The e2 Security Rulebook: How to survive in the Internet

…without being ripped off, scamed, or getting stolen your identity

This set of rules is intended to arm the users of the internet for the lurking dangers in it. Whether it’s the deceptively real-looking “application.doc” that lands in the HR department, or the Office 365 login link in the CEO’s inbox with the inconspicuous request to review a shared document. After you have read and understood this set of rules, you are 99.99% safe when using the Internet.

The e2 Security rulebook is available here: DOWNLOAD

Phishing: These are the most popular tricks

For criminals and fraudsters, personal data of Internet users is always very desirable. In many cases it allows access to credit cards, bank or online accounts.

Phishing, i.e. obtaining other people’s personal data using fake e-mails or websites, is a popular method of doing this. The following is an overview of the most common methods: