Privacy and security
Don't get fooled: how to spot scams in your inbox
Learn how to protect yourself from falling victim to phishing emails.
Read articleIfran Esmail | Managing Consultant, TELUS
Co-authored by: Joaquin Puga del Rio | Security Consultant II, TELUS
It seems as though there’s always a new information security issue and each time, a similar story follows: unsuspecting people are victimized by others who use technology (and its flaws) to their advantage. The stories are hard to keep up with and often don’t clearly articulate how the issues affect us individually. They introduce fear and uncertainty with respect to our ability to safely navigate the digital world.
Two of the latest cyber threats to appear in the news include cryptojacking and formjacking. Forbes magazine reported in 2018 that cryptojacking is now more prevalent than ransomware.
Cryptojacking is a term used to describe a situation where malware has been installed on your device. This malware then silently puts your device to work which entails completing computational tasks in exchange for digital currency, thereby generating money for the cybercriminals behind the malware.
Formjacking is a term used to describe an attack where information you submit in an online form (credit card and other personal information) is intercepted between your device and the website you are using. Your information is then gathered and used to make a profit. For instance, your data could be sold and/or used to make purchases without your authorization. Symantec reports that roughly 4,800 websites are infected with formjacking malware every month.
Realistically, the specific names of each security issue are not as important. What’s critical, is knowing how to protect yourself against these and other threats.
Below are some key principles to adhere to, to help ensure your security:
For more tips on staying safe in our digital world, check out these TELUS Wise tips or book a TELUS Wise workshop.
Learn how to protect yourself from falling victim to phishing emails.
Read articleLearn how to protect your email and reduce potential exposure.
Read articleLearn best practices to ensure the security and privacy of your online accounts.
Read article