We observe Safer Internet Day or e-safety Day on 8th February and Computer Security Day on November 30th.
Safer Internet Day encourages children and young people all across the world to use online technology more responsibly and safely.
The International Computer Security Day is observed to raise public awareness about cybercrime and information security issues and to encourage individuals to protect personal information kept on their computers.
- 1. What is internet safety and why is it important?
- 2. Common mistakes that can lead to internet Safety issues
- 1. Human error
- 2. Installing unknown apps with full permissions allowed
- 3. Not checking whether the website is secure or not
- 4. Accepting friend requests from unknown people on social networks
- 5. Receiving video calls from unknown numbers
- 6. Believing emails or messages that you have won a lottery or gifts
- 7. Setting very easy passwords and not using two-step verification
- 8. Selling a computer or phone without doing a factory reset or erasing data
- 9. Not removing apps that are notified as malicious
- 10. Not updating your device with the latest security patches and fixes
- 11. Sharing OTPs with unauthorized people
- 12. Not monitoring the activity of your kids online
- 13. Sharing intimate images online
- 14. Opening unexpected email attachments
- 15. Using public WiFi without a secured VPN
- 16. Entering net banking, debit, or credit card information on unfamiliar shopping websites
- 3. Most common types of internet scams you should know
- 1. Online Shopping Scams
- 2. Online Banking Fraud
- 3. Online dating and sextortion scams
- 4. Identity theft scams
- 5. Make money online or work-from-home scams
- 6. Online job scams
- 7. Fake news or TRP scams
- 8. Fake Stock or Share market advisors
- 9. Online promotion and marketing scams
- 10. Donation and Charity Scams
- 11. Scam of data and information leakage
- 12. Digital Arrest Scam
- 4. Conclusion
Computer security service enables us to communicate and exchange information in a variety of ways. Today's cyber and computer crime is on the rise. The use of the internet in our daily lives is increasing all around the world.
1. What is internet safety and why is it important?
The act of raising users' awareness of personal safety and threats to computer security and personal information by using the internet, as well as self-protection from computer crime, is known as internet safety, online safety, cyber safety, and e-safety.
Users find the usage of the Internet in shopping, online payment services, internet banking, and even digital wallets appealing. As a result, the internet is the best place for scammers and hackers to gather sensitive data from any country. These are some of the reasons why internet security is so important today worldwide.
Secure online transactions and the use of digital wallets on mobile devices necessitate internet safety. Children, teenagers, and those who were less computer and internet proficient cheated more on the internet. Parents must ensure that their children are not slipping into the trap of hazardous online activities.
The significance of Internet security in terms of a wide range of information, personal data, and property protection is critical. Internet security is especially critical for people while using online banking and shopping services.
Security risks, preserving and managing your personal data, online reputation management, and avoiding harmful or unlawful information are examples of various threats that you may face while engaging in Internet activity.
2. Common mistakes that can lead to internet Safety issues
1. Human error
I'm not joking. We humans indeed believe that no one can act on our behalf. We think what can someone do with my account details? This is the first thing that comes to mind for most individuals. If people are aware of internet security, half of the problems will be avoided.
Black Hat Hackers take advantage of people's weaknesses to gain access to their accounts and make money.
Encourage people to be cautious when using the internet. If anything happens on the internet, call the cybercrime division for assistance.
2. Installing unknown apps with full permissions allowed
How many of us even think before installing any app that it might steal your data and personal information such as text messages and photos. Some apps can even remotely allow access to your device to hackers.
You mustn't install any app from any sources which are not trustworthy. And when you install any app even from a trustworthy source, be sure to check the permissions it asks to see if it makes sense. Some apps might really not require those permissions. For example, a flashlight app asking you permission to your contacts or messages is something doubtful.
If you feel any app does not require such permissions to be granted, forcibly deny access to such permissions.
3. Not checking whether the website is secure or not
It should be a regular practice to check whether your browser says the website is secure or not. If the website is secure, the browser usually highlights it with a padlock icon. If the browser shows a 'Not secure' warning then you should not access it as it might steal your data.
Even if a website is shown as secure, it is also important to observe the URLs, especially when accessing any link you get through email or text message claiming it to be from your bank, or related to social security identity, or telecom provider.
Hackers usually do phishing using URLs that look like legitimate website URLs. For example, 'google.com' is not the same as 'g00gle.com'. There might be even a small changed character like 'I' and 'l'. Can you spot the difference?
It is usually very easy to not recognize such differences resulting in giving out passwords and other information to hackers.
4. Accepting friend requests from unknown people on social networks
Accepting friend requests from strangers increases the danger of scammers impersonating your profile, collecting personal information to obtain access to online accounts (such as your mother's maiden name, a common verification question used for password resets), and so on.
By accepting unknown friend requests you are giving strangers a lot of information about you and your friends which can be used for social engineering and identity theft scams. They may also be getting live status about where you are.
You may be posting photos while you are on holiday. If thieves get this information, they may even attempt robbery at your home while you away enjoying your holiday.
5. Receiving video calls from unknown numbers
Accepting an unknown video call can land you in trouble with a sextortion scam. Sextortion also includes blackmail, in which the victim is threatened with sharing sexual images or information in exchange for money or sexual pleasure. The scammers can then force a person to do sexual actions or pose naked in front of a camera, resulting in hardcore pornography that is not consensual.
The sextortion victims are eventually forced to transmit obscene photographs, get naked on camera, or perform sexual actions while on video by the offender. The photographs and videos that result can then be kept for ransom.
In recent instances, these scammers even use morphed photos to target their victims. On an unsuspecting video call, the victims are shown porn videos, and the screenshots and recordings of the call are used for blackmailing.
6. Believing emails or messages that you have won a lottery or gifts
Have you ever received an email or a phone call from customs requesting cash to release a shipment sent in your name that is detained at the airport? Or a buddy you met online is requesting you to pay money to customs to receive a gift they sent you from another country?
Hold on in either case! Do not go any further because you are about to be conned!
After befriending the victim, the fraudster would claim to have sent the victim a "present" from abroad.
The fraudster would send images of highly expensive things to earn the trust of the victim.
In a few days, the victim then receives a call/mail/message from someone pretending to be a Customs Department official or a courier guy, requesting payment to release the "present" parcel that has been held at the airport.
7. Setting very easy passwords and not using two-step verification
Hackers can easily guess easy or weak passwords or they might use brute force to find it in the case where the length of the password is small.
Never use names or dates like birthdays etc in passwords that can be easily guessed. Rather use a long string of characters, numbers, and symbols. You can use a password manager to securely store all your passwords.
If there is a two-step verification feature available, it is highly recommended to use it.
8. Selling a computer or phone without doing a factory reset or erasing data
Storage devices on old computers or phones may hold sensitive information. It is better to erase all the data from the computer or phone if you wish to sell it.
You never know the information might be used to hack into your accounts and steal your personal information.
9. Not removing apps that are notified as malicious
Google and various other cybersecurity vendors regularly publish lists of malicious applications they find. They are even removed from the App Store or the Play Store. But the app may remain on your phone.
You should promptly remove any such apps once they are notified as malicious.
10. Not updating your device with the latest security patches and fixes
Antivirus and firewalls in a computer network are an important part of internet safety that protects you from hackers and scammers. However, if these are not updated to its latest database of threat signatures, they are of no use.
Hence it is very important to update the operating system and all the security system software to the latest versions so that it protects you from malware.
11. Sharing OTPs with unauthorized people
One-time passwords (OTP) are one most important aspects of maintaining the security of online accounts.
You need OTPs to authenticate yourself and act as an additional layer of security. However, if you reveal these to unauthorized persons, they may be able to change the account passwords and steal all your information and money too.
12. Not monitoring the activity of your kids online
Kids and teenagers are soft targets of hackers and scammers. Parents need to make their kids, especially teenagers aware of cyber threats and online conduct when they start socializing on the internet.
Talk to your children about their online activities. Make sure you're comfortable with the games, social networking sites, and other internet activities that your children enjoy.
Discuss the dangers of disclosing personal information with your children and assist your children in understanding what information should be kept private. Explain to your children why personal information such as Social Security numbers, street addresses, phone numbers, and financial information should be kept private.
Use parental control to make sure they are protected and review what websites they visit. This will help take timely action in case the child is a victim of cyberbullying or any other cyber threats.
You might find videos and other information from the Federal Trade Commission useful. To discover more about how to talk to your kids about Internet safety, you can visit the Federal Trade Commission's website.
Share the Be Internet Awesome link below with your kids to help them be safe, confident explorers of the online world.
13. Sharing intimate images online
A current or former partner may share intimate photographs without agreement (or threaten to do so), but there have also been reports of image sharing by friends, ex-friends, acquaintances, dates, one-night encounters, or even strangers (if images are obtained by hacking). Intimate images exchanged between strangers on dating websites can resurface years later, or seemingly benign photos can be edited and circulated.
| Image Courtesy: DepositPhotos |
This could involve posing as the pictured individual on social media sites, dating sites, or pornography sites, resulting in inadvertent harassment by unaware third parties. Another example is the creation of a new 'false' social media page for the victim, which encourages the victim's friends and family to connect and unwittingly view personal photographs and videos.
It is better to be safe than sorry and avoid the unnecessary stress of dealing with harassment.
14. Opening unexpected email attachments
Email attachments that are unexpected or suspicious should never be opened. They could run cloaked software (malware, adware, spyware, virus, and so on) that harms or steals your data. If you're unsure, call the sender to double-check. It's a decent rule of thumb to only open file attachments if you expect them and if they're relevant to your task.
Signs to check if the email you received is malicious
Executable Files with .exe extension: Executable files are programs that when executed perform actions on the computer; not all .exe files are malicious, but they can be used to install malware on your computer; there's no reason for a .exe file to be shared via email, so if you receive an executable file through email, you should delete it right away.
Google usually filters and prevents sending othe f executable files through email. However, the .exe files can also be packed in .zip folders - if you receive an email with a .zip, and you find a .exe file inside it, you shouldn't run the file.
Be careful, .exe files have different icons and can icons similar to that of a document, presentation, etc., but they still have the .exe extension are executables.
Many other extensions can be classified as executables. Just because a file isn't a .exe, doesn't mean it's not malicious - there have been instances of macro-viruses that hide inside Office documents.
You should not open attachments on emails you didn't expect or from users, you don't recognize. If the email has a long, alphabetical list of recipients or the "To:" box is blank, the email is most likely malicious, and the attachment in such cases should not be opened. If the subject line or body text is ambiguous, the attachment is most likely illegitimate.
Other signs such as missing salutation and grammar/spelling errors may indicate it is most likely not genuine. In addition, if emails are tagged with a sense of urgency like "this attachment expires in 24 hours" or "you have an outstanding invoice" etc then it is better to avoid opening the attachments in such emails. Most unscrupulous emails try to instill a sense of urgency in the receiver so that he or she will download and execute the attachment without carefully reading it.
15. Using public WiFi without a secured VPN
When connecting to the Internet over a public Wi-Fi network, you should use a VPN (Virtual Private Network). A VPN is an important part of networking security.
Let's say you go to a coffee shop and use a free Wi-Fi network. You have no way of knowing how secure that connection is. Someone else on the network could start searching through or stealing the files and data delivered from your laptop or mobile device without your knowledge. The owner of the hotspot could be a thief, sucking out information from all Wi-Fi connections.
Using a VPN, the internet data is encrypted and routed through a VPN company-owned server. That means no one, not even the owner of the free Wi-Fi network, can eavesdrop on your data.
16. Entering net banking, debit, or credit card information on unfamiliar shopping websites
Entering any payment information like net banking password and debit or credit card details on unfamiliar sites is like readily handing over the keys of the locker to thieves.
You are sure to lose your money and in no time your bank account balance will be zeroed.
To avoid losing money only use reputed online retail websites and payment gateways for shopping.
3. Most common types of internet scams you should know
1. Online Shopping Scams
When you buy something online, pay for it, but never receive it, or unknowingly dial-up fake customer care, and then again you are cheated with refund scams. These scams sometimes happen even with reputed shopping platforms. Scammers register themselves as sellers with fake documents.
Counterfeit products are then sent to the customers of these reputed shopping websites taking advantage of the no-return policy that is in place to protect the sellers on these platforms.
Customers are then left to make numerous calls to the customer care of these legitimate websites. The best way The avoid these scams is to never buy expensive items online and in case you are a victim, register a complaint with the consumer helpline.
2. Online Banking Fraud
Your money is transferred to another bank account. Even if you haven't received the OTP, your money may have been moved to others.
Here are several scenarios in which you might find yourself:
- When you use your credit or debit card in a store or restaurant, it can be cloned.
- Calls posing as from the bank to obtain your card or PIN number.
- Phishing emails are fake emails that connect to sites that steal your login information.
- Fake emails with virus attachments that steal your financial information.
- Scams that claim to deposit money into your account but instead take all of your personal information.
3. Online dating and sextortion scams
These scams involve conversing and communicating with a stranger over the phone or through chat applications. Fraudsters construct fake social media accounts.
This online dating scam can target both male and female victims and the culprit can be an unknown or well-known individual. The perpetrator usually entices and compels the victim to share private and naked images or films over the phone or use morphed images which are then collected and maintained by the former for future extortion (sextortion).
These scams are very common on dating, social networks, and chat apps. The perpetrators usually threaten to share the images online in case you don't pay.
4. Identity theft scams
Identity theft is the theft of another person's personal or financial information to commit fraud, such as making unlawful transactions or purchases, using that person's identity.
Identity theft can take numerous forms, with the most common consequences being damage to a victim's credit, wealth, and reputation.
5. Make money online or work-from-home scams
These scams claim that you can earn money from the comfort of your own home. Previously, the scams required actions such as stuffing envelopes or making phone calls.
Today's scams include claims that you may earn money by reading emails, working on the Internet, tasting things, being a mystery shopper, or filling out surveys.
In most situations, you'll be asked to pay money upfront in exchange for a "work-at-home" chance. They frequently prey on people's acute need for money.
6. Online job scams
People pay money to get jobs online, but they never get a job.
Scammers might use online job scams to get your personal information, money, or information about your bank account or credit card. These con artists prey on those looking for new jobs on the internet.
Because job seekers are desperately looking for job opportunities, they may overlook certain red signals that indicate that something is wrong with an online listing.
There are various forms of online employment fraud. According to the Federal Trade Commission, some scammers will attempt to steal your bank account or credit card information or they will try to persuade you to spend money on certification or training materials for jobs that don't exist. Others will attempt to dupe you into cashing forged cheques.
7. Fake news or TRP scams
People are misled to do a certain action as a result of fake news propagation or TRP scams. They make fake videos and photographs, as well as incorporate other videos or content from prior situations into the current incident's news. And, in many cases, bogus social media news creates challenges for law and order.
Sometimes these kind of threats are propagated as part of bigger Information warfare (IW). It is the art of manipulating data and perceptions to gain control without a single shot.
From cyber hacks and disinformation to psychological operations, it's a high-stakes battle waged in the digital realm. Nations, military units, hacktivist groups, corporations, and even terrorists engage in IW to influence minds, disrupt systems, or sway entire societies.
It’s about shaping realities, steering opinions, and holding the power of influence—whether to secure political interests, gain competitive edges, or spread ideologies. In today’s world, control of information is control of power.
8. Fake Stock or Share market advisors
These individuals approach you after obtaining your contact information. They also look up and identify the phone numbers of everybody who has a Demat account. They pose as stock market counselors and consultants. They make highly convincing claims and offer discounts that appear to be too good to be believed true.
However, if you ask for their company details, address, registration number, internet identification, prior clients' outcomes or reviews, and other information to verify that they are genuine, they will refuse.
Never divulge any personal information or believe their claims; otherwise, you risk losing your hard-earned money.
9. Online promotion and marketing scams
These are fake advertisements that appear to be genuine but aren't. Don't trust every ad that appears online when you are browsing the net. They might be fake customer care scammers waiting to rob you of your money.
If you conduct a fast Google search, you'll uncover dozens of known scams and frauds aimed at helping business owners market and boost visitors. The most prevalent frauds we discovered were phishing scams, pyramid schemes, SEO scams, domain slamming, click fraud, bogus affiliate marketing, AdSense loading, Google account hacking scams, and advertising bots.
10. Donation and Charity Scams
These scams include impersonating religious, social, and educational small and large groups to persuade individuals to give money by manipulating their emotions.
Scammers of this nature also use the internet. Never donate anything unless you are sure and have done your part of due diligence to verify the legitimacy of the organization.
11. Scam of data and information leakage
Any government or private employee or authority might share the firm's or government's proprietary information or data with another company for personal gain or money.
Mobile apps, for example, can access user data to alter election results, the stock market, or any government agency. In exchange for money, the official can provide hidden, confidential information to a media business or another entity.
12. Digital Arrest Scam
The digital arrest scam is a concerning cybercrime where fraudsters pretend to be law enforcement officials to extort money from individuals. Here's how it usually plays out:
- Contact Initiation: Scammers reach out through SMS, email, or messaging apps like WhatsApp, claiming the recipient is involved in serious criminal activities.
- Video Call Deception: They set up a video call, posing as officials from agencies like the police or CBI, using props and uniforms to look authentic.
- False Accusations: During the call, they accuse the victim of crimes or claim a family member is under arrest.
- Intimidation Tactics: They maintain constant video presence to intimidate, making the victim feel monitored.
- Money Demand: Finally, they demand money to clear the charges, instructing the victim to transfer funds to specific bank accounts.
Legitimate law enforcement agencies must never ask for money or personal information over a call or video chat. If you encounter such a call, report it immediately to local authorities or cybercrime helplines.
Stay alert and protect yourself from these scams!
4. Conclusion
The internet is a great way to stay in touch with friends and family, but it’s important to be aware of how these connections are made.
To stay safe online, you should take some basic precautions:
- First, never give out any personal information, including your address or phone number.
- Second, never click on links in emails or receive calls that you are unsure of.
- Third, always install malware and virus protection software on your computers. By following these steps you can enjoy the internet without having to worry about becoming a victim of identity theft or fraud.
If you are already being victimized, please report it right away. If you have handed away any financial information, such as a credit card number, contact your bank to have it blocked, then fill out a Customer Dispute Resolution Form and file a complaint with the bank where the funds were routed.
Additionally, register a complaint with the state fraud investigation officer/adjudicating officer, as well as the cybercrime cell. You can also report it online if you are an Indian citizen at www.cybercrime.gov.in.
In case, where your intimate images are shared online. You must lodge a complaint with the cybercrime cell. You should also stop Non-Consensual Intimate Image Abuse by creating your case.
We hope you found this article useful, and that it has given you some insight into how to stay safe online. If you would like to share your own tips for staying safe online, please leave a comment below. And don't forget to share it with your near and dear ones so that they are also aware. Happy surfing!