Cybercrime
Friday 20 December 2013
Top 10 Cyber Crime Prevention Tips
- Use Strong Passwords
Use different user ID / password combinations for different accounts and avoid writing them down. Make the passwords more complicated by combining letters, numbers, special characters (minimum 10 characters in total) and change them on a regular basis. - Secure your computer
- Activate your firewall
Firewalls are the first line of cyber defense; they block connections to unknown or bogus sites and will keep out some types of viruses and hackers. - Use anti-virus/malware software
Prevent viruses from infecting your computer by installing and regularly updating anti-virus software. - Block spyware attacks
Prevent spyware from infiltrating your computer by installing and updating anti-spyware software.
- Activate your firewall
- Be Social-Media Savvy
Make sure your social networking profiles (e.g. Facebook, Twitter, Youtube, MSN, etc.) are set to private. Check your security settings. Be careful what information you post online. Once it is on the Internet, it is there forever! - Secure your Mobile Devices
Be aware that your mobile device is vulnerable to viruses and hackers. Download applications from trusted sources. - Install the latest operating system updates
Keep your applications and operating system (e.g. Windows, Mac, Linux) current with the latest system updates. Turn on automatic updates to prevent potential attacks on older software. - Protect your Data
Use encryption for your most sensitive files such as tax returns or financial records, make regular back-ups of all your important data, and store it in another location. - Secure your wireless network
Wi-Fi (wireless) networks at home are vulnerable to intrusion if they are not properly secured. Review and modify default settings. Public Wi-Fi, a.k.a. “Hot Spots”, are also vulnerable. Avoid conducting financial or corporate transactions on these networks. - Protect your e-identity
Be cautious when giving out personal information such as your name, address, phone number or financial information on the Internet. Make sure that websites are secure (e.g. when making online purchases) or that you’ve enabled privacy settings (e.g. when accessing/using social networking sites). - Avoid being scammed
Always think before you click on a link or file of unknown origin. Don’t feel pressured by any emails. Check the source of the message. When in doubt, verify the source. Never reply to emails that ask you to verify your information or confirm your user ID or password. - Call the right person for help
Don’t panic! If you are a victim, if you encounter illegal Internet content (e.g. child exploitation) or if you suspect a computer crime, identity theft or a commercial scam, report this to your local police. If you need help with maintenance or software installation on your computer, consult with your service provider or a certified computer technician.
Sunday 15 December 2013
Minimizing The Risk Of Identity Theft
How to Minimizing The Risk Of Identity Thief
Some useful trip prevention measure on Identity Thief
Some useful trip prevention measure on Identity Thief
11 Facts About Cyber Bullying
Cyber bullying” is defined as a young person
tormenting, threatening, harassing, or embarrassing another young person
using the Internet or other technologies, like cell phones.
The psychological and emotional outcomes of cyber bullying are similar to those of real-life bullying. The difference is, real-life bullying often ends when school ends. For cyber bullying, there is no escape. And, it’s getting worse. Read on to get the facts.
Sources: Stop Cyber Bullying, Internet Safety 101, Stomp Out Bullying, End Cyber Bullying
The psychological and emotional outcomes of cyber bullying are similar to those of real-life bullying. The difference is, real-life bullying often ends when school ends. For cyber bullying, there is no escape. And, it’s getting worse. Read on to get the facts.
- Nearly 43% of kids have been bullied online. 1 in 4 has had it happen more than once.
- 70% of students report seeing frequent bullying online.
- Over 80% of teens use a cell phone regularly, making it the most common medium for cyber bullying.
- 68% of teens agree that cyber bullying is a serious problem.
- 81% of young people think bullying online is easier to get away with than bullying in person.
- 90% of teens who have seen social-media bullying say they have ignored it. 84% have seen others tell cyber bullies to stop.
- Only 1 in 10 victims will inform a parent or trusted adult of their abuse.
- Girls are about twice as likely as boys to be victims and perpetrators of cyber bullying.
- About 58% of kids admit someone has said mean or hurtful things to them online. More than 4 out 10 say it has happened more than once.
- About 75% have visited a website bashing another student.
- Bullying victims are 2 to 9 times more likely to consider committing suicide.
Sources: Stop Cyber Bullying, Internet Safety 101, Stomp Out Bullying, End Cyber Bullying
Friday 13 December 2013
Salah youtube video & website
YouTube Link : http://www.youtube.com/watch?v=xZqoeb3pxTY&feature=youtu.be
website Page: http://pure-collection.webnode.com/
website Page: http://pure-collection.webnode.com/
Enjoy watching and subscribe :D
Cyberstalking
Cyberstalking refers to the use of the Internet, e-mail, or other telecommunication technologies to harass or stalk another person. It is not the mere annoyance of unsolicited e-mail. It is methodical, deliberate, and persistent. The communications, whether from someone known or unknown, do not stop even after the recipient has asked the sender to cease all contacts, and are often filled with inappropriate, and sometimes disturbing, content. Cyberstalking is an extension of the physical form of stalking.
It is estimated that there may potentially be tens or even hundreds of thousands of cyberstalking victims in the United States. A cyberstalker only needs access to a computer and a modem. Due to the enormous amount of personal information available through the Internet, a cyberstalker can easily locate private information about a potential victim with a few mouse clicks or key strokes. Information is power, and stalking of any kind is about power and control. There is little security on-line. Turning on a computer can expose anyone to harassment. Everyone who receives e-mail or uses the Internet is susceptible to cyberstalking.
Cyberstalkers use a variety of techniques. They may initially use the Internet to identify and track their victims. They may then send unsolicited e-mails, including hate, obscene or threatening mail. Live chat harassment abuses the victim directly or through electronic sabotage (for example, flooding the Internet chat channel to disrupt the victim’s conversation). With newsgroups, the cyberstalker can create postings about the victim or start rumors that spread through the bulletin board system. A cyberstalker may also set up a web page on the victim with personal or fictitious information or solicitations to readers. Another technique is to assume the victim’s persona on-line, such as in chat rooms, for the purpose of discrediting the victim’s reputation, posting details about the victim, or soliciting unwanted contacts from others. Cyberstalking is a course of conduct that takes place over a period of time and involves repeated, deliberate attempts to cause distress to the victim.
Several things to do when being Harassed
1. Trust your instincts.If you suspect that someone knows too much about you and/or your activities, it is possible that you are being monitored.
2. Plan for Safety.Advocates at your local rape crisis center or domestic violence shelter are available to help you develop a safety plan. You can also use national hotlines such as 1-800-656-HOPE, the National Sexual Assault Hotline or a website such as www.fris.org or www.rainn.org .
3. Be extra cautious if your abuser is very technologically savvy.
Again trust your instincts. You may want to talk to an advocate or to the police.
Again trust your instincts. You may want to talk to an advocate or to the police.
4. Use a safer computer.If you suspect that your computer is compromised, use a computer at the public library, church, or a community center.
5. Create a new email account(s).Look for free web-based email accounts. Use an anonymous name and don’t provide much information in the profiles that an abuser could use to find you.
6. Check your cell phone settings.Consider turning it off when not in use. If your phone has GPS enabled, consider turning it off.
7. Change passwords and pin numbers.Use gender neutral passwords. Try to avoid using birth dates, numbers or phrases that your abuser may recognize. Don’t give your passwords to anyone and keep them in a safe, not easily accessed place.
Added by : Marshall University
Subscribe to:
Posts (Atom)