From the "Ask Booster" column in the June 17, 2005 issue of Booster's Auction News, a free ezine for online auction sellers and enthusiasts.
Dear Booster,
How can someone get private information from my computer?
Thank you,
Evan S.
Minnesota U.S.A.
Dear Evan,
Hackers can get your private information from your computer in a number of ways. Here are the top ways they do it:
* Computer viruses, spyware and adware from e-mails you've received and/or websites you've visited.
* Hacker programs that find unprotected IP addresses are subject to attack. An IP address is a series of several numbers (ex. 65.129.37.84) that identifies your location on the internet. It's like your "internet" telephone number.
* Entering your financial information (i.e., credit card info) into a website that does not offer secure order processing. Your internet browser should show you that you've entered a secure site.
* Having your financial information "intercepted" by a hacker while shopping online at a legitimate website. This is called "pharming" and is becoming a more worrisome threat.
* You downloaded software from that contained a malicious program.
* You fall victim to a "phishing" or "spoof" scam, whereby you GIVE your personal information away.
* Phishing and spoof e-mails appear as if they are coming from a legitimate website. The e-mail generally alarms the recipient with a message such as "your account has been suspended" or telling you that you need to "verify your account." Most eBay and PayPal users have received at least one (if not several more) spoof e-mails appearing to come from either eBay or PayPal.
eBay has information showing you how to spot spoof. I highly recommend your take a few moments and visit http://pages.ebay.com/education/spooftutorial/index.html for this brief tutorial.
* Another growing threat is called "malware" which is a spyware. Malware is a malicious software which logs your keystrokes and forwards the information to a hacker. This type of software can come through viruses and is often included in downloaded applications.
Knowing how to protect yourself can greatly reduce your risk of identity theft. Following are some suggestions to help you protect yourself. The programs listed below are just a few of the many options available.
* Use an anti-virus software such as Norton AntiVirus (www.norton.com) or McAfee AntiVirus (www.mcafee.com) and regularly UPDATE it. Updating is absolutely CRITICAL if you want the software to protect you. For thorough spyware and adware scanning, popular software choices are Spy Sweeper (http://www.webroot.com) and SpyCop (http://www.spycop.com).
* Using a firewall software such as Zone Alarm (www.zonelabs.com), Norton Personal Firewall (www.norton.com) or McAfee Firewall (www.mcafee.com).
This is a good option for dial-up modem users. Why? Dial-up modems are slower, so a firewall software will often see the attack coming and prevent it. Most hackers don't like the slowness of a dial-up because they can't easily get in and out of your computer without being detected. It is also critical that your firewall software be REGULARLY UPDATED!
* Those accessing the internet with broadband (i.e., DSL, cable modem, etc.) need the added protection of a firewall hardware such as a Linksys Router (www.linksys.com), NetGear Router (www.netgear.com) or DLink Router (www.dlink.com). The reason why is because the speed is higher on broadband which allows the hacker quicker access into your computer without being detected. The router is what will be "on the internet" versus your computer. Since the router is not a computer, there is nothing for the hackers to attack (i.e., no hard drive, no processor, etc.). The router simply acts as a "bodyguard" that only allows those with permission to come in.
* In the event that you unintentionally "bring in" a hacker (as explained above) or you had the misfortune of being the victim of a very clever hacker, it's still smart to have a firewall software (in addition to firewall hardware) to make it difficult for the hacker to "exit" with your data.
If you want to check the vulnerability of your machine for free, visit the well-respected GRC's Shields Up website at https://www.grc.com/x/ne.dll?bh0bkyd2. This website will attempt to break into your computer in order to expose vulnerabilities. Click on the individual options (i.e., file sharing, common ports, etc.) for a vulnerability analysis.
Keeping up-to-date with internet scams is also helpful in keeping your private information safe. Here are just a few reference websites you may want to bookmark for future reference:
* Scam Busters: http://www.scambusters.org
* Anti-Spam Help & Advice Website: http://www.spamhelp.co.uk
* AuctionBytes Online Fraud Discussion Forum: http://www.auctionbytes.com/forum/phpBB/viewforum.php?f=28
* Internet Fraud Complaint Center: http://www.ifccfbi.gov/index.asp
* Anti-Phishing Working Group: http://www.antiphishing.org
* Microsoft - Help Safeguard Your Personal Information Online: http://www.microsoft.com/security/incident/spoof.mspx.
Lastly, check out the Better Business Bureau & Javelin Strategy's ID Quiz to see how safe you are from identity theft: http://www.javelinstrategy.com/IDSAFETYQUIZ.htm.
Great question, Evan. Thanks!
Wet kisses & tail wags,
Booster
BoostYourBids.com is a free information website for online auction sellers and enthusiasts. BoostYourBids.com publishes a free opt-in ezine called "Booster's Auction News" every Friday. Subscribers of this newsletter are automatically entered each month in Booster's Monthly Prize Drawing featuring valuable prizes geared towards online auction sellers.
Booster's Auction News is written by Angela Saul, webmaster of BoostYourBids.com. Angela has been selling on eBay and other online auction sites for more than five years.
http://www.BoostYourBids.com - The FUN Internet Destination for Online Auction Sellers & Enthusiasts!
![]() |
|
![]() |
|
![]() |
|
![]() |
With the Internet entering our lives in such an explosive... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
Pharming is one of the latest online scams and rapidly... Read More
As soon as almost all computer users already got used... Read More
Every now and then you can read about a new... Read More
Nobody wants to pay to remove spyware. At the very... Read More
A couple of days ago, I was searching for a... Read More
Have you ever bought a product or service from the... Read More
As more people are logging onto the Internet everyday, Network... Read More
First the basic definition of Spyware: It is a type... Read More
First off I should explain what phishing is. Phishing is... Read More
Every day millions of people go online to find information,... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
We all know that it's dangerous to use the same... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
Before you enter your name, address or any other data... Read More
Computer security for most can be described in 2 words,... Read More
Credit card fraud is a growing problem for online businesses... Read More
Since its birth, the Internet has grown and expanded to... Read More
You are at your computer, checking out software on EBay.... Read More
Someone recently told me, "You would have to be a... Read More
To blog or not to blog? Well, why not? Lots... Read More
The words Corporate Security may conjure up images of a... Read More
A few nights ago I received an email from "2CO"... Read More
This is not some new fangled techno-speak, it is a... Read More
Afraid that someone is monitoring your PC or installed a... Read More
Spelt phishing, but pronounced as above, this despicable act is... Read More
Spyware/adware is a new major concern for PC users everywhere.... Read More
Today the internet is a mine field of malicious code... Read More
Sooner or later everyone with an email account will receive... Read More
The Internet offers a global marketplace for consumers and businesses.... Read More
Watching how the traditional media covers the latest virus or... Read More
You can detect spyware online using free spyware cleaners and... Read More
Working from home has its advantages, including no commute, a... Read More
The Internet offers a global marketplace for consumers and businesses.... Read More
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
In 1997, I decided after 15 years as a practicing... Read More
Paypal is a great site and is used by many... Read More
Nobody wants to pay to remove spyware. At the very... Read More
Many of us have run into an annoying and time-consuming... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
Since its birth, the Internet has grown and expanded to... Read More
After Two Security Assessments I Must Be Secure, Right? ... Read More
As the number of people using the Internet as an... Read More
These six ways to prevent identity theft offer you valuable... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
Everyone should eliminate spyware and adware from your hard drive... Read More
If you have used a Windows machine for a while,... Read More
Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More
P C. owners are constantly at risk from attacks by... Read More
The words Corporate Security may conjure up images of a... Read More
Much has been said on the theory of password protection... Read More
What is computer security? Computer security is the process of... Read More
With the advent of the World Wide Web, a whole... Read More
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More
Today,on most internet user's computers, we have the ability to... Read More
File sharing on p2p is soaring despite the music and... Read More
Have you ever bought a product or service from the... Read More
It's a sad statistic, but hundreds of unsuspecting kids are... Read More
This is the second in a series of articles highlighting... Read More
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
Internet Security |