Computer hackers have a lot of tools that help them threaten your security system when using the Internet, but these tips provided by cyber security experts can help you protect your privacy.

1. Check the identity of the sender
Phishing by sending emails to prompt you to share your financial information or passwords is happening in a very sophisticated way.

Today they call you, use your professional title, and even mention the projects that you are working on for that, unless you are completely confident that the message is from someone you know, so do not open attachments or click on links.

2 . Install all updates for your browser
"As you browse the website you will think it is safe, there are people who direct you to a series of other websites that attack you," said Giovanni Vienna, professor of computer science at the University of California at Santa Barbara.

Often, the site owner does not even know that his site is compromised. Although search engines maintain blacklists of known malicious sites, they are constantly changing. Accordingly, experts advise to ensure that all available updates are installed on your browser or use a browser that performs an update automatically.

3 . Avoid using public Wi-Fi networks
If you are connected to a public Wi-Fi network, you will likely be hacked by a hacker who wants to snoop on you.

As a result, avoid using both public Wi-Fi and unsafe passwords-based networks. Instead, set your smartphone as a secure hotspot or subscribe to a VPN service.

Phishing is the process of sending emails to prompt you to share your financial information or passwords (Getty Images)

4 . Mine videos on Facebook
"If a friend posts a video about a strange animal that is in Africa, and you click on the" Watch "button, you will be asked to download a media player or perform a scan that installs malware on your computer, according to Tyler Rigoli, director of security research at cyber security company. Your. As a result, be sure to do a Google search on the video title and see if it is on YouTube.

5 . A. Turn off Bluetooth after using it
The writer mentioned that if Bluetooth is left on your device after using a wireless headset, hackers can easily connect to your phone, manipulate it and steal your data.

Therefore, it is always important to turn off bluetooth after using it. Moreover, set the Bluetooth settings to "off" or "undetectable", and request a verification code when pairing with another bluetooth device.

Penetrate you while browsing weak or suspicious websites (Getty Images)

6 . Withdraw small amounts at first
The writer indicated that hackers tested the stolen card by withdrawing small amounts of no more than $ 10 to see if anyone noticed it. Therefore, check the financial transactions that you make on the Internet regularly. In the event that you notice any fees that you did not pay, you will have to report immediately to the party that issued your card.

7 . The ATM hack that you just took out the money from
The writer indicated that scammers are cleverly installing hidden "browsers" to steal your card data, while capturing a hidden camera or a thin layer of leather over the keyboard to register the PIN.

Therefore, try to use ATMs inside banks, as it is difficult for criminals to install such devices, in addition to carefully examining the machine before using it.

8 . Check installed apps and beware of fake ones
The author said that these applications steal confidential information or bypass the security settings on your phone and subscribe to premium services to download a free version of the game for example so that these fraudsters steal your money.

Before installing an app, check the ratings and the number of people who installed it, knowing that the fact that hackers can make fake positive assessments, but they cannot prevent users from posting warnings that the app is a hoax. It is worth noting that the applications should be downloaded from official stores, such as Google Play and App Store.

When Wi-Fi is turned on, the laptop will try to connect constantly to well-known networks, and hackers can identify and imitate these networks (Getty Images)

9 . Don't always leave your device's Wi-Fi on
Although it is appropriate to leave Wi-Fi on your laptop, tablet or smartphone running while traveling, your device will continuously attempt to connect to known networks. Hackers can learn about these networks and create rogue networks to impersonate them. Therefore, it is important to make sure that the Wi-Fi network is turned off whenever you leave your home.

10 . Beware of fake software updates
The author stated that hackers may send fake updates with the intention of installing malicious malware on your computer. If you receive a pop-up message about an update, go to the actual website of the software providers and check if the update is real. You can also try closing your web browser to see if the popup update has disappeared. If that happens, it could be illusory.

11 . Safety actually
The author touched on the advice provided by some readers who have fallen victim to or prevented cyber crime. First, try not to apply for a credit card online, and avoid using debit cards, as it allows hackers to access bank accounts much easier than credit cards allow.

When logging into an online account, never click on the phrase "Remember Me", as it only takes a few seconds to write your username and password every time, so you definitely do not want to "remember" that information.