Saturday, November 28, 2009

10 Steps to avoid Cyber Attack during Holiday Shopping.

Holiday season is here and the whole world is shopping. I am sure that a 50 % increase will be recorded in online shopping. Here we have to take out your credit card and open net banking accounts to pay your stuffs. Maximum care must be employed to safeguard your online identity and avoid monitory loss. Cyber attacks are also increased to 50% for your information. Here are some important safety guidelines to avoid a cyber crime.
1. Check your balance regularly even if you are not using your cyber accounts.
2. Pay your stuffs through bonafied vendors only. Now it is quite possible to use verified sites and reputed agents.
3. A disciplined buyer always goes for reputed suppliers and sellers.
4. Follow physical payment methods like checks and documents for large purchases.
5. Opt for instalments and limit your maximum purchase per sale.
6. Notify the credit card issuer immediately if your credit card is lost, stolen or misused.
7. Change your passwords frequently and use guidelines for Password Protection.
8. Your awareness and vigilance will always help you to safe guard your cyber identity and online bank accounts.
9. Be innovative and different in handling your account and this will avoid you from losing money.
10. Don’t ever go for fraud sellers and unauthorized vendors.

Also read

Tips for safe passwords for bank accounts and online accounts.

Tuesday, November 24, 2009

Cyber Wellness Student Ambassadors program

The Internet is a place of unlimited resources of knowledge and wealth as well as potential dangers. Students and youngsters are more affected due to cyber attacks. But it is important to safe guard your youngsters from cyber encroach. Cyber Wellness Student Ambassadors program is one good example for such an attempt. Ministry of Education (MOE), the Infocom Development Authority of Singapore (IDA) and Microsoft Singapore are the partners. Guiding children and youth to safely navigate cyberspace is an important objective for Microsoft. Students who want to play an active role in promoting cyber wellness among their peers can now become Cyber Wellness Student Ambassadors. The Cyber Wellness Student Ambassador Programme is launched today to promote safe and responsible use of Information-Communication Technologies (ICT) among students through peer education. The programme is a part of the BackPack LIVE! Education Initiative led by the Ministry of Education (MOE), the Infocom Development Authority of Singapore (IDA) and Microsoft Singapore. Microsoft Singapore will also be working closely with the Cyber Wellness Student Ambassadors on the creation of a skit called ‘Buddy Goes to School’. Through positive peer influence and peer education, the Programme will provide a platform for cyber wellness messages to be delivered from the youths’ viewpoint. Student Ambassadors will also benefit from their direct involvement as they are actively engaged in planning and designing activities to propagate cyber wellness messages.

Learn more at Singapore Launches Cyber Wellness Student Ambassador Programme

Saturday, November 21, 2009

Tips for safe passwords for bank accounts and online accounts.


Holidays are here and shopping season is picking up. I am sure that you are going to take out your credit card to buy every sort of services and products. It is the time to make sure that cyber thieves are not benefiting from your expense. So you must take care of the following facts to protect yourself from cyber attacks.
1. So pay close attention to your bank and credit card accounts during the holidays.
2. Update your anti-virus software regularly and rely on it to alert you to a virus.
3. Don't shop from internet cafes and public computers.
4. Create complex passwords
To avoid your cyber identity or account it is important to choose a sufficiently healthy password. Password guessers and hackers are trying their best to robe your identity and password. A wise netizen must aware of the possible
1. Select a password as long as possible.
2. Use as many different alpha numeric characters as possible
3. Do not use personal information
4. Do not use words that are related to you.
5. Do not replicate your account number as password.
6. Do not replicate your username as password.
7. Use both upper and lower case letters in your password.
There are many things you should avoid in your password that include Your name, Your spouse's name, Your parent's name, Your pet's name, Your child's name, Anybody's name, Your phone number, Any part of your social security number, your birth date or Other information that is easily obtained about you. Taking care of these things will make your password stronger and your cyber identity safer. Try this today before you loss valuables or identity.

Thursday, November 19, 2009

SpyZooka spyware removal software - Guarantee 100% Spyware Removal

SpyZooka spyware removal software - Guarantee 100% Spyware Removal! Yes SpyZooka spyware removal software automatically update SpyZooka spyware removal software on computers worldwide, and analyze over 100 million web pages for new spyware threats every day since 2004.
Zap Spyware and Keep it Gone!
SpyZooka antispyware is recommended by computer experts worldwide, Detects, removes, and blocks all types of spyware and adware threats, Advanced features are totally automated, Our proprietary spyware destroying robot hits at least 100 million web pages a day to find new spyware threats, Daily updates ensure your complete protection, They immunize your computer so you’re protected from future spyware infection, Free unlimited customer support, 60 day 100% SpyZooka spyware detector money back guarantee.


Free Trial Software from Symantec

Symantec helps consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored.


Try Symantec products for 30 days before you buy.

Tuesday, November 3, 2009

Cyber security (Online Security) Threat or attacks and the Regulations

Cyber security (Online Security) Threat or attacks and the Regulations is an earnest attempt to show the inner side of cyber crimes. There are many cyber crimes are happening on every day basis. Rather it is happening on every second basis. Some facts like 1 out of 5 e-mail messages that corporate servers receive are spam and 1 out of 20 is infected with malicious software (software designed to infiltrate or damage a computer system without the owner's informed consent. Consumer Reports released a report in 2006 showing that United States consumers would spend $7.8 billion over the last two years for computer repairs and replacements because security attacks like malicious software and viruses are unbelievable.
Cyber security (Online Security) is about safeguarding or securing your online identity (cyber identity) from any threat or attack that may use you confidential or valuable data and information without authority or your knowledge, protect you machine from different threat or attacks like viruses, worms, spy ware, and mal-ware. When these threat or attacks are blended together, they can overload and shut down systems and resources.
Everybody seems to rely on online identity (cyber identity) nowadays, bill payments can be done online, communication, transportation, entertainment and other aspects of our lives depend or influenced by computers. This is why computer or Cyber security (Online Security) threat or attacks are important to be dealt immediately.
There are different kinds of online identity (cyber identity) threat or attacks, for example, our browsers are not that safe anymore. Browsers have vulnerabilities where expert hackers can exploit codes and passwords. Hackers would use even our trusted websites to make these attacks. This is why software manufacturers are investing on security to setup tools that would protect users even on trusted sites.
Another alarming online identity (cyber identity) threat or attack is that there are an increased number of incidents where national records are extracted. Economic data of a nation or state can fall victims to cyber theft. National and state governments are not the only victims, in the United Kingdom cyber theft is recognized to be among the biggest crime in the country. Cyber theft could include credit card fraud, illegal bank transfers and phishing attacks.
Phising attacks are fraudulent processes where sensitive personal and financial information are asked from an individual. People would fall victims to phishing scams since they pose as legal and trustworthy institutions, they are normally send out through emails and instant messaging.
Computers are not the only targets of cyber threat or attacks, mobile phones are also being attacked by worms, viruses, and malicious software. Mobile phones are very susceptible to hackers and also viruses. Old cellphones can be immune to viruses, but new cell phones, the smart ones, because of their standardized operating system are now in risk of viruses.
Multimedia messaging services or MMS can send multiple copies of the phone address book or copy the phone book into a new handset just within a couple of minutes. Aside from that it could also infect other phones within the area and disrupt communication protocols.
Cyber-terrorism is also another increasing Cyber security (Online Security) threat or attack experienced by users. Some experts would say that cyber terrorism is just the same as hacking. But experts would agree that it is intended to create or start fear, physical harm or death by using electronic methods.
An example would be the case in Romania, where terrorists were able to control the life support systems in an Antartic research station, putting 58 scientists in danger. This kind of attack can affect a great deal of people, weaken the economy and even make the country vulnerable to military attacks.
Another common Cyber security (Online Security) problem would be the attacks of people themselves, like disgruntled employees. In a survey conducted by the Nucleus Research and Knowledge Storm, 1 out 3 workers would jot down their passwords. This is not the best security practice since jotted down passwords can be lost and used by unsatisfied workers.
There is increasing number of Cyber security (Online Security) threat or attacks that needs to be addressed immediately. Long-term plans and solutions should be created to address the increasing number of victims. While we wait for government and organizations to come up with long-term solutions, it is our individual responsibility to make sure that we keep our personal and work-related information safe.
Cyber security (Online Security) is meant to protect personal and work-related confidential or valuable data and information stored in our computer and personal websites. With the increase of individuals, organizations, and members of the community falling prey to cyber crimes and security attacks, there is an increase in demands for more measures to be taken.
Alarmingly, the number of people getting affected Cyber security (Online Security) attacks is increasing. According to a research by Panda Software in 2006, 1 out of 5 e-mail messages that corporate servers receive are spam and 1 out of 20 is infected with malicious software. Consumer Reports released a report in 2006 showing that United States consumers would spend $7.8 billion over the last two years for computer repairs and replacements because security attacks like malicious software and viruses.
Security attacks like these do not only cost an individual repair, businesses, organizations and the national economy could suffer losses. In 2005, cyber crime led to a loss of whopping $130.1 million, all because of viruses, unauthorized access to computer systems and personal and financial information theft.
There are numerous measures that should be taken by the government to help resolve cyber crimes and attacks. In the United States, there are different legislations in the executive and Congress level that are meant to protect computer systems and other medium of information technology. This is called cyber-security regulations.
Cyber –security regulations is to make sure that companies and private institutions would be using or safeguarding or securing their systems from any cyber attacks like viruses, worms, phishing, denial of service and unauthorized access.
The United States Chamber of Commerce said that there are about 64 % of small businesses that are getting protection for their systems to protect their customer’s financial information. While there are about 72 % of businesses expressed concern about security of the company’s assets and information.
In the United States, there are cyber-security regulations, for both federal and estate governments. For federal government Cyber security (Online Security) regulations, they focus mainly on specific industries and fields, healthcare, organizations, financial institutions and agencies that work with systems and information. Unfortunately, this regulation does not reach and cover computer related industries like Internet Service Providers (ISP).
Additional to this, the federal government is also trying to resolve issues of Cyber security (Online Security) breach by allocating more funds in research and programs directed to research better solutions and recommendations for improving Cyber security (Online Security). The government is collaborating with members of the private sector.
Meanwhile, states are forming their own methods of dealing with security attacks. An example is the regulation passed by the California State in 2003 called Notice of Security Breach Act. Different states have followed the example of California and created their own anti-breach regulations and standard procedure.
There has been an ongoing debate about Cyber security (Online Security) regulation. There are people who comments that creating a regulation is not the answer and not enough, what is needed is better defences against hackers, viruses and similar threat or attacks. The regulation is said to restrict industries to develop programs and software that would boost Cyber security (Online Security). Aside form this, businesses also fears that having the regulation will cut back their healthy profits since they would meet more limitations and would cost them more.
But in spite of regulations and software that could protect your computer and systems, still the best way to boost Cyber security (Online Security) is preventing any attacks from happening in the first place. There are easy tips that could be followed to avoid cyber attacks from happening.

Additional Security Guidelines from RBI

To make online payment safer, the RBI has made it mandatory, from 1st August onwards, for all online transactions to have an additional level of authentication. The additional level is a password that you will have to enter after entering your credit/debit card details. You will require this password for transacting on any website in India. This process will ensure that unauthorized individuals will not use your card to make payment online.

Monday, November 2, 2009

Popular Articles - Security

Online Child Protection Act

It is said that a child has an innocent mind. Children learn from what they see. Hence it is important to show those things that will be beneficial to them. If an inspiring movie is showed, it will definitely motivate them. It is said that children should be prohibited from watching any adult content. A law called child protection act was initiated in this regard.
Parents generally do not allow their children to watch any adult content. Today a variety of sources have become available to children that show obscene content. There are many websites that showcase content which is very harmful to children.
Online child protection act was passed in United States in 1998. The law is made in order to protect minors from any kind of harmful sexual material that is available on the internet. A minor in United States is a person who is less than 18 years old. Child online protection act has not come into effect as the law has been ruled out by federal courts.

Many federal courts feel that the law violates the constitutional right of freedom of speech. That is why this law has not been yet implemented. The Supreme court also declared this act as unconstitutional. Although this law has not been passed, similar laws have come into effect in United States.
The internet contains a lot of unwanted material. There are various online sites that provide harmful sexual material. This harmful material if seen by children can have a negative effect on them. In order to make this material inaccessible to children, child protection act was passed.
Internet pornography is distributed via websites and Usenet groups. The makers of child online protection act wanted to restrict the access of internet pornography. The makers wanted internet pornography to be inaccessible to children who are less than 18 years.
Online child protection act limits commercial and affects providers that are based within United States. Makers of Online child protection act wanted all commercial distributors that provided harmful sexual material to restrict their websites from access to children. Sexual material that explicitly demonstrated sexual acts or showed nudity was considered extremely harmful for minors. According to this law obscenity was also considered harmful to children who are less than 18 years old.
Although makers of child online protect act gave reasons for enforcing this law, the Supreme court found these reasons insufficient and hence the law could not be enforced.
Some believe that online child online protection act should be implemented as we harm the children by showing any obscene content. The lawmakers of child protection act believed that restriction of access to websites that displayed harmful sexual material is beneficial for minors. They believed that some minors may commit crimes after watching this content.
Minors are citizens of tomorrow. In order to make better citizens of tomorrow, they believed that this law should have been implemented.
As internet is growing rapidly it is essential to protect the kids from any harmful content. Hence it is important to enforce this child online protection act.

Monday, October 26, 2009

Identity Theft in Indian online community

We have identified Identity theft as the new threat faced by online business houses. Let us see how this threat affects Indian BPO. The statistics shows that this trouble is about to grip Indian online market. As the proportional quantity of online transactions are much lesser the problem is not poised much public attention now. But I am sure that it is going to get into news paper titles.
Please read this one article Identity Theft & 'PHISHING" within Indian BPO Employees

Also read

Federal Trade Commission’s Identity Theft Site

We have seen many posts on Cyber Identity theft and Cyber Crime. Here we will discuss some sites that help us from such Cyber Thefts. I would like to invite your attention towards Federal Trade Commission’s Identity Theft Site. Federal Trade Commission’s Identity Theft Site is a one-stop national resource to learn about Cyber identity theft. This site provides detailed information to deter, detect, and defend Cyber Identity theft. Federal Trade Commission’s Identity Theft Site consumers can learn how to avoid iCyber Identity theft – and learn what to do if their identity is stolen. Businesses can learn how to help their customers deal with identity theft, as well as how to prevent problems in the first place. Law enforcement can get resources and learn how to help victims of identity theft. Here are some interesting publications by this site. Please visit http://www.ftc.gov/bcp/edu/microsites/idtheft/index.html for more details.

Federal Trade Commission’s Identity Theft Site Publications

1. Fighting Fraud with the Red Flags Rule: A How-to Guide for Business (PDF 22MB)
2. Seeing Through Stimulus Scams (PDF 126KB)

3. How To Plan and Host Protect Your Identity Days Kit (PDF 6MB)

4. To Buy or Not To Buy: Identity Theft Spawns New Products and Services To Help Minimize Risk (PDF 229KB)

5. Take Charge: Fighting Back Against Identity Theft
(PDF 4.9MB)

6. Information Compromise and the Risk of Identity Theft: Guidance for Your Business
(PDF 152KB)

7. Protecting Personal Information: A Guide for Business (PDF 3.47MB)

Sunday, October 25, 2009

A Product That Is Too Good To Be True... Except It Is True

Today any body can start an online business. Stay-At-Home-Moms, Local asphalt-sealer Site Build It!grows into a Netpreneur who sells asphalt-sealing kits globally, Corporate executive, eBay slaves, Husband-and-wife, Teen, college student,
Photographer, Uber-geek, Corporate cubicle worker , Savvy Network Marketers or any body can start the online business with ease, there are many opportunities available and it is very simple to make your online presence. Online website designers like Site Build It! ("SBI!") can make a whole business for you. This is very good for newbies who are afraid of Cyber Identity theft and Cyber Fraud. You will get the whole expertise from firms like Site Build It! ("SBI!") to build your business.

Also read


Cyber Identity and Security - Wikipedia Narration

In this blog let us see what our favourite enciclopedia wiki talks about Cyber Identity theft. Cyber Identity theft is a term used to refer to fraud that involves someone pretending to be someone else in order to steal money or get other benefits. The term dates to 1964 and is actually a misnomer, since it is not inherently possible to steal an identity, only to use it. The person whose identity is used can suffer various consequences when he or she is held responsible for the perpetrator's actions. Cyber Identity theft is somewhat different from cyber identity fraud. However, the terms are often used interchangeably. Identity fraud is the result of cyber identity theft. Someone can steal or appropriate someone’s identifying information without actually committing identity fraud. The best example of this is when a data breach occurs. There has been very little evidence to link ID fraud to data breaches.
Now go directly to http://en.wikipedia.org/wiki/Identity_theft and learn more!

Also read:

Protect Yourself from Cyber Identity Theft

To Protect Yourself from Cyber Identity theft you must know What Is Online Identity Theft? Using Information on the Internet for Identity Theft and for online transaction, take a moment to review a Web site's privacy policy. Read more about t is Cyber Identity Theft at http://www.webopedia.com/didyouknow/Internet/2006/identity_theft.asp
Cyber Identity Theft is a Cyber Crime is an act of criminals impersonate individuals for financial gain. If a Cyber thief is able to access your secret information such as social security numbers, a signature, name, address, phone numbers, and even banking and credit card information, he or she can use it to commit fraud in your name. Using this confidential information the Cyber thief could apply for loans or new credit card accounts.
Cyber Identity theft can also go beyond this type of a monetary impact. Thieves can use your information to obtain a driver's license or other documentation that would display their photo but your name and information. With these documents thieves could to obtain a job and file fraudulent income tax returns, apply for travel documents, file insurance claims, or even provide your name and mailing address to police and other authorities if involved in other criminal activities.
Learn the terms like
Security: In the computer industry, refers to techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorization.
Cyber forensics: The application of scientifically proven methods and to use digital evidence to provide a conclusive description of Cyber Crime activities.
Phishing: The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for Cyber Identity theft.
E-mail spoofing: Forging an e-mail header to make it appear as if it came from somewhere or someone other than the actual source.

Saturday, October 24, 2009

Cyber Security Regulations

Cyber Security Regulations is also from the Plr articles free articles.

Cyber Security is meant to protect personal and work-related data and information stored in our computer and personal websites. With the increase of individuals, organizations, and members of the community falling prey to cyber crimes and security attacks, there is an increase in demands for more measures to be taken.

Alarmingly, the number of people getting affected Cyber Security attacks is increasing. According to a research by Panda Software in 2006, 1 out of 5 e-mail messages that corporate servers receive are spam and 1 out of 20 is infected with malware. Consumer Reports released a report in 2006 showing that United States consumers would spend $7.8 billion over the last two years for computer repairs and replacements because security attacks like malware and viruses.

Security attacks like these do not only costs an individual repairs, businesses, organizations and the national economy could suffer losses. In 2005, Cyber Crime led to a loss of whopping $130.1 million, all because of viruses, unauthorized access to computer systems and personal and financial information theft.

There are numerous measures that should be taken by the government to help resolve cyber crimes and attacks. In the United States, there are different legislations in the executive and Congress level that are meant to protect computer systems and other medium of information technology. This is called cyber-security regulations.

Cyber –security regulations is to make sure that companies and private institutions would be using or protecting their systems from any cyber attacks like viruses, worms, phishing, denial of service and unauthorized access.

The United States Chamber of Commerce said that there are about 64 % of small businesses that are getting protection for their systems to protect their customer’s financial information. While there are about 72 % of businesses expressed concern about security of the company’s assets and information.

In the United States, there are cyber-security regulations, for both federal and estate governments. For federal government cyber security regulations, they focus mainly on specific industries and fields, health care, organizations, financial institutions and agencies that work with systems and information. Unfortunately, this regulation do not reach and cover computer related industries like Internet Service Providers (ISP).

Additional to this, the federal government is also trying to resolve issues of cyber security breach by allocating more funds in research and programs directed to research better solutions and recommendations for improving cyber security. The government is collaborating with members of the private sector.

Meanwhile, states are forming their own methods of dealing with security attacks. An example is the regulation passed by the California State in 2003 called Notice of Security Breach Act. Different states have followed the example of California and created their own anti-breach regulations and standard procedure.

There has been an ongoing debate about cyber security regulation. There are people who comments that creating a regulation is not the answer and not enough, what is needed is better defenses against hackers, viruses and similar threats. The regulation is said to restrict industries to develop programs and software that would boost cyber security. Aside form this, businesses also fears that having the regulation will cut back their healthy profits since they would meet more limitations and would cost them more.

But in spite of regulations and software that could protect your computer and systems, still the best way to boost Cyber Security is preventing any attacks from happening in the first place. There are easy tips that could be followed to avoid Cyber Security attacks from happening.

Friday, October 23, 2009

Cyber Identity theft - More Books

Cyber Crime has moved yet another step forward in its unyielding progression through society. Now it is Cyber Identity theft. Trying to combat both legal and illegal Cyber Identity theft continues to occupy a large portion of the average citizen's life.
Before you become a victim of Cyber Crime for those decided cyber thieves, read books like Cyber Identity theft. Identity theft By Claudia L. Hayward is a 157 page listed in Google Books under Political Science Category. You van have a limited preview at
http://books.google.co.in/books?id=K-veh5H0ggcC&printsec=frontcover&source=gbs_v2_summary_r&cad=0
Cyber Identity theft or identity fraud generally involves 'stealing' another person's personal identifying information -- such as Social Security number (SSN), date of birth, and mother's maiden name -- and then using the information to fraudulently establish credit, run up debt, or take over existing financial accounts. This new book examines the extent of Cyber Identity theft, its costs and remedies under the law.

Also read

From Victim to Victor: A Step By Step Guide for Ending the Nightmare of Identity Theft

From Victim to Victor: A Step By Step Guide for Ending the Nightmare of Identity Theft

From Victim to Victor: A Step By Step Guide for Ending the Nightmare of Identity Theft - A book review
It has been estimated that more than 100,000 people in the UK are affected by Cyber Identity theft year. Cyber Identity theft is also the fastest growing crime in America and according to a Federal Trade Commission; 9.9 million victims were reported last year. Yes the issue of identity theft is in a rising in India also. We have several cases reported from every corner of this country. As the popularity and use of internet based services increases the dimensions of Cyber Identity theft also increases.
2nd Edition of from Victim to Victor: A Step By Step Guide for Ending the Nightmare of Identity Theft by Mari Frank is an interesting bit to read. The book and CD are fact filled with crucial information showing you the actions and precautions you need to take to minimize your risk of cyber identity theft. A Step By Step Guide for Ending the Nightmare of Identity Theft by Porpoise Press, Inc. 2005, comes with CD has 176 pages plus CD and it is priced at $39.95.
the publishers claim that this book will empower you with todays major skills that is required to survive online. Victim to Victor: A Step By Step Guide for Ending the Nightmare of Identity Theft empowers you with
1. Easy to follow critical steps to protect your identity and regain it if stolen
2. Simple to understand legal explanations of your rights.
3. Attorney composed, pre-formatted letters (on CD) to write to protect and exert your rights without having to hire a lawyer.
4. Success techniques to handle all issues to protect your privacy and good name.

Read more at http://www.identitytheft.org/v2v.htm and handle Cyber Identity theft effectively.

Also read

Cyber Identity theft in India

It has been estimated that more than 100,000 people in the UK are affected by iCyber Identity theft every year. Cyber Identity theft is also the fastest growing crime in America and according to a Federal Trade Commission; 9.9 million victims were reported last year. Yes the issue of identity theft is in a rising in India also. We have several cases reported from every corner of this country. As the popularity and use of internet based services increases the dimensions of identity theft also increases.
Cyber Crime Investigation Cell, Mumbai describe identity theft in their website. They have listed a few examples of Cyber Identity thefts and Cyber Crime like “ Apply for a credit card in the victim’s name”, “Open a bank or building society account in the victim’s name”,“Apply for other financial services in the victim’s name” ..
For more details Please read the article What is Identity Theft?

Also read


Cyber Security Tips at US-CERT

US-CERT, United States Computer Emergency Readiness Team, the operational arm of the National Cyber Security Division (NCSD) at the Department of Homeland Security (DHS), is a public-private partnership. US-CERT located in the Washington DC Metropolitan area is charged with providing response support and defence against cyber attacks for the Federal Civil Executive Branch and information sharing and collaboration with state and local government, industry and international partners. US-CERT interacts with federal agencies, industry, the research community, state and local governments, and others to disseminate reasoned and actionable cyber security information to the public. Information is available from the US-CERT web site, mailing lists, and RSS channels. US-CERT, United States Computer Emergency Readiness Team, including implementation of the National Strategy to Secure Cyberspace also provides a way for citizens, businesses, and other institutions to communicate and coordinate directly with the United States government about cyber security.
US-CERT, United States Computer Emergency Readiness Team, provide you General and in depth information on General security, Attacks and threats, Email and communication, Mobile devices, Privacy, Safe browsing and Software and applications. The topics covered are like

1. Why is Cyber Security a Problem?
2. Guidelines for Publishing Information Online
3. Understanding Internet Service Providers (ISPs)
4. Choosing and Protecting Passwords
5. Understanding Anti-Virus Software
6. Understanding Firewalls
7. Coordinating Virus and Spyware Defense
8. Debunking Some Common Myths
9. Good Security Habits
10. Safeguarding Your Data
11. Real-World Warnings Keep You Safe Online
12. Keeping Children Safe Online
13. Dealing with Cyberbullies
14. Understanding Hidden Threats: Corrupted Software Files
15. Understanding Hidden Threats: Rootkits and Botnets
16. Preventing and Responding to Identity Theft
17. Recovering from Viruses, Worms, and Trojan Horses
18. Recognizing and Avoiding Spyware
19. Avoiding Social Engineering and Phishing Attacks
20. Understanding Denial-of-Service Attacks
21. Identifying Hoaxes and Urban Legends
22. Avoiding the Pitfalls of Online Trading
23. Understanding Your Computer: Email Clients
24. Using Caution with Email Attachments
25. Reducing Spam
26. Benefits and Risks of Free Email Services
27. Benefits of Blind Carbon Copy (BCC)
28. Understanding Digital Signatures
29. Using Instant Messaging and Chat Rooms Safely
30. Staying Safe on Social Network Sites
31. Protecting Portable Devices: Physical Security
32. Protecting Portable Devices: Data Security
33. Using Caution with USB Drives
34. Securing Wireless Networks
35. Cybersecurity for Electronic Devices
36. Defending Cell Phones and PDAs Against Attack
37. How Anonymous Are You?
38. Protecting Your Privacy
39. Understanding Encryption
40. Effectively Erasing Files
41. Supplementing Passwords
42. Understanding Your Computer: Web Browsers
43. Evaluating Your Web Browser's Security Settings
44. Shopping Safely Online
45. Browsing Safely: Understanding Active Content and Cookies
46. Understanding Web Site Certificates
47. Understanding Internationalized Domain Names
48. Understanding Bluetooth Technology
49. Avoiding Copyright Infringement
50. Understanding Patches
51. Understanding Voice over Internet Protocol (VoIP)
52. Risks of File-Sharing Technology
53. Reviewing End-User License Agreements
54. Understanding Your Computer: Operating Systems

Learn more about US-CERT at United States Computer Emergency Readiness Team

Cyber Security: Password Protected

Cyber Security is a burning issue and that is to be addressed effectively. Password Protected sites are used in abundance in these days. Let us have a look into password protection techniques.
You turn on your computer and you’re prompt with a username and password. The same thing happens when you open your email account. I know it is quite obvious to you right now but allow me to stress the importance of cyber security by having password protected files, networks, and software applications. It is important to protect your personal information. Sure, it seems unimportant if people hacked into your email account.
You have a bunch of personal emails from friends and occasionally send some your self but the whole lot of your mails in your inbox are spam and other promotional garbage, so why do you have to care that much. But the thing is, those who are able to gain access to your email accounts are often not truly satisfied with that level of attach and are in reality just preparing for a much bigger intrusion.
Before you know it, they can get information about your social security number of even bank accounts. Your personal emails contain heaps of information which can be used by hackers for their own personal gain.
Having a good password installed is therefore a good deterrent for hackers or attackers. It ensures that proper authentication is verified first before you gain access to personal information. It is therefore important that you make up a good password. A poorly made one will just be ineffective and totally useless against hackers.
For instance, using part of your name as a password would be just too easy to crack. It will not be a deterrent at all. To add to this, there are applications like virus and worms that can actually penetrate a secure or confidential system just because it has a weak password installed.
Example of weak passwords, aside from a derivative from your name, would be using numbers that coincides with birthdays, phone numbers, addresses and information about your family or stuff. Sure, these are easy to remember but that thinking will also cause you problems later on. These kinds of numeric passwords are just easy to solve. The same thing goes with dictionary based passwords which are those words that you picked up from a dictionary.
Now in making up your password, it would be a lot better if you use combinations of letter, numbers and other techniques. You could intentionally misspell the words so you won’t fall for dictionary attackers. You can add numbers and a combination of upper and lower cases. Or you could assign a code.
You can abbreviate something that if you love “watching soap shows on TV” you can take the first letters of the word “WsSoT” and combine it with a relevant numbers. Not only would the acronym easy to remember but it would be difficult for hackers to crack. However, avoid using famous quotes, catch phrases, lyrics, poem and even pick up lines. Go for something you invented.
Also, remember that having a longer password is better. The more characters you have the harder it is to guess or the more difficult to decipher the combinations. Also, don’t use the same password twice for your other accounts. Although this is quite tempting since you don’t have to create a new one and remember it every time, when an attacker does get a password from one of your accounts, the first thing he will do is to try the same password for all your other accounts.
Cyber security begins with you. Keeping your personal information safe lies first on password protected access to your files, systems and networks. Having a right and strong password will help fight off attackers.

Also read

Cyber Identity and Security - Past Blogs

Cyber Identity and Security: Today’s biggest cyber security concern is Identity Theft. Cyber thieves use all kinds of methods like hacking, phishing to robe your money in your online account with financial institutions such as Citibank, eBay, PayPal, Best Buy and others. Go though the last four posts appeared on Cyber Identity and Security

Cyber Security for Kids

Tips for Cyber Identity and Security

Surviving safely in your daily online routine is a bit difficult. If you need some sort of help then visit any one of these sites. I just digged them out from my Google Search! Please rate this article on !

Cyber Security Building a Good Habit

Cyber Security Building a Good Habit is the latest article on ! is not at all that difficult. Once you have incorporated it into your system then it is just like riding a bicycle or can be as normal as walking. All you need is to learn how you can make it work well and build a good habit to make cyber security consistent. By doing this you can have a better chance of keeping your confidential information protected from attacks from virus or similar applications or from hackers. This way you can keep your personal information safe from other persons who would like to access them and use them for personal gain or protect them from applications that can erase or corrupt your files. Part of building a good habit would be to identify how your information can be accessed and who would be the most likely people who can gain from accessing your confidential files. It’s like identifying the usual suspects in a criminal line-up. I’m not saying that the people you know cannot be trusted but it helps to be extra cautious. You brother might not do something untrustworthy by his friends might and if they have physical access to your computer then your files are at a risk of being hacked.

Cyber Security a peep back into history

The concern about cyber security comes into picture with the spread of internet services. Now the problem is very sever and attracts attention from around the world. Here I have a small clipping from Wikipedia that tells about a hacking.
In 1994, over a hundred intrusions were made by unidentified hackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horse viruses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtain classified files, such as air tasking order systems data and furthermore able to penetrate connected networks of National Aeronautics and Space Administration's Goddard Space Flight Centre, Wright-Patterson Air Force Base, some Defense contractors, and other private sector organizations, by posing as a trusted Rome center user.

Cyber Security and Online Shopping

With the popularity of online shopping today, the importance of cyber security becomes essential to everyone. Shopping, even in the real world, involves money and where there is money, there go the criminals. And since much shopping is now happening in cyber space, these criminals lost no time in following the money trail targeting online shoppers. Online shopping became fashionable when people discovered one is free from stress and fatigue caused by crowds and traffic. There is also the convenience of searching whatever it is you want from your home, at your most convenient time, and paying for it without waiting in line. All of these with just a few click of a mouse. However, the Internet is also a convenient place for cyber criminals as well. They target the online shoppers, fraudulently obtaining information they can use for their own financial gains. These criminals use the three most common ways in attacking the online shoppers.

Cyber Security and Identity Theft is an article

Today’s biggest cyber security concern is Identity Theft. Cyber thieves use all kinds of methods (hacking, use of spyware for intercepting information, etc.) in stealing personal or financial information from their victims, mostly from the computers. The latest of these nefarious activities even sports a name: phishing (pronounced like ‘‘fishing”). The thief sends a simple e-mail that looks like it came from a genuine site (mostly from financial institutions as Citibank, eBay, PayPal, Best Buy and others), telling you there is a problem with your account. They would then ask you to click on a certain link in the e-mail, and you are taken to a site that looks exactly like that of your bank. Here, they will ask you to fill out again your Social Security or credit card numbers, and/or other confidential numbers. The following are some ways to minimize the risk of your identity being stolen:

Thursday, October 22, 2009

Cyber Security for Kids

I have added this article on Cyber Security for Kids on my blog to bring your kind attention towards todays burning problem.

If you think your kids now just need to be protected from strangers offering them candy or from cars while crossing the streets, then you have another thing coming. Your children need a whole new level of protection especially in this age of computers and the internet. More and more kids are having easier access to the internet. According to some studies, more than 80% of teenagers in the US have access to the internet at home. The parents should take an active role in teaching their children proper cyber security measures.

Most of the time these kids who access the net are not careful enough when giving out personal information online. They don’t realize yet the risks of not having confidential and personal information protected online. From virus, to hackers, to identity thieves, these people are lurking in cyberspace waiting for that opportunity. I can only stress the importance of cyber security for kids.

Now there are several ways where you can help instill to your children the proper ways of accessing, behaving and protecting themselves online. One of the more common venue where your children go on the web is the social network sites where they have online profiles, photos and keep blogs or online journals. Remind your kids that not to accept all those you invite them to be their online friend especially if they don’t know that person.

The problem with these social network sites is that once you add someone as a friend, you can be viewed by friends included in his own network which most of time you don’t even know. These are venues where scrupulous individuals can gain access to your personals.

To monitor their browsing activities or encourage them to ask questions, place your computer in an area of the house where there’s heavy foot traffic. This will make it easy for them to call your attention to their monitor if they want to ask questions or show you something. This also discourages them from visiting lewd and pornographic websites.

These websites are not only inappropriate but are also a repository of malware, spyware and virus applications that can destroy files and even your whole computer system. In this regard, it would be best to use controlling mechanisms like content blockers which prohibits them to access certain websites and also monitoring application so you can take a look later what they actually look for in the net.

It is always good to engage your children in a healthy conversation about the things that did or things they can do online. This way you can teach them proper ways or help develop good habits that will ensure their safety online. You can also teach them the pros and cons of social networking, online file sharing, and even the issues of software piracy and illegal downloads. These are part of increasing their knowledge and understanding about the technology of computers and the net as well as cyber security.

You should always remember that children’s predisposition of being still curious, innocent, and sometimes their desire to be independent can cause them to be careless. That is why ordinary safeguards are not enough when it comes to protection your kids on cyberspace. The previously mentioned cyber security measures for kids are not just an introduction.

You will have to know for a fact your kids computer habits and then learn how you can better protect them.

Also read

Tips for Cyber Identity and Security

Surviving safely in your daily online routine is a bit difficult. If you need some sort of help then visit any one of these sites. I just digged them out from my Google Search! Please rate this article on !

Cyber Security Tips
Cyber Security Tips describe and offer advice about common security issues for non-technical computer users. Sign up to receive these security tips in your ...www.us-cert.gov/cas/tips

Fraud prevention - Microsoft Protect
Security |; Online Safety |; TechNet |; MSDN |; Businesses |; Manage Profile · Contact Us |; Terms of Use |; Trademarks |; Privacy Statement ...www.microsoft.com/protect/fraud/default.aspx

Welcome to Stay Safe Online | STAYSAFEONLINE.org
Since the theme of National Cyber Security Awareness Month is Our Shared Responsibility, using the tips is an easy way to get important security information ...www.staysafeonline.info/

Top Tips | STAYSAFEONLINE.org
Cyber Security Awareness Month ... Here are our Top Tips to keep you safe online. ... Top Cyber Security Practices. Know who you're dealing with online. ...www.staysafeonline.org/top-tips

Also read

Cyber Security Building a Good Habit

Cyber Security Building a Good Habit is the latest article on !

is not at all that difficult. Once you have incorporated it into your system then it is just like riding a bicycle or can be as normal as walking. All you need is to learn how you can make it work well and build a good habit to make cyber security consistent.

By doing this you can have a better chance of keeping your confidential information protected from attacks from virus or similar applications or from hackers. This way you can keep your personal information safe from other persons who would like to access them and use them for personal gain or protect them from applications that can erase or corrupt your files.

Part of building a good habit would be to identify how your information can be accessed and who would be the most likely people who can gain from accessing your confidential files. It’s like identifying the usual suspects in a criminal line-up. I’m not saying that the people you know cannot be trusted but it helps to be extra cautious. You brother might not do something untrustworthy by his friends might and if they have physical access to your computer then your files are at a risk of being hacked.

Lock your computer with a good password. Use combinations of letters and numbers, upper case and lower case, and even use codes. Avoid using the usual birthdays, social security numbers, bank PINs, account numbers, favorite superheroes, favorite food, etc. Use unique passwords and make one up for every system that requires authentication. Do not use the same password in all your confidential files.

To protect your computer from outside hackers, the best thing would be to disconnect your computer from the network when you’re not using it. No anti-virus application or firewall systems provide 100 per cent protection. The best way would be to remove yourself from the network when you’re not using your computer to reduce the risk of being attacked.

When you do go online, make sure that you have your firewall on and your anti-virus application active. Also look into your security settings. Your emails, web browsers and even other applications have specific settings which increase the security allowing them to block attacks from virus, malware and spyware. Study the security settings and select one which permits you to maximize the use of the application but at the same time offer you a good deal of security to keep your files protected.

Also, do not forget about power surges and other technological problems. Even though, the virus and hacker threats are real and sometimes the priority, people also forget that sometimes power surges or breakdown of computer hardware can cause loss of data or have files corrupted and rendered unusable.

To have added protection therefore, it would be wise to install some uninterrupted power supply that protects your from power surges and allows you to back up or shut down your computer properly preventing possible corruption of files and applications.

And speaking of backing up, it would be great if you would regularly back up your files just in case the unthinkable happens. May these be personal files or files you need for work, having a good back up is always a good thing to have.

You see, once you have a system you will develop a good habit in cyber security which can help reduce the risks of losing files or your confidential information being hacked.

Also read


Cyber Security a peep back into history

The concern about cyber security comes into picture with the spread of internet services. Now the problem is very sever and attracts attention from around the world. Here I have a small clipping from Wikipedia that tells about a hacking.
In 1994, over a hundred intrusions were made by unidentified hackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horse viruses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtain classified files, such as air tasking order systems data and furthermore able to penetrate connected networks of National Aeronautics and Space Administration's Goddard Space Flight Centre, Wright-Patterson Air Force Base, some Defense contractors, and other private sector organizations, by posing as a trusted Rome center user.

Cyber Security and Online Shopping

Cyber Security and Online Shopping

With the popularity of online shopping today, the importance of cyber security becomes essential to everyone. Shopping, even in the real world, involves money and where there is money, there go the criminals. And since much shopping is now happening in cyber space, these criminals lost no time in following the money trail targeting online shoppers.

Online shopping became fashionable when people discovered one is free from stress and fatigue caused by crowds and traffic. There is also the convenience of searching whatever it is you want from your home, at your most convenient time, and paying for it without waiting in line. All of these with just a few click of a mouse.

However, the Internet is also a convenient place for cyber criminals as well. They target the online shoppers, fraudulently obtaining information they can use for their own financial gains. These criminals use the three most common ways in attacking the online shoppers.

Unprotected computers
Unprotected computers are easy target for viruses and other malicious codes used by cyber criminals to gain access to the information inside it. On the other end, online vendors have to protect their computers, too, against attackers who may access their customer databases.

Fake sites and email messages
In the virtual online world, a site (or an online store) can be faked by these criminals, with no one the wiser. These fake sites mimic the legitimate ones and inherit the business, at least until they are caught or noticed.

Charities had been misrepresented before, especially during natural disasters or holiday seasons where people pour in donation money and aid. Most often, though, these attackers collect information for their own illegal use.

Cyber safety measures
Maintaining an up-to-date anti-virus program, a firewall and anti-spyware is always the three-pronged first line of defense in cyber security. They protect you against viruses and Trojan horses that may steal or modify your data and make your computer vulnerable. Spyware may also give the attackers access to your data.

Updated browser
Browsers are the gateway between your computer and the Internet. They must be updated first. Also, open the option of automatic updates to your computer so that the operating programs and utilities are up to date.

It is likewise important to check the default settings of your computer and apply the highest level of security. This will preempt the attackers to use default setting of the programs. This applies primarily to browsers, email clients, etc. because these are the connectors to the Internet.

Reputable vendors
This is where care should be taken because cyber criminals are very good at mimicking the sites of legitimate vendors and make it appear genuine. You need to verify their legitimacy before supplying any information. Keep the phone numbers and the physical addresses of these vendors which you can use in case of problems.

Security features and private policies
As always, passwords and other security features add protection, if correctly used. Check the site’s privacy policy before giving out personal or financial information. You have to understand how your information are stored and used.

Encrypted information
Make sure the information you give out are encrypted. To check if it is, see if it includes a URL that begins with "https:" instead of "http:" and a padlock icon. If the padlock is closed, the information is encrypted. Know where the padlock icon is located in your favorite browser because some attackers use fake padlock icons to trick users.

Use your credit card
Credit card charges have laws that limit your liability in case of fraud. This may not be the case for your debit card. Because debit cards draw money directly from your bank account, unauthorized withdrawals could leave you penniless. Needless to say, a record of your purchases should be kept aside. Report immediately any discrepancy.

Shopping online is truly a time-saving, hassle-free, and fun way of buying whatever you want on the Internet. The presence of the ubiquitous cyber criminals stalking at every cyber corner necessitates the need of cyber security as well.

It is everyone’s responsibility.

Cyber Security and Identity Theft is an article

Cyber Security and Identity Theft is an article from PlrArticles!

Today’s biggest cyber security concern is Identity Theft. Cyber thieves use all kinds of methods (hacking, use of spyware for intercepting information, etc.) in stealing personal or financial information from their victims, mostly from the computers.

The latest of these nefarious activities even sports a name: phishing (pronounced like ‘‘fishing”). The thief sends a simple e-mail that looks like it came from a genuine site (mostly from financial institutions as Citibank, eBay, PayPal, Best Buy and others), telling you there is a problem with your account.

They would then ask you to click on a certain link in the e-mail, and you are taken to a site that looks exactly like that of your bank. Here, they will ask you to fill out again your Social Security or credit card numbers, and/or other confidential numbers.

The following are some ways to minimize the risk of your identity being stolen:

Do business with reputable companies
Some attackers may try to trick you by creating web sites that appear to be legitimate.
Don’t visit any site that is using third party links. Open a new browser and type the address yourself if you want to visit a site.

You can also check privacy policies to see how the company in question use and distribute information. Many companies allow customers to request that their information not be shared with other companies.

Maintain a security mindset – always be skeptical of unfamiliar sites and links, suspicious e-mails and IM messages.

Anti-virus software and firewall
As standard practice, use and maintenance of an anti-virus software and firewall will protect your computer from attacks that may steal or modify data in your computer.
Make sure to keep your anti-virus program and firewall up to date.

Fighting identity robbery
As precautionary steps, regularly check your credit reports for strange transactions or transactions you don’t recall, unusual charges on your bills, bills for products and services you don’t have, or worse, unexpected denial of your credit card.

Once the identity robbery has been confirmed, calls to appropriate companies and agencies have to be done immediately. Have your credit card accounts closed right away so future charges will be denied.

Contact the Social Security Administration if your SSS card number has been accessed or the DMV if your driver’s license or car registration papers were stolen. This is to warn these agencies for possible unauthorized use of your personal ID information. Of course, you need to file a criminal report with the local police.

For U.S. citizens, you need to contact the main credit reporting companies (Equifax, Experian, TransUnion) to see if there had been any unexpected or unauthorized activity. Have fraud alerts placed on your credit reports to prevent new accounts from being opened without verification. File a complaint with the FTC and IFCC.

A website, IdentityTheftActionPlan.com, had been created to help citizens prevent, detect, and respond to identity theft and fraud. Within the site is information on how identity theft occurs, the latest prevention tips, what to do in case you are victimized and pertinent information of law enforcement agencies that investigate these crimes. Two other sites to learn more about phishing and ID theft are the following: consumer.gov/idtheft/ and
idtheftcenter.org

Vigilance, information and action
Cyber security dictates that every cyber citizen (those using computers and the Internet in most of their activities) needs to be vigilant at all times.

Everyone is enjoined to keep up with the latest information, so that they can do the appropriate action by themselves.

Cyber Identity and Security

Cyber Identity and Security are two words may be the most hot words around us. In this blog we will talk about Cyber Identity and Cyber Security in detail and discuss the hot subjects around us.