Error message

  • Warning: count(): Parameter must be an array or an object that implements Countable in theme_table() (line 1998 of /home/admin/web/
  • Warning: count(): Parameter must be an array or an object that implements Countable in theme_table() (line 2061 of /home/admin/web/
  • Deprecated function: The each() function is deprecated. This message will be suppressed on further calls in menu_set_active_trail() (line 2405 of /home/admin/web/

How to protect personal data on the Internet Part 1

Tell why our personal information every day are under threat, and share tips on how to protect personal information online.

Many people think that their data criminals are not interested, but experience shows that fame does not affect the willingness of intruders to acquire other people's personal information and to benefit from them. We reviewed the most popular scenarios where your data is at risk and will tell you what to do to keep personal information confidential.


Email is more than just a mailbox. You use it to register on most of the sites and services, and therefore, having access to email, the attackers can hack your other accounts.

Has not been canceled and a threat to the secrecy of correspondence, stored in the dialogues documents. If it is a working drawer, then the hackers can get closed corporate information. And then hacked email is not only your problem it would threaten the security of all correspondence in the company.

Accounts in game services

Millions of people play World of Tanks, DOTA 2, Counter Strike: Global Offensive or FIFA use Origin, Steam, Xbox Live, PlayStation Network and other game services.

Users earn game experience, game currency, bought with real money things for the gaming equipment, the games themselves. Cracking your game account, attackers will steal bought licensed games, play equipment and items and get them for real money.

Social networks and instant messengers

Social network and instant messenger is the best for the fraudsters, if they want to make money intimate details of your life. We all have skeletons in the closet, but that doesn't mean that they should become public. If you properly are not protected your account, then trouble may happen anytime.

For many, the correspondence in social networks and messengers replace email they share photos, documents, and other confidential information.

Digital theft of the smartphone

All modern smartphones have the primary account: for iOS is an Apple ID for Android Google account. What if criminals have access to them, valuable information about you and your smartphone will be in their hands.

Last year was the known story about the crook who fraudulently obtained access to your Apple ID, blocked the victim's phone and demanded money for unlocking. This often happens with the purchase of a smartphone when an unscrupulous dealer sells you, in fact, a brick that cannot be used without entering the password to the hacked account.

Mobile apps and games

Programs installed from the App Store, Google Play or Windows Marketplace, requesting access to your contacts, location, calendar, billing. Each time carefully read what info the app requests to access or the game. For example, why the puzzle game to know your location and what the currency Converter need your calendar?

Bank details

Now Bank cards to pay not just in the supermarket: card pay utility bills through Internet banking and shopping in online stores using the card to book tickets and hotels. But think about where you leave your details?

Unprotected WiFi point

WiFi happiness for the traveler and freelancer. But attackers use insecure public hotspots and negligence of users. By the way, the hackers are getting closer to locked points. But there is a trick: connected to WiFi, and everything you do on the screen and type on the keyboard, sees the attacker.

It is important to understand what information and who you trust. No problem to trust my email to Google. But if access the same mail asks an unfamiliar application, to give such access dangerous not only because of the lack of information about the good reputation of the service. Attackers can hack the app itself and thereby gain access to information without even having to hack your Google account.