Saturday, May 2, 2015

Preventing and Responding to Identity Theft

According www.us-cert.gov/ncas/tips/ST05-019, you can be a victim of identity theft even if you never use a computer. Malicious people may be able to obtain personal information (such as credit card numbers, phone numbers, account numbers, and addresses) by stealing your wallet, overhearing a phone conversation, rummaging through your trash (a practice known as dumpster diving), or picking up a receipt at a restaurant that has your account number on it. If a thief has enough information, he or she may be able to impersonate you to purchase items, open new accounts, or apply for loans.
The internet has made it easier for thieves to obtain personal and financial data. Most companies and other institutions store information about their clients in databases; if a thief can access that database, he or she can obtain information about many people at once rather than focus on one person at a time. The internet has also made it easier for thieves to sell or trade the information, making it more difficult for law enforcement to identify and apprehend the criminals.

How are victims of online identity theft chosen?
Identity theft is usually a crime of opportunity, so you may be victimized simply because your information is available. Thieves may target customers of certain companies for a variety of reasons; for example, a company database is easily accessible, the demographics of the customers are appealing, or there is a market for specific information. If your information is stored in a database that is compromised, you may become a victim of identity theft.

These are few ways to minimize your risk:

Always do businesses with reputable companies:  before providing any personal or financial information, make sure that you are interacting with a reputable, established company. Some attackers may try to trick you by creating malicious web sites that appear to be legitimate, so you should verify the legitimacy before supplying any information

Take advantage of security features - Passwords and other security features add layers of protection if used appropriately.

Check privacy policies: Take precautions when providing information, and make sure to check published privacy policies to see how a company will use or distribute your information. Many companies allow customers to request that their information not be shared with other companies; you should be able to locate the details in your account literature or by contacting the company directly.

Be careful what information you publicize: attackers may be able to piece together information from a variety of sources. Avoid posting personal data in public forums.

Use and maintain anti-virus software and a firewall: protect yourself against viruses and Trojan horses that may steal or modify the data on your own computer and leave you vulnerable by using anti-virus software and a firewall Make sure to keep your virus definitions up to date.
Be aware of your account activity: pay attention to your statements, and check your credit report yearly. You are entitled to a free copy of your credit report from each of the main credit reporting companies once every twelve months.

Note:
Individuals, be very careful in the way you intend to disposed your personal information and dropping your personal data. There might be dumpster divers in places just waiting for the opportunity to arrive.

Use the hints that are given above to help protect your data and be safe from identity theft.


Undertsanding fake Virus

What is Fake Virus?
Fake virus is malicious software designed to steal information from unsuspecting users by legitimate security software. The malware makes numerous system modifications making it extremely difficult to terminate unauthorized activities and remove the program. It also causes realistic, interactive security warnings to be displayed to the computer user.

How can computer become infected with fake antivirus?
Criminals distribute this type of malware using search engines, emails, social networking sites, internet advertisements and other malware.

How users will know their computer gets infected:
The presence of pop-ups displaying unusual security warnings and asking for credit card or personal information is the most obvious method of identifying a fake antivirus infection.

Steps to protect yourself
•           Be cautious when visiting web links or opening attachments from unknown    senders.
•           Keep software patched and updated.
•           To purchase or renew software subscriptions, visit the vendor sites directly.
•           Monitor your credit cards for unauthorized activity.