Showing posts with label Crime. Show all posts
Showing posts with label Crime. Show all posts

Keep the Crooks Out of Your Computer! How to Protect Yourself From Online Crime


You'd never ask a convicted burglar to watch your house while you're away, and you'd never ask a known criminal to babysit your kids, right? So why, then, are you allowing identity thieves into your computer, giving them access to all your personal and financial information, right now - possibly even while you're reading these words?

"But wait a minute," you may be thinking. "My computer is perfectly safe and protected. I installed an anti-virus program two - maybe three - years ago."

Okay, let's assume your computer is protected at some level. How do you think your internet and computer protection ranks against such companies as Microsoft, Network Solutions, or even the U.S. Department of Defense - Department of Homeland Security? If you think they have better protection than you, which they obviously should, then you'll be disheartened to know that each of them had their network hacked in 2009, potentially exposing hundreds of thousands of people's personal information to identity thieves.

And these companies aren't alone. In 2009, hundreds of companies, from small hospitals to big corporations to top secret government agencies, have had their computers compromised. From January 2009 through November 2009, over 13.7 million Americans fell victim to identity thieves, resulting in financial losses totaling upwards of $50 billion.

To put it in a clearer perspective, approximately 7% of all adults have had their identities misused in 2009, with each instance resulting in approximately $3,500 in losses. Additionally, close to 100 million Americans have their personal identifying information placed at risk of identity theft each year when records maintained in government, corporate, and home computers and networks are lost or stolen. These alarming statistics show that identity theft may be the most frequent, costly, and pervasive crime in the United States.

One victim, Suzanne in San Diego, spent 600 hours and nearly $6,000 trying to clear her name when identity thieves stole her information from CitiBank and racked up thousands of dollars in fraudulent charges. But don't fool yourself into thinking that online thieves only go after big companies. The fact is that the favorite targets of online criminals are home and home office computers. Why? Two reasons: 1) These computers are usually not as protected as computers at big companies, and 2) These computers are often connected by broadband to the Internet - since the connection is always open, there is more opportunity to locate these computers with scanners and then break in.

So beware...YOU could be the next victim!

You Can Lower Your Risk of ID Theft

Fortunately, there are simple steps you can take at home, right now, to keep your computer safe and protect your personal information. Each of the following tips are super easy to do and very inexpensive (most are even free). Yet they can save you both time and money, and give you the peace of mind knowing your computer is safe and your personal information is protected.

o Install an anti-virus program. One of the key components to online safety is to have an anti-virus package. Even better is to get a suite that has anti-virus, anti-spyware, and a personal firewall. This way all the programs work together and don't interfere with each other. Regardless of which program you choose, it's best to purchase it from a traditional store or name-brand online retailer you trust rather than download the program from just any "discount" online store. Why? Because when you go to a website to download a program, you never know what you're really getting. There have been instances where people paid money for a downloadable anti-virus program, but what they really paid for was a program filled with viruses. So unless you're on the website of a well-known anti-virus company (and you're 100% certain it's their real site, not a site a criminal has mimicked), get the program at your local office supply store and install it from the disc in the box.

But simply installing the software isn't enough. You also want to go into the "Settings" tab of your program and make sure updates happen on a regular basis. This ensures your version of the product is the most up-to-date. Additionally, make sure scans are actually happening. You can set the scans to be done automatically at a certain time (highly recommended), or you can opt to manually initiate the scans.

o Update your applications. Identity thieves have learned that many people are getting better at downloading patches for their operating systems; however, they also know that most people don't patch their applications (their individual programs). As a result, ID thieves are attacking individual applications to get access to your computer. Some common applications that are being attacked include Adobe Acrobat Reader, Adobe Flash Player, Apple QuickTime, Internet Browsers such as Firefox, Safari, and Internet Explorer, and many other applications you likely use every day.

Fortunately, many companies are releasing security patches for their applications on a regular basis. So you can go to each company's site directly and look for patches yourself. Another option is a program at www.secunia.com, which offers a software inspector for home users. You can do a scan online and they'll give you a list of the applications on your computer that are not secure. Then they will help you take the necessary steps to enhance your security. No matter how you choose to update your applications, the key is to do it.

o Use a firewall. Many home modems and routers have firewalls in them. Unfortunately, some of the best features of those firewalls are often turned off. You'll likely need an IT professional to help you determine the right settings for you. However, the good news is that something called Network Address Translation, or NAT, is usually automatically turned on and it basically hides the addresses of your devices from the outside world.

Realize that firewalls are often like Swiss cheese. They have to allow some information in and out of your computer; otherwise, you wouldn't be able to access the internet or your email. The challenge for your firewall is determining which information is okay to go in and out. This also means that if a friend or family member is in your house and installs something on your computer with a CD-ROM or DVD, your firewall has no chance of detecting that intrusion because that's not what it's designed for. So you can't just say that you have a firewall and trust it to catch everything.

If you have a small business or if you do stock trading or banking online, you may want to augment the simple firewall that comes in your device with an additional firewall you can purchase, which is much more robust. These devices have extra tools in them that allow the firewall to do its job better. You can also use a program running on your computer, called a software firewall. An example would be the firewall that comes with your operating system or one that comes with an anti-virus package suite. Whatever additional firewall protection you give yourself, the harder you make it for identity thieves to get in and steal your data.

Stay Safe Today

Just as you lock your car when it's parked and you secure your home when you leave for the day, you need to proactively protect your computer. The good news is that staying safe online can be just as simple and second nature as protecting everything else in your life. Start with these three easy solutions. Once you're done, you can move on to other aspects of computer and online safety found in the short and simple videos at www.learntobesafeonline.com. By doing so, you can keep yourself from being the next identity theft victim and save yourself a lot of frustration and thousands of dollars. The choice is yours: do nothing and be a victim, or take action now and reduce your risk. Which do you choose?




Go to http://www.learntobesafeonline.com/ to view free and informative videos on how to protect yourself from online fraud, cyber attacks, phishing schemes, identity theft, and much more. Since we all use the Internet, shouldn't it be a safe place to work, learn, and play? Mike Foster is recognized by many as America's IT Security Specialist and is committed to helping people stay safe online.




Cyber Crime - Produces Winners When You Lose


The computer security industry in many ways is ineffective in fighting cyber crime. Now why would I say that? As a consultant let me ask you a question - Where are computer and network threats like viruses, malware, scareware and other threats born? You will have the answer before the end of this article.

Web-borne threats can invade your PC from a network, like yours. Wired or wireless we are all connected globally now. An infected email can reach your inbox from anywhere on this planet in mere seconds. Sent from a major city or let's say any of the 2000 plus islands in Micronesia, it makes no difference anymore. Many ask this question constantly - Why do we have computer viruses? For an easy question here is an easy and plausible answer - A strategy called "permissionless innovation".

The big deal is businesses rely too much on anti-virus software to keep their computers protected. This strategy is only as good as the second it is available before a new computer virus is discovered. 1000s of new threats and strains of existing ones landed on the Internet since you started reading this article. Yes, your anti-threat applications will slow down invasions, but the computer security industry is selling a sense of security that is only as good as its weakest point.

McAfee, Symantec and other security software vendors market their wares to entice us to buy in to a subscription based business practice that only provides a limited amount of protection. This is a "baby aspirin" approach to dealing with a catastrophic illness. You are paying for the cyber warfare experience. The strategy to let the end-point (PC) and servers be ground zero for computer security defense shows how McAfee, Symantec (Norton) and others generate billions of dollars in subscription revenues. Their offerings are weak and addictive pain pills for computers.

To FIGHT CYBER CRIME AND WIN an occasional battle you have to fight cyber crime where it begins - off of your network. Does it make sense to wait for the threat to find you first? Network and Security Administrators must use a layered approach to minimize attacks. Hosted Exchange a SaaS platform, can reduce computer and network security administration overhead.

As promised, where are computer and network threats born? On computers like yours. Running Windows, Linux or other operating system, like yours.

Before we can stamp out cyber crime and end threats, the following questions are a few factors to consider for ending an on-demand war. What do you think?

Are you a business manager or owner that renews anti-virus software subscriptions annually?
Being that the Internet is global and virtual, is it worth time and public money for governments to police the Internet?
How would you feel if government was the only source for domain name, email and web hosting?
Can private sector business lead, monitor, innovate and police Web activities better?
For better cyber security do we redesign current systems and threat management tactics or redesign humans?
Where do you think the core of cyber security problems lie?




What is on your mind about cyber crime? Visit my blog and tell me more about what you think!

About the Author - Keith Nunnery: 24 years in Business - IT; President/CEO of an IT Consulting business in Las Vegas, NV and Charlotte, NC




Cyber Crime Through the Eyes of a Normal Internet User


Man has always strived to discover new things to make life better and more comfortable. He has been always motivated to find new vistas and try new methods and technological advancements using the intellect. One development leads to another and he never just stops and advancement and progress in never ending and is an on going project.

Nothing has changed the world more drastically as the internet. Since the wide world of web this world is no longer divided by invisible boundaries. It has become a global village and the advancement in the information technology has changed the lifestyle of the people radically. This change is obvious only since the last 15 years when the concept of personal computers came into existence. People are always connected to their electronic gadgets and almost all functions of our daily lives are dependent on the internet or the related technology.

Pros and cons of the cyber space:

As always the good and the evil are like two sides of a coin. Though the advantages outweigh the disadvantages it is high time we looked into them before they spread. Computer, internet or information technology related crimes are termed as cyber crimes. So what really is cyber crime? How seriously can these crimes affect common man or business establishments? What actions can be taken to curb such crimes and what legal action is needed to restrict the criminals who are into this? Cyber crime is growing to be a greatest threat to mankind and hence serious considerations and actions are definitely needed to check its spreading further.

We need to first understand what cyber crime is and what all activities are termed as cyber crimes. Cyber crime simply means criminal activities using the telecommunication and internet technology. Basically cyber crimes can be categorized into two types. They are,

Crimes which are directly targeted on vast computer networks or other related devices. For example, malware, computer viruses, attacks on denial of services etc
Crimes that are facilitated by the computer networks targeted not on any independent network or device. For example, identity theft, cyber stalking, phishing, email scams, hacking etc.

Cyber crimes are also considered or at least in lieu with white collar crimes, as the culprit cannot be conned very easily as the internet is open to the wide world. Although most cyber crimes are not related to any violence or serious crime still identity threat or government secrets can be virtually stolen in no time if the security measures fail. Terrorist, deviants and extremists stand higher chances of using this technology for their illegal and anti social activities.

Internet related frauds:

Almost 163 million users are estimated to use the internet this year as against just 16.1 million in 1995. thus the need for a more secured network becomes imperative keeping in mind the user's overall security.

The anonymous nature of the internet is the breeding ground for criminals who engage in activities which are termed as virtual crimes or cyber crimes. Governments have introduced cyber laws to curb such activities but then no serious punishment is awarded to the criminal or individuals who are involved in cyber crimes. Proper legal infrastructure is yet to be created and powerful regulatory mechanisms formed to protect netizens.

Let us now have a look of the different types of cyber law and the amount of damage they release to the society or individual. Generally the cyber threats sources are of three types. They are,

hacking related threats
traditional criminal threats
ideology Threats

Hacking:

This is one of the common forms of cyber crime found in the cyber space worldwide. It has been defined as "whoever with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person destroys or deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means commits hacking". A hacker can crack into computer system thus gaining access to all internal information. Many hackers just do it for fun or pastime. Hacking is considered less harmful than other security related crimes.

Basically the hacker's main aim is to disrupt a system or network. Whether he is a white hat hacker or black hat hacker his level of destruction is to stop or get the access to the computer systems. Repeated hacking or tampering constantly might take a hacker behind bars but many times these crimes are taken lightly.

Traditional cyber crimes

Criminals whose focus is on monetary gains only are called traditional cyber criminals. Most of them are identified as some internal source. Recent study has confirmed that almost 80% criminals of such crimes belong to the related company or firm. Industrial espionage, intellectual property crime, trademark violation, illegal fund transfers, credit card scams, etc are some of the traditional cyber crimes. Such criminals who conduct these crimes are more likely to end up behind bars if the crime is proved.

Ideology cyber threats:

Stolen data are circulated as against the intellectual property laws according to such ideology threats. These criminals consider themselves as Robin Hood and spread the data which is preserved under intellectual property rights. Many terrorist activities are also termed as ideology threats in the cyber world. They spread their own ideology or oppose government's by using the internet technology. Cyberanarchistsis how they are called and their primary aim is to spread their ideology or principles and opposing what is against their activities. Many terrorists' plans and data's are also considered as cyber threats.

Thus whatever be the nature of cyber crime strict laws must be administered to enable a secured cyber space. As more and more of our daily activities becomes connected or interlinked in cyber space the need for a complete secure technology has become the need of the hour. Be is simple email hacking or phishing, the people involved in such activities are definitely invading the privacy of individuals and business organizations. Identity thefts, money swindling and credit card scams are grave issues which can cause irreparable damage to the person concerned.

Prevention is definitely better than cure:

How can we prevent our network or computer systems against the so the cyber criminals? How can the government aid in curbing such high risk threats to the society? As individuals it is important that we use the best internet security system to protect our systems from cyber attacks. It is important to use strong password to protect the emails or other important data or document stored online. Important details like bank account user names and passwords must not be stored online or in the computer. Remember that the cyber space is an open network and has no security or safety against such important data.

Never open unidentified emails and never reply or believe in email scams saying that you have won millions of dollars in an online lottery. Credit cards must be used sparingly or wisely online. Unsecured sites and restricted sites are always high on risk and thus using your credit cards on such sites is highly unadvisable. Always keep changing passwords and install a powerful anti virus software to protect against torzons, viruses and malware.

Companies and business establishment must ask the workers to sign powerful contracts to prevent internal identity thefts. The servers and domains must be well secured for continuous cyber security for their data. Government datas and highly secretive data must be under strict scrutiny. Hackers are also used by enemy nations to fid out the internal secrets of an opponent country. So, all forms of top secret is better not stored online. Too much information exposed is always a cyber threat. Vigilance, awareness and not sharing personal information while networking can prevent most of such cyber crimes.

The government must setup cyber wings to identify such criminals and put forth strong rules or punishment for cyber criminals. Cyber laws must be very strict and newer technology must be used to easily find these criminals to curb their illegal activity. Steps to block the erring person and information updated on such criminals can help the general public from identifying the different crimes in the cyber space. After all knowledge is what can make one powerful, isn't it?

For customized websites, webhosting and other internet related designs and marketing collaterals contact the best webdesigners and affordable SEO experts.




Please contact me to get articles written on any topic for websites, directories and other needs. Please check my blog for samples..Get customized websites and portals designed ethically and creatively for affordable rates. http://www.vingsnetwork.com/




Cyber Crime - A Threat to Every Internet User


According to the Federal trade Commission (FTC), there are around 10 million reported cases of identity theft each year in the United States. A recent report by Eugene Kaspersky, founder and head analyst of Kaspersky Labs (a leading internet security company), indicates that the level of criminal activity on the internet has doubled in the past year, and there is reason to believe this trend will continue to grow exponentially in the future.

Cyber crime has become a serious problem for everyone who uses the internet. The biggest threats to all internet users are malicious software programs known as crimeware and social engineering schemes, often referred to as phishing and pharming scams.

Although computer viruses have always presented a big problem regarding potential loss of data or damage to our computers, spyware and phishing scams are where the real danger is. These forms of internet crime don't hurt our computers - they cause personal damage.

Spyware

The most common form of crime-ware comes in the form of spyware, which is a small program or piece of code that is designed to "spy" on your online activity and/or personal information. There are many types and forms of spyware and new versions are introduced into the internet every day.

Although not all spyware is used for illegal purposes, much of it can be very dangerous due of its ability to record keystrokes, take snapshots of our PC screen, and monitor everything we do online. Spyware usually installs without anyone's knowledge and runs silently in the background.

The information gathered by spyware is secretly transmitted to the person who planted it. It is sometimes sent out via email without our knowledge, but more often it is relayed to a hijacked "slave" computer, where it is picked up by the criminal who installed it. He/she will either use it to access bank accounts or credit cards, sell it to another thief, or perhaps steal our identity altogether.

Some spyware is used to "hijack" computers, turning them into "slaves" that are used to collect and store data that was obtained illegally. The computer's owner rarely knows that his PC is being used to house illegal information. Many "slave" computers are also used to help social engineers collect data via Pharming scams.

Phishing Scams

One of the most popular criminal activities on the internet is Phishing. In fact, this type of scam is so prevalent that an estimated 99% of email users have seen at least one phishing scam in their inbox. Phishing is mostly done via email, and is usually performed in conjunction with Pharming. Social engineers often send email letters that appear to come from your bank or other financial institution. The message urges you to click the link, log in, and verify your credentials. These emails sound and look very legitimate, and this is why so many people follow through by clicking the link.

Pharming

Once a person has clicked a link in a fraudulent Phishing email, they are taken to a website that appears to be legitimate. This is because the social engineer has copied the home page of the financial institution. What most victims don't realize is that the website they are on is really in some third world country, or on a "slave" computer that has been hijacked by spyware. The Pharming occurs when the person enters his/her credentials to "log on" to their account. This provides the Pharmer with all the information he needs to quickly wipe out the account or charge up a fortune on the associated credit card.

How to Protect Yourself Online

There are several things you can do to protect yourself from cyber-crime. The most obvious is to use good internet security products. At minimum, everyone who uses the internet should be using a good personal firewall, anti-spyware software, and anti-virus software.

The easiest, most effective way for most home computer users to stay protected is to purchase an internet security suite. A suite will include antivirus, anti-spyware/anti-adware, software firewall, and possibly some extras like a spam filter and password protection software. Suites are easy to use because everything is controlled via one interface.

There are many "free" things you can and should do to protect yourself from cyber-crime, such as keeping your computer's operating system and all applications up-to-date. This combined with the implementation of cautious browsing and email habits will have a big impact on your safety.




Internet Security Suites [http://www.antivirus-firewall-spyware.com/computer-security-suites.html]

How to Protect Yourself Online [http://www.antivirus-firewall-spyware.com/Free-Report.html]

Computer Security for Everyone




Hacking - Crime Or No Crime?


Every responsible Internet user knows that hacking is a serious crime. However, we all know as well that justice may not be on hand for its victims. A lot of private and public companies, including governments, have lost revenues due to information theft leading to loss of income and damage brought about by hackers. The sad thing is, laws don't seem to be tough enough on cyber offenders. In some cases, they're not even considered offenders at all due to the lack of legislation that defines and covers Internet crimes. This simply leaves us wondering what happens to a hacker when he's caught.

There are, of course, celebrated cases where hackers have actually been brought to justice. However, it's not very reassuring to take into account how the film industry has even somehow created this perception of hackers as being cool and even sexy. It seems as though Hollywood has forgotten to portray these black hats as they really are. It actually looks as though people have developed a distorted perception of this act and don't realize that it can be seriously damaging. Still, we are left only to wonder why this is so.

The very important question now is, what happens to hacker if and when they're caught? Do they even pay for what they've done? Do they serve a jail sentence? Are they made to pay damages to the victim? It's crazy to think that some people in government actually think the problem could be solved by confiscating the hacker's equipment and banning him from buying any new gadgets. It actually is downright ridiculous to think that the problem could be prevented by confiscation. After all, any black hat can hire anyone to buy him a new computer, modem or storage device and then he'll be right back on his trade as if nothing happened.

Definitely, hacking is a far more serious offense than most justice officials are ready to accept. And this leniency is, in fact, making the situation worse. Because these people know they can easily get away even if they were caught, they will simply continue robbing people and companies of their identities and causing their victims massive detriment while they take off in their private jets and burn some cold cash in an offshore casino.

If things go on like this, then Internet users will have to ensure their online security on their own by employing every measure there is to keep hackers at bay. Because these cyber offenders can begin by installing keyloggers into your computer, it would always be wise to have basic computer safety software installed. The firewall is another key component in securing your system along with an anti-virus software and every other type of anti-malware there is.




For general precaution, you can make use of an IP hiding software which works by disguising your IP address so even if you actually met a hacker while surfing, he wouldn't know how to get back to you because you've stashed your IP in some place he couldn't reach. Of course, this offers a reliable cloak of protection and you'll be gone from every hacker's life from then on.




Hacking - Crime Or No Crime?


Every responsible Internet user knows that hacking is a serious crime. However, we all know as well that justice may not be on hand for its victims. A lot of private and public companies, including governments, have lost revenues due to information theft leading to loss of income and damage brought about by hackers. The sad thing is, laws don't seem to be tough enough on cyber offenders. In some cases, they're not even considered offenders at all due to the lack of legislation that defines and covers Internet crimes. This simply leaves us wondering what happens to a hacker when he's caught.

There are, of course, celebrated cases where hackers have actually been brought to justice. However, it's not very reassuring to take into account how the film industry has even somehow created this perception of hackers as being cool and even sexy. It seems as though Hollywood has forgotten to portray these black hats as they really are. It actually looks as though people have developed a distorted perception of this act and don't realize that it can be seriously damaging. Still, we are left only to wonder why this is so.

The very important question now is, what happens to hacker if and when they're caught? Do they even pay for what they've done? Do they serve a jail sentence? Are they made to pay damages to the victim? It's crazy to think that some people in government actually think the problem could be solved by confiscating the hacker's equipment and banning him from buying any new gadgets. It actually is downright ridiculous to think that the problem could be prevented by confiscation. After all, any black hat can hire anyone to buy him a new computer, modem or storage device and then he'll be right back on his trade as if nothing happened.

Definitely, hacking is a far more serious offense than most justice officials are ready to accept. And this leniency is, in fact, making the situation worse. Because these people know they can easily get away even if they were caught, they will simply continue robbing people and companies of their identities and causing their victims massive detriment while they take off in their private jets and burn some cold cash in an offshore casino.

If things go on like this, then Internet users will have to ensure their online security on their own by employing every measure there is to keep hackers at bay. Because these cyber offenders can begin by installing keyloggers into your computer, it would always be wise to have basic computer safety software installed. The firewall is another key component in securing your system along with an anti-virus software and every other type of anti-malware there is.




For general precaution, you can make use of an IP hiding software which works by disguising your IP address so even if you actually met a hacker while surfing, he wouldn't know how to get back to you because you've stashed your IP in some place he couldn't reach. Of course, this offers a reliable cloak of protection and you'll be gone from every hacker's life from then on.




Auction Fraud is Most Reported Cyber Crime, According to IC3


It seems that auction fraud is the new black in the land of cyber crime. According to its website, the Internet Crime Complaint Center (IC3) has recently received a large number of calls reporting fraud involving international automobile auctions online. This particular fraud involves an online auction in which the "winner" pays via wired money for a vehicle that will supposedly be shipped from Europe. The money is wired, and the buyer waits in vain for a vehicle, which, predictably, never shows. Unfortunately, once the money is gone, there is little that can be done in the way of recovering it.

The IC3, a partnership of the FBI and the National White Collar Crime Center, this year released its yearly complaints report, which stated that reports of internet fraud made up 62 percent of crime complaints received, crowning it with the dubious title of most commonly reported cyber crime. Other top complaints include undelivered merchandise or payment, credit and debit fraud, and check, investment, computer, and confidence fraud.

According to IC3, buyers in the United States planning to purchase online a vehicle that is located outside of the United States should exercise caution and thoroughly research any potential sellers or auction houses for legitimacy. Buyers should be aware of the risk of what are known as "second chance auctions," wherein a buyer who lost an "auction" is contacted and told that they may buy the item they bid on at a discount rate, due to the original auction winner defaulting on payment. Buyers should also beware of any monetary transfers requested that don't involve an established and trustworthy method, such as an escrow service.

The IC3 recommends observing the guidelines below to avoid being duped into an online fraud scam:


Educate yourself. Research how the auction works, what your obligations are as a buyer, and what the seller's obligations are before you bid.
Research the seller, especially if the only information you have is an e-mail address. If it is a business, check the Better Business Bureau where the seller/business is located. If you can't find any information, do not place a bid.
Research any feedback from past customers.
Determine the method of payment and where the seller is requesting it be sent.
Be aware that a problem with an international auction transaction may be much more difficult to resolve because of the difference in laws.
Find out the seller's policies on problems, warranties, delivery times, exchanges, and defective merchandise.
Avoid surprise charges by finding out if shipping and delivery are included in the auction price or are charged as separate costs.
Do not give your social security number or drivers license number to the seller. No reputable auction house has any use for them.

One issue that makes an online auction a prime spot for fraudulent exchange is that users can easily be mislead or become confused about the responsibility of the site in question. Some people don't realize that a site such as eBay does not sell the items up for auction; what eBay does is provide a forum for sellers to hock their own goods. Most online auction sites will not reimburse a buyer's losses, and emphasize the importance of using caution when engaging in online commerce.

eBay's Trust and Safety policy states that the site has put in place a safety team dedicated to keeping their "marketplace a safe, well-lit place for people around the world to trade with one other." The site features a number of protection methods in place to benefit users:


Feedback - Users can rate each other, establishing marketplace reputations and acting as watchdogs for dishonest or unfair auction practices (defective merchandise, late payment, inordinately long shipping time, etc.)
Buyer Protection - eBay is set up so that users can pay for their merchandise in a fashion that offers more security than wired cash.
Fraudulent Web Site Protection - eBay offers users a toolbar that alerts users in the event they stumble upon a fraudulent site.
Security Center Features - eBay offers tips on practicing good marketplace habits, as well as information on reporting fraud or other online criminal activity.

Other ways to protect oneself in the world of online auctions include avoiding both buyers and sellers who seem suspicious:


If the seller claims to be located in the United States but wants the payment sent overseas or to someone else, beware. Also, if the seller claims he suddenly had to leave the country for whatever reason, don't conduct business until he is back in the country.
If the seller requests cash payment or wire transfer, do not send it. Using these services leaves virtually no paper trail and no way to recover the money in the event of fraud.
Avoid dealing with sellers who claim to be authorized dealers or factory representatives in countries where you know such positions don't exist.
Do not trust buyers request the merchandise be shipped using methods that avoid customs or taxes.

Sellers should be suspicious of any credit card purchases if the address of the cardholder does not match the shipping address, and be sure to receive the cardholder's authorization before shipping any products.

Users who suspect they may have been a victim of internet fraud are encouraged to contact the IC3 at http://www.ic3.gov/.




http://home.stopsign.com




Auction Fraud is Most Reported Cyber Crime, According to IC3


It seems that auction fraud is the new black in the land of cyber crime. According to its website, the Internet Crime Complaint Center (IC3) has recently received a large number of calls reporting fraud involving international automobile auctions online. This particular fraud involves an online auction in which the "winner" pays via wired money for a vehicle that will supposedly be shipped from Europe. The money is wired, and the buyer waits in vain for a vehicle, which, predictably, never shows. Unfortunately, once the money is gone, there is little that can be done in the way of recovering it.

The IC3, a partnership of the FBI and the National White Collar Crime Center, this year released its yearly complaints report, which stated that reports of internet fraud made up 62 percent of crime complaints received, crowning it with the dubious title of most commonly reported cyber crime. Other top complaints include undelivered merchandise or payment, credit and debit fraud, and check, investment, computer, and confidence fraud.

According to IC3, buyers in the United States planning to purchase online a vehicle that is located outside of the United States should exercise caution and thoroughly research any potential sellers or auction houses for legitimacy. Buyers should be aware of the risk of what are known as "second chance auctions," wherein a buyer who lost an "auction" is contacted and told that they may buy the item they bid on at a discount rate, due to the original auction winner defaulting on payment. Buyers should also beware of any monetary transfers requested that don't involve an established and trustworthy method, such as an escrow service.

The IC3 recommends observing the guidelines below to avoid being duped into an online fraud scam:


Educate yourself. Research how the auction works, what your obligations are as a buyer, and what the seller's obligations are before you bid.
Research the seller, especially if the only information you have is an e-mail address. If it is a business, check the Better Business Bureau where the seller/business is located. If you can't find any information, do not place a bid.
Research any feedback from past customers.
Determine the method of payment and where the seller is requesting it be sent.
Be aware that a problem with an international auction transaction may be much more difficult to resolve because of the difference in laws.
Find out the seller's policies on problems, warranties, delivery times, exchanges, and defective merchandise.
Avoid surprise charges by finding out if shipping and delivery are included in the auction price or are charged as separate costs.
Do not give your social security number or drivers license number to the seller. No reputable auction house has any use for them.

One issue that makes an online auction a prime spot for fraudulent exchange is that users can easily be mislead or become confused about the responsibility of the site in question. Some people don't realize that a site such as eBay does not sell the items up for auction; what eBay does is provide a forum for sellers to hock their own goods. Most online auction sites will not reimburse a buyer's losses, and emphasize the importance of using caution when engaging in online commerce.

eBay's Trust and Safety policy states that the site has put in place a safety team dedicated to keeping their "marketplace a safe, well-lit place for people around the world to trade with one other." The site features a number of protection methods in place to benefit users:


Feedback - Users can rate each other, establishing marketplace reputations and acting as watchdogs for dishonest or unfair auction practices (defective merchandise, late payment, inordinately long shipping time, etc.)
Buyer Protection - eBay is set up so that users can pay for their merchandise in a fashion that offers more security than wired cash.
Fraudulent Web Site Protection - eBay offers users a toolbar that alerts users in the event they stumble upon a fraudulent site.
Security Center Features - eBay offers tips on practicing good marketplace habits, as well as information on reporting fraud or other online criminal activity.

Other ways to protect oneself in the world of online auctions include avoiding both buyers and sellers who seem suspicious:


If the seller claims to be located in the United States but wants the payment sent overseas or to someone else, beware. Also, if the seller claims he suddenly had to leave the country for whatever reason, don't conduct business until he is back in the country.
If the seller requests cash payment or wire transfer, do not send it. Using these services leaves virtually no paper trail and no way to recover the money in the event of fraud.
Avoid dealing with sellers who claim to be authorized dealers or factory representatives in countries where you know such positions don't exist.
Do not trust buyers request the merchandise be shipped using methods that avoid customs or taxes.

Sellers should be suspicious of any credit card purchases if the address of the cardholder does not match the shipping address, and be sure to receive the cardholder's authorization before shipping any products.

Users who suspect they may have been a victim of internet fraud are encouraged to contact the IC3 at http://www.ic3.gov/.




http://home.stopsign.com




Protecting Yourself From Cyber Crime


Today, the Internet has become an integral part of our lives. It's a daily routine for us to log onto the internet for banking, shopping, social & business networking, job application, researching, music downloads and on other various important information retrieval, we all depend on internet.

With its worldwide popularity, the risk of Internet crime has also risen considerably. Precaution has always been better then cure so it's in our hands to safeguard our personal information when we make any online transaction. With every bit of information you transmit through the Internet or store online, the risk of falling victim to the Internet crime also rises. Identity theft is at its all time high! Some of the various gullible trends that have been rising through the Internet include hacking, stalking, fraud, phishing, theft, spreading Malware and harassment! This not only causes a financial distress but more then often leads to the psychological stress.

Some of the ways that can help you to guard your safety in the Internet world and help you escape from falling prey to Cyber Crime are listed below. Do remember, your safety is at your own hands!

Awareness: Before you start the campaign to safeguards yourself from cyber crime, keep in mind that you know about the risks you are going to face! The right knowledge equips you to fight with a right mindset! Awareness is the most important weapon that will come to your rescue at the most difficult times!

Be Vigilant: These days most of the people who surf online are the members of social networking sites. Being social is nice but trusting everyone regarding your personal information can drown you into deep waters! Most of the cyber criminals maintain a good relationship at the start and at later stages they exploit that information for their own good. Do not let them exploit your trust! Be conscientious of the information you share with others online.

Don't pass your Password: If any link in your email asks for your personal information or your password, quickly mark it as Spam and report it! Most of these emails are used to phish for your personal information. They will allure you with schemes such as " Congrats! You've been chosen winner for a trip to Switzerland", all excited you may give your information but in the end you'll realize the big loss you made for yourself! Keep in mind, if you are dealing with a valid organization, it will never ask you for your password. Another way to keep your personal information secure is by changing passwords at some regular intervals. Though make it easy for yourself to remember!

We all enjoy using the Internet. It has been a valuable source of information since almost a decade now! Do not let anyone make it a bad experience for you by making you prey to their bad motives. So, to prevent yourself from becoming a victim to cyber crime keep in mind these basic tips, be vigilant and conscious of the information you share through the intranet connection.




For all your Project Management and Portal Solutions




Hacking - Crime Or No Crime?


Every responsible Internet user knows that hacking is a serious crime. However, we all know as well that justice may not be on hand for its victims. A lot of private and public companies, including governments, have lost revenues due to information theft leading to loss of income and damage brought about by hackers. The sad thing is, laws don't seem to be tough enough on cyber offenders. In some cases, they're not even considered offenders at all due to the lack of legislation that defines and covers Internet crimes. This simply leaves us wondering what happens to a hacker when he's caught.

There are, of course, celebrated cases where hackers have actually been brought to justice. However, it's not very reassuring to take into account how the film industry has even somehow created this perception of hackers as being cool and even sexy. It seems as though Hollywood has forgotten to portray these black hats as they really are. It actually looks as though people have developed a distorted perception of this act and don't realize that it can be seriously damaging. Still, we are left only to wonder why this is so.

The very important question now is, what happens to hacker if and when they're caught? Do they even pay for what they've done? Do they serve a jail sentence? Are they made to pay damages to the victim? It's crazy to think that some people in government actually think the problem could be solved by confiscating the hacker's equipment and banning him from buying any new gadgets. It actually is downright ridiculous to think that the problem could be prevented by confiscation. After all, any black hat can hire anyone to buy him a new computer, modem or storage device and then he'll be right back on his trade as if nothing happened.

Definitely, hacking is a far more serious offense than most justice officials are ready to accept. And this leniency is, in fact, making the situation worse. Because these people know they can easily get away even if they were caught, they will simply continue robbing people and companies of their identities and causing their victims massive detriment while they take off in their private jets and burn some cold cash in an offshore casino.

If things go on like this, then Internet users will have to ensure their online security on their own by employing every measure there is to keep hackers at bay. Because these cyber offenders can begin by installing keyloggers into your computer, it would always be wise to have basic computer safety software installed. The firewall is another key component in securing your system along with an anti-virus software and every other type of anti-malware there is.




For general precaution, you can make use of an IP hiding software which works by disguising your IP address so even if you actually met a hacker while surfing, he wouldn't know how to get back to you because you've stashed your IP in some place he couldn't reach. Of course, this offers a reliable cloak of protection and you'll be gone from every hacker's life from then on.




 
Support : Creating Website | Johny Template | Mas Template
Copyright © 2011. Information Computer and Technology - All Rights Reserved
Template Modify by Creating Website
Proudly powered by Blogger