-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathhome.html
108 lines (106 loc) · 6.69 KB
/
home.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
<!DOCTYPE html>
<html lang="en">
<head>
<title>Home | RealistSecurity</title>
<link rel="stylesheet" href="styles.css">
<link rel="icon" type="image/x-icon" href="favicon.ico">
<meta name="keywords" content="realistsecurity, realist security">
<meta name="viewport" content="width=device-width, initial-scale=1">
<meta name="description" content="RealistSecurity - Building Your Defenses. Learn how to protect yourself online with strong passwords, software updates, phishing awareness, two-factor authentication, and antivirus software.">
</head>
<body>
<nav>
<ul class="navbar">
<a class="activetext" href="home.html"><li class="active">Home</li></a>
<a href="warning.html"><li>What can happen?</li></a>
<a href="defence.html"><li>Building Your Defenses</li></a>
</ul>
</nav>
<div class="homescreen">
<h1 class="title">CYBER SECURITY</h1>
</div>
<div class="infodiv">
<div class="dangersimg"></div>
<h2>What are the dangers of being online?</h2>
<p>There are many dangers but we'll go over some major ones:</p>
<ul class="overviewlist">
<li><b>IP Trackers:</b> We'll discuss how your IP address can reveal your location and how malicious websites can try to steal it (IP grabbers - explained later).</li>
<li><b>Location Sharing:</b> We'll explore the risks of granting location permissions to websites and apps.</li>
<li><b>Permissions Creep:</b> We'll discuss how seemingly harmless permissions can be misused by websites.</li>
<li><b>Phishing Scams:</b> We'll learn how scammers try to trick you into revealing personal information or downloading malware.</li>
<li><b>Malware:</b> We'll explore different types of malware (malicious software) and how they can harm your device and data.</li>
<li><b>Data Breaches:</b> Any website, even the large ones can have data breaches resulting in your personal information being leaked.</li>
</ul>
</div>
<div class="infodiv">
<h2>Examples of Breaches</h2>
<section class="articles">
<article>
<div class="article-wrapper">
<figure>
<img src="https://natlawreview.com/sites/default/files/article/aux/1141/yahoo%20data%20breach_0.jpg" alt="Yahoo Data Breach" />
</figure>
<div class="article-body">
<h2>Yahoo (2013 - 2014)</h2>
<p>
This massive data breach affected over 3 billion user accounts, exposing names, email addresses, phone numbers, and even some security questions and answers. It remains one of the largest data breaches in history.
</p>
<a href="https://www.nytimes.com/2017/10/03/technology/yahoo-hack-3-billion-users.html" class="read-more" target="_blank">
Read more <span class="sr-only">about this is some title</span>
<svg xmlns="http://www.w3.org/2000/svg" class="icon" viewBox="0 0 20 20" fill="currentColor">
<path fill-rule="evenodd" d="M12.293 5.293a1 1 0 011.414 0l4 4a1 1 0 010 1.414l-4 4a1 1 0 01-1.414-1.414L14.586 11H3a1 1 0 110-2h11.586l-2.293-2.293a1 1 0 010-1.414z" clip-rule="evenodd" />
</svg>
</a>
</div>
</div>
</article>
<article>
<div class="article-wrapper">
<figure>
<img src="https://www.csoonline.com/wp-content/uploads/2023/06/cso_equifax_data_breach_by_anyaberkut_gettyimages-1020456586_2400x1600-100802656-orig.jpg?quality=50&strip=all" alt="Equifax Data Breach" />
</figure>
<div class="article-body">
<h2>Equifax (2017)</h2>
<p>
This breach exposed the personal information of nearly 150 million Americans, including Social Security numbers, birth dates, and home addresses. The breach was caused by a vulnerability in Equifax's website that allowed hackers to access sensitive data.
</p>
<a href="https://www.cnbc.com/2019/07/22/what-you-need-to-know-equifax-data-breach-700-million-settlement.html" class="read-more" target="_blank">
Read more <span class="sr-only">about this is some title</span>
<svg xmlns="http://www.w3.org/2000/svg" class="icon" viewBox="0 0 20 20" fill="currentColor">
<path fill-rule="evenodd" d="M12.293 5.293a1 1 0 011.414 0l4 4a1 1 0 010 1.414l-4 4a1 1 0 01-1.414-1.414L14.586 11H3a1 1 0 110-2h11.586l-2.293-2.293a1 1 0 010-1.414z" clip-rule="evenodd" />
</svg>
</a>
</div>
</div>
</article>
<article>
<div class="article-wrapper">
<figure>
<img src="https://www.csoonline.com/wp-content/uploads/2023/06/cso_marriott_data_breach_binary_data_stream_flowing_through_the_fingers_of_a_hacker_by_grandeduc_gettyimages-498749678_2400x1600-100812198-orig.jpg?quality=50&strip=all&w=1024" alt="marrindeott data breach_binary data stream flowing through the fingers of a hacker"/>
</figure>
</figure>
<div class="article-body">
<h2>Marriott International (2018)</h2>
<p>
This breach compromised the data of up to 339 million guests who had stayed at Marriott properties between 2014 and 2018. Hackers gained access to guest names, passport numbers, mailing addresses, phone numbers, email addresses, and birth dates.
</p>
<a href="https://www.bbc.com/news/technology-54748843" class="read-more" target="_blank">
Read more <span class="sr-only">about this is some title</span>
<svg xmlns="http://www.w3.org/2000/svg" class="icon" viewBox="0 0 20 20" fill="currentColor">
<path fill-rule="evenodd" d="M12.293 5.293a1 1 0 011.414 0l4 4a1 1 0 010 1.414l-4 4a1 1 0 01-1.414-1.414L14.586 11H3a1 1 0 110-2h11.586l-2.293-2.293a1 1 0 010-1.414z" clip-rule="evenodd" />
</svg>
</a>
</div>
</div>
</article>
</section>
</div>
<footer>
<p>© 2024 realistkrook </p>
<p><a href="https://www.cayugamutual.com/cyber-safety-101-tips-to-protect-your-online-safety/">Dangers image</a></p>
<p><a href="https://www.cbsnews.com/news/equifax-breach-exposes-data-for-143-million-consumers/">Equifax image</a></p>
<p><a href="https://www.csoonline.com/article/567795/marriott-data-breach-faq-how-did-it-happen-and-what-was-the-impact.html">Marriott image</a></p>
<p><a href="https://www.pymnts.com/legal/2018/yahoo-fine-personal-data-breach/">Yahoo image</a></p>
</footer>
</body>
</html>