Chris Simpson, head of Scotland Yard's computer crime unit was unpleasantly surprised to learn how easy it is to cheat anybody out of his or her personal info -- by means of a fake survey.
This survey wasn't a scam; in fact, it was an experiment. It was carried out in March for the Information Security show (April 26-28). The results showed that most people casually give out their personal info.
Market researchers questioned 200 people on London streets in a bogus survey on theater-going habits. 92% of those who took part disproved the common stereotype of British as reserved people. They readily gave out personal data, including first school and birth dates, mothers' maiden names, names of pets -- valuable info for, say, cracking passwords. During the survey many people volunteered such key details as name, address and postcode.
The chance to win free tickets was enough for these people to reveal almost everything one might need to impersonate them. By the end of the survey, the fake researchers had everything they needed to take out credit cards in their name and even open bank accounts. These 200 people were lucky -- the survey was just a trick. But what if it hadn't been?
Instead of laughing at naive and unwary Londoners, let's think whether we all are careful enough with such personal data. Aren't we sometimes give away information without a clear idea how it will be used -- and by whom?
Much cautioned about identity theft and phishing in the Internet, we tend to relax when speaking in person. Most of us will never click links in spam or open attachments if we don't know who sent the email. We don't trust letters asking us for sensitive information. We are getting wiser.
We have heard about identity theft plenty of times. We know that good deal of identity theft occurs offline. But all the same, some of us are still far from having good habits such as shredding personal correspondence before throwing it into the trash, or not having the same easy-to-guess password just for everything.
The odds of identity theft online partly depend on such factors as what anti-virus and anti-spy software is installed on a PC and how often it is updated. Software vendors try to develop and provide effective means of defense against information-stealing malware. Of course, much depends on whether the user is careful enough to avoid a phishing scam, and even on what sites he visits -- one can easily pick malware while visiting certain websites.
As for plain looking over your shoulder when you are writing something down, digging out papers from your trash or picking some valuable info from a casual talk -- nothing will help you if you carelessly scatter information about yourself.
Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company that provides solutions for preventing identity theft.
The company's R&D department created an innovative technology, which capable of blocking information-stealing malware.The company's anti-keylogging software disables the very processes of information capturing -- keylogging, screenshoting, etc.
Learn more -- visit the company's website http://www.anti-keyloggers.com
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More
When surfing the Internet you probably take your anonymity for... Read More
Ebay is a great site and is used by many... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More
Spelt phishing, but pronounced as above, this despicable act is... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
Since its birth, the Internet has grown and expanded to... Read More
A few nights ago I received an email from "2CO"... Read More
Fishing on the Internet has come a long way. However,... Read More
First I would like to stress I am condoning the... Read More
It's a sad statistic, but hundreds of unsuspecting kids are... Read More
As more people are logging onto the Internet everyday, Network... Read More
The most frustrating part of having Spyware on your computer... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
The words Corporate Security may conjure up images of a... Read More
It's been with us since 1993, it's gotten more intrusive,... Read More
Identity Theft is one of the most serious problems facing... Read More
There is no doubt that "how-to articles" have become a... Read More
Before we start, I want to make it clear that... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
If you use emails actively in your communication, you must... Read More
Business on the internet is getting down right shameless. This... Read More
If you use the internet, you have probably been infected... Read More
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More
Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
If you are wondering how to fight spyware for safe... Read More
There you are busily typing away on your PC or... Read More
The 1998 Data Protection Act was not an extension to,... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
Every day millions of people go online to find information,... Read More
Microsoft routinely releases new security updates, many of which are... Read More
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
We all get the odd virus now and then, but... Read More
Spyware symptoms happen when your computer gets bogged down with... Read More
With the advent of the World Wide Web, a whole... Read More
The Internet offers a global marketplace for consumers and businesses.... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
Identity Theft is one of the most serious problems facing... Read More
There are ways to insure security though. You can get... Read More
The average computer is packed with hidden software that can... Read More
A couple of years back, I paid my dues the... Read More
Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
Spyware is software that runs on a personal computer without... Read More
While clicking from site to site on the internet you... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
Phishing is the act of some individual sending an email... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
A couple of days ago, I was searching for a... Read More
Having a good Spyware eliminator on your computer is vital... Read More
This really chapped my lips...I recently bought a new computer.... Read More
At this point, if you've got the whole "turning the... Read More
You can detect spyware online using free spyware cleaners and... Read More
Over £5 billion pounds was spent on online shopping in... Read More
Internet scams and frauds are on the rise! The quantity... Read More
In today's times spyware is a very serious issue and... Read More
Someone recently told me, "You would have to be a... Read More
Phishing is a relatively new form of online fraud that... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
Computer security for most can be described in 2 words,... Read More
Today the internet is a mine field of malicious code... Read More
First, let's do a little recap'. As I stated in... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
It's late. You've been scouring the web for that perfect... Read More
Internet Security |