child internet

The "muddy technique" and the Internet

Let's talk more about her on Internet.
"In the case of small children, I would advise that family safety software, and more importantly, be used PC should be in shared space", Advises Mr. Elias Hantzos.

Internet
Internet

[One_third]"If there are young children, I would advise that family safety software be used and, more importantly, the PC should be in a shared area"[/ one_third]

Where would your mind go if you heard someone talking about the "waterhole technique"? Possibly a farmer, perhaps an agronomist, the only sure thing, though, is that you would never have imagined a hacker. And yet, this name was given by cybercrime prosecutors to an electronic intrusion technique on our computers. The reason;

Because it reminds of the way the tigers chase their game in India and Asia. These fellas never run by hunting the antelopes, but they set up a "hat" in the springs where they will go to drink water. "There is a lot of cyber criminals lately," says Elias Hantzos, privacy specialist of a large multinational company. "That is, they do not attack directly on the machines of those who have targeted, but they violate websites that are known to visit these users to infect them when they visit them. That is, they are setting up their cards. "

Mr. Hantzos found himself in Greece a few days ago on the occasion of a speech at a conference on Internet security, organized by the Greek EU Presidency. By the way, he spoke in the "K" about whether the Greeks are exposed to cyber-threats - as far as it happens abroad - and was revealing. "The truth," he told us, "is that even the cases are less in our country, which has to do with its comparatively limited penetration Internet». But something else also helps us: the fact that our language is not widespread and thus they "get ” the malicious messages, which are usually bad translations from “automated machines”.

"However, this does not mean we have to be complacent, as well as" orchestrated "attacks. And he remembers: "For example, although foreigner," the police of the Police "was calling for" ransom "to fluent Greek."

Ενας από τους μύθους που υπάρχουν όσον αφορά την κυβερνοασφάλεια έχει να κάνει με την ύπαρξη απολύτως «στεγανών» λειτουργικών συστημάτων: «Είναι αφελές να νομίζει κανείς πως δεν διατρέχει καμία απειλή, επειδή χρησιμοποιεί υπολογιστή γνωστής μάρκας», λέει χαρακτηριστικά. Επίσης, παρ' όλο που ένα λογισμικό ασφάλειας μειώνει κατά πολύ τους κινδύνους, καμία τεχνική λύση δεν θα προστατεύσει τον χρήστη, αν αυτός δεν προσέχει τα προγράμματα που εγκαθιστά, αλλά και τα or the websites it "opens".

The first line of defense

Therefore, controlled online activity is and will always remain the first line of defense, which includes the wording in social networks. "For example, it may seem innocuous that a user has 'uploaded' their birthday to Facebook, but the date of birth is a question for credit card access," he says. Because our country was slow to adapt to technological developments, a significant portion of today's 40- and 50-year-olds, in Greece, inevitably does not have much familiarity, both as professionals and – mainly – as parents. "I think that this lack of experience is sufficiently covered by the informational material of organizations, public services, etc.," he points out. All this material more or less converges on the same rules of computer protection, namely using the latest versions of the operating system and programs, installing a comprehensive "security suite" and creating and protecting strong passwords.

"If there are young children, I would advise that family safety software be used, and more importantly, the PC should be in a shared area," Mr Hantzos says.

Οι ίδιοι κανόνες ισχύουν και για τις «έξυπνες» συσκευές, στις οποίες εξάλλου στρέφουν ολοένα και περισσότερο την προσοχή τους οι κυβερνοεγκληματίες. Παρ' όλο που για το Android υπάρχουν περισσότερα κρούσματα, για τον κ. Χάντζο η προσεκτική χρήση και μια σουίτα ασφαλείας εγγυώνται ικανοποιητική ασφάλεια. «Αν και το “οικοσύστημα” των iPhone και iPad περιφρουρείται σαφώς περισσότερο, σε απόλυτο αριθμό το λειτουργικό τους έχει περισσότερες ευπάθειες, επομένως θα συνιστούσα ένα λογισμικό ασφαλείας και σε αυτήν την περίπτωση», συμπληρώνει. Στην πραγματικότητα, οι φορητές συσκευές είναι πιο εύκολο, από κλοπή ή απώλεια, να πέσουν στα χέρια «αδιάκριτων» και, μαζί με αυτές, τυχόν ευαίσθητα αποθηκευμένα δεδομένα.

kathimerini.gr

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).