Enter sensitive data or do online transactions only in websites secured with SSL (Secure Socket Layer). If a website is secured with SSL, you can identify by looking at the URL or the address bar. The URL should contain HTTPS instead of HTTP.
Supreme Court of India clarified the services where you need to link your Aadhaar and where not. You don’t have to submit your Aadhar in bank or e-wallet, to buy a SIM card, during school admission, to appear in CBSE, NEET, and UGC examinations. Private companies can't ask for Aadhar number.
VPNs encrypt the data following between your device and the Internet protecting you against eavesdropping. Using an encrypted connection to send and receive sensitive information over the Internet is strongly recommended.
Keep your operating system, installed programs or mobile apps updated. Hackers often penetrate exploiting a vulnerability that exists in software.
Never use a dictionary word as the password. Doing so makes it easier for hackers to gain unauthorized access by checking all possible dictionary words for a match. This type of attack is known as “Dictionary Attack”, and software can be designed to make the attack automatic.
Many sites or software tools prompt you to set a security (hint) question, which you may have to answer sometimes. Never set an answer that others can easily guess.
Use different passwords for each of your accounts. If someone figures out the password of one account, that person may be able to access your other accounts too. Moreover, as every site does not take security too seriously, so hacking some sites may not be too difficult.
Having access to your phone means, the intruder can reset the passwords to gain unauthorized access to your accounts. The result will be far more devastating if you kept your debit/credit card added promoting the intruder to make transactions.
You probably have accounts on different websites or apps where you used your email to sign up. Having access to your email means, the intruder can reset the passwords to gain unauthorized access to your accounts. The result will be far more devastating if you kept you debit/credit card added promoting the intruder to make transactions.
Incognito mode or private browsing is a feature available in many browsers.
A computer Virus is a self-replicating malware that modifies other software. Damages cause include affecting files and consuming device's resources.
In phishing, the attacker tries to obtain sensitive information such as debit/credit card details, login details (like usernames, passwords, etc.) by pretending to be someone else, often masquerading as a trustworthy entity, e. g. an employee of a bank, payment processors or as such.
Your smartphone may facilitate you to configure settings so that you can wipe the phone data remotely. This is very handy to format your mobile in case of a loss.