Owing to the frequently happened network security incidents and personal privacy and data leak issues, most of readers have already begun to pay attention to strengthening personal information protection and enhancing secure awareness. But unfortunately, currently there’s still some false information about data protection spreading among the public. These erroneous views spread between the network community and users, but seldom experts correct these errors. The following includes five representative security errors:
Error 1: I don’t have valuable information, nobody would hack my computer
Many people hold the similar argument. When you tell them to strengthen security measures (for example, improve the account password strength), they always say we don’t have valuable information and there’s no need to hack my computer.
In fact, today’s hackers often use phishing attacks. Once your cell phone information , email and social network information and other network information have been mastered by hackers, they would carry out further social engineering attacks (of course, the targets may be your friends in Contacts), and even cooperate with offline fraud, causing serious consequences.
Moreover, hackers or cyber criminals can not only make use of privacy information to start social engineering attacks, they can also invade your home router, laptop. NAS and even smart phone, they can change your device into zombie clients, even worse, they can use your device to initiate a variety of criminal activities, so you will not only be a victim but also an accomplice. Therefore, it’s a responsibility for us to enhance security awareness, improve security knowledge level.
Error 2: VPN or Tor can realize completely anonymous.
After Snowden event happened, Tor has stepped into the vision of people who are seeking asylum privacy. Many people may forget, Tor is also a paradise of botnet network and network black market. And more importantly, after Snowden event, some experts pointed out that Tor couldn’t help escape tracking of US intelligence agencies.
The most typical example is that by the end of 2013 a student of Harvard University – Eldo Kim used Tor to release bomb threat information and then arrested. Perhaps influenced by Snowden, Kim overestimated Tor’s “stealth” capability, and published false information of bomb attack by Tor, attempting to delay the date of the final exam, but unfortunately FBI officers soon found Kim’s classmate.
Similarly, VPN also do not have the stealth capability, for the design purpose of VPN is strengthening security, rather than being stealth.
Error 3: Mac address filtering plus turned off SSID broadcast can ensure WiFi network security
Many users think setting the MAC address filtering plus turned off SSID broadcast can ensure family WiFi hotspots security, which is actually a big misunderstanding. It may be useful for computer novice, but useless for computer geeks or hackers.
Remember that only WPA2 encryption standard level can effectively protect your WiFi network, and you must use strong password.
Error 4: Seamless browse can ensure security
Today, many browsers have launched a so-called “incognito browsing” security option, but in reality this so-called incognito can only prevent other users of your computer check and see your privacy information, but for network service providers such as providers of cloud disk, mailbox, social network, your activities are still under surveillance.
Error 5: I have never visited dangerous sites, so I don’t need to install anti-virus software.
Many people think that computer hacker is caused by browsing “dirty” sites, in fact. Nowadays many hackers use pub-style attacks”, which means that first of all attacking regular sites you frequently visit, and then sit back and wait to control your computer. In addition, browser plug-ins, malicious app will stealthily steal your important private information and data.
Hackers have been all pervasive and even your computer that’s never connected to the Internet may be infected with virus. Therefore, you need to keep good online habits including installing anti-virus software, enhancing anti-phishing awareness and password protecting personal files.