
AWARENESS ABOUT SAFE ONLINE LIFE
Think of cyber security risks as potential hazards when you go online.
Just like you take precautions to stay safe in the physical world, such as locking your doors, being aware of cyber risks helps you stay safe in the digital world.
These risks can include things like hackers trying to steal your personal information, scams that trick you into giving away your money, or viruses that can harm your computer.
Moreover, cyber security emphasizes the cultivation of a securityconscious culture by promoting awareness and education about safe online practices.
COMMON TYPES OF THREATS
Think of cyber threats as sneaky tricks or traps that bad people use online.
Most common types are:
- to steal your personal information
- infect your computer with harmful software
- trick you into giving them your money.
Some common types of cyber threats include things like phishing, malware and identity theft.
SAFE BROWSING TOOLS
Phishing is like a fake email or message that pretends to be from someone you trust, but it’s trying to trick you into giving away your personal information.
It’s like someone pretending to be a friend to get access to your secrets.
Common phishing messages are: fake emails from the bank, false reports of winnings from gambling or games of chance or free prizes, fake accounts of providers of IT or payment services or Internet stores, false confirmations of purported orders or false payment reminders, false messages about personal data privacy policies or terms that should be accepted.
A SAMPLE…
The phishing e-mail message may say:
«Your credit card has expired, your account has expired, temporarily blocked, or confirm your login information».
Layout (corporate design), sender address or directly greeting the user they can create the impression that it is an e-mail sent by a bank or other provider service.
E-mail messages in HTML format display a “legal” link to the recipient, which contains a hidden link in the background, which leads directly to fraudulent or malicious content.

MALAWARE
Malware is like a virus that can infect your computer and cause damage.
It can make your computer slow down or even steal your personal information…
…IDENTITY THEFT
is when someone steals your personal information, like your name, address, or credit card details, and uses it without your permission. It’s like someone pretending to be you and using your money or buying things on your behalf.
Identity thieves can also in their e-mail messages integrate malware such as viruses or Trojan software as a link, attachment, or source code in an email message in HTML format.
OTHER SAMPLE
Just click on the image in the Phishing message can have serious consequences.
Fraudsters who steal identities often use addresses that differ only slightly from the original ones. An identity thief can replace characters to create fake URLs.
For example, instead of the original addresses such as
http://www.onlinebank.com.hr
can be fake representation use address such as
http://www.on1inebank.com.hr.
MOST COMMON SAMPLES…
In the following slides we mention the most common samples of scam.
By learning about these common types of cyber threats, you can recognize them and take steps to protect yourself.
FAKE SENDER ADDRESS
Hover your mouse over the sender’s address.
Does the email address contain suspicious elements? Are there
spelling mistakes in the address, even if they were insignificant?
REQUEST FOR CONFIDENTIAL DATA
Does the link contained in the e-mail ask you to enter personal information?
Are you required to provide confidential information such as PINs or passwords?
URGENCY
Does the e-mail request that you act immediately or urgently?
Does the message contain a threat or a warning?
LINKS TO FAKE WEBSITES
What URL appears when you mouse over a link?
Is it a secure page (URL should start with “https://”) and encrypted (lock symbol in front of the URL)?
STRANGE FORMULATIONS AND SPELLING ERRORS
Is the email greeting generic?
Does it contain spelling errors, incorrect punctuation, or special signs?
SAFE BROWSING TOOLS
Next slides introduce easy tools and practice to enhance safety browsing on Internet
By utilizing these tools, you can protect your privacy, secure your personal information, and reduce the risk of online threats.
Here are some essential tips to enhance your online safety with secure browsing tools

CHOOSE A TRUSTED WEB BROWSER
Choose a reputable web browser, such as Google Chrome, Mozilla Firefox, or Microsoft Edge. These browsers prioritize security and regularly release updates to
address vulnerabilities.
ACTIVATE THE BROWSER’S SECURITY FEATURES
Familiarize yourself with the security features offered by your web
browser.
To enhance your online safety enable features such as:
- pop-up blockers
- safe browsing mode
- privacy settings.
ENABLE PHISHING AND MALWARE PROTECTION
Activate the built-in phishing and malware protection features offered
by your web browser.
These features can warn you about suspicious websites and prevent
you from visiting known malicious sites.
STAY INFORMED AND UPDATED
Stay informed about the latest online threats and best practices for secure browsing.
Regularly read reliable sources, such as reputable cybersecurity websites or blogs, to stay up to date with the evolving landscape of online security.