Sunday, December 6, 2009

10 Tips to Protect Yourself from On-line Scams During this Holiday Season


News Channel 10 Has Put Out a Holiday Alert:
“ONLINE HOLIDAY SHOPPERS SHOULD BE AWARE OF SCAMS”
Online shopping has become a lot more popular with working people and those who do not like to fight the crowds. More than half the consumers are expected to shop online for holiday gifts. This year 26% more folks will be shopping online than last year. However, online shoppers are at risk for scams and identity theft during this holiday season. Internet fraud cost about $340 million last year.
e.Week.com reports that online fraud depends on an offline component – people who launder money. National and International Cybercriminals first use online Trojan Horse Viruses to gain access to your bank account and credit card numbers and passwords. A Trojan Horse Virus works by hiding in a seemingly acceptable program and makes you think that there is nothing wrong with it. It will then steal your personal information and send it to an internet server designed by the cybercriminal, thereby gaining control over your computer which will eventually crash. Trojan Horse Viruses are difficult to remove.
After your information is stolen, Money Mules, people who think they have legitimate jobs as salesmen, private financial receivers, or shipping managers, are recruited. Their job is to transfer illegal funds from your credit card and bank accounts to websites or wholesale product distribution services owned by the criminals. In this way anti-fraud systems are avoided.
10 Steps to Protect Yourself from Online Scams:
1. Don’t let your guard down when shopping online. Do business with companies you know.
2. Make sure the company is secure by noting whether the Web address starts with http://.
3. Check for the padlock icon on the bottom of the browser. Click on the icon and you should see the site address. It should match the address on the top of the page. If they don’t match, it could be a fraudulent website.
4. Avoid shopping on sites that don’t have a bright green banner in the address bar when you are checking out. The green banner indicates that the site meets the industry standard for online safety.
5. Keep printouts of the web page describing the item you ordered, the price you paid, any email messages, and the page that shows the seller’s name, address, and telephone number.
6. Make sure all your security software is updated before you do shopping online. These include antivirus software, antispyware, and firewalls.
7. Be proactive in looking for the best kinds of computer protection. You need industrial grade security software rather than over-the-counter or freeware products to block the Trojan Horse Virus before it can steal your personal information.
8. Most of the common hassles and headaches that come with being infected with Trojan Horse Viruses are eliminated.
9. A personal computer service will make your experience on the computer fun, productive and hassle-free.

10. You should seriously consider considering having industrial grade software and a personal computer service where a team of trained professionals constantly keep your computer protected and manage everything for you. The service includes security checkups, system cleanups, and online repair. Freeware and traditional over-the-counter computer protection products do not provide this type of service.

When you have industrial grade software that bypasses the Windows’ operating system and blocks trojan horses, viruses, spyware, and malware from entering your computer along with a personal computer service, you can safely shop online and enjoy this holiday season.

Thursday, December 3, 2009

10 Tips to Protect Yourself from Identity Theft During the Holidays


10 Tips to Protect Yourself from Identity Theft During The Holidays

The Identity Theft Resource Center has put out a Holiday Alert:
“IDENTITY THIEVES DON’T TAKE A HOLIDAY”

The ITRC reports that the time between Thanksgiving and Christmas is the biggest shopping season of the year. They remind us to take extra precautions against identity theft. Credit card companies offer us new cards. We get mail from stores with discounted products. Charities are asking for donations. Shopping environments are crowded, and conditions are ripe for thieves to steal our identities. No one is immune-from birth to beyond death. About 10 million people have their identities stolen each year.

Follow these 10 Steps to Safeguard Your Identity:

1. Guard Your Social Security Number as if it were cash. If it is lost, contact the Social Security Administration at www.ssa.gov or 1-800-772-1213 to get a new one. However, reporting a lost card will not prevent misuse.
2. You will need a service that monitors your social security number daily to check if an identity thief is using it, contacts the necessary agencies, and fills out all the paperwork to help you restore your identity to pre theft status.
3. Check your bank and credit card accounts. If you notice something suspicious, contact your bank or credit card issuer immediately.
4. Never give personal or financial information over the telephone.
5. Leave your checkbook at home as it has information identity thieves want, e.g. name, address, telephone number, and routing and account numbers on it.
6. Carry your money and credit cards securely. Women should not leave their purses open or unattended, and men should not carry their wallets in their back pockets.
7. Be aware of your surroundings. Go to a brightly lit ATM, shield your transactions with your body, and if you see an odd looking gadget attached to the ATM use another machine.
8. Protect your credit card receipts. Don’t let store clerks staple them to bags, rip up carbon copies, and don’t put them in trash cans for identity thieves to get.
9. Protect yourself against credit card skimming when a store clerk or waitress slides your credit card through a second machine and downloads it onto a counterfeit card.
10. Be extra careful when it comes to mail. Lock your mailbox. If monthly bills haven’t arrived on time, contact the issuer and the post office. Mail bills at the post office at the end of the day. When you go away, hold your mail at the post office, and shred any credit card offers that aren’t wanted.
Following these simple tips can help you avoid being a victim of Identity Theft this holiday season. Being safe and secure helps ensure a stress free holiday.

Friday, November 27, 2009

College Students Are At Risk for Identity Theft




Phillip Kuhlman reports in the Devil's Tale that Identity Theft is the fastest growing crime in the country and college students are very much at risk.

Jeri Ledford from About.com describes how identity thieves steal student's identities:
  • 40% of college students receive multiple pre-approved credit card offers that are usually partially filled out with the recipient's name, address, and other personal data. 30% throw the form into the trash without destroying them. An identity thief can take it out of the trash can, fill in the rest of the blanks, and call the toll free phone number provided on the form, thereby stealing the student's identity.
  • 30% of college students do not balance their checking and savings account statements. They are not aware of legitimate or fraudulent charges that shows that a thief has been withdrawing money in small amounts from their accounts. In time, this builds up to large amounts of money.
  • Most college students use their computers to access on-line banking, pay bills, order merchandise, do social networking, and communicate in every area of their lives. Lax computer security puts them at risk of having their identities stolen.
  • Many college courses require that students use their social security numbers to log into websites that are used to post homework assignments or other course communications, and 48% of grades are posted by social security numbers. If a thief watches the student enter his/her social security number or looks at the posted grades, the thief can gain access to that number along with a lot more personal information about the student.
  • Many students use laptops in class to take notes and organize coursework documents. If the laptop is stolen, the thief will find their personal information.
  • Students are at risk of having their wallets, purses, or backpacks stolen in a dorm room or at a party and their identities are then stolen.
If a student's identity is stolen, he/she has to clear up the mess. It's almost as if they have been assaulted as it can be a long and tedious process to rebuild one's identity.

The Federal Trade Commission provides 4 basic steps to take if you become a victim of identity theft:
  1. Call a Fraud Alert to the three consumer reporting companies - Equifax, Experian, and Transunion. A fraud alert stays on your credit report for 90 days and can keep an identity thief from setting up new credit card accounts in the student's name.
  2. Close breached accounts. It is better to do it in person, rather than on-line or via e-mail. Write to bank and credit card companies to create a paper trail. Supply each company with copies of supporting documents and send them by certified mail. Request a return receipt to have a record of when each company received the written documents.
  3. File a complaint with the Federal Trade Commission. Fill out an on-line complaint form or call the FTC Identity Theft Hotline at (877) 438-4338.
  4. File a report with the police in the area where the theft took place. Tell the police you want to file an identity theft report. If you can't do it in person, ask if you can place the report over the phone or on-line. If the police seem reluctant, ask them to fill out a Miscellaneous Incident Report.
Does it seem realistic that a college student who is in the middle of taking tests or writing term papers has the time to do all this?

A better way is for the student or his/her family to have an Identity Protection Service that includes the student and helps restore his/her identity to pretheft status. This Identity Protection Service provides:
  • An affordable Expense Reimbursement Insurance Policy to cover the costs of repairing the student's identity.
  • Monitoring of National Databases.
  • Staff at the Service immediately notify the student if his/her identity has been stolen, unlike banks and credit card companies who let you know a month later.
  • A professional team calls the agencies and does all the paper work.
  • The team works together with law enforcement to find the thief and put him/her in jail
Now students and their parents can feel safe. They can feel secure that if the student's identity has been stolen, there is help to get it back.

Monday, October 5, 2009

What You Can Do If Your Medical Identity Has Been Stolen

According to the American Health Information Management Association, medical identity theft accounts for 3% of all identity theft crimes. 250,000 people a year have their medical identities stolen. Those particularly at risk are the elderly, newborns, minors, people on registries e.g. cancer registry, individuals with developmental disabilities, and dead people.

The major question is: What happens when a medical identity thief uses your name, social security number, and medical insurance information to get services from doctors, emergency rooms, and pharmacies? The answer is a false medical record is created in your name. When you go to get medical services, your treatment is now based on the thief's blood type, allergies, prescription drug use, and a history of his/her diseases, and you could die.

If you live, your life becomes a nightmare as it is difficult to get your medical identity back. You can't even get a copy of your medical records as your information is mixed in with the thief's information. The federal law known as Hipaa (Health Insurance Portability and Accountability Act) regulates that the thief's medical information must be kept confidential.

Ten Steps to Get Your Medical Record Corrected:
  1. Contact the health information manager or the anti-fraud hotline of the health plan where the medical identity theft occured.
  2. Request a copy of your medical records.
  3. Work with the health plan to stop the flow of incorrect information and correct the existing inaccurate health record entries.
  4. File a police report.
  5. File a complaint with the attorney general.
  6. File a complaint with the Federal Trade Commission's Identity Theft Data Clearinghouse.
  7. Contact the Department of Health and Human Services for Medicare and Medicaid fraud.
  8. Check with state authorities for resources.
  9. Review health records to make sure they have been corrected before prior to seeking new healthcare insurance.
  10. Change all personal identification numbers and passwords.
It can take years to correct your record using these methods. It must be done on a case-by-case basis as the thief's medical information may be hidden in complex payment systems, databases, and medical records of healthcare providers and insurance companies. Until such time as all your records are corrected, you could be denied additional health, disability, or life insurance, and your credit could be ruined.

I want to share with you the way I protect my medical identity. I just love having an Identity Protection Service as it monitors my social security number and medical insurance information every day for medical fraud, insurance records, and criminal records. Should my medical identity be stolen, a team of professionals will help me correct it.

Check List to Determine Whether an Identity Protection Service Would be Good For You:
  • Would you like to quickly know if your identity theft has been stolen?
  • Would you like a professional team to help you recover your identity?
  • Would you like the team to call the agencies and do the paper work for you?
  • Would you like your family to be protected?
  • Would you like to have an affordable Expense Reimbursement Insurance Policy?
It would be my pleasure to share with you a safe and secure way to live and be healthy without stress and fear.

Thursday, September 17, 2009

How European Cyber-Gangs Target Small and Mid-Sized Businesses

Brian Krebs, a Washington Post writer, reports that The Financial Services Information Sharing and Analysis Center, an industry group created to share data about threats to the financial sector, received alerts that European Cyber-Gangs set off a multi-million dollar crime wave by stealing from small and mid-sized U.S. companies. Until six months ago, cyber-gangs weren't noticed because the businesses were small and mid-sized.

Significant increases in funds transfers involved the exploitation of valid banking credentials belonging to these businesses. Cyber-gangs sent emails to controller or treasurers with a message that contained malicious software designed to steal passwords. They then used the passwords to send wire transfers in increments of less than $10,000 to avoid banks' anti-money-laundering reporting requirements. More than 100 billion spam messages are sent out each day by zombie computers.

Cyber-gangs are cashing in because of the economic downturn. Americans are turning to the Internet to look for jobs. The cybercriminals advertise jobs on the internet. Unsuspecting people accept these job. However, their real job is being a "money-mule" who launders stolen funds. They steal customer account information, set up fraudulent bank accounts, make unauthorized, and wire the money to the crooks.

Mules are a necessary part of cybercrime operations as monies transferred to a criminal's account is easily traced by banks and law enforcement. Since it is the mules who are laundering the monies, they get caught and convicted, not the cyber-kingpins as there is a significant lack of training and understanding in digital forensics, evidence collection as well as in the law courts.

The FBI is working on the problem. Shawn Henry of the FBI Cyber Crime Unit calls cybercrime "the most critical threat to our way of life other than weapons of mass destruction." The greatest challenge in the battle for winning the war on cybercrime is keeping up with the sheer volume of attacks. Hackers find new ways of getting around safeguards put in place. Therefore, it is very important to have multiple layers of defense to protect yourself from cybercriminals.

Check List to Survive on the Internet:
  1. Professional Grade Software that bypasses the Windows Operating System.
  2. Daily scans that detect and remove malware before it harms your computer.
  3. A combination of anti-virus+anti-spyware.
  4. Anti-rootkit technology that keeps hackers out of the back of your computer.
  5. A monitored firewall.
  6. A team of techs to keep your computer clean and running well.
Computer security is essential to survive on the Internet. Search for the best, but having a team of techs along with great software is the best protection from cyber-gangs.

Monday, September 14, 2009

Who Caused the Twitter Attack?

On 8/6/09 the an alarm rang that Twitter had been hit by a large attack and was not working for several hours,followed by a period of slowness and sporadic time-outs. It was so large that Twitter didn't even know it was under attack until it crashed. This was called a Distributed Denial-of-Service Attack (DDoS). It came from infected computers from all over the world. They were zombie computers and were used by hackers and cybercriminals to cause trouble.

Graham Cluley, a technology consultant at Sophos, explained in an article by C. McCarthy in CNET News, that DDoS attacks come from millions of compromised computers. Some of these computers belonged to people with Twitter accounts. Because they either did not install or update their security software, visited risque sites, or downloaded music and movies from unsecure sites, their computers had become zombie computers.

During the DDoS attack, zombie computers were used to inundate Twitter servers with communication requests. It was difficult for Twitter to deal with the attack because it was hard to distinguish legitimate Twitter communications from communications that were part of the attack. They did not want to block access from IP addresses as many of the zombie computers that was sending traffic to Twitter belonged to law abiding people.

The question is "Who Caused the Twitter Attack?" There are several possibilities:

  1. Paul Henry, a security analyst, explained that it happened at the same time as the Hacker Convention where a new version of malware, that was found on Twitter messages, was introduced.
  2. A European Blogger believes that a foreign country was behind the attack because such a large attack could only be organized by somewith huge resources.
  3. According to a spokeswoman at Facebook, the attack might have been directed at an individual who had a presence on a number of sites, rather than the sites themselves.
  4. So many Twitters did not have adequate security on their computers and were zombie computers that they made it easy for a hacker to attack Twitter
We can all learn from the Twitter attack how important it is to install security software on our computers and continuously undate and upgrade them. This will keep them safe and secure and not put Twitter or any other site at risk of being attacked.

I can identify with those who had no security on their computers. I once was like you, but then my computer started to slow down. I met someone who told me he could help. I took a test and found out that 7,500 malicious codes were on my computer. I immediately enrolled for personal computer services. A team of techs cleaned up my computer and installed professional grade software on it. I now occasionally call them if I have any computer related issues.

Check List for a Safe and Secure Computer With the Following:
  • Alerts of unexpected events that could harm your computer.
  • Daily scans that detect and remove malware before it harms your computer.
  • The latest security updates.
  • A protected computer with a combination of antivirus+antispyware.
  • Have the holes in back of your computer closed up so hackers can't get in.
  • Critical data and sensitive information protected from being compromised or modified.
  • Your organization's computing assets protected from loss and/or damage from network attacks.
  • A firewall that is monitored.
  • Fully protected emails and attachments.
  • Improved performance of your computer.
Was your computer one of the zombie computers that contributed to the attack? Even if it wasn't, are you sure it won't be in the future? Click on the Twitter icon to learn how to protect your computer from cybercriminals.

How Social Networking Websites Have Become A New Battlegroud for Cybercrime

Originally, social networking websites such as Twitter, Face Book, My Space, and Linked in were considered to be one of the most remarkable technological phenomena of the 21st century and a great tool to allow like-minded people to interact with each other.

However, the European Commission has singled out social networking websites as potentially dangerous. It was recently predicted that social networking websites will soon become the most dangerous places on the Internet, where users are most likely to face cyber attacks and digital annoyances. They will become the main battleground for cybercriminals and identity thieves.

Twitter. a social networking site with 44 million people, has had several attacks. In April 2009 a phishing campaign sent you to a website that stole your user name and password. Staff from Twitter said it was due to a basic vulnerability. Holes like these were found on Face Book and My Space in the past.

On August 6, 2009, Twitter was shut down for hours by cybercriminals. It was described as a Denial of Service Attack, affecting millions of Tweeters. Zombie computers from all over the world had attacked Twitter. It was a complete blackout and was due to SABOTAGE.

A man with a Face Book account was recently hacked. A message was placed on his site stating that he was away from home, had lost his wallet, and requesting money. When he realized that he had been hacked, he contacted Face Book. It took them 5 hours to close his account. During that time, his friends sent $3,000 to the cybercriminal.

Another way that hackers steal your identity is by building fake YouTube Pages with an error message claiming the video you want won't play without your installing new software. When you click on the error message, a virus is put on your computer. Once infected, the hacker then redirects you to a real YouTube page to see the videos you wanted to see - and hides the crime.

Always be on Guard to Protect Yourself on Social Networking Sites and Win the War on Cybercrime. Make sure the URL for the sign up page is correct. If the URL doesn't look right leave the web site and contact the social network. Forward phishing emails to space@uce.gov. If you believe you have been scammed by cybercriminals, file a complaint at www.ftc.gov.

Install a combination of antivirus, antispyware, anti-rootkit, anti-malware and other security technologies along with a bi-directional firewall for superior PC and email protection.

Educate others. Make sure they understand how serious the situation is and how to protect themselves from cybercrime. Tell them they need a managed internet security system with a personal team of techs that takes care of their computer and security problems by phone or remote internet access.
Identity theft, the cybercrime of this century, has become the fastest growing white collar crime in the world and affects us all. It doesn't matter where you live, how much you protect your personal or business information, or how careful you are. Identity theft is an equal opportunity crime with the ability to hurt everyone.

Thursday, September 10, 2009

Cybercrime - A Worldwide Epidemic

The chilling reality is that cybercrime has become an epidemic that is moving so fast that law enforcement cannot catch up with it. The Department of Treasury has reported that the profits of cybercrime are greater than the profits from the sale of illegal drugs.

According to President Obama, Cybercrime has cost Americans more than $8 billion in the past two years and the cost of computers repairs has risen to $11 billion a year.

You ask, "How can my computer get hacked?" There are many ways:

A hacker or cybercriminal installs a piece of software called a rootkit into a hole in the back of your computer, slows down your computer, steals your personal information, and uses your computer to commit criminal activities.

Botnets are used to hack many computers at the same time by infecting them with viruses, spyware, malware, and trojans and preventing you from having access to your email, websites, and online accounts.

Emails are sent out that appear to be coming from a legitimate organization or someone you know. You enter your username and password. However, these "phishing" emails take you to the cybercriminal's web site and they use your information to commit crimes.

Viruses are put into attachments and when someone opens the attachment, the computer become infected with viruses and is hacked.

With rootkits, botnets, phishing emails, and infected attachments, your computer slows down. Cybercriminals gain control of it, make it into a zombie computer, and commit crimes using your computer and your personal information and you are responsible for their crimes. You become aware that there is a Cyber War going on, but you don't know who the enemy is.

So What Can You to Protect Yourself and Win the War on Cybercrime?

Click on the Image above and Learn About a Managed Internet Security Service that has a whole new computer security product to protect you from cybercrime. This new product:
  • Combines anti-spyware and antivirus and other technologies to detect all types of malware.
  • Works inside the core of the Windows Operating System, watching for malware and stopping it before it has a chance to effect the user's system.
  • Has new anti-rootkit technology that finds and disables malicious hidden threats, files, or registry keys on a user's system.
  • Bypasses the Window's Operating System to directly scan certain locations of the hard drive for malware and removes infections where found.
  • Protects against email viruses with direct support for all email programs that use POP3 and SMTP.
  • Has a bi-directional firewall.
However, you don't just get this wonderful software that scans your computer daily. You get a team of certified technicians that spend hours remotely removing the malicious codes that are on your computer that your previous security software did not remove. Afterwards, if you have a problem, they will work on your computer to keep it running well, no matter how long it takes.

Sunday, September 6, 2009

Identity Theft - The Cybercrime of the 21st Century













Identity thieves can be people you know or they can be cybercriminals. People who know you can steal your mail, send your mail to another address, rummage through your trash or steal your wallet or purse. Your personal information can be taken from records at your job, at your doctor's office, at voter registration places, and insurance companies. Cybercriminals commit cybercrime by hacking into your computer, sending you fake emails to get you to give them your personal information, and by infecting attachments.

Identity Thieves are looking for credit card numbers, bank accounts, driver's licenses, dates of birth, social security numbers, and medical data. They run up charges on your credit cards, take out loans, establish phone services, and open up new bank accounts all in your name. They write bad checks, drain your retirement account, and file for bankruptcy in your name. They apply for medical and social security benefits in your name, get a driver's license with your name and their picture, get a job and file taxes in your name, and give your name to the police when they are arrested.

A good example of someone who has had their identity stolen is Ben Bernanke, the head of the Federal Reserve, the main bank in America. According to Newsweek, his wife's purse was stolen in August 2008 with all her personal information. Someone soon began cashing checks on the Bernanke family bank accounts. It turned out that they were one of 500 whose identities were stolen by a crime ring. It took a year for law enforcement to solve the case.

If you become a victim of identity theft, it is a living nightmare. You can end up with a wrongful criminal record, spend up to 500 hours over two years, and it will cost $3,000 or more to restore your identity, and it can happen again.

You ask, "How can I protect myself from being a victim of identity theft and cybercrime?" Shredding your personal information or requesting free credit reports is not enough. Monitoring your credit does not keep you safe. Credit fraud alerts do not work. Up to 50% of the time the creditor does not check the thief's credit and just issues him credit. You also don't need to lock your life away.

While you can't completely prevent identity theft, you can protect yourself against its harmful effects. There is a new form of protection, Identity Risk Protection for Your Whole Identity.
When you subscribe to a Comprehensive Identity Protection Service, your credit, medical information, social security number, insurance records, and driver's license are monitored daily. Should your identity be stolen, experts work together with law enforcement to help restore it to pre-theft status.

Thursday, September 3, 2009

A Business that Protects Against Cybercrime and Identity Theft

We live in the Information Age where most people have and depend on computers at home and for their business. Everyone needs their computer to work, but it is always slowing down due to hackers putting malicious codes, i.e. viruses, spyware, malware, and trojans in the computer to steal our personal information and engage in criminal activities. Consequently, everyone is frequently having their computer repaired and spending a lot of money. Everyone wants a better way to manage their computer.

A business has been created to protect the public from cybercrime and identity theft. It is on the ground floor of a Multi-Trillion Dollar Computer Industry, the next big money making trend in the 21st century.

Software does not keep the cybercriminals away. Big businesses like IBM and Raytheon and Universities like Stanford and John Hopkins have used a Managed Internet Security Service for many years. However, it was too expensive for the individual, family, or small business owner to have. Now this business provides a Managed Internet Security Service which is available and affordable for everyone. Computers are scanned daily and malicious codes are kept away so information cannot be stolen. Everyone has a Team of Techs who take care of the computer by phone and remote connection to the computer. They keep the computers safe, reliable, and running like new. Internet safely alerts, unlimited access to security check-ups, and virus and spyware cleanups are provided. Computer hassles and frustrations are gone with this Managed Internet Security Service.

Another service that is available and affordable is a Whole Identity Protection Service which monitors credit and non credit information daily. Should an identity be stolen, the person is notified immediately, not a month later when the credit bureaus and banks find out about it. A team of professionals work to restore identities to Pre-Identity Theft Status. A $10,000 Expense Reimbursement Insurance Policy which helps defray costs and reimbursement for lost wages is part of the service. Help is given with prior occurrences of identity theft and prevention of repeat identity theft.

This business is truly a first in providing affordable services to protect people from cybercrime and identity theft. Imagine having your own business where corporate grade internet security is affordable as a "monthly service" and unlimited PC support for a hassle free computer is part of that "monthly service." Add to that a full identity monitoring service with a $10,000 expense reimbursement insurance policy also as a "monthly service." Customers have the choice of either one or both of the services. No other company combines protection for both the computer and identity theft.

There is another unique part to this company. Besides combining Personal Computer and Whole Identity Protection Services, it also has a program that is offered to small businesses, insurance companies, non profits, schools, radio stations, internet marketing companies, and the list goes on and on. And if that is not enough, there is a Tech Network which allows thousands of local computer repair shops to market these services to their customers.

The epidemic problems of cybercrime and identity theft will never go away. Anyone who has a computer, is on the internet, and has an identity needs these services. Anyone who can solve these problems and bring peace of mind to others will reap big monetary rewards.

To Join the Tech Team, you'll need my Account#: Bobroff 3767.

Wednesday, August 26, 2009

The Key to Protecting Your Computer from Cybercriminals

Beware of free or store bought security software installed on your computer that claims to protect your from cybercriminals. Your chance of becoming a victim of cybercrime is 7 out of 10.

Companies like McAfee, Symantec (Norton), and Trend Micro, Inc. spend a lot of money advertising that their products prevent cybercrime, but Computer World Security writes that they admitted that vulnerabilities in their security software allow hackers to hijack computers.

The security software and suites that these companies sell DO NOT prevent cybercrime. They mainly focus on worms, Trojan horses, and spyware that allow hackers to infect your computer. It takes many hours for the security companies to capture and analyze the problem, write a new solution, and get it to your computer. In the meantime, hackers are one step ahead of the companies. This explains why 172,000 computers are hacked each day.

Security companies do not focus on vulnerabilities, e.g. weak passwords, software bugs, a computer virus and other malware that allow hackers to install malware on your computer, take your sensitive data, convince you to open an email message with atached malware, or copy a hardened encrypted program onto a thumb drive and crack it at home. Not focusing on these vulnerabilities can bring the "blue screen of death" and make your operating system unusable.

When your computer is hijacked, it becomes a zombie computer and cybercriminals have full control of all your personal information. They use your name and social security number for criminal activities and you don't know that it has been hacked until a policeman arrives at your doorstep to arrest you. It may take a long time for this to happen, and in the meantime your computer slows down You need to have it cleaned up a few times a year and it is expensive.

You wish there was a better way to protect your computer from becoming infected. I once had 7,500 malware on my computer and it was slowing down. I subscribed to a Managed Internet Security Service where a team of techs remotely cleaned it up, and installed professional grade software and a bi-directional firewall in my computer. I just love this Managed Internet Security Service.

Until now only big businesses, universities, and the government were able to afford Managed Internet Security Services. Now there is a company that makes it affordable for individuals, families, and small businesses. The company has recently upgraded the software. If you are not satisfied the security software on your computer read my blog "Cybercrime - A World Wide Epidemic." It describes how cutting edge technologies protect you, your family, and your business from cybercrime and cybercriminals

Thursday, August 20, 2009

Cybercriminals Target Small Businesses

According to a study by McAfee, Inc. small businesses risk losing over $1 trillion from loss or theft of data and other cybercrimes. The Internet Security Alliance, a non-profit organization that provides a forum for information on security issues, tells us that small businesses are severely at risk for security breaches. Large corporations who were formerly attacked by hackers have significantly bolstered their network security. Therefore, criminals are turning their attention toward small businesses.l

Small businesses can be easier to find as many do not have a well developed security plan, and their networks and computers many times are unprotected. One in five does not have antivirus software and more than half do not use encryption for wireless links. Hackers, on the other hand, now have more sophisticated and damaging programs that resist removal, continuously change, and spread across the Internet in minutes.

The impact of a security attack on a small business is much greater than on a corporation. Small businesses that do business over the internet and handle credit card data online, cannot protect their data from hackers when they do a denial of service attack. They do not have the financial resources and insurance and have difficulty bouncing back.

The following are a few of the small businesses that are at risk for cybercrime and identity theft:

Charities and nonprofit organizations can be targets of organized crime rings from abroad. Russia, the Ukraine, and China are particularly interested in their lists of benefactors and donors, and beneficiary lists from life insurers and cybercrime is the best way to get these lists.

The Real Estate Industry is also targeted. Realtor Associations, MLS Boards, and Brokers and Agents are severly at risk and have already been victims of cybercrime. Hackers have been able to gain access to membership systems and the MLS store through programming errors on MLS public websites. They can walk into a real estate agency, walk past the busy receptionist, plug his laptop into a network jack, and in minutes can have the entire membership database and all the software needed to use for criminal activities. Millions of consumer records with bank account and credit card information have been stolen stolen by employees and then sell it to a data broker.

Hotels are also at risk. Hackers have broken into the computers of one hotel that was part of a chain of hotels and gained access to tens of thousands of customer credit card members from all the hotel chains,

Recently, the largest coordinated ATM rip-off took place when $9 million dollars were stolen from 100 stolen credit cards in 30 minutes.

The best protection for small businesses is Managed Internet Security and Whole Identity Protection as they are affordable, have the latest security technologies to protect the computer and emails, and work with the police to find the thieves. They help restore identities to Pre-theft Status.

Wednesday, August 19, 2009

Five Dangerous Internet Myths

Eric Larkin in PC World reports that we need to get rid of myths about the internet in order to stay safe online.
Myth #1:
Maladjusted teens vandalize your computer.
Reality #1:
Gone are the days when teenagers looked for 15 minutes of fame. Organized crime is the culprit. They want money.Online black marketers place malware on computers to make money. They take over PCs to send spam, steal logins and credit card information, or hack game accounts. They use stolen webmail accounts to request transfers from contact lists and raid online games to sell the items or the in-game currency for real money. Financial fraud has cost consumers and businesses billions of dollars.
Myth #2:
All you need is a good antivirus program.
Reality #2:
Wrong. A good antivirus program will help a good deal, but antivirus companies are locked in a constant battle with cybercriminals who make every effort to stay one step ahead of antivirus software. Yes, many times the security software can prevent the attacks, but other times there are holes in the software and the criminals get the upper hand. You need more security software to protect you from cybercrime than just a good antivirus program.
Myth #3:
You're fine if you are just careful where you surf.
Reality #3:
This way of thinking is outdated. Years ago you could tell if a site was dangerous just by looking at it, and if you were careful with your emails, you could go without antivirus software. Not anymore. Now personal pages and big-name company sites are hacked by cybercriminals using flaws in the security software to install malware. You would have to be an expert to recognize a hacked page or an email that was attacked. Besides antivirus software, you need antispyware, antirootkit, and a bidirectional firewall along with a team of techs to protect you from cybercriminals.
Myth #4:
"If it ain't broke don't fix it" requires knowing when something is broken.
Reality #4:
These days there are malicious hidden processes, threats, files, or registry keys and you need advanced anti-rootkit technology to remove them.
Myth #5:
The worse myth. We're all doomed. Stay offline.
Reality #5:
Yes, you can get hacked, but if you know the risks and prepare adequately you can enjoy what the Web has to offer. By following simple steps, you can be protected from cybercriminals.
  • Install antivirus+antispyware, antirootkit, and a bidirectional firewall on your computer.
  • Make sure your computer has daily security updates, automatic upgrades to new software, and full security software support.
  • Have your computer monitored daily for malware and have malicious codes stopped before it can harm your computer.
  • Get protection for emails and attachments.
  • Have your own team of techs to keep your computer clean and running well.
Don't fall hostage to cybercriminals. Personal Computer Services can protect you, your family, and your business from cybercrime.


























Friday, August 14, 2009

Who Caused the Twitter Attack?

On 8/6/09 the an alarm rang that Twitter had been hit by a large attack and was not working for several hours,followed by a period of slowness and sporadic time-outs. It was so large that Twitter didn't even know it was under attack until it crashed. This was called a Distributed Denial-of-Service Attack (DDoS). It came from infected computers from all over the world. They were zombie computers and were used by hackers and cybercriminals to cause trouble.

Graham Cluley, a technology consultant at Sophos, explained in an article by C. McCarthy in CNET News, that DDoS attacks come from millions of compromised computers. Some of these computers belonged to people with Twitter accounts. Because they either did not install or update their security software, visited risque sites, or downloaded music and movies from unsecure sites, their computers had become zombie computers.

During the DDoS attack, zombie computers were used to inundate Twitter servers with communication requests. It was difficult for Twitter to deal with the attack because it was hard to distinguish legitimate Twitter communications from communications that were part of the attack. They did not want to block access from IP addresses as many of the zombie computers that was sending traffic to Twitter belonged to law abiding people.

The question is "Who Caused the Twitter Attack?" There are several possibilities:

  1. Paul Henry, a security analyst, explained that it happened at the same time as the Hacker Convention where a new version of malware, that was found on Twitter messages, was introduced.
  2. A European Blogger believes that a foreign country was behind the attack because such a large attack could only be organized by somewith huge resources.
  3. According to a spokeswoman at Facebook, the attack might have been directed at an individual who had a presence on a number of sites, rather than the sites themselves.
  4. So many Twitters did not have adequate security on their computers and were zombie computers that they made it easy for a hacker to attack Twitter
We can all learn from the Twitter attack how important it is to install security software on our computers and continuously undate and upgrade them. This will keep them safe and secure and not put Twitter or any other site at risk of being attacked.

I can identify with those who had no security on their computers. I once was like you, but then my computer started to slow down. I met someone who told me he could help. I took a test and found out that 7,500 malicious codes were on my computer. I immediately enrolled for personal computer services. A team of techs cleaned up my computer and installed professional grade software on it. I now occasionally call them if I have any computer related issues.

Check List for a Safe and Secure Computer with the Following:
  • Alerts of unexpected events that could harm your computer.
  • Daily scans that detect and remove malware before it harms your computer.
  • The latest security updates.
  • A protected computer with a combination of antivirus+antispyware.
  • Have the holes in back of your computer closed up so hackers can't get in.
  • Critical data and sensitive information protected from being compromised or modified.
  • Your organization's computing assets protected from loss and/or damage from network attacks.
  • A firewall that is monitored.
  • Fully protected emails and attachments.
  • Improved performance of your computer.
If you answered yes to any of these questions, check out my blog at www.crimeandjustice4all.com to find out how your computer can be protected from hackers and cybercriminals and never be a zombie computer again.

Thursday, August 13, 2009

Medical Identity Theft - A Fast Growing Crime

According to the American Health Information Management Association, medical identity theft accounts for 3% of identity theft crimes. In 2005, 249,000 of the estimated 8.3 million people who had their identities stolen were medical identity theft cases.

Medical Identity theft affects individuals, healthcare providers, and health plans.

  • For the individual, it leads to a trail of falsified information in medical records and can plague your medical and financial life for many years. The elderly, newborns, minors, people whose medical information are on public registries (e.g. cancer registry) and individuals with developmental and intellectual disabilities are particularly at risk for medical identity theft. Dead people are often targeted too.
    • A healthcare provider who incorrectly bills the victim for treatment provided to the identity thief may have to write off all the expenses related to the thief as he has trouble canceling health insurance claims that were made for the thief. His reputation can be damaged and his practice negatively affected.
  • The reputation of the health plan can be damaged too as they preapproved and paid for the thief's treatment which is applied to your annual or lifetime benefit allowance. They also store wrong medical information in its database and share it with the Medical Information Bureau.

    When a medical identity thief uses your name, social security number, and medical insurance information without your knowledge or consent to get medical services from doctors, emergency rooms, hospitals, and pharmacies, the thief's medical information is put into your records and a false medical record in your name is created. The new record can contain the thief's blood type, allergies, prescription drug use, and a history of his diseases. In an emergency, you could be treated based on the wrong information and die.

    It is very difficult to discover that you are a victim of medical identity theft as it is often hidden in complex payment systems, databases, and medical records. When you do find out that you have been a victim, it is even more difficult to correct. Under the federal law know as Hipaa (Health Insurance Portability and Accountability Act) you are entitled to a copy of your medical records, but once your information is mixed in with the thief's information, you may have trouble accessing your files as privacy laws regulate that the thief's medical information, now in your records, must also be kept confidential. If you want to correct your record, you have to do it on a case-by-case basis as the wrong information may be in dozens of health care providers and insurance plan records. Until such time as all your records are corrected, you could be denied additional health, disability, or life insurance and your credit record could be permanently damaged.
  • The best way to protect your medical identity is to have an Identity Protection Service which monitors social security numbers and medical insurance information every day for medical fraud, insurance records, and criminal records. The Cybercrime Underground is also monitored for your information. Your entire family is protected, including your children to age 25 and senior dependents. You will get Expense Reimbursement Insurance and Full Recovery Services (not assisted recovery) from a team of experts who also cooperate with the police to help find the thief.

  • Tuesday, August 11, 2009

    The Internet - A Hiding Place for Online Child Predators


    Do you know who your child is talking to online? If he/she is romping ar ound chat rooms, instant messaging, emails, discussion/ bulletin boards and social networking sites, it is time for you to take notice.

    While using the technology of the 21st century seems very appropriate for children, you need to be aware that Child Predators are lurking in these sites. In February 2009 My Space kicked out 90,000 sexual predators and Facebook booted out 5,500. Now the predators are heading to Twitter.

    ALL children are at risk. Whether they are insecure, rebellious, lonely, confused about their sexual identity or just normal kids playing games on the internet, they are prey for these predators. They meet in chat rooms, then continue communicating through emails or instant messaging, and the final step is to meet in person.

    Not knowing the identity of people you meet on the internet, allows predators to pretend they are young adults. They build relationships with inexperienced young people by listening to their problems and sympathizing with them. They know their favorite music and hobbies. And gradually, and sometimes not so gradually, they introduce sexual content into their conversation or show them photos of child pornography to convince the child that it is normal for adults to have sex with children. Then the predator arranges a meeting in the community where the child is raped, photographed and videographed.

    If the child plays games over the internet, the predator will offer game points in exchange for naked photographs of the child.

    The National Center for Missing and Exploited Children has reviewed some 25 million child pornography videos and images circulating online in the past six years alone. Sexual predators around the world now network with each other and share photographs and videos of children they met online. These pictures are shown all over the internet. Furthermore, tech-savvy criminal organizations sell child pornography through web sites that can be put up and taken down in hours. They make large profits through online card processing centers. Online Pornography is yet another form of Cybercrime.

    To minimize your child's risk of being a victim of a sexual predator, computers need to be in a common area of the house, not in the bedroom. Children should share the family's email address and their access to chat rooms, instant messaging, and emails should be monitored. They should be taught never to leave the chat room's public area as private area chat rooms are where they can become victim's of the predator. They should never respond to emails or instant messages from strangers or go out with a stranger they meet over the internet. And last but not least they should be instructed that it is wrong for adults to have sex with minors.

    If your child is targeted by a predator who asks for a meeting, sends sexually explicit photos or asks to be sent naked pictures, save any documentation including email addresses, web sites, and chat logs to share with the police.

    Then call the LOCAL POLICE and ask for the CYBERCRIME UNIT. Call the National Center for Missing and Exploited Children Cyber Tip Line at 1-800-843-5678 or log onto www.cybertipline.com. They are staffed 24/7 to receive reports of child exploitation online.

    Either before or after the crisis, get involved with a non-profit organization that teaches children in school how to be safe online. They are at http://www.i-safe.com.

    Explore a Managed Internet Security Service that has the latest security technologies to keep predators away from your computer, and an Whole Identity Protection Service that includes your children. This service monitors all the databases and if the identity is stolen works with law enforcement to catch the thief or predator, and restore the identity to pretheft status.

    May you never go through this kind of experience.