Category: ID Theft

Protecting your business against online hacker is your main goal. To achieve this goal, you need to choose between hiring a third-party security provider and to do it on your own. If you prefer a DIY, you need to consider the following points.

You need to consider your experience and expertise. Do not risk it unless you know how to handle it personally or you have an IT staff who can do it. Third-party providers have the experience, skills, and tools to execute. Lastly, online security requires intense planning and maintenance and it won’t work if you are not committed to it.

Source: Forbes

Screen-exclamationPeople all know that vulnerability has been out there for many years and that they have discovered threats out there. For one, online shoppers are at the mercy of websites where they are buying their goods, but these are also places, where security can be at risk. What can you do to avoid the issue? First, look at the padlock symbol in the site’s URL, which can indicate if the website is using an HTTP that can encrypt communications. You should also be selective when it comes to giving your payment information on websites to use for later purchases. Do not store your credit card information on them to avoid thefts from getting your personal and financial details. See the full story from the source.

Source: Market Watch

globe2People get more concerned about the security of their password after news about a Russian hacker allegedly stole numerous usernames and passwords broke recently.  Here are few tips to help online users secure their passwords.

Use combinations of characters in lower and upper case, numbers and signs or symbols. More websites use case-sensitive passwords and this increases your password security. Do not use obvious keys such as ‘password,’‘admin’ or ‘1234’ and among others. Some websites even prohibit using dictionary words. Never recycle passwords. Once you’ve changed it, forget using the previous ones. You hold the key to your security as well as the possibility of being internet vulnerable.

Source: Tech Times

Safety Shopping Tips Online

globe2The Internet proves to become a helpful tool to free any boundaries set by geographical locations. This is more evident when you’re shopping online. With it, you entrust your information to someone you don’t know like your credit card and personal information like your tax identity and contact information. When you do this, you must ensure that you do some research of your own regarding the online company you’re dealing with. One thing that you could do is to avoid debits, rather, choose credit. For more information regarding this, check out the source.

Source: About.com

IRS Tips On Identity Thefts

Computer-WarningJust a few weeks after the recent database attack at Target including credit card information, there have been many emails that have been sent out from the website of credit card companies. These emails indicate what they were doing in order to fight these types of incidents. On the other hand, according to the Internal Revenue Service, you can also be a victim of identity thefts when you’re processing tax returns. The said agency has doubled their staff that aims to battle and handle identity cases. This has been done since last year, which brings the total to about 3,000. Aside from that, they have about 35,000 employees working with any taxpayer to handle and recognize identity as it occurs. For more about this story, check out the source.

Source: Boston

security1Today, Techman noticed an email regarding the top seven things that you can do to protect yourself from identity theft. These things are truly worth sharing, as they are so important. According to them, if you happen to be a victim of identity theft, you must understand where it actually took place. Most identity thefts happen at a business’ location. It can occur through robbery, employee initiated crimes or hackers breaching your computers.  In order for you to battle this, you would need to secure your wallet and all information in it. For more information regarding this, check out the source.

Source: Techman Texts

socialmediaThe increasing use of social media by small businesses and large organizations means that there will be threats from hackers. Hackers often break into accounts to post false messages or steal information that can be used for financial gain. Social media accounts need to be treated the same as in-house computer systems by using various security measures.

Unique Passwords

Social media networks all require a user to log in with a username and password. Passwords used for a social media account needs to be unique. This means you should not use the same log in information to access multiple accounts. The use of the same username and password for multiple social media sites is the best way to get one or more accounts hacked. Each social media account will need to have separate log in information for the username and password. If someone manages to hack into one of your social media accounts, or even your email, then they will not be able to gain access to any other account.

Strong Passwords

The passwords that are used for social media accounts need to be difficult to decipher. This means that passwords should not include words that anyone can find in a standard dictionary. The best option is to use acronyms for words that only you know. You should also include numbers and alternate letters that are used between upper case and lower case. A strong password consists of 15 characters or more. Your goal is to create a password that is hard for anyone to crack.

HTTPS Connections

This is a setting for social media sites that allows for secure browsing. Most sites now have this turned on my default. However, if you use Facebook and do not see HTTPS in your address bar, then you will need to enable this is the settings for your account. Connecting to any website using HTTPS means the connection is being encrypted. One reason that is a concern is because of key loggers. Key loggers will record anything typed on your keyboard. You can prevent key loggers from getting your username and passwords by installing an encryption program on your system.

Account Access

Accessing social media accounts should not be done from a shared computer. A shared computer keeps all your log in information stored and you may not know if it is infected with malware. The best way for you to access social media accounts is from a single device, such as a laptop computer, a tablet, or your smartphone.

Third-Party Apps

Apps that are installed on a smartphone or tablet computer, such as games, often want permission from users to access their social media account. If you need to install a third-party app, then you will need to create a new account. Do not use your Facebook log in as a shortcut to log in to an app. If you have the log in for your Facebook compromised, then other social media sites can be easily accessed.

Additional Information

Install an anti-virus program on your mobile device that can detect if malware or threats are present on any third-party apps you install. Many are available for the iPhone and Android phones.

This article was written by Mary Johnson.  She is a blogger for wyominginternetproviders.com.  She enjoys writing about current events, social media and technology.

(CNN) — A recent warning from the FBI about hackers targeting guests’ data when they log into hotel Wi-Fi overseas was a salient reminder to travelers of the risks to data security on the road.

The alert, from the FBI’s Internet Crime Complaint Center, was addressed to U.S. executives, government workers and academics but did not specify a particular country of threat.

It warned of a spate of incidents of travelers encountering bogus software update pop-ups when they used hotel internet connections overseas. When they clicked on the “update,” malicious software was installed on their computer.

Hotel Wi-Fi connections are particularly risky, said Sian John, UK security strategist at Symantec, because they are often set up without proper security settings. But they are merely one data-security threat among many facing business travelers.

Source: CNN

Website Hacking

FBI agents arrested West New York (NJ) Mayor Felix Roque and his son Joseph, 22, for illegally canceling the domain name registration of Recallroque.com.

An insurgent political campaign in West New York, N.J., suddenly realized in February that its Web site had been disabled. The campaign was being run by opponents of the mayor, Dr. Felix Roque, and the Web site, recallroque.com, had been intended to rally support to recall him and collect information about what his critics described as his rampant mismanagement.

Mayor Roque, 55, who was elected last year, was encouraged by his 22-year-old son, Joseph Roque, to successfully gain access to the GoDaddy-hosted website and had successfully took it offline. The father and son duo then learned the identities of the site’s creators—several local public official and media personalities—whom he threatened to “punish” by way of Roque’s political power.

Father and son appeared, shackled at the hands and feet, in federal court in Newark on Thursday, where a judge told them that they face up to 11 years in prison and $600,000 in fines. They were released on $100,000 bond each, officials said.

Source: The New York Times

Beware Your Login DetailsResearchers at security firm BitDefender have detected a new do-it-yourself kit created to produce customized Trojans that pilfer Facebook login details, passwords stored inside browsers and even VPN credentials.

The kit is termed as “Facebook Hacker” and it is very easy to configure, just like any do-it-yourself tool crafted with the ‘skiddie’ [script kiddie] in mind.

BitDefender’s Loredana Botezatu explains:

“Once run, the malicious tool will snatch the victim’s Facebook account’s credentials, along with all the usernames and passwords that we carelessly ask the browser to remember for us … because Facebook Hacker also targets the Internet browser and instant messaging clients to pick up the entire list of “remembered” identification data.”

Source: ESecurityPlanet