![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
How Can Someone Get Private Information From My Computer?
From the "Ask Booster" column in the June 17, 2005 issue of Booster's Auction News, a free ezine for online auction sellers and enthusiasts. Dear Booster, How can someone get private information from my computer? Thank you, Evan S. Dear Evan, Hackers can get your private information from your computer in a number of ways. Here are the top ways they do it: * Computer viruses, spyware and adware from e-mails you've received and/or websites you've visited. * Hacker programs that find unprotected IP addresses are subject to attack. An IP address is a series of several numbers (ex. 65.129.37.84) that identifies your location on the internet. It's like your "internet" telephone number. * Entering your financial information (i.e., credit card info) into a website that does not offer secure order processing. Your internet browser should show you that you've entered a secure site. * Having your financial information "intercepted" by a hacker while shopping online at a legitimate website. This is called "pharming" and is becoming a more worrisome threat. * You downloaded software from that contained a malicious program. * You fall victim to a "phishing" or "spoof" scam, whereby you GIVE your personal information away. * Phishing and spoof e-mails appear as if they are coming from a legitimate website. The e-mail generally alarms the recipient with a message such as "your account has been suspended" or telling you that you need to "verify your account." Most eBay and PayPal users have received at least one (if not several more) spoof e-mails appearing to come from either eBay or PayPal. eBay has information showing you how to spot spoof. I highly recommend your take a few moments and visit http://pages.ebay.com/education/spooftutorial/index.html for this brief tutorial. * Another growing threat is called "malware" which is a spyware. Malware is a malicious software which logs your keystrokes and forwards the information to a hacker. This type of software can come through viruses and is often included in downloaded applications. Knowing how to protect yourself can greatly reduce your risk of identity theft. Following are some suggestions to help you protect yourself. The programs listed below are just a few of the many options available. * Use an anti-virus software such as Norton AntiVirus (www.norton.com) or McAfee AntiVirus (www.mcafee.com) and regularly UPDATE it. Updating is absolutely CRITICAL if you want the software to protect you. For thorough spyware and adware scanning, popular software choices are Spy Sweeper (http://www.webroot.com) and SpyCop (http://www.spycop.com). * Using a firewall software such as Zone Alarm (www.zonelabs.com), Norton Personal Firewall (www.norton.com) or McAfee Firewall (www.mcafee.com). This is a good option for dial-up modem users. Why? Dial-up modems are slower, so a firewall software will often see the attack coming and prevent it. Most hackers don't like the slowness of a dial-up because they can't easily get in and out of your computer without being detected. It is also critical that your firewall software be REGULARLY UPDATED! * Those accessing the internet with broadband (i.e., DSL, cable modem, etc.) need the added protection of a firewall hardware such as a Linksys Router (www.linksys.com), NetGear Router (www.netgear.com) or DLink Router (www.dlink.com). The reason why is because the speed is higher on broadband which allows the hacker quicker access into your computer without being detected. The router is what will be "on the internet" versus your computer. Since the router is not a computer, there is nothing for the hackers to attack (i.e., no hard drive, no processor, etc.). The router simply acts as a "bodyguard" that only allows those with permission to come in. * In the event that you unintentionally "bring in" a hacker (as explained above) or you had the misfortune of being the victim of a very clever hacker, it's still smart to have a firewall software (in addition to firewall hardware) to make it difficult for the hacker to "exit" with your data. If you want to check the vulnerability of your machine for free, visit the well-respected GRC's Shields Up website at https://www.grc.com/x/ne.dll?bh0bkyd2. This website will attempt to break into your computer in order to expose vulnerabilities. Click on the individual options (i.e., file sharing, common ports, etc.) for a vulnerability analysis. Keeping up-to-date with internet scams is also helpful in keeping your private information safe. Here are just a few reference websites you may want to bookmark for future reference: * Scam Busters: http://www.scambusters.org * Anti-Spam Help & Advice Website: http://www.spamhelp.co.uk * AuctionBytes Online Fraud Discussion Forum: http://www.auctionbytes.com/forum/phpBB/viewforum.php?f=28 * Internet Fraud Complaint Center: http://www.ifccfbi.gov/index.asp * Anti-Phishing Working Group: http://www.antiphishing.org * Microsoft - Help Safeguard Your Personal Information Online: http://www.microsoft.com/security/incident/spoof.mspx. Lastly, check out the Better Business Bureau & Javelin Strategy's ID Quiz to see how safe you are from identity theft: http://www.javelinstrategy.com/IDSAFETYQUIZ.htm. Great question, Evan. Thanks! Wet kisses & tail wags, Booster BoostYourBids.com is a free information website for online auction sellers and enthusiasts. BoostYourBids.com publishes a free opt-in ezine called "Booster's Auction News" every Friday. Subscribers of this newsletter are automatically entered each month in Booster's Monthly Prize Drawing featuring valuable prizes geared towards online auction sellers. Booster's Auction News is written by Angela Saul, webmaster of BoostYourBids.com. Angela has been selling on eBay and other online auction sites for more than five years. http://www.BoostYourBids.com - The FUN Internet Destination for Online Auction Sellers & Enthusiasts!
MORE RESOURCES: Why NHIs Are Security's Most Dangerous Blind Spot The Hacker News Security Alert: Los Cabos and La Paz, Baja California Sur U.S. Embassy & Consulates in Mexico (.gov) The impressive security measures at Pope Francis' funeral, from anti-drone bazookas to Eurofighters Euronews.com Defense Officials Outline AI's Strategic Role in National Security U.S. Department of Defense (.gov) Belarus Weekly: Russian, Belarusian security services plan violent attacks on Belarusian diaspora The Kyiv Independent Remarks at a UN Security Council Briefing on the Political and Humanitarian Situations in Syria United States Mission to the United Nations (.gov) Summit on the Future of Energy Security IEA – International Energy Agency NSA targets OT cyber risks with new smart controller security standards for national security systems Industrial Cyber Everything You Need to Know About the Air Defenses Protecting World Leaders at the Pope’s Funeral The Aviationist Signalgate lessons learned: If creating a culture of security is the goal, America is screwed theregister.com Allegiant flight attendant finds bomb threat just before St. Pete-Clearwater International departure: Sheriff FOX 13 Tampa Bay Get to know new security leaders at OSU-CHS Oklahoma State University ATA Transportation Security Council Recognizes Fleets American Trucking Associations Safeguarding Your Corporate Leaders Against Rising Security Threats: FP’s Guide on Executive Protection Fisher Phillips US House Committee subpoenas Chinese state telecoms over data privacy, national security concerns Industrial Cyber Legislature should provide lobbyists with key fobs to bypass new Capitol security screening The Alaska Landmine Judges Worry Trump Could Tell U.S. Marshals to Stop Protecting Them The New York Times Mobile Applications: A Cesspool of Security Issues Dark Reading Inside the Fiasco at the National Security Council The Atlantic Hyosung Urges Operators of All ATMs to Follow Previous Security Guidance Due to Large-Scale Cyberattacks Business Wire Court grants NM Tech student temporary restraining order against Homeland Security Source New Mexico US Donates Decommissioned Cutters to Tunisia to Bolster Regional Security The Maritime Executive DOJ’s Data Security Program Final Rules Effective – Implications for Telecom Providers NatLawReview.com New Security Perimeter Around Mt. Kolang Gaz La Secret Nuclear Tunnel Complexes Institute for Science and International Security (ISIS) Kristi Noem’s Stolen Purse at a Burger Joint Is Still a Washington Mystery The New York Times King County Security Tips – “Google” yourself kcemployees.com UN Security Council condemns Jammu and Kashmir terror attack Department of Political and Peacebuilding Affairs Fiesta goers can expect increased security at main events Texas Public Radio Remarks at a UN Security Council Briefing on Haiti United States Mission to the United Nations (.gov) Homeland Security, Riverside County deputies raid business in Pomona FOX 11 Los Angeles Ukraine, allies working on security guarantees potentially similar to NATO Article 5, Zelensky says The Kyiv Independent Footage Reveals New York-To-Paris Delta Flight Stowaway Getting Through Airport Security Travel Noire Rome Health to install new security systems Rome Sentinel Tarleton State University elevates campus security, student safety with new mobile app. Beneath the Surface News National Security Commission on Emerging Biotechnology’s Final Report Includes Recommendations to Boost Economy and Protect National Security NatLawReview.com Associated Press: Civil rights groups sue to restore jobs at Homeland Security oversight offices that were gutted Robert F. Kennedy Human Rights Security increased in disputed Kashmir as India vows to punish perpetrators of attack that killed 26 PBS California security firm CEO, workers charged after woman forcibly removed from Republican town hall Los Angeles Times Climate and National Security: Bridging the Divide in Energy Policy Columbia Business School Anton’s Security Blog Quarterly Q1 2025 Security Boulevard Joint Press Statement on United States-Japan-Republic of Korea Trilateral Security Coopera U.S. Department of Defense (.gov) Trump administration highlights economic growth and national security wins in April 2025 Fingerlakes1.com Temple University stepping up security after several students assaulted near campus last week CBS News NSA Publishes Recommendations for Smart Controller Security Controls and Technical Require National Security Agency (.gov) Trump Should Have Stuck With Border Security, Not Mass Deportations New York Magazine Yes, You Can Take Water Through Airport Security—Here's How Travel + Leisure Windows "inetpub" security fix can be abused to block future updates BleepingComputer Hegseth’s Personal Phone Use Created Vulnerabilities The New York Times New Syrian foreign minister attends UN Security Council in first US appearance since Assad's fall AJC.com Verkada launches executive protection offering Security Systems News Pete Hegseth’s bad calls: Unfit defense secretary is a major security risk New York Daily News Increased Security at City Courthouses? Unanswered Questions Baltimore Witness Two state officials join Department of Homeland Security Dakota News Now ‘We need to apprehend him’: $10K reward offered for Family Dollar ‘security guard’ who killed man WSB-TV The Role of Smart Security Systems in Addressing Healthcare Demands Security Sales & Integration Updates to parking and security at the parks around Lake Tapps Tacoma News Tribune |
![]() |
![]() |
![]() |
RELATED ARTICLES
3 Simple Steps to Stay Safe from Spyware There are several basic concepts to keep in mind when deciding to stay spyware free for good. This article will outline a spyware checklist for you to keep in mind when getting tough on spyware and taking back control of your computer using two popular free applications, Ad-Aware,and Spybot - S&D. Technology and Techniques Used in Industrial Espionage Industrial Espionage. These methodologies are being used on a daily basis by competitors maybe even against you. File Sharing - What You Need to Know! File sharing on p2p is soaring despite the music and movie industryefforts to curb the practice. Regardless of which side of the arguement you are on it is likely that sharing of copyright materialwill continue in one form or another for the foreseeable future. Viruses and Worms, Protection from Disaster Virus damage estimated at $55 billion in 2003. "SINGAPORE - Trend Micro Inc, the world's third-largest anti-virus software maker, said Friday that computer virus attacks cost global businesses an estimated $55 billion in damages in 2003, a sum that would rise this year. Preventing Online Identity Theft Identity theft is one of the most common criminal acts in society today. Criminals will use your personal information such as banking accounts and passwords, to pretend that they are you. What Can Be Done About Spyware And Adware Having a good Spyware eliminator on your computer is vital now a days with all of the different Spyware, Adware, and other malicious computer parasites that are out there. Most of them are reasonably priced and very easy to use. Online Shoppers, Beware of a New Scam Beware of a New Scam Aimed at Bargain-HuntersTrying to buy something cheap is absolutely natural--and online crooks set traps for unwitting bargain-hunters. On April 6 Panda Software warned Internet users of a new particularly brazen scam aimed at stealing confidential information. The Bad Guys Are Phishing For Your Personal Information Do you know what "phishing" is?No, it doesn't mean you grab a pole and head to the late to catchsome phish.The official Webopedia definition of "phishing" is as follows:The act of sending an e-mail to a user falsely claiming to be anestablished legitimate enterprise in an attempt to scam the userinto surrendering private information that will be used foridentity theft. How to Manage Your Username and Password The Easy and Secure Way Have been an Internet user for more than 9 years, I have 100's of logins and passwords to keep. I'm paranoid. Identity Theft Offline -- So Many Possibilities Chris Simpson, head of Scotland Yard's computer crime unit was unpleasantly surprised to learn how easy it is to cheat anybody out of his or her personal info -- by means of a fake survey.This survey wasn't a scam; in fact, it was an experiment. Online Shopping: 10 Tips For Safe Online Shopping Have you ever bought a product or service from the internet?Yes? Me too. You're not alone?Some of the reasons why most people are shopping online are: they can buy anything at anytime because Internet shopping is available 24 hours, all the time. What to Look for before You Purchase Spyware Software Huge number of spyware software applications are available in the market, some being offered as shareware while rest as freeware. (Shareware means a software available for download / CD, and can be used for a particular length of time, usually 30 days. Is That Free Stuff Like An iPod Or Desktop Computer Really Free? Have you seen the web site, www.freestuff. Free Ways to Tackle Threats to Your Computer Protect Your PCHaving problems with your pc?Do your kids, family or friends fill it with all the stuff they find on the internet?Your computer, just like your car, needs to be serviced regularly to keep it running efficiently. You wouldn't fill your car up with petrol from an old rusty can with a layer of dirty water on the bottom, so you shouldn't allow your pc to be treated that way either. What Every Internet Marketer Should Know About Spyware If you run any type of Internet business, Adware and Spyware can be a very serious issue. These programs hide themselves on your computer and do all sorts of annoying and potentially dangerous things. Corporate Security for Your Home Business The words Corporate Security may conjure up images of a group of techies working in a wire-filled basement room of Microsoft or HP, combating hackers and terrorists online using words like algorithm and encryption. If you own your own business, do not allow yourself to think that security is only for big corporations. Check Out That Privacy Policy Before you enter your name, address or any other data in that form, STOP! Wait. Don't enter anything yet. Money Mule Email Scam Hits U.S. Imagine this - you open up your email box and an international company is offering you a dream job - you can be an agent for them - a financial intermediary - receiving payments for them and transferring money to them, and, naturally, keeping a commission on each transaction.There's no investment, no money required. 7 Ways to Spot a PayPal Scam E-Mail Paypal is a great site and is used by many to send and receive money. Unfortunately some dishonest people are using the Popularity of Paypal to line their own pockets with gold at the expense of unsuspecting Pay Pal members. HackAttack P C. owners are constantly at risk from attacks by hackers. ![]() |
home | site map |
© 2006 |