What to do and where to run when the scammers took offmoney from the card? What to do when your social network account is hacked? How to behave if your private correspondence is shared? Such questions are almost daily asked by Internet users. And the majority are interested in this is not for preventive purposes. Unfortunately, such situations are not uncommon. And what is happening in the world, and in particular in Russia, only confirms this.
For example, in March 2018 in Moscow, thunderedscandal. One metropolitan programmer discovered that using a vulnerability on the Moscow Metro's Wi-Fi network, it is possible to obtain the data of 12 million people registered in the service. You could track almost everything, including data such as cash flow on the account, age, all phone numbers, marital status, and so on. It is easy to imagine what would have happened if these data fell into the hands of fraudsters.
Internet access from a home computer
However, danger can be not onlyuse of public Wi-Fi hotspot. Even when you access the Internet from your home PC, there is a chance that your personal information will become available to third parties. All passwords, logins, bank card data that you enter from your computer are saved by the provider. And who gets access to this data, you can no longer control.
Analysis of outgoing traffic allows you to make“User portrait”. And already on the basis of this portrait, obsessive contextual advertising begins to take shape for you at best, and at worst - individual offers, and not always beneficial for you.
For example, you want to travel andlook through the sites that sell tickets. From your IP-address you make requests, indicating the most attractive directions for you. Thus, certain tickets increase liquidity and as a result, the price increases for you.
The same situation may arise with car rental, and with booking hotel rooms, and with communication services.
Unprotected traffic and VPN99
So, practice shows that secure onlineyou can not feel not only in public places, but at home. To keep your privacy and to prevent personal data from falling into the hands of fraudsters, you need to encrypt the connection, and hide your IP address.
There are different ways to do this: use proxy servers, TOR and VPN networks. Internet access through a proxy server will not provide complete anonymity, since On servers, history is preserved. TOR encrypts data by automatically changing IP addresses, but significantly limits the ability to use all the functions of individual resources (for example, you cannot view Flash content). Services remain VPNwhich are now in abundance.
Free VPN services are extremely insecure. Many of them do not just capture traffic and save logs, but they can transfer your data to third parties for a fee. And even if they do not do this, the speed on VPN servers of free services is extremely low due to the number of connections.
When choosing a paid VPN provider, the following criteria are applied:
● connection stability;
● simple and clear settings;
● guarantee of anonymity;
● bypassing geographic restrictions.
Full anonymity in the network can guarantee, for example, service VPN99because does not save logs. In addition, due to the large number of servers and the distribution of load between them, high data transfer rates and connection stability are maintained. VPN99 uses a 2048-bit key to encrypt data, which provides a high level of security and at the same time allows you to provide a high level of performance even on older PCs and mobile devices.
Of course, do not think that everyone on the Internetthe second is a scammer who wants to get your personal data. But for security purposes, it is still better to use a VPN and not advertise your activities on the network.