Monday, October 26, 2009

Identity Theft in Indian online community

We have identified Identity theft as the new threat faced by online business houses. Let us see how this threat affects Indian BPO. The statistics shows that this trouble is about to grip Indian online market. As the proportional quantity of online transactions are much lesser the problem is not poised much public attention now. But I am sure that it is going to get into news paper titles.
Please read this one article Identity Theft & 'PHISHING" within Indian BPO Employees

Also read

Federal Trade Commission’s Identity Theft Site

We have seen many posts on Cyber Identity theft and Cyber Crime. Here we will discuss some sites that help us from such Cyber Thefts. I would like to invite your attention towards Federal Trade Commission’s Identity Theft Site. Federal Trade Commission’s Identity Theft Site is a one-stop national resource to learn about Cyber identity theft. This site provides detailed information to deter, detect, and defend Cyber Identity theft. Federal Trade Commission’s Identity Theft Site consumers can learn how to avoid iCyber Identity theft – and learn what to do if their identity is stolen. Businesses can learn how to help their customers deal with identity theft, as well as how to prevent problems in the first place. Law enforcement can get resources and learn how to help victims of identity theft. Here are some interesting publications by this site. Please visit http://www.ftc.gov/bcp/edu/microsites/idtheft/index.html for more details.

Federal Trade Commission’s Identity Theft Site Publications

1. Fighting Fraud with the Red Flags Rule: A How-to Guide for Business (PDF 22MB)
2. Seeing Through Stimulus Scams (PDF 126KB)

3. How To Plan and Host Protect Your Identity Days Kit (PDF 6MB)

4. To Buy or Not To Buy: Identity Theft Spawns New Products and Services To Help Minimize Risk (PDF 229KB)

5. Take Charge: Fighting Back Against Identity Theft
(PDF 4.9MB)

6. Information Compromise and the Risk of Identity Theft: Guidance for Your Business
(PDF 152KB)

7. Protecting Personal Information: A Guide for Business (PDF 3.47MB)

Sunday, October 25, 2009

A Product That Is Too Good To Be True... Except It Is True

Today any body can start an online business. Stay-At-Home-Moms, Local asphalt-sealer Site Build It!grows into a Netpreneur who sells asphalt-sealing kits globally, Corporate executive, eBay slaves, Husband-and-wife, Teen, college student,
Photographer, Uber-geek, Corporate cubicle worker , Savvy Network Marketers or any body can start the online business with ease, there are many opportunities available and it is very simple to make your online presence. Online website designers like Site Build It! ("SBI!") can make a whole business for you. This is very good for newbies who are afraid of Cyber Identity theft and Cyber Fraud. You will get the whole expertise from firms like Site Build It! ("SBI!") to build your business.

Also read


Cyber Identity and Security - Wikipedia Narration

In this blog let us see what our favourite enciclopedia wiki talks about Cyber Identity theft. Cyber Identity theft is a term used to refer to fraud that involves someone pretending to be someone else in order to steal money or get other benefits. The term dates to 1964 and is actually a misnomer, since it is not inherently possible to steal an identity, only to use it. The person whose identity is used can suffer various consequences when he or she is held responsible for the perpetrator's actions. Cyber Identity theft is somewhat different from cyber identity fraud. However, the terms are often used interchangeably. Identity fraud is the result of cyber identity theft. Someone can steal or appropriate someone’s identifying information without actually committing identity fraud. The best example of this is when a data breach occurs. There has been very little evidence to link ID fraud to data breaches.
Now go directly to http://en.wikipedia.org/wiki/Identity_theft and learn more!

Also read:

Protect Yourself from Cyber Identity Theft

To Protect Yourself from Cyber Identity theft you must know What Is Online Identity Theft? Using Information on the Internet for Identity Theft and for online transaction, take a moment to review a Web site's privacy policy. Read more about t is Cyber Identity Theft at http://www.webopedia.com/didyouknow/Internet/2006/identity_theft.asp
Cyber Identity Theft is a Cyber Crime is an act of criminals impersonate individuals for financial gain. If a Cyber thief is able to access your secret information such as social security numbers, a signature, name, address, phone numbers, and even banking and credit card information, he or she can use it to commit fraud in your name. Using this confidential information the Cyber thief could apply for loans or new credit card accounts.
Cyber Identity theft can also go beyond this type of a monetary impact. Thieves can use your information to obtain a driver's license or other documentation that would display their photo but your name and information. With these documents thieves could to obtain a job and file fraudulent income tax returns, apply for travel documents, file insurance claims, or even provide your name and mailing address to police and other authorities if involved in other criminal activities.
Learn the terms like
Security: In the computer industry, refers to techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorization.
Cyber forensics: The application of scientifically proven methods and to use digital evidence to provide a conclusive description of Cyber Crime activities.
Phishing: The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for Cyber Identity theft.
E-mail spoofing: Forging an e-mail header to make it appear as if it came from somewhere or someone other than the actual source.

Saturday, October 24, 2009

Cyber Security Regulations

Cyber Security Regulations is also from the Plr articles free articles.

Cyber Security is meant to protect personal and work-related data and information stored in our computer and personal websites. With the increase of individuals, organizations, and members of the community falling prey to cyber crimes and security attacks, there is an increase in demands for more measures to be taken.

Alarmingly, the number of people getting affected Cyber Security attacks is increasing. According to a research by Panda Software in 2006, 1 out of 5 e-mail messages that corporate servers receive are spam and 1 out of 20 is infected with malware. Consumer Reports released a report in 2006 showing that United States consumers would spend $7.8 billion over the last two years for computer repairs and replacements because security attacks like malware and viruses.

Security attacks like these do not only costs an individual repairs, businesses, organizations and the national economy could suffer losses. In 2005, Cyber Crime led to a loss of whopping $130.1 million, all because of viruses, unauthorized access to computer systems and personal and financial information theft.

There are numerous measures that should be taken by the government to help resolve cyber crimes and attacks. In the United States, there are different legislations in the executive and Congress level that are meant to protect computer systems and other medium of information technology. This is called cyber-security regulations.

Cyber –security regulations is to make sure that companies and private institutions would be using or protecting their systems from any cyber attacks like viruses, worms, phishing, denial of service and unauthorized access.

The United States Chamber of Commerce said that there are about 64 % of small businesses that are getting protection for their systems to protect their customer’s financial information. While there are about 72 % of businesses expressed concern about security of the company’s assets and information.

In the United States, there are cyber-security regulations, for both federal and estate governments. For federal government cyber security regulations, they focus mainly on specific industries and fields, health care, organizations, financial institutions and agencies that work with systems and information. Unfortunately, this regulation do not reach and cover computer related industries like Internet Service Providers (ISP).

Additional to this, the federal government is also trying to resolve issues of cyber security breach by allocating more funds in research and programs directed to research better solutions and recommendations for improving cyber security. The government is collaborating with members of the private sector.

Meanwhile, states are forming their own methods of dealing with security attacks. An example is the regulation passed by the California State in 2003 called Notice of Security Breach Act. Different states have followed the example of California and created their own anti-breach regulations and standard procedure.

There has been an ongoing debate about cyber security regulation. There are people who comments that creating a regulation is not the answer and not enough, what is needed is better defenses against hackers, viruses and similar threats. The regulation is said to restrict industries to develop programs and software that would boost cyber security. Aside form this, businesses also fears that having the regulation will cut back their healthy profits since they would meet more limitations and would cost them more.

But in spite of regulations and software that could protect your computer and systems, still the best way to boost Cyber Security is preventing any attacks from happening in the first place. There are easy tips that could be followed to avoid Cyber Security attacks from happening.

Friday, October 23, 2009

Cyber Identity theft - More Books

Cyber Crime has moved yet another step forward in its unyielding progression through society. Now it is Cyber Identity theft. Trying to combat both legal and illegal Cyber Identity theft continues to occupy a large portion of the average citizen's life.
Before you become a victim of Cyber Crime for those decided cyber thieves, read books like Cyber Identity theft. Identity theft By Claudia L. Hayward is a 157 page listed in Google Books under Political Science Category. You van have a limited preview at
http://books.google.co.in/books?id=K-veh5H0ggcC&printsec=frontcover&source=gbs_v2_summary_r&cad=0
Cyber Identity theft or identity fraud generally involves 'stealing' another person's personal identifying information -- such as Social Security number (SSN), date of birth, and mother's maiden name -- and then using the information to fraudulently establish credit, run up debt, or take over existing financial accounts. This new book examines the extent of Cyber Identity theft, its costs and remedies under the law.

Also read

From Victim to Victor: A Step By Step Guide for Ending the Nightmare of Identity Theft

From Victim to Victor: A Step By Step Guide for Ending the Nightmare of Identity Theft

From Victim to Victor: A Step By Step Guide for Ending the Nightmare of Identity Theft - A book review
It has been estimated that more than 100,000 people in the UK are affected by Cyber Identity theft year. Cyber Identity theft is also the fastest growing crime in America and according to a Federal Trade Commission; 9.9 million victims were reported last year. Yes the issue of identity theft is in a rising in India also. We have several cases reported from every corner of this country. As the popularity and use of internet based services increases the dimensions of Cyber Identity theft also increases.
2nd Edition of from Victim to Victor: A Step By Step Guide for Ending the Nightmare of Identity Theft by Mari Frank is an interesting bit to read. The book and CD are fact filled with crucial information showing you the actions and precautions you need to take to minimize your risk of cyber identity theft. A Step By Step Guide for Ending the Nightmare of Identity Theft by Porpoise Press, Inc. 2005, comes with CD has 176 pages plus CD and it is priced at $39.95.
the publishers claim that this book will empower you with todays major skills that is required to survive online. Victim to Victor: A Step By Step Guide for Ending the Nightmare of Identity Theft empowers you with
1. Easy to follow critical steps to protect your identity and regain it if stolen
2. Simple to understand legal explanations of your rights.
3. Attorney composed, pre-formatted letters (on CD) to write to protect and exert your rights without having to hire a lawyer.
4. Success techniques to handle all issues to protect your privacy and good name.

Read more at http://www.identitytheft.org/v2v.htm and handle Cyber Identity theft effectively.

Also read

Cyber Identity theft in India

It has been estimated that more than 100,000 people in the UK are affected by iCyber Identity theft every year. Cyber Identity theft is also the fastest growing crime in America and according to a Federal Trade Commission; 9.9 million victims were reported last year. Yes the issue of identity theft is in a rising in India also. We have several cases reported from every corner of this country. As the popularity and use of internet based services increases the dimensions of identity theft also increases.
Cyber Crime Investigation Cell, Mumbai describe identity theft in their website. They have listed a few examples of Cyber Identity thefts and Cyber Crime like “ Apply for a credit card in the victim’s name”, “Open a bank or building society account in the victim’s name”,“Apply for other financial services in the victim’s name” ..
For more details Please read the article What is Identity Theft?

Also read


Cyber Security Tips at US-CERT

US-CERT, United States Computer Emergency Readiness Team, the operational arm of the National Cyber Security Division (NCSD) at the Department of Homeland Security (DHS), is a public-private partnership. US-CERT located in the Washington DC Metropolitan area is charged with providing response support and defence against cyber attacks for the Federal Civil Executive Branch and information sharing and collaboration with state and local government, industry and international partners. US-CERT interacts with federal agencies, industry, the research community, state and local governments, and others to disseminate reasoned and actionable cyber security information to the public. Information is available from the US-CERT web site, mailing lists, and RSS channels. US-CERT, United States Computer Emergency Readiness Team, including implementation of the National Strategy to Secure Cyberspace also provides a way for citizens, businesses, and other institutions to communicate and coordinate directly with the United States government about cyber security.
US-CERT, United States Computer Emergency Readiness Team, provide you General and in depth information on General security, Attacks and threats, Email and communication, Mobile devices, Privacy, Safe browsing and Software and applications. The topics covered are like

1. Why is Cyber Security a Problem?
2. Guidelines for Publishing Information Online
3. Understanding Internet Service Providers (ISPs)
4. Choosing and Protecting Passwords
5. Understanding Anti-Virus Software
6. Understanding Firewalls
7. Coordinating Virus and Spyware Defense
8. Debunking Some Common Myths
9. Good Security Habits
10. Safeguarding Your Data
11. Real-World Warnings Keep You Safe Online
12. Keeping Children Safe Online
13. Dealing with Cyberbullies
14. Understanding Hidden Threats: Corrupted Software Files
15. Understanding Hidden Threats: Rootkits and Botnets
16. Preventing and Responding to Identity Theft
17. Recovering from Viruses, Worms, and Trojan Horses
18. Recognizing and Avoiding Spyware
19. Avoiding Social Engineering and Phishing Attacks
20. Understanding Denial-of-Service Attacks
21. Identifying Hoaxes and Urban Legends
22. Avoiding the Pitfalls of Online Trading
23. Understanding Your Computer: Email Clients
24. Using Caution with Email Attachments
25. Reducing Spam
26. Benefits and Risks of Free Email Services
27. Benefits of Blind Carbon Copy (BCC)
28. Understanding Digital Signatures
29. Using Instant Messaging and Chat Rooms Safely
30. Staying Safe on Social Network Sites
31. Protecting Portable Devices: Physical Security
32. Protecting Portable Devices: Data Security
33. Using Caution with USB Drives
34. Securing Wireless Networks
35. Cybersecurity for Electronic Devices
36. Defending Cell Phones and PDAs Against Attack
37. How Anonymous Are You?
38. Protecting Your Privacy
39. Understanding Encryption
40. Effectively Erasing Files
41. Supplementing Passwords
42. Understanding Your Computer: Web Browsers
43. Evaluating Your Web Browser's Security Settings
44. Shopping Safely Online
45. Browsing Safely: Understanding Active Content and Cookies
46. Understanding Web Site Certificates
47. Understanding Internationalized Domain Names
48. Understanding Bluetooth Technology
49. Avoiding Copyright Infringement
50. Understanding Patches
51. Understanding Voice over Internet Protocol (VoIP)
52. Risks of File-Sharing Technology
53. Reviewing End-User License Agreements
54. Understanding Your Computer: Operating Systems

Learn more about US-CERT at United States Computer Emergency Readiness Team

Cyber Security: Password Protected

Cyber Security is a burning issue and that is to be addressed effectively. Password Protected sites are used in abundance in these days. Let us have a look into password protection techniques.
You turn on your computer and you’re prompt with a username and password. The same thing happens when you open your email account. I know it is quite obvious to you right now but allow me to stress the importance of cyber security by having password protected files, networks, and software applications. It is important to protect your personal information. Sure, it seems unimportant if people hacked into your email account.
You have a bunch of personal emails from friends and occasionally send some your self but the whole lot of your mails in your inbox are spam and other promotional garbage, so why do you have to care that much. But the thing is, those who are able to gain access to your email accounts are often not truly satisfied with that level of attach and are in reality just preparing for a much bigger intrusion.
Before you know it, they can get information about your social security number of even bank accounts. Your personal emails contain heaps of information which can be used by hackers for their own personal gain.
Having a good password installed is therefore a good deterrent for hackers or attackers. It ensures that proper authentication is verified first before you gain access to personal information. It is therefore important that you make up a good password. A poorly made one will just be ineffective and totally useless against hackers.
For instance, using part of your name as a password would be just too easy to crack. It will not be a deterrent at all. To add to this, there are applications like virus and worms that can actually penetrate a secure or confidential system just because it has a weak password installed.
Example of weak passwords, aside from a derivative from your name, would be using numbers that coincides with birthdays, phone numbers, addresses and information about your family or stuff. Sure, these are easy to remember but that thinking will also cause you problems later on. These kinds of numeric passwords are just easy to solve. The same thing goes with dictionary based passwords which are those words that you picked up from a dictionary.
Now in making up your password, it would be a lot better if you use combinations of letter, numbers and other techniques. You could intentionally misspell the words so you won’t fall for dictionary attackers. You can add numbers and a combination of upper and lower cases. Or you could assign a code.
You can abbreviate something that if you love “watching soap shows on TV” you can take the first letters of the word “WsSoT” and combine it with a relevant numbers. Not only would the acronym easy to remember but it would be difficult for hackers to crack. However, avoid using famous quotes, catch phrases, lyrics, poem and even pick up lines. Go for something you invented.
Also, remember that having a longer password is better. The more characters you have the harder it is to guess or the more difficult to decipher the combinations. Also, don’t use the same password twice for your other accounts. Although this is quite tempting since you don’t have to create a new one and remember it every time, when an attacker does get a password from one of your accounts, the first thing he will do is to try the same password for all your other accounts.
Cyber security begins with you. Keeping your personal information safe lies first on password protected access to your files, systems and networks. Having a right and strong password will help fight off attackers.

Also read

Cyber Identity and Security - Past Blogs

Cyber Identity and Security: Today’s biggest cyber security concern is Identity Theft. Cyber thieves use all kinds of methods like hacking, phishing to robe your money in your online account with financial institutions such as Citibank, eBay, PayPal, Best Buy and others. Go though the last four posts appeared on Cyber Identity and Security

Cyber Security for Kids

Tips for Cyber Identity and Security

Surviving safely in your daily online routine is a bit difficult. If you need some sort of help then visit any one of these sites. I just digged them out from my Google Search! Please rate this article on !

Cyber Security Building a Good Habit

Cyber Security Building a Good Habit is the latest article on ! is not at all that difficult. Once you have incorporated it into your system then it is just like riding a bicycle or can be as normal as walking. All you need is to learn how you can make it work well and build a good habit to make cyber security consistent. By doing this you can have a better chance of keeping your confidential information protected from attacks from virus or similar applications or from hackers. This way you can keep your personal information safe from other persons who would like to access them and use them for personal gain or protect them from applications that can erase or corrupt your files. Part of building a good habit would be to identify how your information can be accessed and who would be the most likely people who can gain from accessing your confidential files. It’s like identifying the usual suspects in a criminal line-up. I’m not saying that the people you know cannot be trusted but it helps to be extra cautious. You brother might not do something untrustworthy by his friends might and if they have physical access to your computer then your files are at a risk of being hacked.

Cyber Security a peep back into history

The concern about cyber security comes into picture with the spread of internet services. Now the problem is very sever and attracts attention from around the world. Here I have a small clipping from Wikipedia that tells about a hacking.
In 1994, over a hundred intrusions were made by unidentified hackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horse viruses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtain classified files, such as air tasking order systems data and furthermore able to penetrate connected networks of National Aeronautics and Space Administration's Goddard Space Flight Centre, Wright-Patterson Air Force Base, some Defense contractors, and other private sector organizations, by posing as a trusted Rome center user.

Cyber Security and Online Shopping

With the popularity of online shopping today, the importance of cyber security becomes essential to everyone. Shopping, even in the real world, involves money and where there is money, there go the criminals. And since much shopping is now happening in cyber space, these criminals lost no time in following the money trail targeting online shoppers. Online shopping became fashionable when people discovered one is free from stress and fatigue caused by crowds and traffic. There is also the convenience of searching whatever it is you want from your home, at your most convenient time, and paying for it without waiting in line. All of these with just a few click of a mouse. However, the Internet is also a convenient place for cyber criminals as well. They target the online shoppers, fraudulently obtaining information they can use for their own financial gains. These criminals use the three most common ways in attacking the online shoppers.

Cyber Security and Identity Theft is an article

Today’s biggest cyber security concern is Identity Theft. Cyber thieves use all kinds of methods (hacking, use of spyware for intercepting information, etc.) in stealing personal or financial information from their victims, mostly from the computers. The latest of these nefarious activities even sports a name: phishing (pronounced like ‘‘fishing”). The thief sends a simple e-mail that looks like it came from a genuine site (mostly from financial institutions as Citibank, eBay, PayPal, Best Buy and others), telling you there is a problem with your account. They would then ask you to click on a certain link in the e-mail, and you are taken to a site that looks exactly like that of your bank. Here, they will ask you to fill out again your Social Security or credit card numbers, and/or other confidential numbers. The following are some ways to minimize the risk of your identity being stolen:

Thursday, October 22, 2009

Cyber Security for Kids

I have added this article on Cyber Security for Kids on my blog to bring your kind attention towards todays burning problem.

If you think your kids now just need to be protected from strangers offering them candy or from cars while crossing the streets, then you have another thing coming. Your children need a whole new level of protection especially in this age of computers and the internet. More and more kids are having easier access to the internet. According to some studies, more than 80% of teenagers in the US have access to the internet at home. The parents should take an active role in teaching their children proper cyber security measures.

Most of the time these kids who access the net are not careful enough when giving out personal information online. They don’t realize yet the risks of not having confidential and personal information protected online. From virus, to hackers, to identity thieves, these people are lurking in cyberspace waiting for that opportunity. I can only stress the importance of cyber security for kids.

Now there are several ways where you can help instill to your children the proper ways of accessing, behaving and protecting themselves online. One of the more common venue where your children go on the web is the social network sites where they have online profiles, photos and keep blogs or online journals. Remind your kids that not to accept all those you invite them to be their online friend especially if they don’t know that person.

The problem with these social network sites is that once you add someone as a friend, you can be viewed by friends included in his own network which most of time you don’t even know. These are venues where scrupulous individuals can gain access to your personals.

To monitor their browsing activities or encourage them to ask questions, place your computer in an area of the house where there’s heavy foot traffic. This will make it easy for them to call your attention to their monitor if they want to ask questions or show you something. This also discourages them from visiting lewd and pornographic websites.

These websites are not only inappropriate but are also a repository of malware, spyware and virus applications that can destroy files and even your whole computer system. In this regard, it would be best to use controlling mechanisms like content blockers which prohibits them to access certain websites and also monitoring application so you can take a look later what they actually look for in the net.

It is always good to engage your children in a healthy conversation about the things that did or things they can do online. This way you can teach them proper ways or help develop good habits that will ensure their safety online. You can also teach them the pros and cons of social networking, online file sharing, and even the issues of software piracy and illegal downloads. These are part of increasing their knowledge and understanding about the technology of computers and the net as well as cyber security.

You should always remember that children’s predisposition of being still curious, innocent, and sometimes their desire to be independent can cause them to be careless. That is why ordinary safeguards are not enough when it comes to protection your kids on cyberspace. The previously mentioned cyber security measures for kids are not just an introduction.

You will have to know for a fact your kids computer habits and then learn how you can better protect them.

Also read

Tips for Cyber Identity and Security

Surviving safely in your daily online routine is a bit difficult. If you need some sort of help then visit any one of these sites. I just digged them out from my Google Search! Please rate this article on !

Cyber Security Tips
Cyber Security Tips describe and offer advice about common security issues for non-technical computer users. Sign up to receive these security tips in your ...www.us-cert.gov/cas/tips

Fraud prevention - Microsoft Protect
Security |; Online Safety |; TechNet |; MSDN |; Businesses |; Manage Profile · Contact Us |; Terms of Use |; Trademarks |; Privacy Statement ...www.microsoft.com/protect/fraud/default.aspx

Welcome to Stay Safe Online | STAYSAFEONLINE.org
Since the theme of National Cyber Security Awareness Month is Our Shared Responsibility, using the tips is an easy way to get important security information ...www.staysafeonline.info/

Top Tips | STAYSAFEONLINE.org
Cyber Security Awareness Month ... Here are our Top Tips to keep you safe online. ... Top Cyber Security Practices. Know who you're dealing with online. ...www.staysafeonline.org/top-tips

Also read

Cyber Security Building a Good Habit

Cyber Security Building a Good Habit is the latest article on !

is not at all that difficult. Once you have incorporated it into your system then it is just like riding a bicycle or can be as normal as walking. All you need is to learn how you can make it work well and build a good habit to make cyber security consistent.

By doing this you can have a better chance of keeping your confidential information protected from attacks from virus or similar applications or from hackers. This way you can keep your personal information safe from other persons who would like to access them and use them for personal gain or protect them from applications that can erase or corrupt your files.

Part of building a good habit would be to identify how your information can be accessed and who would be the most likely people who can gain from accessing your confidential files. It’s like identifying the usual suspects in a criminal line-up. I’m not saying that the people you know cannot be trusted but it helps to be extra cautious. You brother might not do something untrustworthy by his friends might and if they have physical access to your computer then your files are at a risk of being hacked.

Lock your computer with a good password. Use combinations of letters and numbers, upper case and lower case, and even use codes. Avoid using the usual birthdays, social security numbers, bank PINs, account numbers, favorite superheroes, favorite food, etc. Use unique passwords and make one up for every system that requires authentication. Do not use the same password in all your confidential files.

To protect your computer from outside hackers, the best thing would be to disconnect your computer from the network when you’re not using it. No anti-virus application or firewall systems provide 100 per cent protection. The best way would be to remove yourself from the network when you’re not using your computer to reduce the risk of being attacked.

When you do go online, make sure that you have your firewall on and your anti-virus application active. Also look into your security settings. Your emails, web browsers and even other applications have specific settings which increase the security allowing them to block attacks from virus, malware and spyware. Study the security settings and select one which permits you to maximize the use of the application but at the same time offer you a good deal of security to keep your files protected.

Also, do not forget about power surges and other technological problems. Even though, the virus and hacker threats are real and sometimes the priority, people also forget that sometimes power surges or breakdown of computer hardware can cause loss of data or have files corrupted and rendered unusable.

To have added protection therefore, it would be wise to install some uninterrupted power supply that protects your from power surges and allows you to back up or shut down your computer properly preventing possible corruption of files and applications.

And speaking of backing up, it would be great if you would regularly back up your files just in case the unthinkable happens. May these be personal files or files you need for work, having a good back up is always a good thing to have.

You see, once you have a system you will develop a good habit in cyber security which can help reduce the risks of losing files or your confidential information being hacked.

Also read


Cyber Security a peep back into history

The concern about cyber security comes into picture with the spread of internet services. Now the problem is very sever and attracts attention from around the world. Here I have a small clipping from Wikipedia that tells about a hacking.
In 1994, over a hundred intrusions were made by unidentified hackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horse viruses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtain classified files, such as air tasking order systems data and furthermore able to penetrate connected networks of National Aeronautics and Space Administration's Goddard Space Flight Centre, Wright-Patterson Air Force Base, some Defense contractors, and other private sector organizations, by posing as a trusted Rome center user.

Cyber Security and Online Shopping

Cyber Security and Online Shopping

With the popularity of online shopping today, the importance of cyber security becomes essential to everyone. Shopping, even in the real world, involves money and where there is money, there go the criminals. And since much shopping is now happening in cyber space, these criminals lost no time in following the money trail targeting online shoppers.

Online shopping became fashionable when people discovered one is free from stress and fatigue caused by crowds and traffic. There is also the convenience of searching whatever it is you want from your home, at your most convenient time, and paying for it without waiting in line. All of these with just a few click of a mouse.

However, the Internet is also a convenient place for cyber criminals as well. They target the online shoppers, fraudulently obtaining information they can use for their own financial gains. These criminals use the three most common ways in attacking the online shoppers.

Unprotected computers
Unprotected computers are easy target for viruses and other malicious codes used by cyber criminals to gain access to the information inside it. On the other end, online vendors have to protect their computers, too, against attackers who may access their customer databases.

Fake sites and email messages
In the virtual online world, a site (or an online store) can be faked by these criminals, with no one the wiser. These fake sites mimic the legitimate ones and inherit the business, at least until they are caught or noticed.

Charities had been misrepresented before, especially during natural disasters or holiday seasons where people pour in donation money and aid. Most often, though, these attackers collect information for their own illegal use.

Cyber safety measures
Maintaining an up-to-date anti-virus program, a firewall and anti-spyware is always the three-pronged first line of defense in cyber security. They protect you against viruses and Trojan horses that may steal or modify your data and make your computer vulnerable. Spyware may also give the attackers access to your data.

Updated browser
Browsers are the gateway between your computer and the Internet. They must be updated first. Also, open the option of automatic updates to your computer so that the operating programs and utilities are up to date.

It is likewise important to check the default settings of your computer and apply the highest level of security. This will preempt the attackers to use default setting of the programs. This applies primarily to browsers, email clients, etc. because these are the connectors to the Internet.

Reputable vendors
This is where care should be taken because cyber criminals are very good at mimicking the sites of legitimate vendors and make it appear genuine. You need to verify their legitimacy before supplying any information. Keep the phone numbers and the physical addresses of these vendors which you can use in case of problems.

Security features and private policies
As always, passwords and other security features add protection, if correctly used. Check the site’s privacy policy before giving out personal or financial information. You have to understand how your information are stored and used.

Encrypted information
Make sure the information you give out are encrypted. To check if it is, see if it includes a URL that begins with "https:" instead of "http:" and a padlock icon. If the padlock is closed, the information is encrypted. Know where the padlock icon is located in your favorite browser because some attackers use fake padlock icons to trick users.

Use your credit card
Credit card charges have laws that limit your liability in case of fraud. This may not be the case for your debit card. Because debit cards draw money directly from your bank account, unauthorized withdrawals could leave you penniless. Needless to say, a record of your purchases should be kept aside. Report immediately any discrepancy.

Shopping online is truly a time-saving, hassle-free, and fun way of buying whatever you want on the Internet. The presence of the ubiquitous cyber criminals stalking at every cyber corner necessitates the need of cyber security as well.

It is everyone’s responsibility.

Cyber Security and Identity Theft is an article

Cyber Security and Identity Theft is an article from PlrArticles!

Today’s biggest cyber security concern is Identity Theft. Cyber thieves use all kinds of methods (hacking, use of spyware for intercepting information, etc.) in stealing personal or financial information from their victims, mostly from the computers.

The latest of these nefarious activities even sports a name: phishing (pronounced like ‘‘fishing”). The thief sends a simple e-mail that looks like it came from a genuine site (mostly from financial institutions as Citibank, eBay, PayPal, Best Buy and others), telling you there is a problem with your account.

They would then ask you to click on a certain link in the e-mail, and you are taken to a site that looks exactly like that of your bank. Here, they will ask you to fill out again your Social Security or credit card numbers, and/or other confidential numbers.

The following are some ways to minimize the risk of your identity being stolen:

Do business with reputable companies
Some attackers may try to trick you by creating web sites that appear to be legitimate.
Don’t visit any site that is using third party links. Open a new browser and type the address yourself if you want to visit a site.

You can also check privacy policies to see how the company in question use and distribute information. Many companies allow customers to request that their information not be shared with other companies.

Maintain a security mindset – always be skeptical of unfamiliar sites and links, suspicious e-mails and IM messages.

Anti-virus software and firewall
As standard practice, use and maintenance of an anti-virus software and firewall will protect your computer from attacks that may steal or modify data in your computer.
Make sure to keep your anti-virus program and firewall up to date.

Fighting identity robbery
As precautionary steps, regularly check your credit reports for strange transactions or transactions you don’t recall, unusual charges on your bills, bills for products and services you don’t have, or worse, unexpected denial of your credit card.

Once the identity robbery has been confirmed, calls to appropriate companies and agencies have to be done immediately. Have your credit card accounts closed right away so future charges will be denied.

Contact the Social Security Administration if your SSS card number has been accessed or the DMV if your driver’s license or car registration papers were stolen. This is to warn these agencies for possible unauthorized use of your personal ID information. Of course, you need to file a criminal report with the local police.

For U.S. citizens, you need to contact the main credit reporting companies (Equifax, Experian, TransUnion) to see if there had been any unexpected or unauthorized activity. Have fraud alerts placed on your credit reports to prevent new accounts from being opened without verification. File a complaint with the FTC and IFCC.

A website, IdentityTheftActionPlan.com, had been created to help citizens prevent, detect, and respond to identity theft and fraud. Within the site is information on how identity theft occurs, the latest prevention tips, what to do in case you are victimized and pertinent information of law enforcement agencies that investigate these crimes. Two other sites to learn more about phishing and ID theft are the following: consumer.gov/idtheft/ and
idtheftcenter.org

Vigilance, information and action
Cyber security dictates that every cyber citizen (those using computers and the Internet in most of their activities) needs to be vigilant at all times.

Everyone is enjoined to keep up with the latest information, so that they can do the appropriate action by themselves.

Cyber Identity and Security

Cyber Identity and Security are two words may be the most hot words around us. In this blog we will talk about Cyber Identity and Cyber Security in detail and discuss the hot subjects around us.