{"id":5478,"date":"2015-02-27T09:16:01","date_gmt":"2015-02-27T14:16:01","guid":{"rendered":"http:\/\/kasperskydaily.com\/uk\/?p=5478"},"modified":"2020-02-26T15:10:56","modified_gmt":"2020-02-26T15:10:56","slug":"one-dollar-security-lesson","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/one-dollar-security-lesson\/5478\/","title":{"rendered":"One dollar lesson: defend your buck from online fraud"},"content":{"rendered":"<p>For a regular user like you and me it\u2019s hard to imagine the path of online payments and the\u00a0obstacles that appear on the way of one dollar \u2014 or just the same with thousands or millions of dollars. In fact we do not need to know how a payment is performed (although it\u2019s interesting), but to stay protected we need to know what can go wrong.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2015\/02\/05195552\/onedollarlesson-scr-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-5479\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2015\/02\/05195552\/onedollarlesson-scr-1-1024x492.png\" alt=\"onedollarlesson-scr-1\" width=\"1024\" height=\"492\"><\/a><\/p>\n<p>That\u2019s the reason Kaspersky Lab have designed an interactive web-project called \u2018<a href=\"http:\/\/onedollarlesson.com\/?reseller=gb_onedollarlesson_pro_ona_oth__all_b2c_kasperskydaily_ban_______\" target=\"_blank\" rel=\"noopener nofollow\">One dollar lesson<\/a>\u2018.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2015\/02\/05195550\/onedollarlesson-scr-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-5480\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2015\/02\/05195550\/onedollarlesson-scr-2-1024x496.png\" alt=\"onedollarlesson-scr-2\" width=\"1024\" height=\"496\"><\/a><\/p>\n<p>The One dollar lesson will take you to a virtual journey that starts at three possible locations: a laptop, a tablet or a smartphone. \u00a0It then goes through the endless spaces of the world-wide-web to the destination point \u2014 a bank account. \u00a0The interactive element is designed to help you, the user, better understand exactly what your dollar (or pound!) gets up to after its left your account.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2015\/02\/05195548\/onedollarlesson-scr-3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-5481\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2015\/02\/05195548\/onedollarlesson-scr-3-1024x485.png\" alt=\"onedollarlesson-scr-3\" width=\"1024\" height=\"485\"><\/a><\/p>\n<p>The dollar can take different routes depending on what how you\u2019re spending (and with whom.)<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2015\/02\/05195546\/onedollarlesson-scr-4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-5482\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2015\/02\/05195546\/onedollarlesson-scr-4-1024x493.png\" alt=\"onedollarlesson-scr-4\" width=\"1024\" height=\"493\"><\/a><\/p>\n<p>There are three stories you can trace: sending money to a charity in need, transferring money from one account to another and shopping online. In each case you\u2019ll see different scenarios. Every of the dollar payments will face numerous obstacles like phishing, trojan apps or brute force methods that aims to hack weak passwords.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2015\/02\/05195545\/onedollarlesson-scr-5.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-5483\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2015\/02\/05195545\/onedollarlesson-scr-5-1024x497.png\" alt=\"onedollarlesson-scr-5\" width=\"1024\" height=\"497\"><\/a><\/p>\n<p>Each episode is accompanied by a brief description of the threat and supported by statistical data. The informational background behind the project is powerful indeed. Here you\u2019ll find statistics from numerous researches conducted by Kaspersky Lab experts \u2014 for example, data from <a href=\"https:\/\/securelist.com\/analysis\/kaspersky-security-bulletin\/68010\/kaspersky-security-bulletin-2014-overall-statistics-for-2014\/\" target=\"_blank\" rel=\"noopener\">Kaspersky Security Bulletin<\/a> and other sources.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2015\/02\/05195542\/onedollarlesson-scr-6.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-5484\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2015\/02\/05195542\/onedollarlesson-scr-6-1024x563.png\" alt=\"onedollarlesson-scr-6\" width=\"1024\" height=\"563\"><\/a><\/p>\n<p>\u00a0<\/p>\n<p>Last but not least, what\u2019s the fun without a little bonus? If you study all three lessons of the one dollar you\u2019ll be awarded with a free three-month trial of <a href=\"https:\/\/usa.kaspersky.com\/products-services\/home-computer-security\/total-security\/?redef=1&amp;THRU&amp;reseller=blog_en-global\" target=\"_blank\" rel=\"noopener\">Kaspersky Total Security<\/a> \u2014 a security solution that is able to work with numerous different operating systems and devices.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2015\/02\/05195540\/onedollarlesson-scr-7.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-5485\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2015\/02\/05195540\/onedollarlesson-scr-7-1024x546.png\" alt=\"onedollarlesson-scr-7\" width=\"1024\" height=\"546\"><\/a><\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For a regular user like you and me it\u2019s hard to imagine the path of online payments and the\u00a0obstacles that appear on the way of one dollar \u2014 or just<\/p>\n","protected":false},"author":522,"featured_media":5487,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,7,2026],"tags":[77,264,354,215,870,553,344,76,192],"class_list":{"0":"post-5478","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-products","9":"category-threats","10":"tag-cybercrime","11":"tag-device-security","12":"tag-financial-security","13":"tag-internet-security","14":"tag-kaspersky-total-security","15":"tag-news-2","16":"tag-online-protection","17":"tag-phishing","18":"tag-protection"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/one-dollar-security-lesson\/5478\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/one-dollar-security-lesson\/5169\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/one-dollar-security-lesson\/7730\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/one-dollar-security-lesson\/7730\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/one-dollar-security-lesson\/7730\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/cybercrime\/","name":"cybercrime"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5478","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/522"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=5478"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5478\/revisions"}],"predecessor-version":[{"id":19196,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5478\/revisions\/19196"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/5487"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=5478"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=5478"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=5478"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}