Error loading page.
Try refreshing the page. If that doesn't work, there may be a network issue, and you can use our self test page to see what's preventing the page from loading.
Learn more about possible network issues or contact support for more help.

Internet Security The Complete Manual

Issue 2
Magazine

Learn how to keep your PC secure from hackers, viruses and malware. The modern digital age is an incredible resource and an astounding human achievement. However, alongside the wealth of information at your fingertips, there are more nefarious elements at work. We live in an increasingly digital reliant world and there are those out there who would stop at nothing to swindle, cheat, destroy and cause utter mayhem with our information. With this guidebook we will help you protect you and your data.

The Complete Internet Security Manual

STOP • Over the next year there is a 69% CHANCE you could be HACKED!

Modern Day Security • The start of the digital age brought with it many advances in the way we work and interact with each other. It’s estimated there’s 1.2 Zettabytes (1.3 trillion gigabytes) of data available to someone with access to the Internet and whilst most of it may be irrelevant, what’s important to you is somewhere within that mass of raw information.

Types of Security Risk • There are more security risks for your computer than just the common, run-of-the-mill virus. The amount of digital use the average person has over the course of a week has increased significantly in just a few years, and with it comes a legion of security related issues.

Hackers and You • Hackers and You We’re probably all familiar with the term ‘hacker’, and what it suggests, but do we really know what a hacker wants from us? More to the point, how are we perceived in the eyes of a hacker? Let’s have a look at what the modern hacker wants from the average user.

Social Engineering • With the rise of wider forms of communication, through social media and so on, comes a new wave of threats called social engineering. There are many forms of social engineering, so let’s have a look at what you’re up against, and how to combat it.

Ransomware: How it Works • The first instance of an extortion attack is credited to Joseph Popp back in 1989. Since then the frequency, delivery and scale of ransomware attacks has increased significantly; so what is ransomware and how does it work?

The Virus Top Ten • Viruses are constantly evolving thanks to more ingenious methods of delivery and due to the developers and hackers tweaking their code to sniff out operating system vulnerabilities. It’s difficult to say what the next big virus will be but some scary ones have already appeared on the Internet.

Phishing, Vishing & Smishing • It’s tempting to think we’ve made up the words Phishing, Vishing and Smishing but in actual fact they’re all forms of social engineering scams. Whilst we’ve covered social engineering already, it’s worth looking at these three modern day threats individually.

Pharming • Whilst on the subject of homophones, another recently added word to the long list of security threats is Pharming. Pharming falls within the online fraud layer of security and although in reality it’s been around for as long as web pages have, the methods of deception are continually evolving.

Windows 10 Security • Microsoft is often accused of developing insecure and ‘broken’ operating systems. However, what the Redmond company delivers is an easy to use system that’s as secure as it can be without compromising its use. It’s a difficult balance to maintain and security can suffer in the long run.

Digital Security FAQ • Whilst it’s all fine and well learning about the different security risks you face every time you boot up your computer, often questions can go unanswered. We’ve put together ten popular digital security questions that we hope will help fill in any blanks.

Protecting Yourself • Being able to recognise a scam or virus is one thing but you need to know how to protect yourself against possible attacks. We look at the top Internet security packages, from...


Expand title description text
Frequency: Twice per year Pages: 248 Publisher: Papercut Limited Edition: Issue 2

OverDrive Magazine

  • Release date: September 23, 2022

Formats

OverDrive Magazine

subjects

Tech & Gaming

Languages

English

Learn how to keep your PC secure from hackers, viruses and malware. The modern digital age is an incredible resource and an astounding human achievement. However, alongside the wealth of information at your fingertips, there are more nefarious elements at work. We live in an increasingly digital reliant world and there are those out there who would stop at nothing to swindle, cheat, destroy and cause utter mayhem with our information. With this guidebook we will help you protect you and your data.

The Complete Internet Security Manual

STOP • Over the next year there is a 69% CHANCE you could be HACKED!

Modern Day Security • The start of the digital age brought with it many advances in the way we work and interact with each other. It’s estimated there’s 1.2 Zettabytes (1.3 trillion gigabytes) of data available to someone with access to the Internet and whilst most of it may be irrelevant, what’s important to you is somewhere within that mass of raw information.

Types of Security Risk • There are more security risks for your computer than just the common, run-of-the-mill virus. The amount of digital use the average person has over the course of a week has increased significantly in just a few years, and with it comes a legion of security related issues.

Hackers and You • Hackers and You We’re probably all familiar with the term ‘hacker’, and what it suggests, but do we really know what a hacker wants from us? More to the point, how are we perceived in the eyes of a hacker? Let’s have a look at what the modern hacker wants from the average user.

Social Engineering • With the rise of wider forms of communication, through social media and so on, comes a new wave of threats called social engineering. There are many forms of social engineering, so let’s have a look at what you’re up against, and how to combat it.

Ransomware: How it Works • The first instance of an extortion attack is credited to Joseph Popp back in 1989. Since then the frequency, delivery and scale of ransomware attacks has increased significantly; so what is ransomware and how does it work?

The Virus Top Ten • Viruses are constantly evolving thanks to more ingenious methods of delivery and due to the developers and hackers tweaking their code to sniff out operating system vulnerabilities. It’s difficult to say what the next big virus will be but some scary ones have already appeared on the Internet.

Phishing, Vishing & Smishing • It’s tempting to think we’ve made up the words Phishing, Vishing and Smishing but in actual fact they’re all forms of social engineering scams. Whilst we’ve covered social engineering already, it’s worth looking at these three modern day threats individually.

Pharming • Whilst on the subject of homophones, another recently added word to the long list of security threats is Pharming. Pharming falls within the online fraud layer of security and although in reality it’s been around for as long as web pages have, the methods of deception are continually evolving.

Windows 10 Security • Microsoft is often accused of developing insecure and ‘broken’ operating systems. However, what the Redmond company delivers is an easy to use system that’s as secure as it can be without compromising its use. It’s a difficult balance to maintain and security can suffer in the long run.

Digital Security FAQ • Whilst it’s all fine and well learning about the different security risks you face every time you boot up your computer, often questions can go unanswered. We’ve put together ten popular digital security questions that we hope will help fill in any blanks.

Protecting Yourself • Being able to recognise a scam or virus is one thing but you need to know how to protect yourself against possible attacks. We look at the top Internet security packages, from...


Expand title description text