WEBVTT 00:03.899 --> 00:28.985 [Automatic captions by Autotekst using NB Whisper. May contain recognition errors.] Hello. My name is St?le. I have been working with data and outdoor security at Blindern for more than 20 years. And hacking ... Nobody wants to be hacked. It can happen crazy things, like you bothering your friends or losing holiday photos. But it can also happen quite a lot more serious things, like ID theft. Or hackers can hack you, so that they can get further into the network where you work. 00:29.906 --> 00:59.036 But for most of us it's quite simple to become much safer and much less exposed to hacking. It's about making some clever choices. And with five simple rules we get very far. One - don't click. That means be skeptical of links and attachments in email. And don't click on all sorts of weird things on Facebook or Snap either. It's stupid. Two - password. Have a good password, of course. 00:59.053 --> 01:01.954 Different passwords on different services - and change them regularly. 01:04.548 --> 01:31.425 Programs. Don't install too many programs on your computer. And know what you have and should have, and how they behave normally. Be neat. And know your machine. 4. Updates. This means making sure that your machine and the programs are up to date all the time, and turn on automatic update so you don't have to think about it. 01:32.619 --> 02:01.408 And five? Trawlless network. Be a little skeptical of wireless networks that you don't quite know. Rather use networks you know, or use your mobile if you feel that you don't quite know who actually owns the network. OK. There were five rules. But first we'll talk about fake emails. One of the most common ways to hack people is to send them an email to deceive them. And in these fake emails everyone should really be able to recognize. 02:01.425 --> 02:20.486 So he won't be tricked. I'm going to teach you some tricks for how to freshen the hackers. They often send out thousands of emails hoping that someone is inattentive. But if you knew the tricks, then you're not among them. And I'm going to teach you those tricks. 02:20.503 --> 02:45.196 The hackers like to try to do two things. Either install crazy programs on your computer to control it without you noticing. Or trick you into giving them information about e.g. user name and password for various services. Everything from Netflix to your job e-mail. Or account number, for example. Credit card number or birth number. Important things. 02:45.196 --> 02:57.090 And how do hackers do that? Yes, they send you an email which either contains a link to a dubious website. So a website that is something other than what it pretends it is. 02:58.507 --> 03:17.705 Here they are trying to get you to log in. Which means that they take your password and username for the service. Or the email contains an attachment, which is something other than what it looks like. And you think you're clicking on a document, but you're actually clicking on a program that is run and does stupid things with your machine. 03:18.797 --> 03:30.845 An e-mail is often called phishing because you are fishing for information. At least the type of e-mail that makes you log in somewhere. 03:30.862 --> 03:57.637 And some types of fishing go again. Typical categories. E.g. you have received a package in the mail that you have not ordered. Or you have won a prize that you have not signed up for either. Or you have to update your account without really needing it. Or your inbox is full of strange twists to be updated. 03:58.916 --> 04:28.916 The emails tend to come from a legitimate company. Preferably something big like Apple or Netflix, or from the IT department where you work. These emails can often be very well made, so it can be difficult to recognize them and discover that they are not real. But if you know any tricks, then it's not that difficult after all. What everyone has in common is that somewhere in the world there are some people sitting and cheering when you click on the fake link or the fake attachment. 04:28.933 --> 04:54.770 So ... First we'll go through some fake emails. And then some that are actually real. Because there are a number of ways to recognize them. The fake emails often have bad language. They often don't include your name, so the e-mail isn't really for you. They often have a very good offer for you that they can't say no to. Or there is something very urgent, and they try to get you to do something right away. 04:56.152 --> 05:12.227 And then they often come from strange addresses. Or maybe from a friend who has been hacked before you. And last but not least, these emails often contain links to strange websites. Which are not the websites you really want to go to. 05:12.244 --> 05:35.230 Most of us read email in 2019 either with Outlook or Gmail. And many also read email on their mobile phone. It is generally easier to detect fake emails if you use a computer. So if you've got an email and are using your mobile, wait until you get home or to the office to check on a proper computer.