How Can Someone Get Private Information From My Computer?

From the "Ask Booster" column in the June 17, 2005 issue of Booster's Auction News, a free ezine for online auction sellers and enthusiasts.

Dear Booster,

How can someone get private information from my computer?

Thank you,

Evan S.
Minnesota U.S.A.

Dear Evan,

Hackers can get your private information from your computer in a number of ways. Here are the top ways they do it:

* Computer viruses, spyware and adware from e-mails you've received and/or websites you've visited.

* Hacker programs that find unprotected IP addresses are subject to attack. An IP address is a series of several numbers (ex. 65.129.37.84) that identifies your location on the internet. It's like your "internet" telephone number.

* Entering your financial information (i.e., credit card info) into a website that does not offer secure order processing. Your internet browser should show you that you've entered a secure site.

* Having your financial information "intercepted" by a hacker while shopping online at a legitimate website. This is called "pharming" and is becoming a more worrisome threat.

* You downloaded software from that contained a malicious program.

* You fall victim to a "phishing" or "spoof" scam, whereby you GIVE your personal information away.

* Phishing and spoof e-mails appear as if they are coming from a legitimate website. The e-mail generally alarms the recipient with a message such as "your account has been suspended" or telling you that you need to "verify your account." Most eBay and PayPal users have received at least one (if not several more) spoof e-mails appearing to come from either eBay or PayPal.

eBay has information showing you how to spot spoof. I highly recommend your take a few moments and visit http://pages.ebay.com/education/spooftutorial/index.html for this brief tutorial.

* Another growing threat is called "malware" which is a spyware. Malware is a malicious software which logs your keystrokes and forwards the information to a hacker. This type of software can come through viruses and is often included in downloaded applications.

Knowing how to protect yourself can greatly reduce your risk of identity theft. Following are some suggestions to help you protect yourself. The programs listed below are just a few of the many options available.

* Use an anti-virus software such as Norton AntiVirus (www.norton.com) or McAfee AntiVirus (www.mcafee.com) and regularly UPDATE it. Updating is absolutely CRITICAL if you want the software to protect you. For thorough spyware and adware scanning, popular software choices are Spy Sweeper (http://www.webroot.com) and SpyCop (http://www.spycop.com).

* Using a firewall software such as Zone Alarm (www.zonelabs.com), Norton Personal Firewall (www.norton.com) or McAfee Firewall (www.mcafee.com).

This is a good option for dial-up modem users. Why? Dial-up modems are slower, so a firewall software will often see the attack coming and prevent it. Most hackers don't like the slowness of a dial-up because they can't easily get in and out of your computer without being detected. It is also critical that your firewall software be REGULARLY UPDATED!

* Those accessing the internet with broadband (i.e., DSL, cable modem, etc.) need the added protection of a firewall hardware such as a Linksys Router (www.linksys.com), NetGear Router (www.netgear.com) or DLink Router (www.dlink.com). The reason why is because the speed is higher on broadband which allows the hacker quicker access into your computer without being detected. The router is what will be "on the internet" versus your computer. Since the router is not a computer, there is nothing for the hackers to attack (i.e., no hard drive, no processor, etc.). The router simply acts as a "bodyguard" that only allows those with permission to come in.

* In the event that you unintentionally "bring in" a hacker (as explained above) or you had the misfortune of being the victim of a very clever hacker, it's still smart to have a firewall software (in addition to firewall hardware) to make it difficult for the hacker to "exit" with your data.

If you want to check the vulnerability of your machine for free, visit the well-respected GRC's Shields Up website at https://www.grc.com/x/ne.dll?bh0bkyd2. This website will attempt to break into your computer in order to expose vulnerabilities. Click on the individual options (i.e., file sharing, common ports, etc.) for a vulnerability analysis.

Keeping up-to-date with internet scams is also helpful in keeping your private information safe. Here are just a few reference websites you may want to bookmark for future reference:

* Scam Busters: http://www.scambusters.org

* Anti-Spam Help & Advice Website: http://www.spamhelp.co.uk

* AuctionBytes Online Fraud Discussion Forum: http://www.auctionbytes.com/forum/phpBB/viewforum.php?f=28

* Internet Fraud Complaint Center: http://www.ifccfbi.gov/index.asp

* Anti-Phishing Working Group: http://www.antiphishing.org

* Microsoft - Help Safeguard Your Personal Information Online: http://www.microsoft.com/security/incident/spoof.mspx.

Lastly, check out the Better Business Bureau & Javelin Strategy's ID Quiz to see how safe you are from identity theft: http://www.javelinstrategy.com/IDSAFETYQUIZ.htm.

Great question, Evan. Thanks!

Wet kisses & tail wags,

Booster

BoostYourBids.com is a free information website for online auction sellers and enthusiasts. BoostYourBids.com publishes a free opt-in ezine called "Booster's Auction News" every Friday. Subscribers of this newsletter are automatically entered each month in Booster's Monthly Prize Drawing featuring valuable prizes geared towards online auction sellers.

Booster's Auction News is written by Angela Saul, webmaster of BoostYourBids.com. Angela has been selling on eBay and other online auction sites for more than five years.

http://www.BoostYourBids.com - The FUN Internet Destination for Online Auction Sellers & Enthusiasts!

In The News:


pen paper and inkwell


cat break through


Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking

Airport Menace: The Wireless Peeping Tom As a network... Read More

Temporary Internet Files - the Good, the Bad, and the Ugly

A little bit of time invested into learning about internet... Read More

Free Antivirus Security Software: Download Now to Eliminate Spyware, Pop Up Ads, etc.

Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More

Types Of Computer Infections

Computer infections can be broken up into 4 main categories... Read More

What Can Be Done About Spyware And Adware

Having a good Spyware eliminator on your computer is vital... Read More

Spyware, What It Is, What It Does, And How To Stop It

Spyware is software that runs on a personal computer without... Read More

The One Critical Piece Of Free Software Thats Been Overlooked

Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More

DOS Attacks: Instigation and Mitigation

During the release of a new software product specialized to... Read More

Mall Protection

The Loss Prevention Manager should be receptive to the needs... Read More

How To Clean the Spies In Your Computer?

Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More

Dont be a Dork ? Protect Yourself

There are folks out there who use their powers for... Read More

Everything You Need To Know About Spyware and Malware

You are at your computer, checking out software on EBay.... Read More

How to Protect Yourself Against Online Criminals

Credit card fraud is a growing problem for online businesses... Read More

Wells Fargo Report Phishing Scam

First off I should explain what phishing is. Phishing is... Read More

Personal Firewalls - Secure Your Computer

There has not been a time in the history of... Read More

3 Pervasive Phishing Scams

Scams involving email continue to plague consumers across America, indeed... Read More

The 5 Critical Steps to Protecting Your Computer on the Internet

Spyware, viruses and worms... oh my!If you are connected to... Read More

Protecting Your Home Both Inside and Out

If you are a parent, you have probably wondered at... Read More

How Can Someone Get Private Information From My Computer?

From the "Ask Booster" column in the June 17, 2005... Read More

How to Protect Yourself from Viruses, Spyware, Adware, and Other Nuisances

Spyware/adware is a new major concern for PC users everywhere.... Read More

Internet/Network Security

Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More

Spyware ? Your Web Browser is the Culprit!

My first experience with a spyware BHO based infection was... Read More

New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue

In 1997, I decided after 15 years as a practicing... Read More

Online Shoppers, Beware of a New Scam

Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More

5 Tips For An Unbreakable Password

Despite the current wave of identity theft and corporate security... Read More

Dont Allow Hackers to Take Out Money from Your Bank Account

If you know what is the 'Fishing' then it's very... Read More

Personal Firewalls for Home Users

What is a Firewall?The term "firewall" illustrates a system that... Read More

Traditional Antivirus Programs Useless Against New Unidentified Viruses!

Every now and then you can read about a new... Read More

Internet Privacy

Over the past few years as the internet has become... Read More

How To Give Away Your Personal Information

Identity Theft and Your Personal Information Identity theft is... Read More

Watching the Watchers: Detection and Removal of Spyware

If spyware were a person and he set himself up... Read More

Detect Spyware Online

You can detect spyware online using free spyware cleaners and... Read More

Computer Viruses, Worms, and Hoaxes

In recent days, I was one of the unfortunate persons... Read More