The term Doxing was for most of us, until recently, not common. However, after the major case of misuse of data from the beginning of the year, we must take him for better or worse, in our vocabulary. In Germany, sensitive information from politicians, musicians, celebrities, Youtubers and journalists were collected and via Twitter released. There were residential and e - Mail addresses and mobile phone numbers, Bank details, Chats, identity documents, letters and photos to the Public.
Doxing States that personal data will be collected and published, with the intention of sacrifice only and to intimidate. This digital form of Attack plays directly to the Person, while the other forms of data theft, the objective is to get to financially actionable information: credit card numbers, access data to online banking, web shops, or e - Mail and Social Media accounts. But, of course, so many motivations exist, as there are cyber criminals.
hackers take what they
can get Anyway, the data all of us are Criminals is interesting, not only of celebrities and politicians. Hackers take what they can get. And since in the last time many of the large Internet companies that are larger or smaller burglaries have seen, are affected, the vast majority of Internet users in any Form. Mostly the effects are small, because the companies have to react quickly and in the case of the stolen access data, the passwords of affected accounts to reset.
But anyone who makes the mistake to use the same combination of user name and password at more than one service, you must expect data loss and real damage is done.
A password Manager is indispensable.
How can you protect yourself? In the Video we show seven measures, which should help against Doxing, but also against the already longer known forms of data theft. The are is a brief summary of the recommendations:
Think about what data you store in the Cloud and which are not. Data can also be stolen directly from the device – however, the Cloud provides an additional attack of opportunity, which increases the risk. How do you keep important documents on your Internet on their devices, and we have explained in a previous Video.
Protect your data on your devices: you take the best protection measures: Keep the operating system up to date, use (notably Windows) the built-in virus protection and make sure that the Firewall is turned on.
Store data on mobile devices encrypted. In the case of new Smartphones and Tablets, the default is not the case, however, in the case of Laptops with Windows or macOS you will need to help probably. The Video shows how you can use the built-in encryption functions or, if necessary, to resort to a third-party product.
you Use a password Manager. With the automatically generate strong passwords. And avoid the cardinal error, namely, the multiple use of the same access data. Tips to the password Manager, you can also find here. The "auto-type"feature, the passwords will automatically be registered, is presented here in Detail. And also important: do not bring in third-party services via Facebook or Google to log in.
Enable the Two-factor authentication. To protect your data on the net in addition to by you to confirm access to user accounts, in addition to a one-time Code or via App. Twofactorauth.org lists all the services that offer this additional security mechanism. Instructions can also be found in the providers themselves, for example, in the case of Apple, Microsoft, Google, Facebook, Whatsapp, Dropbox, Amazon, etc.
Check whether your user have appeared data in connection with a data theft in the network, and alert you if that should happen – so that you can timely change the password. This is, for example, with the Firefox Monitor.
How to secure the Browser, Phishing, avoid Traps and risks while Surfing the net out of the way, we have explained in the post A few clicks, for more security.
The Two-factor authentication (also two-step verification) is schrötig, but necessary. (Editorial Tamedia)
Created: 14.01.2019, 16:01 PM