Security Information |
Identity Theft - Dont Blame The Internet
Identity theft - also known as ID theft, identity fraud and ID fraud - describes a type of fraud where a criminal adopts someone else's identity in order to profit illegally. It is one of the fastest growing forms of fraud in many developed countries. In the UK identity theft is increasing at the rate of 500% each year and, according to Which Magazine, 25% of the population have either suffered from identity theft or know someone who has. In the USA, a report issued by the Better Business Bureau revealed that, in 2004, over 9 million Americans became victims of identity theft with the total sum defrauded being $52.6 billion. With figures like this, it's no surprise that there is a certain amount of concern regarding computer and internet security. After all, the internet is basically a mechanism for exchanging information and the possibility that some of the information exchanged may be more than intended is never far from many internet user's minds. It's easy to imagine criminal masterminds worldwide using the internet to hack into computers in order to gain access to information with which to advance their devilishly cunning schemes. However, as revealed in the report, the facts of the matter are a little more down to earth and the internet, far from making you more at risk to identity theft, can help to significantly cut your losses if you do fall victim this form of fraud. According to the Better Business Bureau's research the main methods by which criminals gain access to information used for identity theft fraud are as below: * 12.9% due to transactions - 10.4% offline transactions, 2.5% online transactions. In total, when the instances where information was accessed during transactions are subdivided into online and offline transactions, only 11.6% of the information used to carry out identity theft fraud was obtained from computers. Of this more than half was obtained by the use of spyware, viruses or hacking - the risk of which can be greatly reduced by installing the appropriate protection software and ensuring that this is kept up to date. Not only did the survey reveal that the internet was not a major source of illegally obtained personal information, but it was also found that those fraud victims who checked their financial records using the internet, ATM machines or other electronic methods suffered financial losses which were, on average, 8 times lower than those of victims who used traditional paper statements to monitor their accounts. This very significant reduction was attributed to the rapid discovery of the fraud due to "real time" monitoring. Of course, that's not to say that you shouldn't exercise caution when using the internet or take care to protect the personal information which you may have stored on your PC. However, as long as you install suitable virus, firewall and spyware protection, and keep this continually updated the internet can should be more of a help than a hindrance when it comes to avoiding identity fraud. Hamish Hayward
MORE RESOURCES: Unable to open RSS Feed $XMLfilename with error HTTP ERROR: 404, exiting |
RELATED ARTICLES
Identity Theft - Beware of Phishing Attacks! "Dear Bank of the West customer", the message begins. I've just received an e-mail message, purportedly from the security department at the Bank of the West. Online Shopping: 10 Tips For Safe Online Shopping Have you ever bought a product or service from the internet?Yes? Me too. You're not alone?Some of the reasons why most people are shopping online are: they can buy anything at anytime because Internet shopping is available 24 hours, all the time. Spyware Protection Software Spyware protection software is the easiest way of removing spyware from your computer and keeping it away. It detects and removes all pieces of spyware and adware automatically. Top Ten Spyware and Adware Threats Identified On December 8, 2004 Webroot, an award winning anti-spyware solution provider, released a press release identifying the ten most significant emerging spyware and adware threats. Most of these you probably haven't heard of and a few may surprise you. Secure Your PC From Hackers, Viruses, and Trojans Viruses, Trojans and Spyware: Protecting yourself.No user on the internet is safe from assault. Dont be a Dork - Protect Yourself There are folks out there who use their powers for evil, not good. Let's not give them the opportunity to sneak into our lives and wreak havoc. Reducing Fraudulent Transations - 5 Simple Ways To Protect Yourself The money being spent online is steadily growing. With billions of dollars being spent each year online, the opportunity to make money on the internet has never been bigger. Internet Scams: Dont be a Victim As the number of people using the Internet as an integral part of their daily life grows, it is inevitable that the number of Internet Scams will grow. Unfortunately there are many forms of scams but in this article we will look at three of the most prominent. Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk The trash folder in my main inbox hit 4000 today. Since I never throw anything out, I know that what's in there is courtesy of my email filter which is set to automatically delete anything that is forwarded from my work account from a certain person. Phishing and Pharming: Dangerous Scams As soon as almost all computer users already got used to -- or at least heard about -- the word "phishing", another somewhat confusing word appeared not long ago. Pharming. New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue In 1997, I decided after 15 years as a practicing CPA that it was time to put down my pencil and explore a new venture on the exciting new internet which, while perhaps not exactly in its infancy at that point, was still at least a pimply faced teenaged medium still unexplored by most accountants.I founded CPAsites. The Bad Guys Are Phishing For Your Personal Information Do you know what "phishing" is?No, it doesn't mean you grab a pole and head to the late to catchsome phish.The official Webopedia definition of "phishing" is as follows:The act of sending an e-mail to a user falsely claiming to be anestablished legitimate enterprise in an attempt to scam the userinto surrendering private information that will be used foridentity theft. How to Protect Yourself from Viruses, Spyware, Adware, and Other Nuisances Spyware/adware is a new major concern for PC users everywhere. Infecting your computer silently (usually installed with programs that seem harmless), spyware and adware can collect personal information about you, as well as cause pop up ads to come up all of the time, changing your browsers home page, sometimes even completely disabling your computer's usability. Computer Viruses - How to Remove a Computer Virus from Your Computer Computer viruses infect millions of computers every day. Viruses can destroy data, steal important information, and even make a computer completely unusable. Remove Rogue Desktop Icons Created By Spyware If you have used a Windows machine for a while, whether it's Windows XP, Windows 2000, or Windows 98, you're sure to have noticed desktop icons appearing from out of nowhere. How can icons mysteriously emerge on your Windows desktop?1. Phishing: An Interesting Twist On A Common Scam After Two Security Assessments I Must Be Secure, Right?---------------------------------------Imagine you are the CIO of a national financial institution and you've recently deployed a state of the art online transaction service for your customers. To make sure your company's network perimeter is secure, you executed two external security assessments and penetration tests. What is Hacking? Are You a Hacker? WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only recently been taken very seriously. The activities undertaken by the real hackers have been criminalized and they are now being legally persecuted on a scale disproportional to the actual threat they pose. Spyware - Your Web Browser is the Culprit! My first experience with a spyware BHO based infection was several months ago. I had gone through all of the usual steps with the client's machine to clean it. Mail Forwarding - Why Would You Do It? First of all we need to get some terms stated. I have been in the business for just over two years and there is still some confusion over the topic. Phishing-Based Scams: A Couple of New Ones Phishing in its "classic" variant is relatively well-known. Actually, 43. |
home | site map | contact us |