01.05.2022 Views

Cyber Defense eMagazine May Edition for 2022

Cyber Defense eMagazine May Edition for 2022 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine May Edition for 2022 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Application of measures<br />

Depending on the degree of risk, data protection methods include creating strong passwords or<br />

passphrases, hiding geolocation, filling the account with false in<strong>for</strong>mation and fictional stories, or deleting<br />

data completely. However, control is an illusion. Everything that got on the Internet stays there <strong>for</strong>ever.<br />

Even if you follow the main rule of safety and silence, the result is not guaranteed. The following rules<br />

will protect against basic in<strong>for</strong>mation gathering, but if someone is seriously interested in you, they find<br />

everything.<br />

Basic rules of operational security<br />

• Divide accounts. Come up with random e-mail account names <strong>for</strong> personal use. Create separate<br />

accounts <strong>for</strong> financial transactions, social media registrations, and general purposes.<br />

• Don't repeat passwords. Use the password manager to generate different passwords <strong>for</strong> each<br />

online service. For additional protection, set up two-factor authentication.<br />

• Delete metadata and hide geolocation. In 2012, programmer and businessman John McAfee was<br />

wanted on suspicion of murder. Hiding from Belize police, McAfee ran an escape blog with Vice<br />

Magazine, a journalist of Vice Magazine. McAfee's location in Guatemala revealed a photo in the<br />

post as it had been taken on an iPhone and contained EXIF metadata, including geolocation.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>May</strong> <strong>2022</strong> <strong>Edition</strong> 162<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!