Thursday, January 13, 2011

Top Ten Protection Tips for Identity Theft

Identity theft has been substantially increasing day-by-day. It’s a MUST to know how to protection ourselves from identity theft, so that we don’t fall prey to identity thieves.

1. Protection from Phishing: DO NOT click on links which you receive via unsolicited emails

2. DO NOT share your bank a/c or loan a/c details to third persons.

3. DO NOT provide your confidential details to known or unknown people over phone

4. DO NOT carry your Social Security card in your wallet (if you are robbed, thieves might misuse them)

5. DO NOT share your personal / confidential details such as bank login and password over chat / instant messengers.

6. Monitor your credit report regularly. We offer reliable Credit Monitoring in Topeka, KS

7. Install an Computer Security Software and keep it updated

8. DO NOT visit untrusted websites and download any exes or software’s. (Hackers may add a script to monitor your computer)

9. Always check if the net banking site you visit starts with https (https states whether the site is secure or not)

10. Learn more about identity theft and get self educated as well as educate your known ones

Thursday, September 16, 2010

Un-Trusted Downloads May Crash Your PC

Cyber criminals may get into your PC via unsafe downloads online. So beware about such kind of downloads and ensure you are safe. Here is the full security awareness article for your reference, Just visit http://www.buzzle.com/articles/beware-about-hot-downloads-online.html

Tuesday, August 31, 2010

New Computer Security Forum Launched!



Recently Hermesmyth, an India based Online Marketing Services company has launched an new computer security forum “SafeScribble”. SafeScribble Computer Security Forum aims at discussing and solving computer virus related problems and, suggesting the best antivirus software for computer users.

SafeScribble PC Security Forum now invites antivirus technology experts to join the discussion and help grow the community by contributing security related articles and helping the forum users of their pc related questions. Also SafeScribble invites individuals and business users to share their virus related problems by registering in the discussion board for free and make use of it.

To register for free, please visit http://www.safescribble.com/


Monday, August 09, 2010

Web Server Security

Operating Systems still continue to be vulnerable to attacks if the security patches are not installed periodically, which gives way to malwares and massive internet worms. Sometime ago, the internet worm conficker, which is also known as downadup was creating big chaos over the internet, which lead to huge losses to the corporate and website owners. Meanwhile there was also number of buffer overflow attacks reported during the year 2009. It’s quite common that all the web servers do have vulnerability, but its good the website owner need to safeguard their valuable digital assets by periodically updating the security patches and by running quality server security software products, which would prevent from the web server being vulnerable i.e. accessible to the hackers.



Below are a few one-liner precautionary steps that will help you in securing your Web server.
1. Install the Security Patches whenever available
2. Check the client side of the website by running a Malware Scan to ensure the users are safe
3. Disable the unnecessary scripting languages in your web servers, as hacker may target them
4. Subscribe and Keep monitoring the security vendor's security alerts
5. Most importantly use a tough Alpha-numeric-Symbol based password
6. Check for vulnerabilities by running a vulnerability analyser to check your web server security holes
7. Set up permissions at different levels so that no one can access as an administrator, expect the person intended for.
8. DON'T test any new or unknown scripts in your main web server, because some untrusted scripts may inject a malware in your server

Also, now Google provides a free tool called "SkipFish" - a web application security reconnaissance tool, which can run a security audit to your website. Here is the link for your convenience http://code.google.com/p/skipfish/
Still wondering how the attack takes place, here is a pictorial representation of Top Cyber Security Risks by Sans.org http://www.sans.org/top-cyber-security-risks/tutorial.php

Tuesday, June 08, 2010

Top Identity Theft Methods

According to the FTC, over the past 5 years over 27.3 million people have had their identity stolen. That's a scary number, made more concerning by the fact that most people don't even realize their identity has been "borrowed" until after the damage is done. At this very minute, someone could be merrily opening credit card accounts and applying for mortgages under your name. It's important to take steps to actively protect your identity. The first step is to be aware of the various methods thieves have of obtaining your personal information. Some of them are predictable, while others are more surprising. The list below is a great starting point.
  • Getting your credit card information during an in-person transaction: This usually happens at a retail location where you're using your credit card to make a payment. Thieves can see and memorize your credit card info (or just write it down) and then turn around and use it to make their own purchases. They have even been known to resort to taking pictures of your card with a long range camera lens!
  • Stealing your mail: Make sure your mailbox has a sturdy lock, and that you keep a close watch on your mail trends. Haven't gotten any mail for a while? A thief may have submitted a change of address on your behalf to have your billing statements mailed to an address they control. They can then apply for credit card offers that you receive and obtain credit cards in your name.
  • Stolen wallets or purses: If your wallet or purse has been taken or "lost," immediately cancel all the credit cards. This is also a good time to put a credit freeze on your credit records at all 3 credit bureaus and start looking into identity theft protection services.
  • Dumpster diving: You'd be surprised how much personal information people throw in the trash. It's easy for thieves to acquire this information and use it for their own means. Make sure you shred all your documents and take the proper precautions.
  • Eavesdropping on phone conversations: People are usually pretty lax about what they'll say on the phone. With the advent of mobile phones, it's very easy for a thief to overhear you divulging personal information to a friend. Always be aware of what you're saying and who might be around you.
  • Phishing: This is a common email scam where you receive an email from a company of authority, such as your bank, PayPal or eBay. The email will ask you to provide personal information (like a password) by responding to the email or going to a link in the email, or even by calling them. Do not ever respond to these emails! No legitimate company will ever ask you for personal information via email.
  • Computer viruses: Hackers can create viruses that will invade your computer, acquire personal information, and send that information back to the hacker. Always have a current version of internet security software installed on your computer and make sure you keep it up to date.
  • Intercepting data from insecure sites or networks: If you're accessing your bank account or shopping online, make sure the site is encrypted. Look for a "https://" at the front of the URL. This indicates the site utilizes SSL encryption to keep your online transactions safe.
  • Pretexting or Social Engineering: This occurs when a thief uses false pretenses to get your personal information. One popular scheme is to call you, pretending to be your bank, utility company or other institution that might have access to your personal information. They will then ask for you to provide or confirm some piece of personal information. If someone calls you, don't give this information to them. Instead, look up the number of the company (if it's a bank or credit company, usually the number will be on the back of your card), and call them directly.


Some of the schemes mentioned above are fairly easy to protect against, others are more challenging. It's a good idea to stay on top of your credit records, as suspicious changes or updates to your credit history can indicate potential identity theft. The easiest way to do this is by signing up for an identity theft protection These services will usually monitor your credit history and actively stay on top of any leaks or use of your personal information.

Is taking a Bank Loan Good or Bad?

Definitely taking a bank loan shouldn't be a choice for you and should be the last resource if you need to. You may be wondering, why am...