Identity Theft Offline -- So Many Possibilities

Chris Simpson, head of Scotland Yard's computer crime unit was unpleasantly surprised to learn how easy it is to cheat anybody out of his or her personal info -- by means of a fake survey.

This survey wasn't a scam; in fact, it was an experiment. It was carried out in March for the Information Security show (April 26-28). The results showed that most people casually give out their personal info.

Market researchers questioned 200 people on London streets in a bogus survey on theater-going habits. 92% of those who took part disproved the common stereotype of British as reserved people. They readily gave out personal data, including first school and birth dates, mothers' maiden names, names of pets -- valuable info for, say, cracking passwords. During the survey many people volunteered such key details as name, address and postcode.

The chance to win free tickets was enough for these people to reveal almost everything one might need to impersonate them. By the end of the survey, the fake researchers had everything they needed to take out credit cards in their name and even open bank accounts. These 200 people were lucky -- the survey was just a trick. But what if it hadn't been?

Instead of laughing at naive and unwary Londoners, let's think whether we all are careful enough with such personal data. Aren't we sometimes give away information without a clear idea how it will be used -- and by whom?

Much cautioned about identity theft and phishing in the Internet, we tend to relax when speaking in person. Most of us will never click links in spam or open attachments if we don't know who sent the email. We don't trust letters asking us for sensitive information. We are getting wiser.

We have heard about identity theft plenty of times. We know that good deal of identity theft occurs offline. But all the same, some of us are still far from having good habits such as shredding personal correspondence before throwing it into the trash, or not having the same easy-to-guess password just for everything.

The odds of identity theft online partly depend on such factors as what anti-virus and anti-spy software is installed on a PC and how often it is updated. Software vendors try to develop and provide effective means of defense against information-stealing malware. Of course, much depends on whether the user is careful enough to avoid a phishing scam, and even on what sites he visits -- one can easily pick malware while visiting certain websites.

As for plain looking over your shoulder when you are writing something down, digging out papers from your trash or picking some valuable info from a casual talk -- nothing will help you if you carelessly scatter information about yourself.

Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company that provides solutions for preventing identity theft.

The company's R&D department created an innovative technology, which capable of blocking information-stealing malware.The company's anti-keylogging software disables the very processes of information capturing -- keylogging, screenshoting, etc.

Learn more -- visit the company's website http://www.anti-keyloggers.com

In The News:


pen paper and inkwell


cat break through


Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking

Airport Menace: The Wireless Peeping Tom As a network... Read More

How to Protect Yourself from Viruses, Spyware, Adware, and Other Nuisances

Spyware/adware is a new major concern for PC users everywhere.... Read More

File Sharing - What You Need to Know!

File sharing on p2p is soaring despite the music and... Read More

3 Simple Steps to Stay Safe from Spyware

There are several basic concepts to keep in mind when... Read More

Don?t Become An Identity Fraud Statistic!

"You've just won a fabulous vacation or prize package! Now,... Read More

Reclaim Your PC from the Internet Spies

Viruses are, however, not the only malicious software programs out... Read More

Corporate Security for Your Home Business

The words Corporate Security may conjure up images of a... Read More

Securities

NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More

Email Scams ? Ten Simple Steps To Avoiding Them

According to the Anti-Phishing Working Group (APWG) email scams also... Read More

A Painless Plagiarism Solution

A crowded marketplace can lead to unethical webmasters using underhand... Read More

Password Security and Safety

There is nothing more important that password security in world... Read More

Can I Guess Your Password?

We all know that it's dangerous to use the same... Read More

3 Things You Must Know About Spyware

1)Spyware is on your system. Like it or not, statistically... Read More

Top Five Spyware Fighting Tips

Spyware and adware are becoming major problems for online surfers... Read More

Internet Privacy

Over the past few years as the internet has become... Read More

Preventing Online Identity Theft

Identity theft is one of the most common criminal acts... Read More

Phishing: An Interesting Twist On A Common Scam

After Two Security Assessments I Must Be Secure, Right? ... Read More

The 5 Critical Steps to Protecting Your Computer on the Internet

Spyware, viruses and worms... oh my!If you are connected to... Read More

Is Your Music Player Spying On You?

In today's times spyware is a very serious issue and... Read More

Wells Fargo Report Phishing Scam

First off I should explain what phishing is. Phishing is... Read More

How Spyware Blaster Can Protect Your Computer From Harm

By browsing a web page, you could infect your computer... Read More

How to Prevent Online Identity Theft

Identity theft rates one of the fastest growing crimes in... Read More

Do You Know What your Kids Are Doing Online?

It's a sad statistic, but hundreds of unsuspecting kids are... Read More

Spyware ? Your Web Browser is the Culprit!

My first experience with a spyware BHO based infection was... Read More

Phishing, Fraudulent, and Malicious Websites

Whether we like it or not, we are all living... Read More

The Truth About Hiding Your Tracks on the Internet

Ok, ok, I know you've seen them. All those pop... Read More

The Risk Of Electronic Fraud & Identity Theft

Electronic Fraud and Identity Theft Human beings are pretty... Read More

Computer Viruses - How to Remove a Computer Virus from Your Computer

Computer viruses infect millions of computers every day. Viruses can... Read More

What to Look for before You Purchase Spyware Software

Huge number of spyware software applications are available in the... Read More

Instant Messaging ? Expressway for Identity Theft, Trojan Horses, Viruses, and Worms

Never before with Instant Messaging (IM) has a more vital... Read More

8 Surefire Ways to Spot an E-Mail Identity Theft Scam!

The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More

Reducing Fraudulent Transations ? 5 Simple Ways To Protect Yourself

The money being spent online is steadily growing. With billions... Read More

How To Prevent Spyware Attacking Your Computer

Spyware is software or hardware installed on a computer without... Read More