| Internet Security Articles |
Internet Security Articles
Avoiding Scams: If It Sounds Too Good to Be True, It Probably Is
A week or so ago, I received an inquiry from a man in Indonesia about buying multiple copies of certain items on my website. I immediately suspected fraud, so I explained that I only had one piece of each. The man, who wrote impeccable English, said that was fine. I asked why he wanted to buy so much money's worth of jewelry (it was around $250). He said it was for his wife and daughters.
Malware: Computing's Dirty Dozen
It seems that no sooner do you feel safe turning on your computer than you hear on the news about a new kind of internet security threat. Usually, the security threat is some kind of malware (though the term "security threat" no doubt sells more newspapers).
Identity Theft - Don't Blame The Web
Identity theft – also known as ID theft, identity fraud and ID fraud – describes a type of fraud where a criminal adopts someone else’s identity in order to profit illegally. It is one of the fastest growing forms of fraud in many developed countries.
The Perils of Wireless Networking...
In November 2003, Toronto police arrested a man in an upscale residential neighborhood. They noticed his car driving slowly the wrong way down a one-way street. Upon stopping the car, the police discovered the driver naked from the waist down. What was he doing?
He was using his laptop to download and watch “kiddie” p.rn from the Internet! How? He was connecting to the internet using unprotected wireless systems in the houses near the road!
Malware And Antivirus Software
Warning: most antivirus programs will not protect you against all forms of malignant software (often called "malware") on their own. Find out how to protect yourself.
The Bad Guys Are Phishing For Your Personal Information
Do you know what "phishing" is?
No, it doesn't mean you grab a pole and head to the late to catch some phish.
The official Webopedia definition of "phishing" is as follows:
The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked ...
Identity theft is becoming an increasingly frightening and realistic problem for people around the world. It is possible for a person in Africa to obtain the personal information of someone in Canada and use this information to damage credit steal money within minutes. Identity theft is a worldwide problem with the fastest growing occurrence happening in the United States. The basic definition of identity theft is co-option of another person's personal information ...
How to Protect Your Child from the Internet
When the Internet first came about, it was realized it could be quite the multi-tasking machine. These days people use it for just about everything, from downloading music to checking e-mail, and virtually making the rest of the globe closer all the time.
Technology and Techniques Used in Industrial Espionage
Industrial Espionage. These methodologies are being used on a daily basis by competitors maybe even against you. I knew a Private Investigator who used to break into other firm's voicemail boxes. He was suspected of erasing messages and stealing potential clients. I know you may be
thinking that is not right. Maybe so but if a Private Investigator cannot protect him/herself than what use are they to a client.
How To Protect Yourself Against Online Criminals
Credit card fraud is a growing problem for online businesses and can hurt your business in many ways. Fraudulent credit card transactions are costing e-commerce businesses many millions of dollars annually.
10 Signs And Symptoms Of Spyware Infections
Your system runs noticeably slower than it did before. It could be infected by spyware. A search toolbar or other browser toolbar appears even though you didn't request or install it. Spyware programs are usually installed with other programs that are advertised in regitimate ways. You receive an email in your email client with offers related to your recent Internet searches. A spyware might be monitoring your buying habbits. You enter a search term in Internet Explorer's address bar ...
Internet Security Basics 101
The explosive growth of the Internet has meant that thousands of people are today experiencing the joys of being online for the first time. With growth there always comes pain. Be it your growing pains as a child or the growth and development of this part of our culture called the Internet.
Firstly we need to quickly explain what the Internet is and where it came from. The Internet is the offspring of a military project called Arpanet. Arpanet was designed to provide ...
Dissecting the Computer Virus
Don’t be fooled by the innocent sounding names, some of the most famous and damaging viruses sound seamlessly harmless: The “Melissa” virus in 1999 infected thousands of computers via email causing an estimated $80 million in damage; in 2000 the “I Love You” virus infected millions of computers overnight; the “Anna Kournikova” virus lured unsuspecting users with the promise of digital pictures of the tennis player, but instead mailed itself to PC users in the ...
Are They Watching You Online?
When surfing the Internet you probably take your anonymity
for granted, most of us do.
Tapping phones, listening to confidential conversations,
reading others' e-mail messages seems like something that
only happens in spy movies to "other" people.
However, you probably don't realize just how much
information about yourself has the potential to get
transmitted across the Internet every time you go online.
Every computer connected to ...
More Free Tools Increase Security
(c) Jim Edwards - All Rights reserved
A recent article about preventing hackers from breaking
into your computer caused an overwhelming response by
It seems everyone has an opinion about the best software
and advice for keeping your computer safe from viruses and
online predators. The following will help you increase your
online security and usually without spending a dime!
Cyber Crooks Go Phishing
© Jim Edwards - All Rights reserved
"Phishing," the latest craze among online evil-doers, has
nothing to do with sitting at the end of a dock on a sunny
afternoon dangling a worm to entice hungry catfish.
But, if you take their bait, this new breed of online con
artist will hook you, reel you in, and take you for every
dollar you have... or worse.
"Phishing" describes a combination of techniques ...
8 Surefire Ways to Spot an EBAY Scam E Mail and Protect Yourself from Identity Theft
Ebay is a great site and is used by many to buy and sell new and used Items. It truly is the worlds Largest Garage Sale Unfortunately when an online site becomes as big and popular as E-Bay the scam artists seem to just naturally follow. These Scam artists will often try to steal your Idenity and get your bank or credit card information in addition to your E-Bay Id and Password
Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk
The trash folder in my main inbox hit 4000 today. Since I never throw anything out, I know that what's in there is courtesy of my email filter which is set to automatically delete anything that is forwarded from my work account from a certain person. That "person" is our spam filter that insists on sending me, the administrator, a notification when it blocks an email. It's also set to delete some other mail automatically, those would be that come from addresses that have sent me ...
Computer Viruses How to Remove a Computer Virus from Your Computer
Computer viruses infect millions of computers every day. Viruses can destroy data, steal important information, and even make a computer completely unusable. When a computer is infected by a virus it is imperative that the virus be removed as quickly as possible.
Is My PC Vulnerable on the Internet?
Think about this: Is a simple antivirus application enough to protect your PC against all threats? No longer are viruses the only threat on the internet. In recent years other threats have evolved which include spyware, adware, hacking, identity theft, information theft, pop-ups and the loss of information. Let’s begin with the basics. We all need to protect our PC in the same way we protect our home, car and bank account. We wouldn’t give a stranger the keys to our car, home or bank ...
Viruses, Trojans, and Spyware Oh My!
Have you ever had to call Symantec or McAfee to ask them how to remove a virus? Or have you spent hours online trying to figure out how to remove spyware, only to find out that you did something wrong and now your computer won’t boot? I know your pain and frustration with just trying to use your computer without worry. As a computer technician at ARCH Computing Services, I know how hard it can be to pay someone to remove viruses and spyware. In fact that’s how I started in the ...
How to Protect Yourself from Viruses, Adware, Spyware and Hackers
Spyware/adware is a new major concern for PC users everywhere. Infecting your computer silently (usually installed with programs that seem harmless), spyware and adware can collect personal information about you, as well as cause pop up ads to come up all of the time, changing your browsers home page, sometimes even completely disabling your computer's usability.
3 Pervasive Phishing Scams
Scams involving email continue to plague consumers across America, indeed the world. These so called "phishing" scams involve "spoofed" emails meant to draw the unwary to bogus internet sites masquerading as legitimate sites. These scam artists -- phishers -- attempt to hook visitors in by having them divulge certain critical and personal bits of information. Once the information has been divulged the phishers start their dirty work and you have been conned. Several phishing scams continue ...
Could Your Email Compromise Your Safety?
Hackers, phishers, viruses, worms…simply having your computer online can expose your data and personal information to all kinds of malicious and worrisome problems. If you’re somewhat new to the 'net' or to computers in general, these four tips could help protect you from identity theft, credit card fraud, or a complete computer takeover – all of which can happen without you even knowing about it!
Money Mule Email Scam Hits U.S.
Imagine this – you open up your email box and an international company is offering you a dream job – you can be an agent for them – a financial intermediary – receiving payments for them and transferring money to them, and, naturally, keeping a commission on each transaction.