The Limited Times

Now you can see non-English news...

The 6 most common cyberattacks and 10 tips to protect your personal data


What measures must be taken to prevent information theft on the Internet. Expert recommendations.

Today, personal information is stored in a wide variety of places: computers, phones, devices, etc., which causes us to end up

 losing control

over our private data and exposing ourselves to attacks by cyber criminals.

And although we read daily advice, tips and keys to improve virtual security, it is important to review

habits and customs


"Cybercriminals find an increasingly extensive field in the digital world to reach users through strategies that allow them to take over their personal data," explains

Sebastián Stranieri

, founder and CEO of


, a cybersecurity company specialized in cybercriminals. development of solutions for the

protection of digital identity and fraud prevention


For his part,

Hernán Carrascal

, Sales Director Andina de VU, specialist in cybersecurity and identity protection, maintains: “Cybercrime is a criminal phenomenon that ranges from attacks on computer systems, illegitimate access and destruction of information.

They also use these systems to commit other crimes such as fraud over the Internet.

Cybercrime is a crime that attacks computer systems.

Photo: Shutterstock.

What are the 6 most common cyberattacks suffered by users?

Cyber ​​attacks are attempts to expose, steal, change or destroy sensitive data or damage a network through unauthorized access.

These threats are designed to attack both companies and individuals;

These are the most common:

  • Phishing:

    The objective of this type of scam is for the user to reveal confidential information to be used

    for fraudulent purposes


    The attacker usually calls, emails or WhatsApp the victim posing as an organization or entity.

  • Ransomware: it

     is one more step of a phishing attack.

    The hacker sends the victim a message with a malicious attachment or a link that redirects them to a

    deceptive website

    where they download the malware.

  • Malware

    – is a broad term that encompasses different kinds of

    malicious software

    (applications that are specifically designed to harm a user or damage devices), including viruses, worms, and spyware.

    These attacks exploit a vulnerability and penetrate the network to plant malicious code.

A ransomware is a type of harmful program that restricts access to the files of the infected operating system.

Photo: Shutterstock

  • Password spraying:

    A technique used to obtain valid access credentials that involves testing

    commonly used passwords

    across multiple user accounts.

  • Doxing:

    consists of obtaining information from a person, such as their real name, home address, place of work, telephone number, financial data, etc., and then disclosing it to the public without the victim's permission.

  • Sim swapping:

      A type of fraud that allows criminals to hijack the phone number by

    duplicating the SIM card

The 10 tips to protect our personal data

1. Know how to detect phishing

It is the most popular attack in the world, based on social engineering techniques.

If you receive promotional messages that include links or attachments,

do not click or download content


It is necessary to make sure that the brand of the site or sending mail is

well written


Verify the


of online sellers and

that the site is official


2. Use the internet with secure connections

Protect the home Wi-Fi network with a

strong password

, difficult to discover and, if possible, avoid sharing it.

When making transactions away from home,

do not use public networks

but use cell phone data.

3. Enable additional authentication factors

Many banks and online shopping platforms allow the option of a

second authentication factor

, based on a one-time code that usually arrives via SMS.

It is essential, both for buyers and for companies or financial institutions,

to increase access security levels


Do not click or download content that comes from messages from strangers.

Photo Martin Bonetto

4. Look for safety signs

All sites should have their own security protocols.

It is important:

select the "No" option

, when asked if you want to save the card details for future purchases.

5. Do not enter card details twice

While the payment approval time is delayed, it is recommended not to "refresh" the browser, and of course,

not to share the card details

with strangers.

Always validate that the site is the right one: when a site redirects to another to enter the card data and this site fails, be suspicious, it may be a


attack or

website impersonation


Check that the page where the data is entered has a


next to the web address or the term "https".

6. Do not send personal content through insecure channels

Be careful when sending sensitive data such as credit/debit card and ID/passport photos through unsecured means such as chats, WhatsApp, mail or links in the cloud.

If you don't know for sure who is on the other side, remember that all information/images that you pass through these channels become public domain.

7. Beware of QR code scams

Deactivate the option to automatically open the QR links on the cell phone, do not scan them if they are of dubious, unknown or unofficial origin and, when scanning them, check if the URL of the web page to which they redirect is correct.

If a QR code is captured to see the menu or menu of a restaurant or bar, for example, make sure that it does not ask for any sensitive data to gain access, that it does not download applications or request permissions that violate the user's privacy. 

8. Have control of the physical movement of the card

To avoid being a victim

of data theft from credit or debit cards,

 or skimming, that is, the capture of data from the magnetic stripe, keep an eye on the plastic.

It is preferable in restaurants and bars to request that the posnet be brought to the table or to get up to the till to pay with a card.

9. Install OS and software updates

Make sure that all devices used on the network comply with this policy: cell phones, computers, and tablets.


When they are outdated there is a greater possibility of fraud.

When updating operating systems, it is just correcting errors in the code or adding security components that have been detected.

10. Be aware of the footprint left on the Internet

We enter our personal information on social networks and other internet sites that can eventually be used against us.

That is why it is important to make responsible use of social networks and not share sensitive information such as address, ID, telephone, etc.


look also

Earn in dollars without leaving home: 7 websites to get remote work abroad

How to know what data the AFIP has about your assets, income, expenses and debts

Finances under control: the 9 apps that help you organize your expenses

Earn money traveling: how to earn dollars by bringing products from abroad to local buyers

Improve your CV: how to add "soft" skills that you surely have and companies love

Source: clarin

All news articles on 2023-02-06

Similar news:

You may like

Trends 24h


© Communities 2019 - Privacy

The information on this site is from external sources that are not under our control.
The inclusion of any links does not necessarily imply a recommendation or endorse the views expressed within them.