SlideShare a Scribd company logo
1 of 4
How to Identify and Protect Yourself from an Unsafe Website
With more people storing personal information on their computers, it has never been more
important to protect yourself from internet predators looking to gain access to your files. One
of the many ways they can do this is by attacking your computer or trying to gather your
information from an infected or malicious website you may visit, even if only once. The best
thing you can do is to avoid malicious websites altogether.
Here are the most prevalent tell-tale signs of a threatening website and some ways that you
can protect yourself:
Never click on a link embedded in an email. Even if sent from someone
you trust, always type the link into your browser
Use your common sense. Does a website look strange to you? Is it
asking for sensitive personal information? If it looks unsafe, don’t take the
risk.
Look for signs of legitimacy. Does the website list contact
information or some signs of a real-world presence. If doubtful, contact
them by phone or email to establish their legitimacy.
Read the URL carefully. If this is a website you frequent, is the URL
spelled correctly? Often times, phishers will set up websites almost
identical to the spelling of the site you are trying to visit. An accidental
mistype may lead you to a fraudulent version of the site.
If it looks too good to be true, it probably is. Is the website offering
you a product or service at an unheard of price? Or maybe they are
promising you a huge return on investment? If the offer looks too good to
be true, trust your instincts. Do some research to find reviews or warnings
from other users.
Check the properties of any links. Right-clicking a hyperlink and
selecting “Properties” will reveal the true destination of the link. Does it
look different from what it claimed to lead you to?
You should also always be on the lookout for the clues and telltale hints that you are on a
malicious website. After all, it is by smart people noticing something wrong and reporting it
that the above tools can do their job.
Things to look for in a secure website
When visiting a website that asks for sensitive information such as credit card numbers or
your social security number, the first step you can take to securing your privacy is creating a
strong password (link to infosec site). Equally important is verifying that any information you
enter on this site is transmitted and stored properly. Once your information is entered online, it
is transmitted as plain text for anyone to intercept. To avoid this, make sure that the website is
encrypted over a secure connection.
•HTTPS
One such sign to look for is in the URL of the website. A secure website’s URL should begin
with “https” rather than “http”. The “s” at the end of “http” stands for secure and is using an
SSL (Secure Sockets Layer) connection. Your information will be encrypted before being sent
to a server.
•THE LOCK ICON
Another sign to look for is the “Lock” icon that is displayed somewhere in the window of your
web browser. Different browsers may position the lock in different places, but a few examples
of what it may look like can be found here:
Google Chrome
Clicking on the Lock icon will give you detailed information on the security status of this website
Mozilla Firefox
With Firefox, the Lock icon may not be displayed directly. Clicking on the site's icon next to the URL should reveal the Lock icon and the secure
verification
Internet Explorer
Clicking on the Lock icon will give you detailed information on the security status of this website
Protect Yourself
Utilize your internet browser’s security tools
Be sure to install the most current version of your web browser. Most browsers have
sophisticated filters that can identify and warn you of potential security threats. For information
on browser-specific security tools, explore their security features here:
Internet Explorer
Mozilla Firefox
Google Chrome
Make sure that the proper online protection tools are enabled for your Anti-Virus Software
McAfee’s SiteAdvisor
Norton’s Safe Search
You may also want to consider downloading an add-on for you browser that is specially
designed to identify any unsafe elements of a website
Web of Trust
AVG Link Scanner
Take advantage of your search engine’s security features
Google has a secure version of its search engine. Simply visit https://google.com when
conducting any Google search. You can read more about that here.
In your Google settings, turn on the “always use HTTPS” function through the following steps:
To disable or re-enable this feature in Gmail:
1.Sign in to Gmail.
2.Click the gear icon in the upper-right corner, and select Mail settings.
3.In the General tab, set ‘Browser Connection’ to ‘Always use https’ or ‘Don’t always use https.’
If you’ve never changed the setting before, no radio buttons will be selected, even though the default is indeed ‘Always use
https’.
4.Click Save Changes.
5.Manually change the URL to http://mail.google.com to start accessing Gmail via http.

More Related Content

What's hot

Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threatsourav newatia
 
Child safety 16 jun14
Child safety 16 jun14Child safety 16 jun14
Child safety 16 jun14Naval OPSEC
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacksNamik Heydarov
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafeCheapSSLsecurity
 
11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe onlineScott Schober
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hackingleet detected
 
Internet issues
Internet issuesInternet issues
Internet issuesCJ900
 
Check your network security
Check your network securityCheck your network security
Check your network securityYour Virtual CTO
 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacksSreejith.D. Menon
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
Phishing Attacks - Are You Ready to Respond?
Phishing Attacks - Are You Ready to Respond?Phishing Attacks - Are You Ready to Respond?
Phishing Attacks - Are You Ready to Respond?Splunk
 

What's hot (20)

Phishing
PhishingPhishing
Phishing
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
 
Child safety 16 jun14
Child safety 16 jun14Child safety 16 jun14
Child safety 16 jun14
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacks
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 
Exploring And Investigating New Dimensions In Phishing
Exploring And Investigating New Dimensions In PhishingExploring And Investigating New Dimensions In Phishing
Exploring And Investigating New Dimensions In Phishing
 
Phishing
PhishingPhishing
Phishing
 
Anti phishing
Anti phishingAnti phishing
Anti phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing Technology
Phishing TechnologyPhishing Technology
Phishing Technology
 
11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online
 
A presentation on Phishing
A presentation on PhishingA presentation on Phishing
A presentation on Phishing
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
 
Internet issues
Internet issuesInternet issues
Internet issues
 
Check your network security
Check your network securityCheck your network security
Check your network security
 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacks
 
Phishing demo
Phishing demoPhishing demo
Phishing demo
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Phishing Attacks - Are You Ready to Respond?
Phishing Attacks - Are You Ready to Respond?Phishing Attacks - Are You Ready to Respond?
Phishing Attacks - Are You Ready to Respond?
 

Viewers also liked

Boiler & co generation presentation finished not yet
Boiler & co generation presentation finished not yetBoiler & co generation presentation finished not yet
Boiler & co generation presentation finished not yetdrazil
 
Молодогвардейцы. Иван Васильевич Туркенич
Молодогвардейцы. Иван Васильевич ТуркеничМолодогвардейцы. Иван Васильевич Туркенич
Молодогвардейцы. Иван Васильевич Туркеничpnextorg
 
Women in Antiquity-PresentationPP
Women in Antiquity-PresentationPPWomen in Antiquity-PresentationPP
Women in Antiquity-PresentationPPTristan Wicks
 
Waikato philanthropy series workshop 3 final
Waikato philanthropy series workshop 3 finalWaikato philanthropy series workshop 3 final
Waikato philanthropy series workshop 3 finalKatefnz
 
Виїзне засідання клубу
Виїзне засідання клубуВиїзне засідання клубу
Виїзне засідання клубуAlex Wise
 
Presentazione Gruppo 09 - Resoconto e prospetto per finale - 03.07.2015
Presentazione Gruppo 09 - Resoconto e prospetto per finale - 03.07.2015Presentazione Gruppo 09 - Resoconto e prospetto per finale - 03.07.2015
Presentazione Gruppo 09 - Resoconto e prospetto per finale - 03.07.2015A.C.M.E. Devise
 
2015-4 MSchaper Res AZ HR HS BH EAP
2015-4 MSchaper Res AZ HR HS BH EAP2015-4 MSchaper Res AZ HR HS BH EAP
2015-4 MSchaper Res AZ HR HS BH EAPMary Schaper
 
Canada: Fall Colour: What to Plant | Tips from The Grounds Guys® Landscape Ma...
Canada: Fall Colour: What to Plant | Tips from The Grounds Guys® Landscape Ma...Canada: Fall Colour: What to Plant | Tips from The Grounds Guys® Landscape Ma...
Canada: Fall Colour: What to Plant | Tips from The Grounds Guys® Landscape Ma...DGCommunications
 
Resume hopper-final
Resume hopper-finalResume hopper-final
Resume hopper-finalSteve Hopper
 
Animal Euthanasia by gassing
Animal Euthanasia by gassingAnimal Euthanasia by gassing
Animal Euthanasia by gassingsydneyhardrath
 
MAFMP - Ellen A. Saputra 22051422 - Practice of Cross-Genre in 'Modern' Holly...
MAFMP - Ellen A. Saputra 22051422 - Practice of Cross-Genre in 'Modern' Holly...MAFMP - Ellen A. Saputra 22051422 - Practice of Cross-Genre in 'Modern' Holly...
MAFMP - Ellen A. Saputra 22051422 - Practice of Cross-Genre in 'Modern' Holly...Ellen Saputra
 
Study in ukraine cost
Study in ukraine costStudy in ukraine cost
Study in ukraine costEdufactsIndia
 
Kerajinan Keras - Kelompok 7
Kerajinan Keras - Kelompok 7Kerajinan Keras - Kelompok 7
Kerajinan Keras - Kelompok 7Kaysyifa Rahma
 

Viewers also liked (14)

Boiler & co generation presentation finished not yet
Boiler & co generation presentation finished not yetBoiler & co generation presentation finished not yet
Boiler & co generation presentation finished not yet
 
Молодогвардейцы. Иван Васильевич Туркенич
Молодогвардейцы. Иван Васильевич ТуркеничМолодогвардейцы. Иван Васильевич Туркенич
Молодогвардейцы. Иван Васильевич Туркенич
 
IJBM maart 2015 [facebook]
IJBM maart 2015 [facebook]IJBM maart 2015 [facebook]
IJBM maart 2015 [facebook]
 
Women in Antiquity-PresentationPP
Women in Antiquity-PresentationPPWomen in Antiquity-PresentationPP
Women in Antiquity-PresentationPP
 
Waikato philanthropy series workshop 3 final
Waikato philanthropy series workshop 3 finalWaikato philanthropy series workshop 3 final
Waikato philanthropy series workshop 3 final
 
Виїзне засідання клубу
Виїзне засідання клубуВиїзне засідання клубу
Виїзне засідання клубу
 
Presentazione Gruppo 09 - Resoconto e prospetto per finale - 03.07.2015
Presentazione Gruppo 09 - Resoconto e prospetto per finale - 03.07.2015Presentazione Gruppo 09 - Resoconto e prospetto per finale - 03.07.2015
Presentazione Gruppo 09 - Resoconto e prospetto per finale - 03.07.2015
 
2015-4 MSchaper Res AZ HR HS BH EAP
2015-4 MSchaper Res AZ HR HS BH EAP2015-4 MSchaper Res AZ HR HS BH EAP
2015-4 MSchaper Res AZ HR HS BH EAP
 
Canada: Fall Colour: What to Plant | Tips from The Grounds Guys® Landscape Ma...
Canada: Fall Colour: What to Plant | Tips from The Grounds Guys® Landscape Ma...Canada: Fall Colour: What to Plant | Tips from The Grounds Guys® Landscape Ma...
Canada: Fall Colour: What to Plant | Tips from The Grounds Guys® Landscape Ma...
 
Resume hopper-final
Resume hopper-finalResume hopper-final
Resume hopper-final
 
Animal Euthanasia by gassing
Animal Euthanasia by gassingAnimal Euthanasia by gassing
Animal Euthanasia by gassing
 
MAFMP - Ellen A. Saputra 22051422 - Practice of Cross-Genre in 'Modern' Holly...
MAFMP - Ellen A. Saputra 22051422 - Practice of Cross-Genre in 'Modern' Holly...MAFMP - Ellen A. Saputra 22051422 - Practice of Cross-Genre in 'Modern' Holly...
MAFMP - Ellen A. Saputra 22051422 - Practice of Cross-Genre in 'Modern' Holly...
 
Study in ukraine cost
Study in ukraine costStudy in ukraine cost
Study in ukraine cost
 
Kerajinan Keras - Kelompok 7
Kerajinan Keras - Kelompok 7Kerajinan Keras - Kelompok 7
Kerajinan Keras - Kelompok 7
 

Similar to How to identify unsafe websites

Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsNetLockSmith
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security riskK. A. M Lutfullah
 
cyber security presentation 1234567.pptx
cyber security presentation 1234567.pptxcyber security presentation 1234567.pptx
cyber security presentation 1234567.pptxprashanth73488
 
The Battle Against Phishing:Dynamic Security Skins
The Battle Against Phishing:Dynamic Security SkinsThe Battle Against Phishing:Dynamic Security Skins
The Battle Against Phishing:Dynamic Security SkinsRaj Kumar
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
Staying Safe on the Computer and Online
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Onlinecat509
 
Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptxAljunMisa
 
10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraudWebSitePulse
 
Chapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyChapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyAnjan Mahanta
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1Rozell Sneede
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014B2BPlanner Ltd.
 
CYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxCYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxTapan Khilar
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptxAchu69
 
Techniques For Making 21st Century Learning Tools Safer
Techniques For Making 21st Century Learning Tools SaferTechniques For Making 21st Century Learning Tools Safer
Techniques For Making 21st Century Learning Tools Safernerakmac
 

Similar to How to identify unsafe websites (20)

Securityguide
SecurityguideSecurityguide
Securityguide
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
cyber security presentation 1234567.pptx
cyber security presentation 1234567.pptxcyber security presentation 1234567.pptx
cyber security presentation 1234567.pptx
 
The Battle Against Phishing:Dynamic Security Skins
The Battle Against Phishing:Dynamic Security SkinsThe Battle Against Phishing:Dynamic Security Skins
The Battle Against Phishing:Dynamic Security Skins
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Staying Safe on the Computer and Online
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Online
 
Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptx
 
10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud
 
Chapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyChapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & Safety
 
Phishing
PhishingPhishing
Phishing
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
Avoiding Bad URL's In the Mobile Web
Avoiding Bad URL's In the Mobile WebAvoiding Bad URL's In the Mobile Web
Avoiding Bad URL's In the Mobile Web
 
Phishing
PhishingPhishing
Phishing
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
CYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxCYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptx
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
Techniques For Making 21st Century Learning Tools Safer
Techniques For Making 21st Century Learning Tools SaferTechniques For Making 21st Century Learning Tools Safer
Techniques For Making 21st Century Learning Tools Safer
 

Recently uploaded

VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdfkeithzhangding
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewingbigorange77
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 

Recently uploaded (20)

VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewing
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 

How to identify unsafe websites

  • 1. How to Identify and Protect Yourself from an Unsafe Website With more people storing personal information on their computers, it has never been more important to protect yourself from internet predators looking to gain access to your files. One of the many ways they can do this is by attacking your computer or trying to gather your information from an infected or malicious website you may visit, even if only once. The best thing you can do is to avoid malicious websites altogether. Here are the most prevalent tell-tale signs of a threatening website and some ways that you can protect yourself: Never click on a link embedded in an email. Even if sent from someone you trust, always type the link into your browser Use your common sense. Does a website look strange to you? Is it asking for sensitive personal information? If it looks unsafe, don’t take the risk. Look for signs of legitimacy. Does the website list contact information or some signs of a real-world presence. If doubtful, contact them by phone or email to establish their legitimacy. Read the URL carefully. If this is a website you frequent, is the URL spelled correctly? Often times, phishers will set up websites almost identical to the spelling of the site you are trying to visit. An accidental mistype may lead you to a fraudulent version of the site. If it looks too good to be true, it probably is. Is the website offering you a product or service at an unheard of price? Or maybe they are promising you a huge return on investment? If the offer looks too good to be true, trust your instincts. Do some research to find reviews or warnings from other users. Check the properties of any links. Right-clicking a hyperlink and selecting “Properties” will reveal the true destination of the link. Does it look different from what it claimed to lead you to? You should also always be on the lookout for the clues and telltale hints that you are on a malicious website. After all, it is by smart people noticing something wrong and reporting it that the above tools can do their job.
  • 2. Things to look for in a secure website When visiting a website that asks for sensitive information such as credit card numbers or your social security number, the first step you can take to securing your privacy is creating a strong password (link to infosec site). Equally important is verifying that any information you enter on this site is transmitted and stored properly. Once your information is entered online, it is transmitted as plain text for anyone to intercept. To avoid this, make sure that the website is encrypted over a secure connection. •HTTPS One such sign to look for is in the URL of the website. A secure website’s URL should begin with “https” rather than “http”. The “s” at the end of “http” stands for secure and is using an SSL (Secure Sockets Layer) connection. Your information will be encrypted before being sent to a server. •THE LOCK ICON Another sign to look for is the “Lock” icon that is displayed somewhere in the window of your web browser. Different browsers may position the lock in different places, but a few examples of what it may look like can be found here: Google Chrome Clicking on the Lock icon will give you detailed information on the security status of this website Mozilla Firefox
  • 3. With Firefox, the Lock icon may not be displayed directly. Clicking on the site's icon next to the URL should reveal the Lock icon and the secure verification Internet Explorer Clicking on the Lock icon will give you detailed information on the security status of this website Protect Yourself Utilize your internet browser’s security tools Be sure to install the most current version of your web browser. Most browsers have sophisticated filters that can identify and warn you of potential security threats. For information on browser-specific security tools, explore their security features here: Internet Explorer Mozilla Firefox Google Chrome Make sure that the proper online protection tools are enabled for your Anti-Virus Software McAfee’s SiteAdvisor Norton’s Safe Search
  • 4. You may also want to consider downloading an add-on for you browser that is specially designed to identify any unsafe elements of a website Web of Trust AVG Link Scanner Take advantage of your search engine’s security features Google has a secure version of its search engine. Simply visit https://google.com when conducting any Google search. You can read more about that here. In your Google settings, turn on the “always use HTTPS” function through the following steps: To disable or re-enable this feature in Gmail: 1.Sign in to Gmail. 2.Click the gear icon in the upper-right corner, and select Mail settings. 3.In the General tab, set ‘Browser Connection’ to ‘Always use https’ or ‘Don’t always use https.’ If you’ve never changed the setting before, no radio buttons will be selected, even though the default is indeed ‘Always use https’. 4.Click Save Changes. 5.Manually change the URL to http://mail.google.com to start accessing Gmail via http.