IT in Manufacturing


BitDefender warns that buying gifts on-line can be dangerous

1 March 2011 IT in Manufacturing

BitDefender, an award-winning provider of innovative Internet security solutions, offers a couple of tips meant to help computer users stay away from trouble while searching for the perfect gift for their beloved mother, wife, sister, and girlfriend.

Online shopping portals may seem safe, but not all sites that offer bargains, perfect presents or e-cards are to be trusted because cyber-criminals are always on the watch ready to use any occasion as bait to trick people into willingly giving away their credit card numbers, passwords, IDs or bank accounts.

In order to stay safe, BitDefender offers list of tips on how to avoid a scam that piggybacks the internationally celebrated Women’s Day:

* Exercise caution when you type in critical data in an on-line account. Keep the critical data to a safe minimum and always make sure that the URL you are in is the one that you intend to visit or buy from. Always look for a security seal next to the website’s address, as it is the only guarantee that the website you are on is genuine and trustworthy.

* If you are using Internet mobile, make sure that you manually type in the URL of the desired destination site. The mobile screen being smaller can hinder you from seeing the entire URL and thus makes you vulnerable to phishing.

* Pay enormous attention where you type in your credit card data, bank account ID or password. Double-check the URL so as to make sure you are on the right web site when you make your acquisitions.

* Avoid downloading any content (forms, e-cards, files) or clicking links unless you know and absolutely trust the source of those materials. Pay extra attention to greeting cards and refuse downloading any executable files, as they are probably infected with various bots. If you really have to open this kind of attachment, you are advised to download a local copy and scan it with an updated antivirus before running it.

* Do not check your e-banking account or make any payments from public computers connected to Internet or while using a public hotspot. Your critical data can be intercepted by other users unless the connection is encrypted.

* Make sure to keep the operating system and antivirus solution updated as cyber-crooks waste no opportunity to try and take your money as in the end it all comes to that: money.

* Pay great attention to fake websites that allow you to purchase gifts and make the payment, but never send the order. If you are running either BitDefender Internet Security or Total Security, the anti-fraud module will automatically block fake web-shops and keep you protected.

* If you are looking for that special someone these days, watch out for the notorious Russian Brides scams, the online dating service advertised via spam mail and which will likely leave you broken-hearted and a couple thousand dollars in debt.





Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Schneider Electric’s Five-Pillar Strategy takes the guesswork out of equip
Schneider Electric South Africa IT in Manufacturing
Schneider Electric’s Field Service Cycle, otherwise known as the Five-Pillar Strategy, is a structured approach to managing the lifecycle of equipment to prolong asset lifespan while reducing the total cost of ownership for customers.

Read more...
Enhancing operational safety and efficiency through advanced risk-based modelling
IT in Manufacturing
Now, more than ever, capital and operational cost can be reduced while enhancing operational safety and increasing production uptime by applying transformative methods such as Computational Fluid Dynamics modelling.

Read more...
Laying the groundwork in IT/OT
IT in Manufacturing
In the realm of manufacturing, the core mandate is to deliver value to stakeholders. For many in the industry, this is best achieved through a risk-averse approach. Only upon establishing a robust foundation should a business consider venturing into advanced optimisation or cutting-edge technological innovations such as industrial AI.

Read more...
Looking into the future of machine vision
Omron Electronics IT in Manufacturing
Artificial intelligence (AI) is driving a significant transformation in all areas of industrial automation, and machine vision is no exception. Omron’s AI-powered machine vision systems seamlessly integrate state-of-the-art algorithms, enabling machines to analyse and interpret visual data meticulously.

Read more...
Driving digital transformation in the truck industry
Siemens South Africa IT in Manufacturing
Tatra Trucks, a leading truck manufacturer in Czechia, has adopted the Siemens Xcelerator portfolio of industry software including Teamcenter software for product lifecycle management and the Mendix low code platform to help increase production volume and strengthen its ability to manufacture vehicles that meet specific customer requirements.

Read more...
Opinion piece: Digital twins in manufacturing – design, optimise and expand
Schneider Electric South Africa IT in Manufacturing
Digital twin technology can help create better products, fast. It can also transform the work of product development. This strong statement from McKinsey reinforces how far digital twins have come in manufacturing.

Read more...
Asset tracking is key to driving operational excellence and sustainable growth
Schneider Electric South Africa IT in Manufacturing
Asset tracking plays a critical role in the success of industrial businesses. By effectively managing and monitoring assets, companies can optimise their operations, ensuring that resources are used efficiently. This leads to improved productivity and reduced costs.

Read more...
Siemens democratises AI-driven PCB design for small and medium electronics teams
Siemens South Africa IT in Manufacturing
Siemens Digital Industries Software is making its AI-enhanced electronic systems design technology more accessible to small and mid-sized businesses with PADS Pro Essentials software and Xpedition Standard software.

Read more...
Predicting and preventing cyber-attacks with AI and generative AI
IT in Manufacturing
The speed at which cyber threats are evolving is unprecedented. As a result, companies need to implement state-of-the-art technology to protect their data and systems.

Read more...
Real-world lessons in digital transformation
IT in Manufacturing
Synthesis has helped businesses across multiple industries with their digital transformation by solving their unique integration challenges.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved