Security Information |
How Can Someone Get Private Information From My Computer?
From the "Ask Booster" column in the June 17, 2005 issue of Booster's Auction News, a free ezine for online auction sellers and enthusiasts. Dear Booster, How can someone get private information from my computer? Thank you, Evan S. Dear Evan, Hackers can get your private information from your computer in a number of ways. Here are the top ways they do it: * Computer viruses, spyware and adware from e-mails you've received and/or websites you've visited. * Hacker programs that find unprotected IP addresses are subject to attack. An IP address is a series of several numbers (ex. 65.129.37.84) that identifies your location on the internet. It's like your "internet" telephone number. * Entering your financial information (i.e., credit card info) into a website that does not offer secure order processing. Your internet browser should show you that you've entered a secure site. * Having your financial information "intercepted" by a hacker while shopping online at a legitimate website. This is called "pharming" and is becoming a more worrisome threat. * You downloaded software from that contained a malicious program. * You fall victim to a "phishing" or "spoof" scam, whereby you GIVE your personal information away. * Phishing and spoof e-mails appear as if they are coming from a legitimate website. The e-mail generally alarms the recipient with a message such as "your account has been suspended" or telling you that you need to "verify your account." Most eBay and PayPal users have received at least one (if not several more) spoof e-mails appearing to come from either eBay or PayPal. eBay has information showing you how to spot spoof. I highly recommend your take a few moments and visit http://pages.ebay.com/education/spooftutorial/index.html for this brief tutorial. * Another growing threat is called "malware" which is a spyware. Malware is a malicious software which logs your keystrokes and forwards the information to a hacker. This type of software can come through viruses and is often included in downloaded applications. Knowing how to protect yourself can greatly reduce your risk of identity theft. Following are some suggestions to help you protect yourself. The programs listed below are just a few of the many options available. * Use an anti-virus software such as Norton AntiVirus (www.norton.com) or McAfee AntiVirus (www.mcafee.com) and regularly UPDATE it. Updating is absolutely CRITICAL if you want the software to protect you. For thorough spyware and adware scanning, popular software choices are Spy Sweeper (http://www.webroot.com) and SpyCop (http://www.spycop.com). * Using a firewall software such as Zone Alarm (www.zonelabs.com), Norton Personal Firewall (www.norton.com) or McAfee Firewall (www.mcafee.com). This is a good option for dial-up modem users. Why? Dial-up modems are slower, so a firewall software will often see the attack coming and prevent it. Most hackers don't like the slowness of a dial-up because they can't easily get in and out of your computer without being detected. It is also critical that your firewall software be REGULARLY UPDATED! * Those accessing the internet with broadband (i.e., DSL, cable modem, etc.) need the added protection of a firewall hardware such as a Linksys Router (www.linksys.com), NetGear Router (www.netgear.com) or DLink Router (www.dlink.com). The reason why is because the speed is higher on broadband which allows the hacker quicker access into your computer without being detected. The router is what will be "on the internet" versus your computer. Since the router is not a computer, there is nothing for the hackers to attack (i.e., no hard drive, no processor, etc.). The router simply acts as a "bodyguard" that only allows those with permission to come in. * In the event that you unintentionally "bring in" a hacker (as explained above) or you had the misfortune of being the victim of a very clever hacker, it's still smart to have a firewall software (in addition to firewall hardware) to make it difficult for the hacker to "exit" with your data. If you want to check the vulnerability of your machine for free, visit the well-respected GRC's Shields Up website at https://www.grc.com/x/ne.dll?bh0bkyd2. This website will attempt to break into your computer in order to expose vulnerabilities. Click on the individual options (i.e., file sharing, common ports, etc.) for a vulnerability analysis. Keeping up-to-date with internet scams is also helpful in keeping your private information safe. Here are just a few reference websites you may want to bookmark for future reference: * Scam Busters: http://www.scambusters.org * Anti-Spam Help & Advice Website: http://www.spamhelp.co.uk * AuctionBytes Online Fraud Discussion Forum: http://www.auctionbytes.com/forum/phpBB/viewforum.php?f=28 * Internet Fraud Complaint Center: http://www.ifccfbi.gov/index.asp * Anti-Phishing Working Group: http://www.antiphishing.org * Microsoft - Help Safeguard Your Personal Information Online: http://www.microsoft.com/security/incident/spoof.mspx. Lastly, check out the Better Business Bureau & Javelin Strategy's ID Quiz to see how safe you are from identity theft: http://www.javelinstrategy.com/IDSAFETYQUIZ.htm. Great question, Evan. Thanks! Wet kisses & tail wags, Booster BoostYourBids.com is a free information website for online auction sellers and enthusiasts. BoostYourBids.com publishes a free opt-in ezine called "Booster's Auction News" every Friday. Subscribers of this newsletter are automatically entered each month in Booster's Monthly Prize Drawing featuring valuable prizes geared towards online auction sellers. Booster's Auction News is written by Angela Saul, webmaster of BoostYourBids.com. Angela has been selling on eBay and other online auction sites for more than five years. http://www.BoostYourBids.com - The FUN Internet Destination for Online Auction Sellers & Enthusiasts!
MORE RESOURCES: Unable to open RSS Feed $XMLfilename with error HTTP ERROR: 404, exiting |
RELATED ARTICLES
How Did This Happen to Me? Top 10 Ways to Get Spyware or Viruses on Your Computer If you use the internet, you have probably been infected with a virus, trojan or spyware. According to the SANS Internet Storm Center, the average unprotected PC is infected within 20 minutes of normal internet usage. What Every Internet Marketer Should Know About Spyware If you run any type of Internet business, Adware and Spyware can be a very serious issue. These programs hide themselves on your computer and do all sorts of annoying and potentially dangerous things. A New Low A new variation of the Nigerian Scam themeThe scam artists are employing the Nigerian Scam to fleece unwary sellers who advertise pets for sale.This is particularly despicable because not only are people losing their money but dogs are being abandoned in freight terminals or being killed to get rid of them. The Important Steps To Protect Your Kids on the Internet Internet is the ocean of knowledge. In this ocean youwill find beautiful pearls of knowledge. SCAMS - Be Aware - And Report When Necessary The Internet is a vast International Network of people and businesses - and a place where people can make a fairly decent living. However, it is also a place where certain unsavory characters can freely roam - to take your dollars and run. Viruses and Worms: The Problems and Their Solutions History and BackgroundThe virus was one of the first ever threats to computer security. It brought a whole new fear upon computer users. Lets Talk About Antivirus Software! Nowadays more and more people are using a computer. A lot of them use it at their work place, but an increasing number of computer users have also discovered the need to have a computer at home. How Can Someone Get Private Information From My Computer? From the "Ask Booster" column in the June 17, 2005 issue of Booster's Auction News, a free ezine for online auction sellers and enthusiasts.Dear Booster,How can someone get private information from my computer?Thank you,Evan S. 7 Ways to Spot a PayPal Scam E-Mail Paypal is a great site and is used by many to send and receive money. Unfortunately some dishonest people are using the Popularity of Paypal to line their own pockets with gold at the expense of unsuspecting Pay Pal members. Is The Internet Over Regulated Today's Internet or World Wide Web is being over regulated.But, are you being taken for a ride, are you lead to believe that Governments World Wide are creating new legislation for your benefit or are there underlying factors that these laws are more beneficial to Governments and big business?First we had the Can-Spam and other laws passed regulating the sending of unsolicited commercial e-mail, that contains false or deceptive subject information, or that is sent from invalid e-mail addresses, but for me, my inbox still seems to always be full of junk mail. Identity Theft - Dont Blame The Internet Identity theft - also known as ID theft, identity fraud and ID fraud - describes a type of fraud where a criminal adopts someone else's identity in order to profit illegally. It is one of the fastest growing forms of fraud in many developed countries. Spyware Programs Are Out To Get You! The average computer is packed with hidden software that can secretly spy on online habits.The US net provider EarthLink said it uncovered an average of 28 spyware programs on each PC scanned during the first three months of the year. Spy Scanners - Don't Compromise your Privacy Spies, spyware, internet parasites are among what they are usually called. These are scouts that monitor your web activities. How to Thwart the Barbarian Spyware! Today,on most internet user's computers, we have theability to employ software, along with ourintelligence, to prevent viruses and spyware.To put this article into proper perspective, we'll useMedieval defense tactics. How to Protect Your Child from the Internet When the Internet first came about, it was realized it could be quite the multi-tasking machine. These days people use it for just about everything, from downloading music to checking e-mail, and virtually making the rest of the globe closer all the time. Securities NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a strong partnership to keep information safe and secure. It is important for people who spend time surfing the web to understand much of the information given out is easily accessible by individuals who desire to eavesdrop on the data. With the Rise of Internet Crimes, Users are Turning to High-Tech "PI's" for Solutions High-tech private investigators are becoming the answer for many Internet users who have been victimized online. The use of e-mail by that unethical element lurking in cyberspace rings all too common these days. How to Manage Your Username and Password The Easy and Secure Way Have been an Internet user for more than 9 years, I have 100's of logins and passwords to keep. I'm paranoid. Click Here To Defeat Evil Microsoft routinely releases new security updates, many of which are given it's highest severity rating "critical". Here's a typical announcement:"A security issue has been identified that could allow an attacker tocompromise a computer running Internet Explorer and gain control over it. Protect Your Little Black Book The movie Little Black Book features a young woman, Stacy, who is frustrated when her boyfriend refuses to share information about his past relationships. When his PDA, a Palm Tungsten C, falls into her hands, she is faced with a conundrum. |
home | site map | contact us |