Malware Instead of Carnations for Mother's Day - Slide 6

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Malware Instead of Carnations for Mother's Day-6 Next

When shopping for gifts using a smartphone, make sure you check the whole URL of the site. Since cyber crooks know that the small display of the smartphones might hinder the user from seeing the entire URL of the requested Web page, they set up spoofed Web pages resembling these shops or other commercial services and wait for a user to enter their credit card details. While it might take more time, type in the entire URL manually and check if the website's SSL certificate is in place.

Mother's Day has always been celebrated with gifts for moms worldwide. However, BitDefender®, a provider of innovative Internet security solutions, is warning consumers that cyber crooks are taking advantage of this special day by tricking users with online scams.

"Shopping online is a great way to browse for the perfect gift without leaving the comfort of your home," said Catalin Cosoi, BitDefender Head of Online Threats Lab. "However, it's essential that users are aware of the potential dangers that cyber criminals pose. Cyber criminals know people shop online all the time, which is why they are leveraging this information to try and trick users with various online scams. The more educated a computer user is about these risks, the safer they will be when it comes to making a purchase."

In order to keep your computer and all of your personal information safe BitDefender is offering consumers the following tips.

More Slideshows:


Strategic Considerations for Selecting the Optimal IT Platform for Regulatory Compliance New legislation will have vast repercussions for financial IT infrastructure.

Seven Dos and Don'ts for Digital Communication Our evolving online behavior reveals a lot about our habits and values.


Ten Free Software Tools for the Cost-Conscious Consultant Ten free applications that will help you manage your time and tackle niche tasks.

 

Related Topics : Anti-Virus Solutions, DoS Attacks

 
More Slideshows

infra11-190x128 Five Things to Do Now for Greater Security and Compliance

The perimeter of the network is no longer the only concern; it is the endpoints and applications that are putting IT organizations on high alert. ...  More >>

How to Battle Summer Complacency in Endpoint Security

Here are some tips and tricks to ensure you're ready to start the fall with an effective strategy for monitoring threats and endpoint vulnerabilities. ...  More >>

Seven Steps to Hinder Hackers: Antivirus Just Isn't Enough

Antivirus software is no longer a match for today's threats. Here's what your business needs to stay protected. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.