Friday, October 23, 2009

Cyber Identity and Security - Past Blogs

Cyber Identity and Security: Today’s biggest cyber security concern is Identity Theft. Cyber thieves use all kinds of methods like hacking, phishing to robe your money in your online account with financial institutions such as Citibank, eBay, PayPal, Best Buy and others. Go though the last four posts appeared on Cyber Identity and Security

Cyber Security for Kids

Tips for Cyber Identity and Security

Surviving safely in your daily online routine is a bit difficult. If you need some sort of help then visit any one of these sites. I just digged them out from my Google Search! Please rate this article on !

Cyber Security Building a Good Habit

Cyber Security Building a Good Habit is the latest article on ! is not at all that difficult. Once you have incorporated it into your system then it is just like riding a bicycle or can be as normal as walking. All you need is to learn how you can make it work well and build a good habit to make cyber security consistent. By doing this you can have a better chance of keeping your confidential information protected from attacks from virus or similar applications or from hackers. This way you can keep your personal information safe from other persons who would like to access them and use them for personal gain or protect them from applications that can erase or corrupt your files. Part of building a good habit would be to identify how your information can be accessed and who would be the most likely people who can gain from accessing your confidential files. It’s like identifying the usual suspects in a criminal line-up. I’m not saying that the people you know cannot be trusted but it helps to be extra cautious. You brother might not do something untrustworthy by his friends might and if they have physical access to your computer then your files are at a risk of being hacked.

Cyber Security a peep back into history

The concern about cyber security comes into picture with the spread of internet services. Now the problem is very sever and attracts attention from around the world. Here I have a small clipping from Wikipedia that tells about a hacking.
In 1994, over a hundred intrusions were made by unidentified hackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horse viruses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtain classified files, such as air tasking order systems data and furthermore able to penetrate connected networks of National Aeronautics and Space Administration's Goddard Space Flight Centre, Wright-Patterson Air Force Base, some Defense contractors, and other private sector organizations, by posing as a trusted Rome center user.

Cyber Security and Online Shopping

With the popularity of online shopping today, the importance of cyber security becomes essential to everyone. Shopping, even in the real world, involves money and where there is money, there go the criminals. And since much shopping is now happening in cyber space, these criminals lost no time in following the money trail targeting online shoppers. Online shopping became fashionable when people discovered one is free from stress and fatigue caused by crowds and traffic. There is also the convenience of searching whatever it is you want from your home, at your most convenient time, and paying for it without waiting in line. All of these with just a few click of a mouse. However, the Internet is also a convenient place for cyber criminals as well. They target the online shoppers, fraudulently obtaining information they can use for their own financial gains. These criminals use the three most common ways in attacking the online shoppers.

Cyber Security and Identity Theft is an article

Today’s biggest cyber security concern is Identity Theft. Cyber thieves use all kinds of methods (hacking, use of spyware for intercepting information, etc.) in stealing personal or financial information from their victims, mostly from the computers. The latest of these nefarious activities even sports a name: phishing (pronounced like ‘‘fishing”). The thief sends a simple e-mail that looks like it came from a genuine site (mostly from financial institutions as Citibank, eBay, PayPal, Best Buy and others), telling you there is a problem with your account. They would then ask you to click on a certain link in the e-mail, and you are taken to a site that looks exactly like that of your bank. Here, they will ask you to fill out again your Social Security or credit card numbers, and/or other confidential numbers. The following are some ways to minimize the risk of your identity being stolen:

No comments:

Post a Comment