« Home | Blogs under scrutiny in Malaysia » | 13 daripada 26 AJK Keadilan Bahagian Shah Alam tel... » | Kene si Ctos ni » | Gambar2 ini di-postkan di blog si luncai Tian chua... » | CTOS should be vanished immediately » | Guide to buy TV » | Joran berwajah baru » | » | Merchong » | Kuala Sedeli dan 14 April ini. »

guide to protecting your identity

Thieves may sell your information on the black market or use it to obtain money, credit or even expensive medical procedures. Unless you're vigilant in protecting your records, you'll have to work even harder to repair the damage to your credit. The average victim spends 30 to 40 hours rectifying the problem.

Some of the e-threats to your identity are:

Phishing.


You get an e-mail that appears to be from your bank or an online service, most often PayPal or eBay, instructing you to click on a link and provide information to verify your account.

Pharming or spoofing.
Hackers redirect a legitimate Web site's traffic to an impostor site, where you'll be asked to provide confidential information. visit http://wiki.unilocusa.com/Understanding_Pharming


Smishing.
This is phishing done with text messaging on your smart phone. It instructs you to visit a bogus Web site. visit http://www.avertlabs.com/research/blog/index.php/category/mobile-security-research/ , http://blogs.ebay.com/probizteam

Spyware.
You've unknowingly downloaded illicit software when you've opened an attachment, clicked on a pop-up or downloaded a song or a game. Criminals can use spyware to record your keystrokes and obtain credit card numbers, bank-account information and passwords when you make purchases or conduct other business online. They also can access confidential information on your hard drive.


You don't need to have a computer to become a victim. (See "How safe is your financial information?")

Vishing


Voice phishing. You get an automated phone message asking you to call your bank or credit card company. Even your caller ID is fooled. You call the number and are asked to punch in your account number, PIN or other personal information (See "Your phone may be under attack.") visit http://www.cardguide.co.uk/articles/vishing.html , http://www.voip-weblog.com/50226711/voip_and_sms_is_now_the_target_of_phishers.phpweblog.com/50226711/voip_and_sms_is_now_the_target_of_phishers.php , http://www.abc.net.au/science/news/stories/s1694737.htm

ATM skimming.
Crooks use a combination of a fake ATM slot and cameras to record your account information and PIN when you use a cash machine. Crooks will steal your wallet, or go through your mail or trash. visit http://www.hoax-slayer.com/atm-
skimming
More than half of identity theft cases involve credit card fraud. Checking accounts are the second most popular target. (See "Keep thieves out of your bank account.") But some crooks have other plans:
At least 250,000 people have been the victim of medical identity theft in the last several years. (See "Diagnosis: Identity theft.") Crooks use fraudulently obtained personal information to get expensive medical procedures or dupe insurance companies into paying for procedures that were not done.

The victims of about 5% of reported identity theft cases are children. The fraud often goes undetected for years -- until the young adult applies for credit. (See "Stolen innocence: Child identity theft.")

16 tips to protect yourself You can take steps to protect yourself from identity fraud:
Keep your confidential information private. Your bank or credit card company won't call or e-mail to ask for your account information. They already have it.
Keep an inventory of everything in your wallet and your PDA, including account numbers. Don't keep your Social Security card in your wallet.

Stop getting banking and credit card information in the mail. (See "Go paperless for safer banking.")