Family Encyclopedia >> Electronics

Hack EasyJet:this is what you can do if you are a victim

Yesterday it was announced that EasyJet was hacked by an unknown party. About 9 million customers who were victims of this hack, among other things, email addresses, credit card details and travel details were stolen. What does this mean for the victims and what can they do best now?

This breach affects a large number of people. While it's good to see that customer passwords have not been compromised, the stolen data will be enough grist to the mill for cybercriminals. Anyone involved in the breach should be especially careful about responding to unsolicited messages. It is likely that criminals will exploit the situation to send phishing messages with "too good to be true" offers. They should also regularly check their bank accounts for suspicious activity. Kaspersky recommends using unique, complex passwords for all their online accounts and using two-factor or two-step authentication if a provider offers it. In addition, it is of course advisable to secure devices and apply updates to the operating system and applications as soon as they are available.

What is phishing, and more importantly:how do you recognize it?
Phishing is a tactic used by cyber criminals to steal data for malicious purposes. Sometimes malicious parties also install malware on the computer. Cyber ​​criminals are becoming more and more creative, making it difficult to counter such attacks. Here's what you can do to protect yourself from it:

  1. How to recognize a phishing email:
    the message is not addressed to you personally;
    you are not the only recipient;
    the presence of spelling mistakes and poorly constructed sentences.
  2. Don't blindly click on links in emails. Check that the URL links to the correct website. For websites that you use often, it is best to bookmark the login page of sites such as Facebook or type the url directly into the address line of the browser. Then you can be sure that your data will not end up in the wrong hands.
  3. Check the sender's trustworthiness. You can do this by holding your cursor over the sender/email address. Do you not recognize it or many letters and numbers? There is a good chance that this is a phishing mail.