How To Give Away Your Personal Information

Identity Theft and Your Personal Information
Identity theft is apparently the "in thing" these days. By media accounts, hackers and evildoers lurk everywhere trying to steal your personal information. In the past few months, one company after another is being forced to admit customer data has been lost or stolen.

In many cases, they have then come forth repeatedly over the next few weeks, or even months revising the estimated number of impacted customers. To date, I don't think any have ever lowered those numbers.

Identity Theft and Respected Companies
Generally speaking, these aren't fly-by-night organizations. These are respected companies who we've come to trust. In many instances, the loss wasn't even the work of a "malicious hacker" or other mystical force beyond their control; it was simple carelessness. The frequency of such reports of identity theft is making it difficult for consumers to feel confident in those with whom we do business. Customers are outraged that companies are not doing more to protect their information from the forces of evil.

You and Your Personal Information
What about you? How are you at keeping you personal information under wraps? Some of these high profile incidents were the result of a trivial mistake that could have happened to anyone, including you.

Let's consider two events that didn't make the front page of C|Net or CNN.

The Keys To The Castle
I consult for a client who doesn't trust me. It's nothing personal, they don't trust anyone. Whenever I visit this site, I am forced to contact the client throughout the visit to have them type a credential, or password, to grant access to a server or router. It's really annoying.

I really respect this client.

They don't really know me; I'm "the consultant". They're taking the proper steps when dealing with a consultant, providing the absolute minimum amount of information required. They would never give me unsupervised access to the network, and certainly wouldn't consider giving me passwords to their servers or routers. Not on purpose anyway.

Then there was the day I was working alongside the client and needed to reconfigure a router to complete a task. It's a long walk to the client's office to get the password for that particular router. Yes, this is a client who apparently has a unique password for every piece of equipment they own. Conveniently the client does keep a password protected file on a USB key that contained the needed information. The client was completely appropriate and even asked permission before using my laptop to fetch the file. I consented, and even made the gesture of turning away while he unlocked the file and retrieved the required password.

Have you ever used Google Desktop Search? It's a very cool, and aptly named, program that is a Google for your PC. It will index your files and make them searchable through a fast, flexible, and easy to use interface. It'll even cache the contents of files so if you move it off your hard drive, you'll still be able to see the contents of what was once there. Normally it does all this in the background when you computer is sitting idle. It also does it anytime you open a file.

Your Personal Information Is The Prize
You guessed it. Logins, passwords, public and private IP addresses. You name it, I had it. The client who would never give me a single password had turned over all of them at once.

What kind of wondrous data was now available? Personnel records, salary data, trade secrets? Maybe, if this was a corporate client. What about an academic, a University even? Student records, financial aid forms, and grant information. The possibilities were endless.

I promptly deleted the cache. The customer didn't want me to have the information, nor did I.

Would You Hand Your Credit Card To A Stranger?
The previous example showed how simple it is to inadvertently reveal a large amount of data. It's funny how easily a person can dismiss this type of loss. After all, it's not your data, right?

So let's get a bit more personal.

Convenience And Computer Security Are Rarely Compatible
I have a good trust relationship with my next client. She is quite comfortable with me administering and securing the corporate network. When it comes to her personal credit card information however, well, not so much.

Pretty much every web browser available these days has quite a few convenience features designed to make your day to day "net experience simpler". One of these convenience features came into play in this example, specifically the Firefox browser's auto-completion feature.

Not too long ago, I was tasked by this client to make arrangements for transfer of an internet domain to their ownership. Not a difficult task, she could have handled it herself. She was quite a capable computer user; she just didn't want to be bothered with the process.

I set aside 20 minutes to go through her domain registrar's step-by-step transfer wizard. I summoned the client to explain the details of the transfer displayed on my laptop screen. Facing the payment options screen the client asked if she could proceed. I relinquished control of my laptop and she entered the credit card information required to complete the transaction.

Web Browsers Cache Your Personal Information
Most modern web browsers, for convenience, will cache information entered into web forms. The intent is to be able to recall this information if it's requested by another form. The following day, I was in the process of registering another domain with the same registrar and was surprised, for half a second, when the payment screen pre-populated using the same information used the day before. In addition to the credit card information I also had my client's personal home address, and telephone number. This was quite a bit of personal information the client never had any intention of giving me.

So What's Your Point?
These two examples are very different but do share two important attributes. First, data the client intended to keep private was revealed to me. Second, the reason for the "compromise" of the data was due to the "victim" working with said data on a computer they neither owned nor were familiar with. Under different circumstances, the end results could have been quite devastating.

When using a computer system you do not own, perhaps at a kiosk, or Internet Café, be aware that the computer itself is going to remember a lot of what you've done as part of basic functionality. Additionally, most entities that are going to provide you with access to a computer, including your employer, probably have systems in place that could collect additional data you don't desire to share. Even WiFi hotspots that allow you to use your own notebook or PDA to surf the web while sipping coffee can be a potential information collector.

The moral of the story is, when dealing with computer systems that aren't your own, never handle data or documents that you wouldn't want left behind unprotected. In all odds, once you walk away from that computer, you've done just that.

About The Author
Erich currently specializes in providing network and security solutions for small to medium businesses that frequently have to resolve the conflict of need versus budget. His commitment to precision and excellence is eclipsed only by his fascination with gadgets, particularly ones that are shiny, or that blink, or that beep. Erich is a staff writer for and several other e-zines. If you would like to contact Erich you can e-mail him at [email protected] or [email protected].

In The News:

As the Government Shutdown Drags on, Security Risks Intensify  WIREDFrom potential nation state hacks to a brain drain, the shutdown has done nothing good for cybersecurity.
The Millions Silicon Valley Spends on Security for Execs  WIREDFacebook told investors it expects to spend $10 million annually on security for CEO Mark Zuckerberg.
The Shutdown Is Doing Lasting Damage to National Security  The AtlanticAs the longest government shutdown in American history drags on, it's not just hurting the morale of America's federal work force and the broader American ...
3 Compelling Reasons To Invest In Cyber Security - Part 2  ForbesCyber security is among the essential subjects to boards, alongside business strategy and leadership. Your compelling case to gain an investment is now here!
How to secure, protect, and completely lock down your Android phone  PCWorldWhether you just got a new Android phone or have had one for a while, it's probably not as secure as it could be. Here's how to lock it down.
Person of 'national security concern' was accidentally granted permanent residency  CBC NewsTwo federal departments were forced to make changes after a person of “national security concern” was granted permanent residency “due to a series of failures ...
Bus security guard accused in North Las Vegas murder of elderly passenger  FOX5 Las VegasNORTH LAS VEGAS (FOX5) -- North Las Vegas police arrested a bus security guard in the December death of an elderly passenger. According to police ...
How To Combine Physiological Biometrics And Blockchain For Heightened Security  ForbesBlockchain's security is imperfect as it stands. Here's how the CEO of a physiological biometrics solution recommends leveraging physiology to create new ...
No, you can’t hide a security camera in your Airbnb rental photos and call that 'disclosure'  MashableAirbnb is apologizing to one of its users after dismissing his privacy complaint. The user had discovered undisclosed security cameras inside his rental.
TSA says security wait times are 'within normal' range in latest statement  Fox NewsThe Transportation Security Administration says wait times at security checkpoints are largely returning to the “normal” range following reports of ...
Syria's Kurdish fighters ready to help set up 'safe zone'  Aljazeera.comSDF says zone must come with guarantees to stop 'foreign intervention', in apparent reference to Turkey.
Italian security officers leave Gaza after standoff with Hamas  The Times of IsraelSource in Strip says 3 were given permission to depart Palestinian enclave after being cleared by ruling terror group of wrongdoing.
Applause for Film "Uri" Shows How Much People Respect Security Forces: Piyush Goyal  News18The film, which was released on January 11, is based on the 2016 surgical strikes by the Indian Army on terror launch pads in Pakistan-administered Kashmir.
Email security company Tessian is closing in on a $40M round led by Sequoia Capital  TechCrunchContinuing a trend that VCs here in London tell me is seeing an increasing amount of deal-flow in Europe attract the interest of top-tier Silicon Valley venture ...
Yemen: Security Council backs new mission in support of key port city truce  UN NewsThe Security Council unanimously voted on Wednesday in favour of deploying up to 75 observers to monitor a fragile ceasefire in Yemen's port city of Hudaydah ...
Microsoft continues to build government security credentials ahead of JEDI decision  TechCrunchWhile the DoD is in the process of reviewing the $10 billion JEDI cloud contract RFPs (assuming the work continues during the government shutdown), Microsoft ...
Security Report Gives A or A- Rating to 16% of Major Crypto Exchanges, None Get A+  CointelegraphIndependent security analysts at ICORating have given 16 percent of the world's biggest crypto trading platforms an A rating, and none an A+.
Security agencies commended for a well coordinated operation  NTVKenyan security forces have been commended for their swift reaction to the 14 Riverside Drive attack, that has taken down 14 lives, according to.
GSA, White House must improve security of federal facilities  Federal News NetworkThe General Services Administration approves the technologies and the vendors and the White House sets the parameters for the security of federal facilities.
OxygenOS beta 23/25 for the OnePlus 5/5T brings January security patches and Google Duo integration  XDA DevelopersNot a month has passed since the last OxygenOS update and OnePlus is already offering the next beta update for the OnePlus 5 and OnePlus 5T.
Zimbabwe: Security Forces Fire on Protesters  Human Rights WatchZimbabwe security forces fatally shot at least five people and wounded 25 others during a crackdown on nationwide protests beginning January 14, 2019, ...
Swiss Crypto Industry Leader Says Next Crypto Wave Will Be Stablecoins, Security Tokens  CointelegraphNews. Bitcoin Association Switzerland board member Luzius Meisser says he believes the next wave of crypto innovation will focus on stablecoins and security ...
Box hires former SAP exec as chief information security officer  TechCrunchBox announced today that it has hired Lakshmi Hanspal to be the company's new chief information security officer (CISO). She boasts 20 years of security ...
Ukraine could soon cease to be a country, Russia’s top security official says  The IndependentUkraine could lose its statehood if the former Soviet republic continues to be divided by competing interests, Russia's top security official has said. Nikolai ...
Security camera captured image of deceased son's spirit, Atlanta mother says  Fox NewsA grieving Atlanta mother said a spirit that looked like her deceased son was captured in her home's security camera, according to The Atlanta ...
Drunk Security Guard Attacks Woman With Knife In Delhi's Dwarka: Police  NDTV NewsA 24-year-old woman was injured after she was allegedly attacked with a knife by a drunk man who worked as a security guard in the Dabri area of Dwarka ...
Ethereum’s Constantinople Upgrade Faces Delay Due to Security Vulnerability  CoinDeskEthereum's long-anticipated Constantinople upgrade has just been delayed after a critical vulnerability was discovered in one of the planned changes.
3 Myths That Will Ruin Your Retirement Security  ForbesRetirement planning is complicated and confusing. There are many myths that can trip up your financial security. We cover 4 retirement myths that you shouldn't ...
Major security flaw found in popular ES File Explorer Android app  Android AuthorityIf you use the popular Android app ES File Explorer on any of your Android smartphones or tablets, be careful: a security researcher has found a vulnerability in ...
Over 140 International Airlines Affected by Major Security Breach  BleepingComputerPotential attackers could view and change private information in flight bookings made by millions of customers of major international airlines because of a ...
2019 Android Security Trends  XDA DevelopersGoogle's Android has recently been crowned as the world's most popular operating system. It has become the first in the worldwide operating systems internet ...
Georgia man arrested in plot to attack White House: security officials  The Sydney Morning HeraldThe 21-year-old was arrested in a sting after he traded his car for weapons.
Parents concerned city budget battle could impact school security  Boston 25 NewsParents in Methuen are alarmed after learning school resource officers could be laid off unless the city council approves a funding request from the police ...
Marietta schools plan to improve security with money promised by Gov. Kemp WXIAGov. Brian Kemp pledged to give each school district in Georgia a one-time check of $30000 to fund school safety improvements.
No-show numbers for airport security screeners soar during shutdown  WDAF FOX4 Kansas CityATLANTA — The number of airport security screeners failing to show up for work around the country is soaring as the partial government shutdown goes into its ...
Security Waits Top an Hour at Atlanta Airport Amid Shutdown  BloombergSome airport security lanes in Atlanta, Washington and Houston were closed as the Transportation Security Administration continued to grapple with more ...
Sonraí Security marks official launch with $18.5m funding  The Irish TimesNew York-based cybersecurity firm co-founded by Dublin tech veteran in 2017.
Army chief: After two deployments to Afghanistan, security force assistance brigades could be on tap for other parts of the world  ArmyTimes.comThe Army's security force assistance brigades may soon be branching out to areas of the world other than Afghanistan.
Rise Above The Noise In Enterprise Security  ForbesThe tech industry is a hype machine. It's not just around smart devices and virtual reality glasses and self-driving cars, it's enterprise technology too. In fact, we ...
Metasploit, popular hacking and security tool, gets long-awaited update  ZDNetAfter seven years, Metasploit Framework, the popular open-source hacking and security tool, has been given a major update.
Exclusive: Offensive Security Names New CEO; Former No. 2 at HackerOne, Lynda  FortuneNing Wang is the new chief executive officer of Offensive Security, a cybersecurity training business best known for its popular certification programs which teach ...
14-year-old girl charged after threats heighten security at Winnipeg middle school  CBC.caA 14-year-old girl faces charges after people associated with a Winnipeg middle school were threatened on Monday, prompting a "hold and secure" situation at ...
Border Sheriff's Coalition adopts new policy on border security  KVOA Tucson NewsTUCSON – With border security in the middle of the national conversation, Pima County Sheriff Mark Napier and 30 other sheriffs gathered together to create a ...
Need To Be Careful About Aadhar Data Misuse: Ex-National Security Advisor  NDTV NewsWith Aadhar cards becoming ubiquitous, the country needs to marshal its defensive and offensive capabilities, former national security adviser MK Narayanan ...
Stricter security measures to be implemented at women's prison  Loop News JamaicaThe Ministry of National Security has announced that stricter security measures will be implemented at the Fort Augusta Adult Correctional Centre for women in ...
‘They’re going to get past you’: Attack in Kenya shows how increased security can be thwarted  Washington PostFive and a half years ago, gunmen stormed the Westgate mall in Nairobi, killing 67 people and prompting a days-long standoff with police. The attack rattled ...
Mum's Home Security Camera Appears To Capture Ghost Of Her Son  LADbibleA mum in the US claims to have been left stunned after her home security system captured what appears to be the ghost of her son.
Tesla’s reward for finding security bugs: Model 3  LivemintTesla, which can ship updates to customers via over-the-air software upgrades, launched a 'bug bounty' program in 2014 to reward researchers who uncover ...
More TSA employees skipping work as shutdown stretches on – live  The GuardianCardi B has officially weighed in on the government shutdown, and she is not happy. In a video posted to Instagram the rapper criticized Trump and told her fans ...
Firms fined $1M for SingHealth data security breach  ZDNetSingapore Health Services (SingHealth) has been fined S$250,000 while Integrated Health Information Systems (IHIS), the IT agency responsible for ...
Saudi teen granted asylum in Canada gets 24-hour security amid online threats  CBC NewsA Saudi teen who fled alleged abuse by her family considers herself "one of the lucky ones" now that she has arrived as a refugee in Canada, but the agency ...
As SA policing fails, private security steps in — but...  Daily MaverickSouth Africa's private security industry was thrust into the spotlight in December 2018, when guards from Cape Town's PPA Security company were accused of ...
Mutual Security Credit Union names new president  CT PostThough it's only been two weeks since his promotion, Henry Baum is looking to take Mutual Security Credit Union into the future of banking as its new president.
Intruder alert! The best smart home security cameras  The GuardianA new generation of cameras featuring a host of clever features will make conventional alarm systems obsolete. We review four of the best.
National security advisory board's aim is to spread 'security understanding'  Economic TimesIt was decided that NSAB members would try to spread wider public understanding of Indias national security challenges, perspectives and policies.
Ring Security Cam Snooping, Location Tracking, and More Security News This Week  WIREDA German hack confession, unencrypted government sites, and more security news this week.
President Trump's plan to address security and humanitarian needs at the border deserves more than ridicule from Nancy Pelosi: Anthony Gonzalez (Opinion)  cleveland.comThe Capitol as seen on Monday, the 24th day of a partial government shutdown, after a weekend snowstorm. In a guest column today, U.S. Rep. Anthony ...
April Sound security guard accused of sexting teenage residents  KPRC Click2HoustonA security guard at April Sound has been arrested and charged with online solicitation of a minor after authorities said he sent multiple inappropriate text ...
Security agencies deserve plaudits for swift response  The StandardNo one for sure will know what damage the heavily armed men could have done had the police and the paramedics delayed their response even by a minute.
New laws proposed to ensure Singapore's food security  Channel NewsAsiaSINGAPORE: A new agency set up to oversee food safety and security may be able to require importers of key food items to have plans to mitigate ...
CBI Crisis Should Be Resolved Within System: Ex-National Security Advisor  NDTV NewsFormer National Security Advisor MK Narayanan on Tuesday said the crisis at the top layer of the Central Bureau of Investigation (CBI) should be resolved within ...
In a first, Haryana gets cyber security portal  The Indian ExpressIn a first, Haryana Finance Minister Captain Abhimanyu launched a Cyber Security portal at the National Summit on Digital Innovation and Cyber Security in ...
Cryptopia cryptocurrency exchange pulled offline due to security breach  ZDNetReports suggest that cryptocurrency may have been lost by the exchange.
Delayed salaries at Jet Airways can pose a security risk: DGCA  Economic TimesNEW DELHI: Delayed salary payments at Jet Airways have the potential to pose a safety risk, the Directorate General of Civil Aviation (DGCA) said in an audit of ...
Cedarwood Towers owners hire new security guard after last week's fatal shooting  13WHAM-TVRochester, N. Y. – The owners of Cedarwood Towers say a new security guard has been assigned to the apartment complex following a fatal shooting there last ...
SCP implementations impacted by 36-years-old security flaws  ZDNetAll SCP (Secure Copy Protocol) implementations from the last 36 years, since 1983, are vulnerable to four security bugs that allow a malicious SCP server to ...
Ex-religious teacher and student issued restriction orders under Internal Security Act: MHA  Channel NewsAsiaSINGAPORE: Two Singaporeans – a former religious teacher and one of his students - have been issued restriction orders under the Internal Security Act (ISA), ...
Alejano warns of possible 'security disaster' in CCTV deal with Chinese firm  Philippine StarThe Department of the Interior and Local Government's (DILG) project with a state-owned Chinese firm may be a risk to national security, Rep. Gary Alejano ...
Employees sacked, CEO fined in SingHealth security breach  ZDNetTwo employees have been sacked and five senior management executives, including the CEO, were fined for their role in Singapore's most serious security ...
Security minister blames MDC for Zimbabwe protest chaos  TimesLIVEThe Movement for Democratic Change (MDC) has been blamed for the violent protests which erupted in Harare and Bulawayo on Monday.
3 Compelling Reasons To Invest In Cyber Security - Part 1  ForbesCyber security is among the essential subjects to boards, alongside business strategy and leadership. Your compelling case to gain an investment is now here!
Police: Man shot by security guard during disturbance outside Dream On Saloon dies at hospital  KPTV.comPORTLAND, OR (KPTV) - Police are investigating a deadly shooting that happened outside a southeast Portland strip club early Tuesday morning.
2020 will be a national security election  Washington PostNo matter how long this government shutdown lasts or how many more follow, 2020 will be a national security election. We cannot ignore the world no matter ...
Elections: US expresses concerns over neutrality of Nigeria's security services  Premium TimesThe United States government has expressed concern over the neutrality of security services ahead of Nigeria's general elections.
Security cameras coming to Madison parks and trailheads  WHNT News 19MADISON, Ala. - To combat break-ins when the weather gets warmer, Madison city leaders will include security cameras in park improvements over the next few ...
Security guard stabbed at welfare assistance office in Exchange District, suspect arrested: police  CBC.caA 47-year-old man is accused of stabbing a security guard at the employment and income assistance office in the Exchange District on Monday afternoon.
Erdogan, Trump consider setting up 'security zone' in Syria  Al Jazeera EnglishTwo leaders discuss situation in Syria over the phone amid growing tensions over the fate of US-allied Kurdish fighters.
Government union officer: We back border security but 'don’t believe in not paying people to work' | TheHill  The HillAn officer of the union representing thousands of federal government employees said border patrol and ICE officers believe in border security, but expect to be ...
Security firm Thompson & Clark bill for official answer legitimate Response (SR) says a $2070 payment to security firm Thompson and Clark Investigations (TCIL) for its input into an official release was legitimate.
Security Footage Shows Attempted Theft of Loader Less Than an Hour Before Kelsey Smash and Grab  VOCMThree men were caught on camera attempting to steal a front-end loader less than an hour before a different loader was used in a smash and grab in St. John's.
Webb: Security is the real issue | TheHill  The HillI'm asking fundamental questions in this border battle inside the Beltway, as are you. Many have called my radio show and asked for a breakdown. It is below, as ...
Shutdown: Government sites with lapsed security certificates pose risk  CNETThe federal closure seems to have led to expired certificates, and without them, hackers can get between you and the website you're visiting.
Eisenkot: Netanyahu's national security decisions were never political  The Times of IsraelEchoing outgoing IDF chief, PM says government 'made pertinent decisions whose purpose was to safeguard the state's existence'
Polish Ex-Security Official Charged With Spying for China During Government Service  Wall Street JournalA former senior Polish intelligence official, arrested with a Huawei Technologies employee last week, has been charged with spying for China while he worked ...
Survey reveals growing concern about container technology security  ZDNetNinety-four percent of IT security pros worry about container security, and 60 percent have had container security incidents in the past year. What to do?
The FBI's Investigation of Trump as a “National Security Threat” is Itself a Serious Danger. But J. Edgar Hoover Pioneered the Tactic  The InterceptDid the FBI investigate Trump due to disagreements with his policy views on Russia? If so, it would not be the first time the bureau abused its powers this way.
Samsung Galaxy S9, Galaxy S9+ Update Improves Selfie Performance, Brings January Android Security Patch  Gadgets 360Samsung has rolled out the January 2019 security update for the Samsung Galaxy S9 and Galaxy S9+, which also happens to bring some major improvements ...
Mututho lauds security agents for quick response  Standard DigitalFormer NACADA chairman John Mututho (pictured) has lauded security forces in the country for their quick reaction following the 14 Riverside Drive terror attack ...
'Telecom technology from Huawei rivals may not have lesser security issues'  ETTelecom.comEricsson and Nokia also manufacture parts in China but both say they have tight controls and security protocols in place.
South Australia's new big battery unveiled in bid to improve power security  ABC NewsThe Yorke Peninsula gets South Australia's newest big battery in an attempt to improve power security for the region.
OKCoin Lists Tron Cryptocurrency, Claims it's not a Security  CCNFirst thing we do, we have to abide by regulations in the US. We are a money *service* business. We're operating out of the US. We're serving US customers.
Anderson homeowner catches burglar in the act on mobile security system  FOX 59 IndianapolisANDERSON, Ind. – An Anderson man caught a burglar breaking into his home Monday morning thanks to his mobile security system. The Madison County ...
Burchett, Corcoran family at Capitol to support border security  WVLT.TVRepresentative Tim Burchett and the parents of Pierce Corcoran were in Washington D.C. on Tuesday to discuss border security.
Reed Wants Compromise On Border Security | News, Sports, Jobs  Jamestown Post JournalAs the federal government shutdown lingers underneath a cloud of border security concerns, Rep. Tom Reed again called for compromise and bipartisan ...
Capital Health outsourcing 103 jobs to big private security firm  NJ.comCapital Health System Inc. is replacing its security team with an outside firm, which will result in up to 103 employees losing their jobs in March.
Palace calls bishop's challenge to Duterte to walk without security 'silly, absurd'  Philippine StarMalacañang on Wednesday hit back at a bishop's challenge to President Rodrigo Duterte to roam the streets without bodyguards, calling it absurd and ...
Amazon's Ring Security Camera Let Employees Spy on Customers  ExtremeTechCompanies supposedly devoted to bringing us smart-home breakthroughs are often violating the privacy of their customers in significant ways. ...
Dumb job tips to unpaid federal workers could ruin careers and risk national security  USA TODAYPainting, garage sales, dog walking? Stop already. It's not only insulting, it opens the door to quitting, conflicts of interest and security threats.

Spyware is Not Like a Nosy Neighbor

Remember the television show about the nosy neighbor Mrs. Kravitz... Read More

Sarbanes-Oxley: A Cross-Industry Email Compliance Challenge

Is your enterprise following the rules?The bulk of financial information... Read More

I Spy...Something Terribly Wrong (In Your Computer)

This really chapped my lips...I recently bought a new computer.... Read More

Watching the Watchers: Detection and Removal of Spyware

If spyware were a person and he set himself up... Read More

Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk

The trash folder in my main inbox hit 4000 today.... Read More

The Attack of the Advertiser - Spy Mother Spy

The menacing campaigns that drive the corporate spyware and adware... Read More

How to Know Whether an Email is a Fake or Not

A few nights ago I received an email from "2CO"... Read More

Is My PC Vulnerable on the Internet?

No longer are viruses the only threat on the internet.... Read More

Are You Surfing Safe?

Ok, you've got a computer, and you get online. You... Read More

Detect Spyware Online

You can detect spyware online using free spyware cleaners and... Read More

Protecting Your Home Both Inside and Out

If you are a parent, you have probably wondered at... Read More

Spyware, This Time Its Personal!

First the basic definition of Spyware: It is a type... Read More

Mail Forwarding - Why Would You Do It?

First of all we need to get some terms stated.... Read More

5 Simple Steps to Protect your Digital Downloads

A couple of days ago, I was searching for a... Read More

Steganography ? The Art Of Deception & Concealment

The Message Must Get Through ----------------------------- The year is 300A.D.,... Read More

Virus Prevention 101

Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More

8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft

Ebay is a great site and is used by many... Read More

Temporary Internet Files - the Good, the Bad, and the Ugly

A little bit of time invested into learning about internet... Read More

What Every Internet Marketer Should Know About Spyware

If you run any type of Internet business, Adware and... Read More

The Bad Guys Are Phishing For Your Personal Information

Do you know what "phishing" is?No, it doesn't mean you... Read More

Be Alert! Others Can Catch Your Money Easily!

So called phishers try to catch the information about the... Read More

Identity Theft ? Beware of Phishing Attacks!

"Dear Bank of the West customer", the message begins. I've... Read More

The Importance of Protecting Your PC from Viruses and Spam

Today the internet is a mine field of malicious code... Read More

Breaking Into Your PC: News...

You'd better learn news from media, not from emails, security... Read More

Is Adware - Spyware Putting Your Privacy at Risk

Do you sometimes notice your computer running slower. Is your... Read More