Welcome, fellow digital defenders and cyber adventurers!
In this article essay piece adventure we will embark on an amazingly dangerous journey to the wild world of cybersecurity and other shenanigans.
Now enough with the introduction and grab your cyber armour, as we get into the SFCT (Super Fast Cyber Train), and already arrive in within a millisecond.
The cyber world is a place where hacking is like Tom and Jerry, and phishing is as common as Paw Patrol.
You better watch out and call the Justice League (There is no fire brigade) if you wake up and find yourself drowning in the "Big Black Sea of Big Black Hackers"...
1. Ads and Apps on Social Media
Remember last week, when you were just scrolling through your Instagram feed and found this ad about the new amazing app you can use to control your house from your phone? Oh, such a great app - not. Some ads you find on social media can seem like trusted companies or brands because of how the ad looks like. Companies use different and unique styles in their ads, so whenever you see the ads, you know right away: This ad is from Apple, or Samsung, and so on. But sometimes, ads can contain malware, or in easier words, malicious software, that can harm you or your device. For example, one time, users on 4Chan made very Apple-like ads that had the exact same style Apple uses. The ads featured 2 "new" features that came to your iPhone when you upgraded to iOS 7. One was something called "Wave", which made your phone charge when you put it in a microwave. If people had sat down and thought about it, they would know right away that this was all nonsense and jibber-jabber. But because the ads had the exact same style as Apple's, people didn't think, because they know that Apple is a trusted company. And another ridiculous thing was ads that said that "your phone would become waterproof when you updated to iOS 7". Anyway, you shouldn't trust any ads right away, and you should think first, before doing something dumb.
2. Similiar Websites That Can Contain Viruses
Another bad threat are websites. Do you use Google? Of course you do. Maybe that's even how you found my wonderful blog ;). Now, if you use Google regularly, you may have ran into some very similar websites, that basically copied Google, and did the exact same thing, but added viruses, to steal your personal information and passwords. This type of thing is very common, and you will probably run into things like that within your digital life. So what to do? The only thing we can do is be careful what we click on, and always check URLs, and check the most things, that we can't see without concentrating. Like, for example, instead of www.google.com , you could find www.gooogle.com , or www.googlle.com . So be careful!
3. Hackers and What They Can Do
One main thing, is to be careful who you talk to online. It could be like that: It's 7 o'clock. You are looking for your BFF's account on Messenger. Ah! There! But no! It could be a hacker! Some people look for common names, and create accounts on popular social media platforms to trick people. If you send them something, and they answer, there could be a very high chance that this person is good at what he does (hacking), and can now have all your personal information in a swipe. Such a beautiful gift for Hacker-Day! What we can do: Be careful and before just sending a message to a stranger, wait until you get together with the person, and make sure you are not sending a message to someone you don't know.
Conclusion
There are maaany other cybersecurity threats, it wouldn't even fit here in this article adventure. The only thing I can say is: Be careful in the wild world of cybersecurity, take care and do not choose passwords like abc123 or common things even a 3-year-old could guess. Again, I repeat: Be careful!
Bye!
Gee.. that "Bye" didn't sound professional at all...whatever.
Author: Yahia Ayman
Comments
Post a Comment