This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

Friday, May 22, 2009

How Profits Motivates Virus Creators

The motivation behind hackers has evolved noticeably over the last couple of years. Developing harmful viruses is less about “bragging rights” or satisfying the creator’s ego and is becoming more and more about generating profit or commercial return.

The destruction of data on your computer or corruption of programs you use is a common side effect and what people have traditionally associated with a computer virus. The reformatting of your computer “c: drive”, especially at work, and the loss of valuable data used to be an incredibly painful experience.

The widespread deployment of data back up solutions within companies to comply with legislation and other factors means less and less valuable data is now stored on your computer’s local hard drive. More importantly for the virus writer this attack does not generate much tangible profit so there is not much motivation to develop more sophisticated programs to counter improved anti virus applications and corporate network security.

However, there is profit for the virus writer in turning your computer into a spam distribution machine. “Spam” is email sent without the permission of the person receiving the message. Hackers gain control of your computer through a Trojan Horse which gives them the same access rights as the user. Once your computer is controlled by the hacker it becomes known as a “Zombie.” A group of zombie machines is known as a “botnet.”

By controlling a botnet a hacker can generate profit in a number of ways. The botnet can be used to exhort a ransom from a company by threatening launch a damaging “Distributed Denial of Service” (DDoS) attack against its web site. The botnet can also be hired out to other hackers.

The most common way of profiting from a botnet is to use it to send out spam email. According to the security software company Sophos over 50% of all spam email now originates from botnets. Hackers use spam email to drive traffic to pay per click advertising sites or distribute virus programs further. Using a zombie computer helps cover their tracks.

The drive for generating profit is clearly evident in a new form of virus dubbed “Ransomware” by security experts which started to appear in 2005. Ransomware, as the name suggests, holds data on your computer “hostage.” Files on your hard drive are encrypted with a password. The user is then contacted and asked to pay a ransom to release the file.

Here are some simple tips and strategies to help prevent your computer turning into a “Zombie.”

• Keep your computer up to date with the latest software patches for Windows and other Microsoft programs. Most viruses and other malware exploit vulnerabilities in widely used programs.
• Install a reputable anti virus program. Keep the definitions up to date and scan your computer regularly.
• Install a personal firewall or buy a router with a hardware firewall. Ideally you need a firewall solution which filters both incoming and outgoing traffic from your computer to the internet.
• Never open spam email or associated email attachments which is frequently used to distribute virus programs. Use a spam filter to help reduce the amount of spam you receive.

Wednesday, May 20, 2009

How To Recognize Ebay Scams

Shopping and selling on eBay can be one of the most rewarding experiences on the Internet. However you need to be careful of scam artists who will try to take advantage of you through various types of fraud. If you do get scammed on eBay there are ways you can get your money back. However, it is very difficult to ever catch the fraud artist and it is a lot simpler if you can recognize and avoid frauds from the beginning.

One of the scams that are very common today is fake e-mails that appear to originate from eBay or PayPal or even your bank. Keep in mind that anybody can spoof any e-mail address and send an e-mail that appears to be from somebody else. It is even possible to spoof an e-mail coming from the president of the United States. So when you see any e-mail in your inbox that comes from eBay or PayPal and asks you to log in to confirm your password the chances are that this is a scam. E-mails that you receive of this type will have eBay letterheads or PayPal letterheads and will direct you to a link that appears to be eBay or PayPal. However, if you look closely at the bottom of your browser you’ll generally see that the domain these links point to is not actually an eBay or PayPal domain. It just looks like eBay’s web site, but it is actually a scam site asking you to confirm your password. Once you put in your username and password the fraud artist has it. One of the more popular tactics being used right now is to send a fake payment notification from PayPal suggesting that you have paid for something which you did not buy. The e-mail and includes a link right in the center that says “dispute this charge”, and once you click on that link you are taken to a page that looks like PayPal but is actually a fraudulent web site designed to get you to enter your username and password.

One of the easiest ways to protect yourself on eBay is to use PayPal for all transactions. PayPal is a wholly-owned subsidiary of eBay, and so transactions that are paid for via PayPal can be easily disputed. Since it is in eBay’s interest to maintain a secure shopping environment they are generally very quick to resolve disputes that originate by PayPal. If you buy an item and are not satisfied with it and feel like the seller did not deliver what he promised, it is far easier to dispute that transaction fee with PayPal because eBay can reverse the funds themselves. If you purchased by money order or credit card or some other payment method, eBay does not have the opportunity to reverse charges without going through a third-party.

Whether you are buying or selling items is a good idea to stick with PayPal. If you are selling items it is a good idea to only except PayPal as a payment option. The last thing you need is to get a bad check, or have your buyer dispute his credit card charge. If you have fulfilled your end of the seller’s bargain, then all you’ll need to do is prove that to PayPal and eBay without involving a third-party. Generally speaking, if a buyer is unhappy with a product that you sold and does not consider the product to be in the condition advertised, then you should demand that the product be returned before you issue a refund.

In order to sell on eBay effectively you need to learn how to use reserve pricing. One of the most common schemes on eBay is for someone using multiple accounts to place a low bid and a high bid simultaneously under different aliases. This ties up your auction at the high bid price and allows of the fraud to be carried out when the high bid buyer declines to pay and you are confronted with a low second bid. This scam is effective because the seller feels obligated to sell the item to the second-highest bidder once the auction has fallen through with the top bidder. Placing a reserve is essential to avoid this kind of scam so be sure to set a reserve price at the point where you would not sell the product for any less.

It is worthwhile to note right on your auction page that you reserve the right to back out of selling an item if you suspect fraud. While it is easy to get scammed as a buyer it is even easier to get scammed as a seller. Sellers generally have more experience and can recognize these scams, but you should be aware of the pitfalls of selling upfront before you start selling items on eBay.

EBay is a very safe and secure way to shop if you use it wisely and remain aware of how fraud occurs. It is important to always report suspicious activity directly to the eBay or PayPal. Since they have a vested interest in assuring that reliable transactions occur without fraud you can be sure that they will do their best to prevent illegal fraudulent activity.

Friday, May 15, 2009

How To Shop Safely Online For Any Occasions

Here are several things to keep in mind when shopping online for any special occasions.

Pay with a Credit Card and Protect Your Passwords: Credit cards offer you the most protection as a consumer. Never send cash! If you pay by credit card, your transaction is protected by the Fair Credit Billing Act. This limits your liability for any unauthorized charges
to only $50.

Understand the Return Policy: Determine the company�s refund and return policies before you place any order. Generally, any item that has been engraved or personalized in any way, will not qualify for the store�s Return Policy. Some countries don't have the same return policies as we do here in North America, so know where you shop and always read their return policy if has any.

Shop with Security: When online, look for a symbol of an unbroken key or padlock of the bottom of your Web browser window to ensure that your transmission is protected. Always enter the url manually to your browser instead of clicking links thru emails messages to ensure maximum security.

Print all Transaction Records: Make sure to print or save electronically any records related to your online transactions. This will help you keep track of shipping dates, shipping and handling fees, and other details of your transaction. Take as much info as possible including names, their title and phone numbers in case of
disputes.

File a Complaint
If you suspect the business may have broken the law, file a complaint with the Federal Trade Commission. You can call the FTC toll-free at 1-877-FTC-HELP (1-877-382-4357) or file a complaint online at www.ftc.gov. or report it to your local Better Business Bureau.

Check the Site�s Privacy Policy: The company�s privacy policy should let you know what personal information the company is collecting, why, and how the information is going to be used. Be cautious if you're asked to supply personal information, such as your Social Security number or personal bank account information to conduct a transaction. When you shop online, you should never ever have to provide any sensitive information such as your Social Security Number, if they do, shop somewhere else.

Friday, May 1, 2009

10 Steps to Reduce Your Risk of Identity Theft

You've probably heard about identity theft on television or read about it in the newspaper, and you may already be aware of the damage these crimes can cause victims and their families. What you may not know is how to protect yourself from these attacks. Below you'll find ten steps that can help you minimize your chances of becoming another identity theft statistic.

  1. Invest in a shredder – Never throw anything away without shredding it first. Identity thieves will dig through dumpsters and trash bags looking for credit card receipts, voided checks, paid bills, credit card offers, and other items which provide them with your personal information.


  2. Mail everything from the post office – Leaving your outgoing mail in or on your mailbox is an invitation to have it stolen by an identity thief. Not only can they get all of your personal information from the check, but they can even alter the check and cash it themselves. Instead, drop it by the post office or another mailbox..


  3. Use a post office box – Incoming mail is also a target for identity thieves. Your bills, checks, even junk mail can be used by these thieves to steal your
    personal information. If you have a post office box, then your mail will be delivered safely to that box..


  4. Have a non-published phone number – Some identity thieves will also use the telephone in an attempt to get your personal information. For example, one scam involved a caller telling a person he or she had won a government grant that was going to be directly deposited into their checking account. Of course, the caller needed the person's checking account number to deposit the money. If your phone number isn't available, then you won't be harassed by these calls..


  5. Check your accounts weekly – If you don't already, you need to get in the habit of checking the balances of all your financial accounts on a weekly basis. Waiting for monthly statements isn't good enough because by then your account could have been completely drained..


  6. Check your credit report yearly – Every year, you should request free copies of your credit report and check them for any errors, such as credit cards or loans you never took out. If you find out now that someone is using your identity, you can start correcting the problem before you need to use your own credit..


  7. Memorize PIN numbers and passwords – Never write down your PIN numbers or passwords. No place is a safe place to keep these important pieces of information. Keep them in your memory so no one can steal them. Also, make them more complicated than an ordinary word or your birthday. It shouldn't be easy for anyone to guess..


  8. Keep only basic information on checks – Your checks should only include basic information about you, such as your name and address. Your social security number should never be printed on your checks. If it is, then you're basically handing over the keys to your identity to any thief who comes in contact with your check..


  9. Eliminate unwanted credit card offers – Those credit card offers you throw away can be used by identity thieves. They simply have to complete the application and change the address to have a card sent to them in your name. You should shred them, but you can also call 1-888-567-8688 or visit http://www.optoutprescreen.com to opt-out of the credit card offer mailing list so you'll stop receiving them..


  10. Carry only necessities – Never carry anything in your purse or wallet that isn't necessary, such as extra deposit slips, social security cards, birth certificates, etc. The more personal information your purse or wallet contains the more valuable it will be to an identity thief if it is lost or stolen..


  11. Although we only promised ten steps, we're throwing in an extra one to help you protect yourself even further.

  12. Go electronic – Bank statements, most bills, and many other documents can all be viewed electronically so you never have to worry about them being stolen out of your mailbox or your trash. Contact your financial institution, credit card companies, and utility providers about the availability of this option. As an extra bonus, many of these businesses offer incentives to individuals who sign up for these electronic programs..