In a few seconds you will find out if your email address has been attacked.
Have you ever been hacked? The probability of it being quite large.
About 150,000 Norwegians say they have been exposed to ID theft, says Nordis (Norwegian Center for Information Security).
You can check for yourself. The site "were dressed" gives answers in seconds – where you get all the attacks that hit the email address you're checking and what the attacks can mean.
The probability of the email address and maybe some password being in undesired locations is quite large. Vidar Sandland, Senior Advisor at Norsis, is good at the service and recommends both private and corporate use.
– All our e-mail addresses are being served through this website. When an email is compromised, a message comes out.
I went into the apple trap
But you should expect passwords and usernames to last forever. And soon it may go wrong.
– Your username and password will be misleading sooner or later. They either hack you, or you will pass on the information on the wrong side. For example, this can be used to login to your Facebook and thus Messenger, Linkedin, Istagram, and so on. Together, perhaps someone completely overcomes your identity, says Vidar Sandland.
Unauthorized individuals who can get the email address can quickly misuse it, for example, with phishing attempts. Christian Semme has a long experience as an IT manager. Still, he was taken to bed by email.
"We confirm the subscription to TuneIn Radio for $ 35 a week," which closes in the trap. Streams tend to look at all emails carefully before opening them, but this Apple email for an app that he actually looked like.
– It's easier to pay about $ 300 a week for something I did not order, I clicked on the link and came to the Apple ID login page.
Not long after, he visited this site last time and looked real. But Sømme did not have enough peace of mind to check out the entertaining URL and entered the username and password that gave access to all personal emails, cloud storage, music, and applications.
"What saved me was the next page. There I was asked to fill in a lot of information Apple had of the past. I immediately signed up for Apple's real service and changed my passwords. Fortunately, the old password is good and I do not use anywhere else, says Christian Sememe.
A major breakthrough in Apollo's web service may have provided information that Sømme has TuneIn Radio.
Five good safety tips
Basefarm's IT company is working to improve security in companies.
– It is important for us as computer users to worry about the right levels and doses. Nothing good is that we worry too much. Following a few rules will consistently guarantee against most things, says Fredrik Schwante, a security manager at Basefarm.
He has tips on how best to protect you as a private person:
1. Double protection
The so-called double authentication you already use in many places, for example, when you sign in to your online bank. You then often enter your social security number and password.
In general, anyone can steal this information and try to enter the system, but they do not get anywhere without the double entry element: security code or mobile code.
Many have similar dual authentication systems such as Google Drive, Dropbox, Apple, credit card companies, and government MinID that sends SMS code.
"It will be very important for the fraudsters to break through this. But then there is little risk that the provider can not help you if you do not remember your username or password, says Svantes.
2. More usernames, long passwords
You have several usernames and long passwords. But, unless there is reason to believe that someone has accessed your password, you no longer have to change it often. Previously, the recommendation was the opposite, according to Svantes. Now this is the official council of the US security authorities.
Computers and web sites often require login with a username and password, and there are many things to keep track of. It's definitely boring to remember.
– The risk is to use the same username and password anywhere on sites that are not important, and sites that are very important. If someone takes advantage of this, then he is free for the abusers, says Svantes.
Moreover, the risk is quite real. Many sites that many Norwegians use have been exposed to hacking, LinkedIn, Adobe, Dropbox, and Disqus.
But long passwords are more difficult to break than short ones. A password of 25 characters or more becomes hard even for powerful computers. You can make a regular statement like "easy to remember", which is easy to remember, recommends the Basefarm security expert.
There is also software to help you remember different usernames and passwords for different locations, such as 1Password and LastPass.
3. Keep up to date!
Machine and software safety updates continue to protect against security threats. Do not overlook the updates! If the software / equipment is always up-to-date, it provides the best possible protection against known threats.
Notification for update is performed on the device itself. You will eventually recognize safe and good updates for updates.
But you may want to click on security alerts on sites that contain downloadable malware.
– Do not push if at least you doubt it. Take a screenshot with your mobile phone and ask someone you know, says Svantes.
4. Do not be interested in email
E-mail a major source of violations and damages. You may have received emails from someone who claims to be your bank or tax administration. Even experienced computer people are misleading, so how ordinary PC users can defend themselves?
– Do not be intrigued and let yourself rip for an unimaginable click. Is there a strange name attachment? Are you really waiting for what the letter describes or can you leave it? Is language not translated into Norwegian? Does anyone ask you to tap a connection for something that has security or a user account? In this case the alarm bells will ring, says Svantes.
Antivirus program is important and helps a lot. The most important of all, however, is to show common sense in e-mail management.
If in doubt, you should at least click on the sender's address and see whether @ sender_name.no votes. If not, delete the mail and empty the trash. If you are not sure @ SenderName.no may be correct, ask someone you know or call the sender, not too much, or too little.
5. Check rods, discs and other things
Think carefully before inserting unknown memories, CDs, and DVDs into the drive. Select a known, not unknown. Cancel if you are prompted to approve copy or install.
There is also an "Internet of Things". Bathtubs, TVs, watches and your car. More and more gadgets are included and not everyone should be there all the time.
– Many units do not have authentication, poor security basically and are not up to date. Make a list of what you have, add new purchases, and delete things that disappear. Disconnect the connection that does not need to be connected, says Svantes.
Here, check if you were hacked. The test is free, without risk recommended by the Norwegian security authorities.