Internet and online security - 95
What to do if you're infected:
If you're infected you probably
don't realize it as bots are notoriously quiet. Your Internet Service
Provider might send you a notification alerting you that they
found a threat on your network and that you need to remove the
bot. If you have a bot, use internet security software like McAfee
to scan all of your devices.
Viruses/Malware
"Virus" is the commonplace word for all malicious software
programs for years now; however, a virus is just one type of
malicious threat. A virus is classified as a self-replicating piece of
malicious code that travels by inserting itself into files or
programs.
What to do if you're infected:
Take steps to avoid infection by
staying protected with internet security software like McAfee.
Take special precautions when using public Wi-Fi
Public Wi-Fi is available just about everywhere, from the local
coffee shop to the hotels and airports you visit while traveling.
While public Wi-Fi has made our lives a little easier, it also poses
security risks to the personal information available on our laptops
and smartphones. A virtual private network (VPN) gives you online
privacy and anonymity by creating a private network from a
public internet connection. VPNs mask your internet protocol (IP)
address so your online actions are virtually untraceable as well as
secure. One of the biggest security risks on public Wi-Fi are man-
in-the-middle attacks (MITM). These attacks are akin to
eavesdropping. Data is sent from point A (computer) to point B
(server/website), and an attacker can get in-between these
transmissions. They then set up tools programmed to "listen in"
on transmissions, intercept data that is specifically targeted as
valuable, and capture the data, such as your login credentials and
passwords.
Use a virtual private network (VPN) to ensure your privacy and
anonymity are protected when you use public Wi-Fi. VPN services
can encrypt all the data that you send and receive while using a
public Wi-Fi hotspot, securing your information from hackers and
other users of the same connection.
Summary of Contents for Nitro V 15
Page 1: ...USER SMANUAL...