LOGIN

REGISTER
Seeker

Privacy and security and tricks for internet plots.

Select the language:

You must allow Vimeo cookies to view the video.

Unlock the full course and get certified!

You are viewing the free content. Unlock the full course to get your certificate, exams, and downloadable material.

*When you buy the course, we gift you two additional courses of your choice*

*See the best offer on the web*

Transcription Privacy and security and tricks for internet plots.


Fundamentals of Active Security (Passwords and 2FA).

Digital security starts with good password hygiene. The most common mistake is using weak passwords (dates, "123456", pet name) and, worse, repeating the same password across multiple services.

If a cybercriminal gets that password in a leak (for example, from a gaming website), he will try that same combination in the user's email, social network and bank account.

The fundamental trick is to use strong passwords (long, with uppercase, lowercase, numbers and symbols) and unique for each service, managing them through a password manager.

The most important "trick" or security measure today is Two-Factor Authentication (2FA).

It consists of adding an extra layer of security: in addition to the password (something you know), you need a temporary code (something you have), which usually arrives on your mobile.

Enabling 2FA on WhatsApp, Instagram and email prevents an attacker from accessing your account, even if they managed to steal your password.

Identifying "Plots": Phishing and Scams

The most common "internet plots" are based on social engineering, i.e. manipulating the user to hand over their data voluntarily.

Phishing is the star technique: an email or direct message (DM) pretending to be a legitimate entity (a bank, Netflix, Post Office, the social network itself) and alerting about an urgent problem ("Your account will be blocked", "You have won a prize", "A package could not be delivered").

The tricks to detect these plots are:

1) Check the sender: the email is usually a combination of strange letters, not the official domain.

2) Be wary of urgency: scams always rush you so that you don't think.

3) Look for mistakes: they often contain spelling mistakes or strange wording.

4) The link: the ultimate trick is to hover your mouse over the link (without clicking).

The preview will show the real URL, which will have nothing to do with the official website. No legitimate company asks for passwords by mail.

Browsing Privacy (Cookies and VPNs)

Privacy is not only about protecting accounts, but also about controlling the digital footprint we leave when browsing. Cookies are small files that websites use.

The "first-party" ones are useful (they remember your login), but the "third-party" ones are trackers that follow you around the Internet to create an advertising profile about you.

The advice is to "Reject all" non-essential cookies whenever the website allows it.

Browser Incognito Mode does not make you anonymous on the internet; it just prevents your history and cookies from being stored on your device.

Your Internet Service Provider (ISP) and the websites you visit still know who you are.

For real privacy, VPNs (Virtual Private Network) are used, a "trick" that encrypts your connection and hides your IP address, preventing your provider or third parties from spying on what you do.

Summary

Active security requires strong and unique passwords, managed by a manager. The most important trick is to enable two-factor authentication (2FA) on as many accounts as possible.

To detect schemes such as phishing, be wary of the urgency and check the sender. Never click on suspicious links or give out passwords; check the actual URL before you act.

Manage your browsing privacy by rejecting third-party cookies. Incognito mode only deletes your local history; for greater online privacy, use a VPN.


privacy and security and tricks for internet plots

Recent publications by school bullying

Are there any errors or improvements?

Where is the error?

What is the error?