FAQ - LeoShield

Table of Contents

Protection of Personal Information

¿How do I protect my personal information online?

To protect your personal information online, it's a good idea to use strong, unique passwords for each account, enable two-factor authentication whenever possible, avoid using unsecured public Wi-Fi networks, and keep software and operating systems up to date.

¿How can I check that my password is strong?

If you have doubts about how strong your password is, you can check it using the Bitwarden Password Tester.

¿What should I do if my email account is leaked?

If you suspect that your email account has been compromised or leaked, I highly recommend migrating to another email address. If you don't, you leave yourself very vulnerable to phishing emails, fraud, and even, in the worst case, account theft.

¿How to recognize phishing emails?

Phishing emails often contain suspicious links, grammatical or spelling errors, urgent requests for personal or financial information, and senders who are unknown or do not match the domain of the service or company they claim to represent.

You can learn how to identify phishing emails at Phishing Quiz, which is part of Google.

¿How many characters should my master password be and what pattern should I use?

I recommend that your master password be 20 characters or longer.
It is not necessary to use signs.(!, @, #, $, etc).
You can use alphabetical words that don't make sense together to form a phrase that's easy to remember but hard to guess.

Example: horse+hill+blizzard+584

Cyber ​​Threats

¿What are the most common cyber threats?

The most common cyber threats are the following. Malware: Malicious software such as viruses, Trojans, ransomware, and spyware.

Phishing: Social engineering techniques to obtain sensitive information such as passwords and credit card numbers.

DDoS (Distributed Denial of Service) Attacks: Flooding a server or network with traffic to disrupt service.

Brute force attacks: Attempting to guess passwords by using massive combinations of characters.

Vulnerability exploits: Taking advantage of flaws in software to gain unauthorized access.

Tools and Services

¿What cloud storage service can I use?

There are many cloud storage services. I recommend using MEGA. The free plan gives you 20GB of storage.
MEGA uses end-to-end encryption (E2EE), meaning data leaves the device encrypted.
Only collects metadata.

¿Does Have I Been Pwned (HIBP) collect emails to be analyzed?

No, Have I Been Pwned (HIBP) does not collect the emails you scan for data breaches. The only emails it securely stores are those that have already been breached and found.

Good Practices

¿Should I stop using piracy?

Absolutely yes. Stopping the use of pirated software is important for a number of reasons, ranging from the security and performance of your devices to legal and ethical considerations.
They may contain malware, data theft, etc.

If VirusTotal doesn't detect anything, ¿does that mean it's safe?

No. There are false positives (FP) and false negatives (FN). False positives are when engines classify something as malicious when it is not.
And false negatives are when engines don't detect something that is malicious.
Here are some examples:
JaffaVPN.exe FP
2024-05-07-11.zip FN

¿How to improve the security of my WhatsApp account?

You can protect your WhatsApp account by following these steps:

Enable 2FA:It will ask you for a code every time you start a new WhatsApp.
Don't share SMS codes: 6-digit codes allow access to your account.
Linked devices:Devices linked to WhatsApp have authorized access to your account and messages.
FAQ WhatsApp

General Information

¿What is encryption and why is it important?

Encryption is the process of converting data into a coded format that can only be read by someone who has the decryption key. It is important because it protects confidential and sensitive information from being accessed or readable in case it is intercepted.

© 2024 LeoShield. All rights reserved.