Chris Simpson, head of Scotland Yard's computer crime unit was unpleasantly surprised to learn how easy it is to cheat anybody out of his or her personal info -- by means of a fake survey.
This survey wasn't a scam; in fact, it was an experiment. It was carried out in March for the Information Security show (April 26-28). The results showed that most people casually give out their personal info.
Market researchers questioned 200 people on London streets in a bogus survey on theater-going habits. 92% of those who took part disproved the common stereotype of British as reserved people. They readily gave out personal data, including first school and birth dates, mothers' maiden names, names of pets -- valuable info for, say, cracking passwords. During the survey many people volunteered such key details as name, address and postcode.
The chance to win free tickets was enough for these people to reveal almost everything one might need to impersonate them. By the end of the survey, the fake researchers had everything they needed to take out credit cards in their name and even open bank accounts. These 200 people were lucky -- the survey was just a trick. But what if it hadn't been?
Instead of laughing at naive and unwary Londoners, let's think whether we all are careful enough with such personal data. Aren't we sometimes give away information without a clear idea how it will be used -- and by whom?
Much cautioned about identity theft and phishing in the Internet, we tend to relax when speaking in person. Most of us will never click links in spam or open attachments if we don't know who sent the email. We don't trust letters asking us for sensitive information. We are getting wiser.
We have heard about identity theft plenty of times. We know that good deal of identity theft occurs offline. But all the same, some of us are still far from having good habits such as shredding personal correspondence before throwing it into the trash, or not having the same easy-to-guess password just for everything.
The odds of identity theft online partly depend on such factors as what anti-virus and anti-spy software is installed on a PC and how often it is updated. Software vendors try to develop and provide effective means of defense against information-stealing malware. Of course, much depends on whether the user is careful enough to avoid a phishing scam, and even on what sites he visits -- one can easily pick malware while visiting certain websites.
As for plain looking over your shoulder when you are writing something down, digging out papers from your trash or picking some valuable info from a casual talk -- nothing will help you if you carelessly scatter information about yourself.
Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company that provides solutions for preventing identity theft.
The company's R&D department created an innovative technology, which capable of blocking information-stealing malware.The company's anti-keylogging software disables the very processes of information capturing -- keylogging, screenshoting, etc.
Learn more -- visit the company's website http://www.anti-keyloggers.com
Phishing is the act of some individual sending an email... Read More
The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More
They're out there. Individuals trying to make a quick buck... Read More
If you use the internet, you have probably been infected... Read More
First the basic definition of Spyware: It is a type... Read More
First I would like to stress I am condoning the... Read More
Huge number of spyware software applications are available in the... Read More
It has been said that with the wealth of information,... Read More
Many of us have run into an annoying and time-consuming... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
The words Corporate Security may conjure up images of a... Read More
Every now and then you can read about a new... Read More
During the release of a new software product specialized to... Read More
There are ways to insure security though. You can get... Read More
Threats we ordinary Web users face online leave us no... Read More
Spyware is the most troublesome software to appear on the... Read More
Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More
Recently I have received email from my bank/credit Card Company,... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
It's been with us since 1993, it's gotten more intrusive,... Read More
Someone recently told me, "You would have to be a... Read More
File sharing on p2p is soaring despite the music and... Read More
Watching how the traditional media covers the latest virus or... Read More
Only the top spyware removers are successful at detecting and... Read More
So you want to know who your kids are chatting... Read More
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
After Two Security Assessments I Must Be Secure, Right? ---------------------------------------... Read More
In a word, no - an email message has always... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
If you run any type of Internet business, Adware and... Read More
When surfing the Internet you probably take your anonymity for... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
You may not realize it, but as you are surfing... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
The money being spent online is steadily growing. With billions... Read More
If you use the internet, you have probably been infected... Read More
Before we start, I want to make it clear that... Read More
When we think of adware, what comes to mind are... Read More
You and I are a lot alike. We are both... Read More
It's a sad statistic, but hundreds of unsuspecting kids are... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
With the advent of the World Wide Web, a whole... Read More
First the basic definition of Spyware: It is a type... Read More
This is the second in a series of articles highlighting... Read More
If you are a parent, as am I, I think... Read More
Never before with Instant Messaging (IM) has a more vital... Read More
|