EasyManuals Logo

Acer A514-53 User Manual

Acer A514-53
86 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #83 background imageLoading...
Page #83 background image
Internet and online security - 83
Don't be fooled if someone calls your phone
A tech support scam is a form of online fraud where people call you
on the phone saying they're Technical Support from a trusted
company like Norton or Microsoft and that you have a virus. The main
motive behind these scams is to extort money from the victim.
Cybercriminals can also install malware such as keylogging software
or backdoor Trojans in order to gain access to personal information.
How to stay safe: Don't fall for phone calls that tell you your software
or computer isn't working. Never give your personal information like
social security or credit card numbers to someone that you don't know
over the phone.
Common threats cybercriminals use
Now you know a few very common ways cybercriminals try to sneak
onto your device or trick you into providing private information to them
directly. Here are a few of the types of malware they like to deploy
once they've got into a device and what to do if you're ever infected.
Ransomware
A form of malware that will encrypt personal data files on your
computer and attached devices. Encryption converts files into another
format, that can only be opened with a specific decryption key. Once
the ransomware installs itself, it will display a warning message that
the computer is now locked. The user is given a specific amount of
money to pay as a "fine" and a timeframe in which to pay. Even if
paid, the criminal might choose to not unencrypt the files anyway!
What to do if you're infected: Avoid getting infected in the first place
by staying protected with internet security software like Norton
Security. Also, perform regular backups of all your data either online
or to a separate external hard drive that is only attached to your
computer while performing the backup. Ransomware has been known
to lock access to external hard drives attached to the computer.
If you are infected with ransomware, think twice before you pay the
ransom. There is no guarantee the cybercriminal will unlock your files
and you'll be funding them to prey upon another innocent victim.

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Acer A514-53 and is the answer not in the manual?

Acer A514-53 Specifications

General IconGeneral
Operating SystemWindows 10 Home
CPUIntel Core i3-1005G1
RAM4GB DDR4
Storage128GB SSD
Display Size14 inches
Display Resolution1920 x 1080 pixels
GraphicsIntel UHD Graphics
Ports1 x HDMI, 1 x headphone/microphone combo jack
WirelessWi-Fi 5 (802.11ac), Bluetooth 4.2

Related product manuals