Security Information |
|
Identity Theft Offline -- So Many Possibilities
Chris Simpson, head of Scotland Yard's computer crime unit was unpleasantly surprised to learn how easy it is to cheat anybody out of his or her personal info -- by means of a fake survey. This survey wasn't a scam; in fact, it was an experiment. It was carried out in March for the Information Security show (April 26-28). The results showed that most people casually give out their personal info. Market researchers questioned 200 people on London streets in a bogus survey on theater-going habits. 92% of those who took part disproved the common stereotype of British as reserved people. They readily gave out personal data, including first school and birth dates, mothers' maiden names, names of pets -- valuable info for, say, cracking passwords. During the survey many people volunteered such key details as name, address and postcode. The chance to win free tickets was enough for these people to reveal almost everything one might need to impersonate them. By the end of the survey, the fake researchers had everything they needed to take out credit cards in their name and even open bank accounts. These 200 people were lucky -- the survey was just a trick. But what if it hadn't been? Instead of laughing at naive and unwary Londoners, let's think whether we all are careful enough with such personal data. Aren't we sometimes give away information without a clear idea how it will be used -- and by whom? Much cautioned about identity theft and phishing in the Internet, we tend to relax when speaking in person. Most of us will never click links in spam or open attachments if we don't know who sent the email. We don't trust letters asking us for sensitive information. We are getting wiser. We have heard about identity theft plenty of times. We know that good deal of identity theft occurs offline. But all the same, some of us are still far from having good habits such as shredding personal correspondence before throwing it into the trash, or not having the same easy-to-guess password just for everything. The odds of identity theft online partly depend on such factors as what anti-virus and anti-spy software is installed on a PC and how often it is updated. Software vendors try to develop and provide effective means of defense against information-stealing malware. Of course, much depends on whether the user is careful enough to avoid a phishing scam, and even on what sites he visits -- one can easily pick malware while visiting certain websites. As for plain looking over your shoulder when you are writing something down, digging out papers from your trash or picking some valuable info from a casual talk -- nothing will help you if you carelessly scatter information about yourself. Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company that provides solutions for preventing identity theft. The company's R&D department created an innovative technology, which capable of blocking information-stealing malware.The company's anti-keylogging software disables the very processes of information capturing -- keylogging, screenshoting, etc. Learn more -- visit the company's websitehttp://www.anti-keyloggers.com
MORE RESOURCES: Hong Kong’s national security laws ‘not major concern for arbitration community’ South China Morning Post UCLA police chief, accused of security lapses before mob attack, defends his actions Los Angeles Times Former security guard Gregory Livingston found guilty of murdering man at Kroger gas station over loud music Action News 5 Security guard shoots, kills man outside southwest Atlanta strip club, police say Atlanta News First Laredo UISD receives 100% safety and security audits from TEA Laredo Morning Times Dave Chappelle's attacker sues Hollywood Bowl, security 2 years after he stormed stage: report New York Post Not Every Security Clearance Investigation is the Same ClearanceJobs The U.S.-Japan Alliance Council on Foreign Relations Former security guard found guilty of killing man over loud music WREG NewsChannel 3 Accelerating Innovation: Introducing SocX, SecureIQLab's AI-Powered Cloud Security Validation Platform PR Newswire Netherlands prepares for World War II remembrance amid Gaza security fears The Jerusalem Post Man arrested for attacking hospital security guard, nurse Habersham County deputies say Yahoo! Voices Verdict found after deadly 2021 Kroger fuel center shooting WATN - Local 24 NJ religious sites getting $4.8M for security, Gottheimer says NorthJersey.com Dave Chappelle attacker suing Hollywood Bowl security for negligence New York Daily News Ripple effect: Local agencies ramp up security after state, national cyberattacks on water supplies Altoona Mirror Dazz Unveils AI-Powered Automated Remediation for Application Security Posture Management Dark Reading Cabana Live shooting: Victim sues venue, security, others WESH 2 Orlando After canceling commencement, USC will host event at L.A. Coliseum, rolls out new campus security Los Angeles Times The Mystery Of EgyptAir's Inflight Security Officers... One Mile at a Time College campuses tighten security amidst graduation ceremonies Abccolumbia.com Graduations kick off at UConn with extra security measures in place Eyewitness News 3 Microsoft will base part of senior exec comp on security, add deputy CISOs to product groups GeekWire NSA Highlights Mitigations against North Korean Actor Email Policy Exploitation National Security Agency Security guard gets life in prison for killing unarmed man at East Memphis Kroger gas station WATN - Local 24 Joe Andruzzi Foundation, Amplix, celebrate reaching $1 million milestone in food security grants The Sun Chronicle Chaotic lake getting fence and security Wink News The Nordics in NATO: Women, Peace and Security and Regional Defense Peace Research Institute Oslo (PRIO) Sweden “On Terror Level Four” As Security Is Tightened A Week Before Eurovision Song Contest Deadline Belgium’s Aikido lands $17M Series A for its ‘no BS’ security platform aimed at developers TechCrunch Graduations kick off at UConn with extra security measures in place Eyewitness News 3 Private security worker raises concerns over handling of UCLA encampment violence FOX 11 Los Angeles Remarks by Ambassador Linda Thomas-Greenfield at the UN Security Council Stakeout on the Situation in Sudan United States Mission to the United Nations 174 Nebraska schools get $10 million to upgrade security Lincoln Journal Star Iranian Security Forces Shoot Teenage Border Porter ایران اینترنشنال Bodega owners, advocates address spike in armed bodega robberies, call for ramped-up security measures News 12 Bronx Thune wants cooperation for cyber security plan KELOLAND.com Before mob attack, UCLA police chief was ordered to create security plan but didn't, sources say Yahoo! Voices Security footage released from bible trailer fire | Lebanon | lebanondemocrat.com - Lebanon Democrat |
RELATED ARTICLES
Fishing for Fortunes. Scam! Spelt phishing, but pronounced as above, this despicable act is an effort to batter your bankroll or commandeer your cash.To put it simply, you can get emails from account administrators, which strongly urge you to update details attached to that account. Five Excellent Indie Encryption And Security Solutions You Have Not Heard About 1. Geek Superherohttp://www. Desktop Security Software Risks - Part 1 This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.Reason #2: the Desktop Security Software RisksThe risks of placing software on the desktop are such that I will be breaking this article into two parts. SPYWARE - Whos Watching Who? I am in the midst of Oscar Wilde's The Picture of Dorian Gray. "The basis of optimism is sheer terror. Whats All This I Hear About Firewalls? At this point, if you've got the whole "turning the computer on" thing down; you are ready to learn about firewalls. Whether you use your computer for business or pleasure, it is important to have a firewall. 7 Ways to Spot a PayPal Scam E-Mail Paypal is a great site and is used by many to send and receive money. Unfortunately some dishonest people are using the Popularity of Paypal to line their own pockets with gold at the expense of unsuspecting Pay Pal members. Internet Identity Theft - How You Can Shield Yourself With the advent of the World Wide Web, a whole new breed of criminals have surfaced, posing threats to more than just our material assets, but also to our very identities. Although there are a number of effective methods for protecting yourself from internet identity theft, not everyone takes the necessary steps to initiate such a plan. Do You Know What your Kids Are Doing Online? It's a sad statistic, but hundreds of unsuspecting kids are lured away from home every year by strangers they meet in online chat rooms.As frightening as this seems, it gets scarce attention in the media. Keeping Worms Out of Your Network... No auntie Sookie, not earth worms, computer virus worms that can get to you computer and slowly dig deep into your files and eat them away. Put that eggnog down and I'll tell you some more about these new worms. Information Security for E-businessmen: Just a Couple of Ideas If you constantly deal with bank or electronic accounts, it must beyour worst nightmare--to wake up and learn that you are a bankrupt.Some crook stole your personal data and all the money you have beensweating blood for years has flown to somebody else's account. Spyware Attacks! Windows Safe Mode is No Longer Safe Many of us have run into an annoying and time-consuming error. With your machine running goofey you decide to run a scan for trojans and spyware. Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking Airport Menace: The Wireless Peeping Tom----------------------------------------As a network security consultant, I travel quite frequently. At times, it seems like the airport is my second home. Protecting Your Children On The Internet If you are a parent, as am I, I think we can agree there is little else more important than keeping our children safe and protected. It's difficult enough keeping them safe from the unscrupulous people we read about in the news, but dealing with children and the Internet takes it to a completely new level. 5 Tips For An Unbreakable Password Despite the current wave of identity theft and corporate security breaches it's amazing how very few people treat their passwords with any level of seriousness. Most computers users, both at home and in the office, see passwords as a nuisance and therefore make them as easy to remember as possible. DOS Attacks: Instigation and Mitigation During the release of a new software product specialized to track spam, ACME SoftwareInc notice that there was not as much traffic as they hoped to receive. During furtherinvestigation, they found that they could not view their own website. Online Shoppers, Beware of a New Scam Beware of a New Scam Aimed at Bargain-HuntersTrying to buy something cheap is absolutely natural--and online crooks set traps for unwitting bargain-hunters. On April 6 Panda Software warned Internet users of a new particularly brazen scam aimed at stealing confidential information. Preventing Online Identity Theft Identity theft is one of the most common criminal acts in society today. Criminals will use your personal information such as banking accounts and passwords, to pretend that they are you. Are You Surfing Safe? Ok, you've got a computer, and you get online. You surf your favorite sites, Sports, Shopping, Cowchip Tossing Blogs, and so on. Arming Yourself Against Spyware While clicking from site to site on the internet you are likely to land yourself on a website that downloads spyware onto your computer system. Even while using familiar or unlikely and secure web site you run the risk of being infected with unwanted spyware. If You Steal It, They May Come! Business on the internet is getting down right shameless. This week, my email box was literally filled with hype, overly inflated promises, phish mail, scams, ezines I did not order, and about 14 viagra gimmicks. |
home | site map |
© 2006 |