People tend to have a lot of different applications on their smartphones and computers just to kill time. However, there are a few things to look out for to ensure your safety and security.
What are apps?
Apps (or applications) are programs that can be used on a mobile device, and are often great sources of news, education, lifestyle or entertainment such as games and social networking. They can be downloaded cheaply or even for free on computers, mobile devices and even some TVs.
ATM skimming is like identity theft for debit cards. It is an illegal activity that involves installing hidden devices that secretly record bank account details when a user inserts an ATM card into the machine. Criminals can then use the stolen data to create a cloned card to withdraw money from the victim’s bank account either locally or overseas.
Skimming typically requires two separate components to work.
Ransomware is a type of malware that stops you from using your computer, and holds your data hostage. Typically, it will do this by encrypting your personal files or locking your computer screen. It may then require you to pay a ransom via a credit card payment, money transfer or cryptocurrency in order to unlock and use your computer. But even if you pay the ransom, there’s no guarantee it won’t happen again.
Cloud storage is a term that refers to online space that you can use to store your data. Cloud computing services are online services which store your data in a safe and secure location online, allowing you to access your files from anywhere in the world, as long as you have an internet connection.
Imagine losing your computer in a fire. Think of all the documents, files, photos and videos that you wouldn’t be able to recover. That’s why backing up your data is so important. Backing up your files gives you some protection against accidental loss of data, file corruption, hardware failures, virus attacks and even natural disasters.
Malware is malicious software. The goal of most cyber criminals is to install malware on your computer or mobile devices. Once installed, attackers can potentially gain control of your system.
Symptoms your computer might be infected with malware