacking is to ensure your network is malware-free. Go through this guide on checking your router for malware.
Keep Your Apps Up-to-Date
Old and outdated apps often have vulnerabilities and bugs that hackers exploit as entry points to your devices and accounts. It’s recommended to always update your applications as soon as there’s a new version available. Better yet, enable automatic update on your device’s app store or within your apps’ settings menu.
There’s More to Be Done
Although the recommendations highlighted above will reduce the chances of your computer being hacked, more preventive measures and tools are worth mentioning. For example, online-based virus scanners can detect and remove a variety of malicious files and programs from your computer. Encrypting your storage devices will also prevent your files from falling into the wrong hands.
Hackers can hijack your phone in a bid to break your account’s two-factor authentication. Read the precautionary recommendations in this tutorial on protecting your phone and SIM card from hackers.