Chris Simpson, head of Scotland Yard's computer crime unit was unpleasantly surprised to learn how easy it is to cheat anybody out of his or her personal info -- by means of a fake survey.
This survey wasn't a scam; in fact, it was an experiment. It was carried out in March for the Information Security show (April 26-28). The results showed that most people casually give out their personal info.
Market researchers questioned 200 people on London streets in a bogus survey on theater-going habits. 92% of those who took part disproved the common stereotype of British as reserved people. They readily gave out personal data, including first school and birth dates, mothers' maiden names, names of pets -- valuable info for, say, cracking passwords. During the survey many people volunteered such key details as name, address and postcode.
The chance to win free tickets was enough for these people to reveal almost everything one might need to impersonate them. By the end of the survey, the fake researchers had everything they needed to take out credit cards in their name and even open bank accounts. These 200 people were lucky -- the survey was just a trick. But what if it hadn't been?
Instead of laughing at naive and unwary Londoners, let's think whether we all are careful enough with such personal data. Aren't we sometimes give away information without a clear idea how it will be used -- and by whom?
Much cautioned about identity theft and phishing in the Internet, we tend to relax when speaking in person. Most of us will never click links in spam or open attachments if we don't know who sent the email. We don't trust letters asking us for sensitive information. We are getting wiser.
We have heard about identity theft plenty of times. We know that good deal of identity theft occurs offline. But all the same, some of us are still far from having good habits such as shredding personal correspondence before throwing it into the trash, or not having the same easy-to-guess password just for everything.
The odds of identity theft online partly depend on such factors as what anti-virus and anti-spy software is installed on a PC and how often it is updated. Software vendors try to develop and provide effective means of defense against information-stealing malware. Of course, much depends on whether the user is careful enough to avoid a phishing scam, and even on what sites he visits -- one can easily pick malware while visiting certain websites.
As for plain looking over your shoulder when you are writing something down, digging out papers from your trash or picking some valuable info from a casual talk -- nothing will help you if you carelessly scatter information about yourself.
Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company that provides solutions for preventing identity theft.
The company's R&D department created an innovative technology, which capable of blocking information-stealing malware.The company's anti-keylogging software disables the very processes of information capturing -- keylogging, screenshoting, etc.
Learn more -- visit the company's website http://www.anti-keyloggers.com
![]() |
|
![]() |
|
![]() |
|
![]() |
Your computer is as slow as molasses. Your mouse freezes... Read More
They're out there. Individuals trying to make a quick buck... Read More
What is computer security? Computer security is the process of... Read More
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More
No longer are viruses the only threat on the internet.... Read More
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More
After Two Security Assessments I Must Be Secure, Right? ... Read More
If you know what is the 'Fishing' then it's very... Read More
Some months ago, before there was much publicity regarding phishing... Read More
Only the top spyware removers are successful at detecting and... Read More
The most frustrating part of having Spyware on your computer... Read More
Paypal is a great site and is used by many... Read More
Spelt phishing, but pronounced as above, this despicable act is... Read More
1)Spyware is on your system. Like it or not, statistically... Read More
You can detect spyware online using free spyware cleaners and... Read More
If you run any type of Internet business, Adware and... Read More
First off I should explain what phishing is. Phishing is... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
What is Phishing? Phishing is a relatively newly coined term... Read More
Have you ever bought a product or service from the... Read More
This is not some new fangled techno-speak, it is a... Read More
Afraid that someone is monitoring your PC or installed a... Read More
This really chapped my lips...I recently bought a new computer.... Read More
The first thing people think about when defending their computers... Read More
IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More
Much has been said on the theory of password protection... Read More
This is the second in a series of articles highlighting... Read More
Spyware and adware are becoming major problems for online surfers... Read More
Phishing is a relatively new form of online fraud that... Read More
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
My first experience with a spyware BHO based infection was... Read More
If you constantly deal with bank or electronic accounts, it... Read More
Every day millions of people go online to find information,... Read More
Every now and then you can read about a new... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
The 1998 Data Protection Act was not an extension to,... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
This is not some new fangled techno-speak, it is a... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
If you have used a Windows machine for a while,... Read More
As more people are logging onto the Internet everyday, Network... Read More
To blog or not to blog? Well, why not? Lots... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
If you are a parent, you have probably wondered at... Read More
The money being spent online is steadily growing. With billions... Read More
File sharing on p2p is soaring despite the music and... Read More
Computer infections can be broken up into 4 main categories... Read More
Having a good Spyware eliminator on your computer is vital... Read More
I am the victim of an internet scam. It is... Read More
1)Spyware is on your system. Like it or not, statistically... Read More
There you are busily typing away on your PC or... Read More
Spelt phishing, but pronounced as above, this despicable act is... Read More
Phishing is a relatively new form of online fraud that... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
Many of us have run into an annoying and time-consuming... Read More
You may not realize it, but as you are surfing... Read More
There is nothing more important that password security in world... Read More
Spyware symptoms happen when your computer gets bogged down with... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
Working from home has its advantages, including no commute, a... Read More
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
Every day millions of people go online to find information,... Read More
First I would like to stress I am condoning the... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
Internet Security |