Tips on How Users Can Protect Themselves from Hackers

Share post:

One of the ways to protect yourself online is to avoid posting information about yourself on social media.

In order to reduce the amount of information they share online, especially for a company like LinkedIn, users are advised to follow simple tips. These tips include acting from a minimalist perspective and only providing information they provide to their network and potential employers, ensuring that everything that is supplied is accurate and truthful, and avoiding publishing the addresses, names and contact information of references.

Users should also avoid providing information about their educational efforts, which could be exploited by a hacker to determine when a user was born, but could also be used by someone who provides such an academic record under a similar name. Users should also avoid listing recreational activities for their biography, even if they do.

For more information, read the original story in Tech Republic.

SUBSCRIBE NOW

Related articles

Sleeper Supply Chain Attack Activates After 6 Years

A coordinated supply chain attack has compromised between 500 and 1,000 e-commerce websites by exploiting vulnerabilities in 21...

Russian-Controlled Open Source Tool Raises Alarms Over U.S. Cybersecurity

A widely used open-source Go library, easyjson, used in healthcare, finance and even defence has come under scrutiny...

Signal Archiving Tool Used By Trump Admin Is Breached, Raising Alarms Over Messaging Security (EDITORIAL)

(EDITORIAL) A messaging tool used by Trump administration officials to archive encrypted Signal messages has been hacked —...

Anthropic Warns: AI “Virtual Employees” Could Pose Security Risks Within a Year

Anthropic, a leading artificial intelligence company, anticipates that AI-powered virtual employees could begin operating within corporate networks as...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways