Chris Simpson, head of Scotland Yard's computer crime unit was unpleasantly surprised to learn how easy it is to cheat anybody out of his or her personal info -- by means of a fake survey.
This survey wasn't a scam; in fact, it was an experiment. It was carried out in March for the Information Security show (April 26-28). The results showed that most people casually give out their personal info.
Market researchers questioned 200 people on London streets in a bogus survey on theater-going habits. 92% of those who took part disproved the common stereotype of British as reserved people. They readily gave out personal data, including first school and birth dates, mothers' maiden names, names of pets -- valuable info for, say, cracking passwords. During the survey many people volunteered such key details as name, address and postcode.
The chance to win free tickets was enough for these people to reveal almost everything one might need to impersonate them. By the end of the survey, the fake researchers had everything they needed to take out credit cards in their name and even open bank accounts. These 200 people were lucky -- the survey was just a trick. But what if it hadn't been?
Instead of laughing at naive and unwary Londoners, let's think whether we all are careful enough with such personal data. Aren't we sometimes give away information without a clear idea how it will be used -- and by whom?
Much cautioned about identity theft and phishing in the Internet, we tend to relax when speaking in person. Most of us will never click links in spam or open attachments if we don't know who sent the email. We don't trust letters asking us for sensitive information. We are getting wiser.
We have heard about identity theft plenty of times. We know that good deal of identity theft occurs offline. But all the same, some of us are still far from having good habits such as shredding personal correspondence before throwing it into the trash, or not having the same easy-to-guess password just for everything.
The odds of identity theft online partly depend on such factors as what anti-virus and anti-spy software is installed on a PC and how often it is updated. Software vendors try to develop and provide effective means of defense against information-stealing malware. Of course, much depends on whether the user is careful enough to avoid a phishing scam, and even on what sites he visits -- one can easily pick malware while visiting certain websites.
As for plain looking over your shoulder when you are writing something down, digging out papers from your trash or picking some valuable info from a casual talk -- nothing will help you if you carelessly scatter information about yourself.
Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company that provides solutions for preventing identity theft.
The company's R&D department created an innovative technology, which capable of blocking information-stealing malware.The company's anti-keylogging software disables the very processes of information capturing -- keylogging, screenshoting, etc.
Learn more -- visit the company's website http://www.anti-keyloggers.com
![]() |
|
![]() |
|
![]() |
|
![]() |
Airport Menace: The Wireless Peeping Tom As a network... Read More
Spyware/adware is a new major concern for PC users everywhere.... Read More
File sharing on p2p is soaring despite the music and... Read More
There are several basic concepts to keep in mind when... Read More
"You've just won a fabulous vacation or prize package! Now,... Read More
Viruses are, however, not the only malicious software programs out... Read More
The words Corporate Security may conjure up images of a... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
A crowded marketplace can lead to unethical webmasters using underhand... Read More
There is nothing more important that password security in world... Read More
We all know that it's dangerous to use the same... Read More
1)Spyware is on your system. Like it or not, statistically... Read More
Spyware and adware are becoming major problems for online surfers... Read More
Over the past few years as the internet has become... Read More
Identity theft is one of the most common criminal acts... Read More
After Two Security Assessments I Must Be Secure, Right? ... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
In today's times spyware is a very serious issue and... Read More
First off I should explain what phishing is. Phishing is... Read More
By browsing a web page, you could infect your computer... Read More
Identity theft rates one of the fastest growing crimes in... Read More
It's a sad statistic, but hundreds of unsuspecting kids are... Read More
My first experience with a spyware BHO based infection was... Read More
Whether we like it or not, we are all living... Read More
Ok, ok, I know you've seen them. All those pop... Read More
Electronic Fraud and Identity Theft Human beings are pretty... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
Huge number of spyware software applications are available in the... Read More
Never before with Instant Messaging (IM) has a more vital... Read More
The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More
The money being spent online is steadily growing. With billions... Read More
Spyware is software or hardware installed on a computer without... Read More
This is the second in a series of articles highlighting... Read More
What is computer security? Computer security is the process of... Read More
Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
Identity theft rates one of the fastest growing crimes in... Read More
Whether we like it or not, we are all living... Read More
We all get the odd virus now and then, but... Read More
With the advent of the World Wide Web, a whole... Read More
Electronic Fraud and Identity Theft Human beings are pretty... Read More
Credit card fraud is a growing problem for online businesses... Read More
Identity theft is one of the most common criminal acts... Read More
The Federal Bureau of Investigation has identified "phishing" as the... Read More
Phishing is a relatively new form of online fraud that... Read More
Watching how the traditional media covers the latest virus or... Read More
Shopping for horse gifts or other gift items on the... Read More
Before you enter your name, address or any other data... Read More
So you want to know who your kids are chatting... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
First of all we need to get some terms stated.... Read More
You may not realize it, but as you are surfing... Read More
Business on the internet is getting down right shameless. This... Read More
Spyware/adware is a new major concern for PC users everywhere.... Read More
Be careful of sites that promise to send you "instant... Read More
Chris Simpson, head of Scotland Yard's computer crime unit was... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
You've seen it in the news - 40 million credit... Read More
Only the top spyware removers are successful at detecting and... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
It's been with us since 1993, it's gotten more intrusive,... Read More
In the past I've never really paid much attention to... Read More
Nobody wants to pay to remove spyware. At the very... Read More
Let us take the example of scrambling an egg. First,... Read More
I am the victim of an internet scam. It is... Read More
Internet Security |