dcsimg

Malware Instead of Carnations for Mother's Day - Slide 6

Email     |    
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Malware Instead of Carnations for Mother's Day-6 Next

When shopping for gifts using a smartphone, make sure you check the whole URL of the site. Since cyber crooks know that the small display of the smartphones might hinder the user from seeing the entire URL of the requested Web page, they set up spoofed Web pages resembling these shops or other commercial services and wait for a user to enter their credit card details. While it might take more time, type in the entire URL manually and check if the website's SSL certificate is in place.

Mother's Day has always been celebrated with gifts for moms worldwide. However, BitDefender®, a provider of innovative Internet security solutions, is warning consumers that cyber crooks are taking advantage of this special day by tricking users with online scams.

"Shopping online is a great way to browse for the perfect gift without leaving the comfort of your home," said Catalin Cosoi, BitDefender Head of Online Threats Lab. "However, it's essential that users are aware of the potential dangers that cyber criminals pose. Cyber criminals know people shop online all the time, which is why they are leveraging this information to try and trick users with various online scams. The more educated a computer user is about these risks, the safer they will be when it comes to making a purchase."

In order to keep your computer and all of your personal information safe BitDefender is offering consumers the following tips.

More Slideshows:


Strategic Considerations for Selecting the Optimal IT Platform for Regulatory Compliance New legislation will have vast repercussions for financial IT infrastructure.

Seven Dos and Don'ts for Digital Communication Our evolving online behavior reveals a lot about our habits and values.


Ten Free Software Tools for the Cost-Conscious Consultant Ten free applications that will help you manage your time and tackle niche tasks.

 

Related Topics : Anti-Virus Solutions, DoS Attacks

 
More Slideshows

infra11-190x128 Five Things to Do Now for Greater Security and Compliance

The perimeter of the network is no longer the only concern; it is the endpoints and applications that are putting IT organizations on high alert. ...  More >>

How to Battle Summer Complacency in Endpoint Security

Here are some tips and tricks to ensure you're ready to start the fall with an effective strategy for monitoring threats and endpoint vulnerabilities. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.

×
We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.