Language Selection

English French German Italian Portuguese Spanish

Safety Cheat Sheet

Filed under
Security
Web

If people didn't fall for online scams, online scammers would take up another line of work. And really, it isn't terribly hard to protect yourself. If you do one thing today, print out the following list and tape it to your computer. (lol)

  • Be wary of any financial solicitation from a stranger, especially if there's a sense of urgency involved. Scammers always want you to act without thinking too hard about it.

  • Be very clear about what you're buying from an auction site, and what such items typically cost. Be wary of goods sold "as is" or sellers who claim products are authentic but refuse to provide proof. Check the seller's reputation score carefully before you bid.

  • When you get an e-mail from your bank, never click the link inside it. Always open your browser and type your bank's Web address manually.

  • When you log in to your bank account, make sure you're doing it on a secure site; the Web address should start with "https" and you'll see a tiny lock icon in the bottom right corner of the browser.

  • Be suspicious of all contests and giveaways, and read the fine print before filling out any online forms. Pay COD for shipping and handling, if you can.

  • Don't believe all return addresses. Though an e-mail message may claim it's from your bank, your ISP, or even your boss, that doesn't mean it is. Spammers and virus mailers generally spoof the "From" address field in their messages with a legitimate address that they've stolen. You may even have received spam from yourself as a result of this clever technique.

  • Don't open e-mail attachments--unless you absolutely, 100-percent trust the sender (e.g., it's someone you know well sending an attachment you've been expecting). Most viruses and worms arrive on your PC in the form of e-mail attachments.

  • If you think you've been taken for a ride, contact local law enforcement in your area. Then file a complaint with the FBI's Internet Crime Complaint Center.


Source.

More in Tux Machines

Lubuntu 15.10 Alpha 2 Is Ready for Download, Still Using the LXDE Desktop Environment

The development team behind Lubuntu, an open-source and freely distributed flavor of the popular Ubuntu Linux operating system, announced a few minutes ago the release of the second Alpha build for the upcoming Lubuntu 15.10 (Wily Werewolf) distribution. Read more

Ubuntu Kylin 15.10 Alpha 2 Is Out for Testing with Linux Kernel 4.1, More

The development team behind the Ubuntu Kylin computer operating system have announced earlier today the immediate availability for download and testing of the second Alpha build of the upcoming Ubuntu Kylin 15.10 (Wily Werewolf) distro. Read more

Linux-powered smart sniper rifle can be hacked

Two years ago, TrackingPoint burst on to the scene with a Linux-powered smart sniper rifle that took the guesswork out of killshots. Now, however, a pair of hackers have figured out how to make it miss every single time. Read more

5 heroes of the Linux world

Linux and open source is driven by passionate people who write best-of-breed software and then release the code to the public so anyone can use it, without any strings attached. (Well, there is one string attached and that’s licence.) Who are these people? These heroes of the Linux world, whose work affects all of us every day. Allow me to introduce you. Read more