Due to the widespread access of people to the Internet worldwide, the issue of Internet security has recently received the serious attention of users. Although many systems, browsers, and programs have built-in protection, you cannot rely on their protection alone.

In general, activities that take place online and, on the Internet, including web browsing, email management, and presence on social media, are very dangerous for the privacy of users, so you should be careful about all activities related to personal information on the Internet. In today's era, many things are done with the internet, and not using it can cause people to face serious challenges. For safe use of the Internet, there are various methods that can be kept in mind to prevent the disclosure of personal information.

For this reason, in this article, we will discuss the most common methods of hacking users' computers through the Internet and the critical points of staying safe on the Internet, which are worth reading for users.

What is internet security?

Internet security is under the security of computer networks and mainly deals with the security of online platforms. On the Internet, there are many programs and resources that intend to destroy the operating system, infect the system, and hack the information in the users' systems, so special attention should be paid to the issue of Internet security.

Since the Internet is an insecure platform for transferring information, Internet users should be well acquainted with the Internet environment and with security methods such as installing antivirus software and not providing information to suspicious and unknown sites and other methods from any possible threats. be safe.

In order to ensure safety on the Internet, it is necessary for users to learn about the methods that hackers use to trap their victims. The most common Internet security threats are phishing, hacking and remote access, installing malicious software, and using public Wi-Fi, which are further explained below:


Phishing is a cyber-attack that includes hidden emails. Hackers try to trick email recipients into thinking it's a genuine and relevant message. For example, a request from their office or a note from a colleague or friend of the user is set up by hackers and sent to their victim so that they click on a targeted link or open an attached file. The main goal is to trick the user into handing over personal information or downloading malicious software. Since it is one of the cheapest and easiest ways to steal information, it has remained popular with hackers since the 1990s. In recent years, phishing techniques and messages have become increasingly sophisticated. To avoid being hacked by phishing, users should avoid clicking on suspicious and unknown emails and attached files.

Hacking and remote access

Hackers are always looking to exploit vulnerable aspects of a private system or network to steal users' private information. Contemporary remote access technology and software (Remote Desktop - RDP Problems) allow users to remotely access and control the computer. Since RDP is widely used by businesses of all sizes, the chances of having an improperly secured network are relatively high. Hackers use various techniques to exploit RDP vulnerabilities until they gain full access to the network and its devices. They may steal the information themselves and use it on the other side. To prevent hacking and remote control of their system, users should avoid clicking on e-mails and attached files, avoid using public Wi-Fi, and always use a reliable antivirus.

Malicious software

Malicious software is a set of software that is created for the purpose of stealing users' information. It is a broad term for viruses, worms, trojans, fake websites, and other malicious programs that hackers use to cause havoc and steal sensitive information. Any software designed to harm a computer, server or network can be described as malicious software or malware.

Malware is a collection of malicious and online advertisements. This term refers to online advertisements that spread, distribute, and install malware on the user's computer device by mistake. Online advertising is a complex ecosystem that includes publisher websites, ad exchanges, ad servers, retargeting networks, and content delivery networks. Malware uses this sophistication to insert malicious code into places that publishers and ad networks don't always detect. Internet users who interact with a malicious ad can download malware to their computer or be redirected to malicious websites. To prevent the installation of this malicious software, users should not visit suspicious websites, do not click on various links on websites, and use a reliable antivirus continuously to detect and remove malicious software.

Public Wi-Fi threats

Using public Wi-Fi carries risks. Security Tips When Using Public Wi-Fi Security on these networks in shopping malls, airports, hotels, restaurants, etc. is often weak or non-existent. A lack of security means that cybercriminals and hackers can monitor what you do online and steal your passwords and personal information. Even if you plan to connect to a real and valid free Wi-Fi, there is still a chance that someone else connected to the same Wi-Fi can access your information. First, make sure that you are using the encrypted version of the website that starts with https when logging into your email, bank, or other important accounts. Otherwise, whatever you type will be sent as plain text, and anyone else on the same network can access it. It is recommended not to use public Wi-Fi or unreliable Wi-Fi to access the Internet to be safe from this type of Internet risk.

In addition to the above hacking methods, there are some other private methods, such as social media and fake applications, that hackers create for the purposes of hacking and accessing their users' computers.

Some important tips to deal with hacking

  • Avoid installing software from unreliable sources.
  • Do not click on suspicious links.
  • Have an antivirus and constantly scan your computers.
  • Use the two-factor authentication option.
  • Update and maintain operating systems continuously.
  • Use strong passwords or passwords.
  • Do not use the same password for multiple accounts; on the contrary, use a separate password for each account.
  • Do not share your personal information.
  • Do not connect to free and public Wi-Fi.
  • Do not respond to anonymous emails.
  • Use data encryption.
  • Back up your data.
  • Always use the computer firewall.

Ask for help from "Beporsed" 

For those Afghans seeking specific information, "Beporsed" is here to help. You can reach our information center through WhatsApp (+93729807235), Facebook Messenger, or our website's Messenger to ask our online information desk officer for assistance. 

For more information 

For more information on immigration, resettlement, education and scholarship programs, and other opportunities available to Afghans worldwide, as well as details on the humanitarian services provided by international organizations in Afghanistan and procedures for obtaining civil documents from governmental institutions, please visit Beporsed's website and social media pages. 

Beporsed website (www.beporsed.org) 

Facebook (@beporsed) 

X or Twitter (@beporsed) 

Instagram (@beporsed)