Settings
Language
Color Theme
Secure internet browsing
Browsing the internet securely means taking steps to protect your personal and sensitive information from cyber threats while using the internet.
How can you secure your internet browsing?
To secure your internet browsing, you should use strong and unique passwords, avoid suspicious emails and websites, and use up-to-date antivirus software.
View Options Again
Use strong and unique passwords.
Use up-to-date antivirus software.
Avoid suspicious emails and websites.
All options are correct.
What is a secure web browser?
A secure web browser is an application that allows you to securely access and interact with websites. Common browsers include Chrome, Firefox, Edge, and Safari. When choosing a secure browser, we should ensure the following protections are in place:
Phishing and malware protection
Ad blocking
Encryption, privacy and updates
This feature helps to protect against phishing and malware attacks by identifying and blocking websites that are designed to trick you into entering personal or sensitive information or attempting to deliver malware to your computer. Examples of this include Google Safe Browsing, Firefox Focus and Microsoft SmartScreen.
Some web browsers include an ad-blocking feature that helps to block unwanted or intrusive ads from appearing on websites. If this feature isn't available by default, then there are browser extensions and other network-based blocking solutions available.
This includes a variety of browser-based functionality including: Browsing the internet without leaving a record of your activity on your computer, encrypting your online activity to help protect it from being intercepted by third-parties (i.e. HTTPS support), and automatically updating your browser to fix security issues.
Is the following statement True or False:
Secure internet browsers should have built-in phishing and malware protection capabilities.
Technologies built-in browsers such as Google Safe Browsing, Microsoft SmartScreen, and Firefox Focus provide built-in protection capabilities to prevent users from visiting websites associated with the delivery of phishing material and malware.
View Options Again
True
False
Secure browsing: Credit card fraud
This refers to the unauthorized use of someone's credit card information to make online purchases. This type of fraud commonly occurs when information is stolen through phishing, malware, or breaches of a website that has stored this information.
Secure browsing: Malware delivery
Some websites either entice you to download and install malicious software or may deliver malware without any interaction through the exploitation of a vulnerability in your web browser.
Secure browsing: Credential harvesting
Credential harvesting refers to phishing websites that steal your credentials. These websites are designed to look like real websites with similar domain names, however they steal your credentials to then compromise your online identity.
Protecting against online fraud
So far we have learnt about the common types of online fraud, but how can we protect against them?
Credit card fraud
Malware delivery
Credential harvesting
To protect against credit card fraud, you should use strong passwords and enable multi-factor authentication on any website you provide your credit cards to. You should be cautious when giving out credit card information and only provide it to trusted websites. Finally, you should use a credit card with a bank that provides fraud protection.
To protect against websites delivering malware, you should ensure your operating system and internet browser are up-to-date and have the latest security fixes applied. Vulnerabilities in either of these could be abused to gain access to your computer. Additionally, you should avoid downloading and executing files provided by unfamiliar websites.
To protect against websites attempting to steal your credentials, you should ensure your browser has built-in phishing protections like Google Safe Browsing, Microsoft SmartScreen, and Firefox Focus. Additionally, you should avoid clicking on links within suspicious emails or advertisements or those found within low-ranking search engine results.
How can you protect against credit card fraud?
To protect against credit card fraud, you should use strong passwords and enable multi-factor authentication on any website you provide your credit cards to. You should be cautious when giving out credit card information and only provide it to trusted websites. Finally, you should use a credit card with a bank that provides fraud protection.
View Options Again
Share your credit card information with friends.
Use strong passwords and multi-factor authentication, and be selective when supplying your credit card.
Ignore credit card statements. It's best not to look.
Use the same password for all of your accounts.
How can you protect against websites delivering malware?
To protect against websites delivering malware, you should ensure your operating system and internet browser are up-to-date and have the latest security fixes applied. Vulnerabilities in either of these could be abused to gain access to your computer. Additionally, you should avoid downloading and executing files provided by unfamiliar websites.
View Options Again
Using a public WiFi network to mix your traffic with that of strangers.
All options are correct.
Ensure your operating system and web browser have the latest security fixes applied.
Disable automatic updates on your operating system and web browser.
How can you protect against websites stealing credentials?
o protect against websites attempting to steal your credentials, you should ensure your browser has built-in phishing protections such as Google Safe Browsing, Microsoft SmartScreen, and Firefox Focus. Additionally, you should avoid clicking on links within suspicious emails or advertisements or those found within low-ranking search engine results.
View Options Again
Trust unfamiliar websites, as it may be a lost opportunity.
Ensure built-in phishing protections are enabled in your web browser.
Never check the URL of a website, as it's not important.
Click on links within emails offering good opportunities, even if it's an unknown sender.
Wrapping up
Browsing the internet securely requires a combination of secure web browsers (e.g., Chrome/Edge/Firefox/Safari), security best practices (e.g., regular patching), and security awareness to spot when something seems off.
Back
Next
Translation Correction
×
Select a translation to correct...
Begin the Guided Tour
[0, "Begin the Guided Tour", "Begin the Guided Tour"],
Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action.
[1, "Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action.", "Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action."],
Compose
[2, "Compose", "Compose"],
Folders
[3, "Folders", "Folders"],
Inbox
[4, "Inbox", "Inbox"],
Starred
[5, "Starred", "Starred"],
Draft
[6, "Draft", "Draft"],
Sent Mail
[7, "Sent Mail", "Sent Mail"],
Spam
[8, "Spam", "Spam"],
Trash
[9, "Trash", "Trash"],
[URGENT] Claim Your Work From Home Set-Up Payment
[10, "[URGENT] Claim Your Work From Home Set-Up Payment", "[URGENT] Claim Your Work From Home Set-Up Payment"],
Human Resources
[11, "Human Resources", "Human Resources"],
to
[12, "to", "to"],
Claim Your Work From Home Set-Up Payment
[13, "Claim Your Work From Home Set-Up Payment", "Claim Your Work From Home Set-Up Payment"],
Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of
[14, "Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of", "Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of"],
to ensure that you have a suitable home working set-up.
[15, "to ensure that you have a suitable home working set-up.", "to ensure that you have a suitable home working set-up."],
To receive the payment via payroll
[16, "To receive the payment via payroll", "To receive the payment via payroll"],
you will need to complete this
[17, "you will need to complete this", "you will need to complete this"],
acknowledgement form
[18, "acknowledgement form", "acknowledgement form"],
For more information on how to set up your home office space safely, please look at the
[19, "For more information on how to set up your home office space safely, please look at the", "For more information on how to set up your home office space safely, please look at the"],
Thank you
[20, "Thank you", "Thank you"],
The Human Resources Team
[21, "The Human Resources Team", "The Human Resources Team"],
This is an automatically generated email, please do not reply
[22, "This is an automatically generated email, please do not reply", "This is an automatically generated email, please do not reply"],
Is the following statement True or False
[23, "Is the following statement True or False", "Is the following statement True or False"],
View Options Again
[24, "View Options Again", "View Options Again"],
Email Subject: Urgent Action
[25, "Email Subject: Urgent Action", "Email Subject: Urgent Action"],
Phishing attacks are designed to put a
[26, "Phishing attacks are designed to put a", "Phishing attacks are designed to put a"],
time pressure on us to act fast
[27, "time pressure on us to act fast", "time pressure on us to act fast"],
This can cause us to skip much of the critical thinking we normally apply when browsing our emails
[28, "This can cause us to skip much of the critical thinking we normally apply when browsing our emails", "This can cause us to skip much of the critical thinking we normally apply when browsing our emails"],
Email Sender: Fradulent Address
[29, "Email Sender: Fradulent Address", "Email Sender: Fradulent Address"],
Email Sender: Fraudulent Address
[30, "Email Sender: Fraudulent Address", "Email Sender: Fraudulent Address"],
Attackers will often use
[31, "Attackers will often use", "Attackers will often use"],
obscure email addresses and use display names
[32, "obscure email addresses and use display names", "obscure email addresses and use display names"],
that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information
[33, "that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information", "that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information"],
Email Content: Engaging Topic
[34, "Email Content: Engaging Topic", "Email Content: Engaging Topic"],
Attackers often use a
[35, "Attackers often use a", "Attackers often use a"],
broad but important topic
[36, "broad but important topic", "broad but important topic"],
to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes.
[37, "to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes.", "to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes."],
Email Link: Phishing Website
[38, "Email Link: Phishing Website", "Email Link: Phishing Website"],
hovering over the link
[39, "hovering over the link", "hovering over the link"],
you'll see the true link location. Often this is enough to see the malicious intent.
[40, "you'll see the true link location. Often this is enough to see the malicious intent.", "you'll see the true link location. Often this is enough to see the malicious intent."],
Wrapping up
[41, "Wrapping up", "Wrapping up"],
If you
[42, "If you", "If you"],
spot anything suspicious
[43, "spot anything suspicious", "spot anything suspicious"],
with the email sender, subject, content, links or attachments
[44, "with the email sender, subject, content, links or attachments", "with the email sender, subject, content, links or attachments"],
Don't take the risk. Report the email to your IT or Security team for review.
[45, "Don't take the risk. Report the email to your IT or Security team for review.", "Don't take the risk. Report the email to your IT or Security team for review."],
Submit
[46, "Submit", "Submit"],
Next
[47, "Next", "Next"],
Back
[48, "Back", "Back"],
Malicious links will often appear with innocent looking text. By
[49, "Malicious links will often appear with innocent looking text. By", "Malicious links will often appear with innocent looking text. By"],
Correct!
[50, "Correct!", "Correct!"],
Incorrect
[51, "Incorrect", "Incorrect"],
True
[52, "True", "True"],
False
[53, "False", "False"],
Change language
[54, "Change language", "Change language"],
Current Language
[55, "Current Language", "Current Language"],
Use Browser Settings
[56, "Use Browser Settings", "Use Browser Settings"],
Select a language
[57, "Select a language", "Select a language"],
Change Language
[58, "Change Language", "Change Language"],
Please select a language
[59, "Please select a language", "Please select a language"],
Language
[60, "Language", "Language"],
Color Theme
[61, "Color Theme", "Color Theme"],
Color Theme And Background Selector
[62, "Color Theme And Background Selector", "Color Theme And Background Selector"],
Colorful Theme
[63, "Colorful Theme", "Colorful Theme"],
Select Theme
[64, "Select Theme", "Select Theme"],
Close
[65, "Close", "Close"],
Dark Theme
[66, "Dark Theme", "Dark Theme"],
Green Theme
[67, "Green Theme", "Green Theme"],
Purple Theme
[68, "Purple Theme", "Purple Theme"],
Light Theme
[69, "Light Theme", "Light Theme"],
Blue Theme
[70, "Blue Theme", "Blue Theme"],
Settings
[71, "Settings", "Settings"],
Theme Selected
[72, "Theme Selected", "Theme Selected"],
This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!
[73, "This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!", "This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!"],
Translation Correction
[74, "Translation Correction", "Translation Correction"],
Select a translation to correct...
[75, "Select a translation to correct...", "Select a translation to correct..."],
Original Text
[76, "Original Text", "Original Text"],
Correct Translation
[77, "Correct Translation", "Correct Translation"],
Translation to correct...
[78, "Translation to correct...", "Translation to correct..."],
Submissions are reviewed and applied within 48 hours.
[79, "Submissions are reviewed and applied within 48 hours.", "Submissions are reviewed and applied within 48 hours."],
Submit Correction
[80, "Submit Correction", "Submit Correction"],
Submission Successfully Sent
[81, "Submission Successfully Sent", "Submission Successfully Sent"],
Submission Error - Please Try Again
[82, "Submission Error - Please Try Again", "Submission Error - Please Try Again"],
Submission Sending...
[83, "Submission Sending...", "Submission Sending..."],
Mandatory Viewing
[84, "Mandatory Viewing", "Mandatory Viewing"],
Please watch the video from beginning to end before proceeding.
[85, "Please watch the video from beginning to end before proceeding.", "Please watch the video from beginning to end before proceeding."],
Ok
[86, "Ok", "Ok"],
Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.
[87, "Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.", "Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant."],
Secure-Internet-Browsing
[88, "Secure-Internet-Browsing", "Secure-Internet-Browsing"],
Secure internet browsing
[89, "Secure internet browsing", "Secure internet browsing"],
Browsing the internet securely means taking steps to protect your personal and sensitive information from cyber threats while using the internet.
[90, "Browsing the internet securely means taking steps to protect your personal and sensitive information from cyber threats while using the internet.", "Browsing the internet securely means taking steps to protect your personal and sensitive information from cyber threats while using the internet."],
How can you secure your internet browsing?
[91, "How can you secure your internet browsing?", "How can you secure your internet browsing?"],
Use strong and unique passwords.
[92, "Use strong and unique passwords.", "Use strong and unique passwords."],
Avoid suspicious emails and websites.
[93, "Avoid suspicious emails and websites.", "Avoid suspicious emails and websites."],
Use up-to-date antivirus software.
[94, "Use up-to-date antivirus software.", "Use up-to-date antivirus software."],
All options are correct.
[95, "All options are correct.", "All options are correct."],
To secure your internet browsing, you should use strong and unique passwords, avoid suspicious emails and websites, and use up-to-date antivirus software.
[96, "To secure your internet browsing, you should use strong and unique passwords, avoid suspicious emails and websites, and use up-to-date antivirus software.", "To secure your internet browsing, you should use strong and unique passwords, avoid suspicious emails and websites, and use up-to-date antivirus software."],
What is a secure web browser?
[97, "What is a secure web browser?", "What is a secure web browser?"],
A secure web browser is an application that allows you to securely access and interact with websites. Common browsers include Chrome, Firefox, Edge, and Safari. When choosing a secure browser, we should ensure the following protections are in place:
[98, "A secure web browser is an application that allows you to securely access and interact with websites. Common browsers include Chrome, Firefox, Edge, and Safari. When choosing a secure browser, we should ensure the following protections are in place:", "A secure web browser is an application that allows you to securely access and interact with websites. Common browsers include Chrome, Firefox, Edge, and Safari. When choosing a secure browser, we should ensure the following protections are in place:"],
Phishing and malware protection
[99, "Phishing and malware protection", "Phishing and malware protection"],
This feature helps to protect against phishing and malware attacks by identifying and blocking websites that are designed to trick you into entering personal or sensitive information or attempting to deliver malware to your computer. Examples of this include Google Safe Browsing, Firefox Focus and Microsoft SmartScreen.
[100, "This feature helps to protect against phishing and malware attacks by identifying and blocking websites that are designed to trick you into entering personal or sensitive information or attempting to deliver malware to your computer. Examples of this include Google Safe Browsing, Firefox Focus and Microsoft SmartScreen.", "This feature helps to protect against phishing and malware attacks by identifying and blocking websites that are designed to trick you into entering personal or sensitive information or attempting to deliver malware to your computer. Examples of this include Google Safe Browsing, Firefox Focus and Microsoft SmartScreen."],
Ad blocking
[101, "Ad blocking", "Ad blocking"],
Some web browsers include an ad-blocking feature that helps to block unwanted or intrusive ads from appearing on websites. If this feature isn't available by default, then there are browser extensions and other network-based blocking solutions available.
[102, "Some web browsers include an ad-blocking feature that helps to block unwanted or intrusive ads from appearing on websites. If this feature isn't available by default, then there are browser extensions and other network-based blocking solutions available.", "Some web browsers include an ad-blocking feature that helps to block unwanted or intrusive ads from appearing on websites. If this feature isn't available by default, then there are browser extensions and other network-based blocking solutions available."],
Encryption, privacy and updates
[103, "Encryption, privacy and updates", "Encryption, privacy and updates"],
This includes a variety of browser-based functionality including: Browsing the internet without leaving a record of your activity on your computer, encrypting your online activity to help protect it from being intercepted by third-parties (i.e. HTTPS support), and automatically updating your browser to fix security issues.
[104, "This includes a variety of browser-based functionality including: Browsing the internet without leaving a record of your activity on your computer, encrypting your online activity to help protect it from being intercepted by third-parties (i.e. HTTPS support), and automatically updating your browser to fix security issues.", "This includes a variety of browser-based functionality including: Browsing the internet without leaving a record of your activity on your computer, encrypting your online activity to help protect it from being intercepted by third-parties (i.e. HTTPS support), and automatically updating your browser to fix security issues."],
Secure internet browsers should have built-in phishing and malware protection capabilities.
[105, "Secure internet browsers should have built-in phishing and malware protection capabilities.", "Secure internet browsers should have built-in phishing and malware protection capabilities."],
Technologies built-in browsers such as Google Safe Browsing, Microsoft SmartScreen, and Firefox Focus provide built-in protection capabilities to prevent users from visiting websites associated with the delivery of phishing material and malware.
[106, "Technologies built-in browsers such as Google Safe Browsing, Microsoft SmartScreen, and Firefox Focus provide built-in protection capabilities to prevent users from visiting websites associated with the delivery of phishing material and malware.", "Technologies built-in browsers such as Google Safe Browsing, Microsoft SmartScreen, and Firefox Focus provide built-in protection capabilities to prevent users from visiting websites associated with the delivery of phishing material and malware."],
Secure browsing: Credit card fraud
[107, "Secure browsing: Credit card fraud", "Secure browsing: Credit card fraud"],
This refers to the unauthorized use of someone's credit card information to make online purchases. This type of fraud commonly occurs when information is stolen through phishing, malware, or breaches of a website that has stored this information.
[108, "This refers to the unauthorized use of someone's credit card information to make online purchases. This type of fraud commonly occurs when information is stolen through phishing, malware, or breaches of a website that has stored this information.", "This refers to the unauthorized use of someone's credit card information to make online purchases. This type of fraud commonly occurs when information is stolen through phishing, malware, or breaches of a website that has stored this information."],
Secure browsing: Malware delivery
[109, "Secure browsing: Malware delivery", "Secure browsing: Malware delivery"],
Some websites either entice you to download and install malicious software or may deliver malware without any interaction through the exploitation of a vulnerability in your web browser.
[110, "Some websites either entice you to download and install malicious software or may deliver malware without any interaction through the exploitation of a vulnerability in your web browser.", "Some websites either entice you to download and install malicious software or may deliver malware without any interaction through the exploitation of a vulnerability in your web browser."],
Secure browsing: Credential harvesting
[111, "Secure browsing: Credential harvesting", "Secure browsing: Credential harvesting"],
Credential harvesting refers to phishing websites that steal your credentials. These websites are designed to look like real websites with similar domain names, however they steal your credentials to then compromise your online identity.
[112, "Credential harvesting refers to phishing websites that steal your credentials. These websites are designed to look like real websites with similar domain names, however they steal your credentials to then compromise your online identity.", "Credential harvesting refers to phishing websites that steal your credentials. These websites are designed to look like real websites with similar domain names, however they steal your credentials to then compromise your online identity."],
Protecting against online fraud
[113, "Protecting against online fraud", "Protecting against online fraud"],
So far we have learnt about the common types of online fraud, but how can we protect against them?
[114, "So far we have learnt about the common types of online fraud, but how can we protect against them?", "So far we have learnt about the common types of online fraud, but how can we protect against them?"],
Credit card fraud
[115, "Credit card fraud", "Credit card fraud"],
To protect against credit card fraud, you should use strong passwords and enable multi-factor authentication on any website you provide your credit cards to. You should be cautious when giving out credit card information and only provide it to trusted websites. Finally, you should use a credit card with a bank that provides fraud protection.
[116, "To protect against credit card fraud, you should use strong passwords and enable multi-factor authentication on any website you provide your credit cards to. You should be cautious when giving out credit card information and only provide it to trusted websites. Finally, you should use a credit card with a bank that provides fraud protection.", "To protect against credit card fraud, you should use strong passwords and enable multi-factor authentication on any website you provide your credit cards to. You should be cautious when giving out credit card information and only provide it to trusted websites. Finally, you should use a credit card with a bank that provides fraud protection."],
Malware delivery
[117, "Malware delivery", "Malware delivery"],
To protect against websites delivering malware, you should ensure your operating system and internet browser are up-to-date and have the latest security fixes applied. Vulnerabilities in either of these could be abused to gain access to your computer. Additionally, you should avoid downloading and executing files provided by unfamiliar websites.
[118, "To protect against websites delivering malware, you should ensure your operating system and internet browser are up-to-date and have the latest security fixes applied. Vulnerabilities in either of these could be abused to gain access to your computer. Additionally, you should avoid downloading and executing files provided by unfamiliar websites.", "To protect against websites delivering malware, you should ensure your operating system and internet browser are up-to-date and have the latest security fixes applied. Vulnerabilities in either of these could be abused to gain access to your computer. Additionally, you should avoid downloading and executing files provided by unfamiliar websites."],
Credential harvesting
[119, "Credential harvesting", "Credential harvesting"],
To protect against websites attempting to steal your credentials, you should ensure your browser has built-in phishing protections like Google Safe Browsing, Microsoft SmartScreen, and Firefox Focus. Additionally, you should avoid clicking on links within suspicious emails or advertisements or those found within low-ranking search engine results.
[120, "To protect against websites attempting to steal your credentials, you should ensure your browser has built-in phishing protections like Google Safe Browsing, Microsoft SmartScreen, and Firefox Focus. Additionally, you should avoid clicking on links within suspicious emails or advertisements or those found within low-ranking search engine results.", "To protect against websites attempting to steal your credentials, you should ensure your browser has built-in phishing protections like Google Safe Browsing, Microsoft SmartScreen, and Firefox Focus. Additionally, you should avoid clicking on links within suspicious emails or advertisements or those found within low-ranking search engine results."],
How can you protect against credit card fraud?
[121, "How can you protect against credit card fraud?", "How can you protect against credit card fraud?"],
Use the same password for all of your accounts.
[122, "Use the same password for all of your accounts.", "Use the same password for all of your accounts."],
Share your credit card information with friends.
[123, "Share your credit card information with friends.", "Share your credit card information with friends."],
Ignore credit card statements. It's best not to look.
[124, "Ignore credit card statements. It's best not to look.", "Ignore credit card statements. It's best not to look."],
Use strong passwords and multi-factor authentication, and be selective when supplying your credit card.
[125, "Use strong passwords and multi-factor authentication, and be selective when supplying your credit card.", "Use strong passwords and multi-factor authentication, and be selective when supplying your credit card."],
To protect against credit card fraud, you should use strong passwords and enable multi-factor authentication on any website you provide your credit cards to. You should be cautious when giving out credit card information and only provide it to trusted websites. Finally, you should use a credit card with a bank that provides fraud protection.
[126, "To protect against credit card fraud, you should use strong passwords and enable multi-factor authentication on any website you provide your credit cards to. You should be cautious when giving out credit card information and only provide it to trusted websites. Finally, you should use a credit card with a bank that provides fraud protection.", "To protect against credit card fraud, you should use strong passwords and enable multi-factor authentication on any website you provide your credit cards to. You should be cautious when giving out credit card information and only provide it to trusted websites. Finally, you should use a credit card with a bank that provides fraud protection."],
How can you protect against websites delivering malware?
[127, "How can you protect against websites delivering malware?", "How can you protect against websites delivering malware?"],
Disable automatic updates on your operating system and web browser.
[128, "Disable automatic updates on your operating system and web browser.", "Disable automatic updates on your operating system and web browser."],
Using a public WiFi network to mix your traffic with that of strangers.
[129, "Using a public WiFi network to mix your traffic with that of strangers.", "Using a public WiFi network to mix your traffic with that of strangers."],
All options are correct.
[130, "All options are correct.", "All options are correct."],
Ensure your operating system and web browser have the latest security fixes applied.
[131, "Ensure your operating system and web browser have the latest security fixes applied.", "Ensure your operating system and web browser have the latest security fixes applied."],
To protect against websites delivering malware, you should ensure your operating system and internet browser are up-to-date and have the latest security fixes applied. Vulnerabilities in either of these could be abused to gain access to your computer. Additionally, you should avoid downloading and executing files provided by unfamiliar websites.
[132, "To protect against websites delivering malware, you should ensure your operating system and internet browser are up-to-date and have the latest security fixes applied. Vulnerabilities in either of these could be abused to gain access to your computer. Additionally, you should avoid downloading and executing files provided by unfamiliar websites.", "To protect against websites delivering malware, you should ensure your operating system and internet browser are up-to-date and have the latest security fixes applied. Vulnerabilities in either of these could be abused to gain access to your computer. Additionally, you should avoid downloading and executing files provided by unfamiliar websites."],
How can you protect against websites stealing credentials?
[133, "How can you protect against websites stealing credentials?", "How can you protect against websites stealing credentials?"],
Trust unfamiliar websites, as it may be a lost opportunity.
[134, "Trust unfamiliar websites, as it may be a lost opportunity.", "Trust unfamiliar websites, as it may be a lost opportunity."],
Never check the URL of a website, as it's not important.
[135, "Never check the URL of a website, as it's not important.", "Never check the URL of a website, as it's not important."],
Click on links within emails offering good opportunities, even if it's an unknown sender.
[136, "Click on links within emails offering good opportunities, even if it's an unknown sender.", "Click on links within emails offering good opportunities, even if it's an unknown sender."],
Ensure built-in phishing protections are enabled in your web browser.
[137, "Ensure built-in phishing protections are enabled in your web browser.", "Ensure built-in phishing protections are enabled in your web browser."],
o protect against websites attempting to steal your credentials, you should ensure your browser has built-in phishing protections such as Google Safe Browsing, Microsoft SmartScreen, and Firefox Focus. Additionally, you should avoid clicking on links within suspicious emails or advertisements or those found within low-ranking search engine results.
[138, "o protect against websites attempting to steal your credentials, you should ensure your browser has built-in phishing protections such as Google Safe Browsing, Microsoft SmartScreen, and Firefox Focus. Additionally, you should avoid clicking on links within suspicious emails or advertisements or those found within low-ranking search engine results.", "o protect against websites attempting to steal your credentials, you should ensure your browser has built-in phishing protections such as Google Safe Browsing, Microsoft SmartScreen, and Firefox Focus. Additionally, you should avoid clicking on links within suspicious emails or advertisements or those found within low-ranking search engine results."],
Wrapping up
[139, "Wrapping up", "Wrapping up"],
Browsing the internet securely requires a combination of secure web browsers (e.g., Chrome/Edge/Firefox/Safari), security best practices (e.g., regular patching), and security awareness to spot when something seems off.
[140, "Browsing the internet securely requires a combination of secure web browsers (e.g., Chrome/Edge/Firefox/Safari), security best practices (e.g., regular patching), and security awareness to spot when something seems off.", "Browsing the internet securely requires a combination of secure web browsers (e.g., Chrome/Edge/Firefox/Safari), security best practices (e.g., regular patching), and security awareness to spot when something seems off."],
[141, "", ""],
Original Text (English)
Correct Translation (English)
Submissions are reviewed and applied within 48 hours.
Color Theme And Background Selector
×
Colorful Theme
Select Theme
Blue Theme
Select Theme
Light Theme
Select Theme
Purple Theme
Select Theme
Green Theme
Select Theme
Dark Theme
Select Theme
Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.