Maintain your old Siemens Hipath system

Identity Theft Offline -- So Many Possibilities

Chris Simpson, head of Scotland Yard's computer crime unit was unpleasantly surprised to learn how easy it is to cheat anybody out of his or her personal info -- by means of a fake survey.

This survey wasn't a scam; in fact, it was an experiment. It was carried out in March for the Information Security show (April 26-28). The results showed that most people casually give out their personal info.

Market researchers questioned 200 people on London streets in a bogus survey on theater-going habits. 92% of those who took part disproved the common stereotype of British as reserved people. They readily gave out personal data, including first school and birth dates, mothers' maiden names, names of pets -- valuable info for, say, cracking passwords. During the survey many people volunteered such key details as name, address and postcode.

The chance to win free tickets was enough for these people to reveal almost everything one might need to impersonate them. By the end of the survey, the fake researchers had everything they needed to take out credit cards in their name and even open bank accounts. These 200 people were lucky -- the survey was just a trick. But what if it hadn't been?

Instead of laughing at naive and unwary Londoners, let's think whether we all are careful enough with such personal data. Aren't we sometimes give away information without a clear idea how it will be used -- and by whom?

Much cautioned about identity theft and phishing in the Internet, we tend to relax when speaking in person. Most of us will never click links in spam or open attachments if we don't know who sent the email. We don't trust letters asking us for sensitive information. We are getting wiser.

We have heard about identity theft plenty of times. We know that good deal of identity theft occurs offline. But all the same, some of us are still far from having good habits such as shredding personal correspondence before throwing it into the trash, or not having the same easy-to-guess password just for everything.

The odds of identity theft online partly depend on such factors as what anti-virus and anti-spy software is installed on a PC and how often it is updated. Software vendors try to develop and provide effective means of defense against information-stealing malware. Of course, much depends on whether the user is careful enough to avoid a phishing scam, and even on what sites he visits -- one can easily pick malware while visiting certain websites.

As for plain looking over your shoulder when you are writing something down, digging out papers from your trash or picking some valuable info from a casual talk -- nothing will help you if you carelessly scatter information about yourself.

Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company that provides solutions for preventing identity theft.

The company's R&D department created an innovative technology, which capable of blocking information-stealing malware.The company's anti-keylogging software disables the very processes of information capturing -- keylogging, screenshoting, etc.

Learn more -- visit the company's website

In The News:

Couple jailed for 10 years over viral video showing them dancing at Iran landmark
Wed, 01 Feb 2023 12:00:00 +0000
A young couple in Iran have been jailed for more than 10 years each after a video on social media showed them dancing at one of Tehran's main landmarks.

Legendary NFL player Tom Brady 'retiring for good'
Wed, 01 Feb 2023 13:22:00 +0000
NFL legend Tom Brady has announced for the second time that he will be retiring.

FIFA facing backlash over potential 'sportswashing' Saudi sponsorship
Wed, 01 Feb 2023 11:35:00 +0000
FIFA is facing backlash from Women's World Cup co-hosts Australia and New Zealand over a potential sponsorship of the tournament by Saudi Arabia.

Biggest year ever for crypto hacking - with North Korea the suspected culprit
Wed, 01 Feb 2023 13:00:00 +0000
2022 was the biggest year ever for cryptocurrency hacking, with more than £3.2bn stolen worldwide, according to new research.

Families seek exoneration of relatives convicted of witchcraft centuries later
Wed, 01 Feb 2023 11:43:00 +0000
US politicians are considering exonerating 11 alleged witches who were executed and dozens more who were accused of having ties to Satan more than 375 years ago.

Erfahrungen mit Pallhuber Wein
Agen Bola SBOBET Terpercaya

Travel in comfort and at your leisure with CT Airlink Limousine & Car Service for top quality private transportation and exceptional customer service. We operate Sedans, SUVs & Vans for CT Car Services to covering all Connecticut airports including Car Service from CT to Newark Airport , Mohegan Casino Uncasville CT, Foxwoods Casino Mashantucket CT, Manhattan Cruise Terminal NYC, Brooklyn Cruise Terminal NYC and Bayonne Cruise Terminal NJ. CT Airlink hire licensed and friendly chauffeurs who have in-depth knowledge of the Areas.

Phishing ? Its Signs and Your Options

Phishing is the act of some individual sending an email... Read More

8 Surefire Ways to Spot an E-Mail Identity Theft Scam!

The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More

Online Cell Phone Scams and Spam

They're out there. Individuals trying to make a quick buck... Read More

How Did This Happen to Me? Top 10 Ways to Get Spyware or Viruses on Your Computer

If you use the internet, you have probably been infected... Read More

Spyware, This Time Its Personal!

First the basic definition of Spyware: It is a type... Read More

Hacking the Body Via PDA Wireless Device

First I would like to stress I am condoning the... Read More

What to Look for before You Purchase Spyware Software

Huge number of spyware software applications are available in the... Read More

Dont Miss Information Because of Misinformation

It has been said that with the wealth of information,... Read More

Spyware Attacks! Windows Safe Mode is No Longer Safe

Many of us have run into an annoying and time-consuming... Read More

Technology and Techniques Used in Industrial Espionage

Industrial Espionage. These methodologies are being used on a daily... Read More

What is Hacking? Are You a Hacker?

WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More

Virus Prevention 101

Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More

Corporate Security for Your Home Business

The words Corporate Security may conjure up images of a... Read More

Traditional Antivirus Programs Useless Against New Unidentified Viruses!

Every now and then you can read about a new... Read More

DOS Attacks: Instigation and Mitigation

During the release of a new software product specialized to... Read More

Its War I Tell You!

There are ways to insure security though. You can get... Read More

Cybercriminals Trick: Targeted Trojan-Containing Emails

Threats we ordinary Web users face online leave us no... Read More

A Basic Introduction To Spyware

Spyware is the most troublesome software to appear on the... Read More

The One Critical Piece Of Free Software Thats Been Overlooked

Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More


Recently I have received email from my bank/credit Card Company,... Read More

SPYWARE - Whos Watching Who?

I am in the midst of Oscar Wilde's The Picture... Read More

The Never Ending Spyware Story

It's been with us since 1993, it's gotten more intrusive,... Read More

An Open Letter From a So-called Stupid

Someone recently told me, "You would have to be a... Read More

File Sharing - What You Need to Know!

File sharing on p2p is soaring despite the music and... Read More

3 Steps to Ending Scams and Virus Problems

Watching how the traditional media covers the latest virus or... Read More