Quantcast
Channel: Online threats | NordVPN
Browsing all 69 articles
Browse latest View live

Come capire se hanno hackerato il tuo profilo Facebook: guida 2024

Facebook è un social network estremamente popolare, uno dei più utilizzati al mondo. Per questo motivo, è spesso preso di mira dagli hacker, che lo utilizzano per ottenere le informazioni personali...

View Article


透過 VPN 安全使用公共 Wi-Fi

您使用公共 Wi-Fi 時安全嗎?如果您沒有使用任何網絡安全工具,答案是顯而易見的。雖然公共 Wi-Fi 十分方便,不過連接到咖啡館或者機場的公共 Wi-Fi 可能令您成為網絡罪犯的獵物。不過,虛擬私人網絡能保護使用公共 Wi-Fi 的用戶嗎? VPN 能否保護使用公共 Wi-Fi 的用戶? 如果您在使用公共 Wi-Fi 時開啟 VPN,VPN...

View Article

Cosa può fare una persona (o addirittura, un hacker) con il tuo indirizzo IP?

L’indirizzo IP riveste un ruolo molto importante nel processo di trasmissione e ricezione dei dati tramite internet. Tuttavia, se un malintenzionato dovesse entrare in possesso di questo dato,...

View Article

Is onbeveiligde hotel wifi veilig? Nee – gebruik altijd een VPN

Gratis wifi in hotels is in de regel niet veilig, zelfs niet als het met een wachtwoord beschermd is. Controleer altijd de officiële naam van de wifi van het hotel, omdat criminelen vaak nep-hotspots...

View Article

Jak bezpiecznie robić zakupy w Internecie?

Liczba oszustw związanych z zakupami online i kradzieży tożsamości rośnie z roku na rok. Wielu kupujących online wciąż nie zna prostych zasad bezpiecznych zakupów online, a hakerzy nieustannie...

View Article


Cyberbullying on social media: Its effects and how to stop it

With social media sites and apps at everyone’s fingertips, bullies have easy access to their victims. Cyberbullying can take many forms and even ruin someone’s reputation. Let’s look at how...

View Article

Software troubleshooting: Techniques and tips

Software troubleshooting techniques let users methodically tackle difficult issues, trying out different solutions one by one until they find something that works. In this article, we’ll examine...

View Article

사이버 괴롭힘: 우리의 안전할 권리를 지키는 방법

사이버폭력은 피해자의 삶에 깊은 상처를 남길 수 있습니다. 어떤 피해자는 사이버 괴롭힘을 피하기 위해 거주지를 옮기거나, 일부 피해자는 극단적인 선택을 하기도 합니다. 특히 소셜 미디어의 발전에 따라 사이버 폭력이 실제 폭력으로 이어지는 경우도 많아지게 되었습니다. 따라서 이 글에서는 사이버 괴롭힘에 관해 자세히 알아보고 이러한 폭력으로부터 자신을 지키는...

View Article


How to block spam text messages on an Android and iPhone

Spam text messages are more than just an annoying waste of your time. Scammers use them to get your personal information, make you pay an exorbitant amount of money for replies or calls, or install...

View Article


Why Facebook smart glasses threaten privacy

Facebook has teamed up with Ray-Ban to launch a line of relatively inexpensive smart glasses — but what you’re saving on price, you might end up paying in privacy. In this article, we explore how the...

View Article

NordVPNを装った詐欺についての注意喚起

NordVPNのセキュリティチームは、当社を装い、被害者をマルウェアに感染させようとする詐欺サイトの存在を確認しました。セキュリティチームは当該サイトの削除を試みているところですが、お客様の安全のために状況をご説明します。 詐欺の仕組み...

View Article

Darknet market: What you should know about dark web marketplaces

We don’t recommend venturing into a dark web marketplace on your own, but we understand your curiosity. Let us safely guide you through it. In this article, we’ll demystify darknet markets, explain...

View Article

Estafa de Correos por SMS: disfruta de tus libros de Sant Jordi sin problemas

El Día Internacional del Libro, que siempre cae en 23 de abril, es un día muy especial en Cataluña. En esta fecha, Sant Jordi, nadie se queda sin su rosa y un buen libro; pero si ya es difícil elegir...

View Article


Is it safe to use hotel Wi-Fi? Hotel network security explained

To many, free Wi-Fi in hotels is a blessing. From looking up museums to picking a place for dinner, having a reliable internet connection is a must for any traveler. But when you use these publicly...

View Article

Las estafas más populares de WhatsApp y cómo evitarlas

WhatsApp es la app de mensajería más popular del mundo, con más de 2000 millones de usuarios activos mensuales. Con una base de clientes tan amplia, no es de extrañar que WhatsApp tenga su buena...

View Article


Exposing the top 10 eBay scams and how to detect them

Marketplaces like eBay give everyone a chance to find an item they’ve been looking for. But wherever money’s involved, scams are always nearby. Here’s how you can buy and sell online safely and avoid...

View Article

OIDC vs SAML: Key differences

If you’ve ever studied how the internet works, then you know that it employs various protocols to identify URLs, sort data, and grant users access to their favorite apps and services. Out of all these...

View Article


10 must-have information security policies

Data is extremely valuable in today’s business climate, so organizations must have information security policies. Data integrity and confidentiality must be protected at all costs. At the same time,...

View Article

What is malvertising?

Banner ads, sidebars, and pop-ups are everywhere online, from mainstream news sites to video streaming platforms. While most are simply colorful distractions, some are malvertising ads designed to...

View Article

What should you do if you open a phishing email? Learn how to protect your...

If you’ve accidentally opened a phishing email or clicked on a suspicious link, don’t panic. Take immediate action to protect yourself by marking the email as spam, reporting it to your IT department...

View Article
Browsing all 69 articles
Browse latest View live