Five ways to lose your identity (and wallet) this holiday season
How online shoppers can make their systems more attractive to online thieves
Computerworld - The holiday season is almost here, and even in a recession, huge numbers of people will likely be shopping online for gifts this year.
The rush by shoppers to the Web makes the season a great time for online retailers. It's also a great time for hackers looking to steal data and money from the unwary millions expected to search for great deals online.
The growth of holiday hackers has annually prompted security analysts, identity theft awareness groups and various government agencies to come up with lists of precautions that consumers can take to avoid becoming victims of online fraud. Such lists can be a benefit to consumers, but unfortunately, some people ignore the warnings.
For those unwary consumers, Computerworld this year offers a handy list of tips that can help maximize the their exposure to online fraud.
Tip No. 1: Open all attachments from strangers and click on all embedded links in such e-mail messages. Such actions remain one of the most effective ways to provide thieves with personal information and financial data. All a hacker needs to do is find computer users who instinctively open e-mail messages from strangers, even those who write in a foreign language. The action can open the door to keystroke loggers, rootkits or Trojan horse programs. Crooks can also easily install back doors to steal data without attracting any attention. Once installed the programs are installed, hackers gain unfettered access to personal data and can even remotely control and administer systems from anywhere.
Tip No. 2: Respond to Dr. (Mrs.) Mariam Abacha, whose name is used by many hackers who say they have close friends and relatives in Nigeria who have recently been widowed or deposed in a military coup and need your help to get their millions of dollars out of the country. Users are told they will undoubtedly be rewarded for helping to get "well-packed trunk boxes" full of cash out of Nigeria. And make sure to provide bank account information, log-in credentials, your date of birth and your mother's maiden name so that they can wire the reward directly into your checking account in time for the holidays.
Tip No. 3: Install a peer-to-peer file-sharing client on your PC, and configure it so all files, including bank account, Social Security and credit card numbers, along with copies of mortgage and tax return documents, are easily available to anyone on the same P2P network. Your personal data will stream over the Internet while you check out what songs you can download for free without getting sued by the RIAA.
Tip No. 4: Come up with passwords that are easy to crack. It saves hackers from spending too much time and effort trying to access your PC. Clever sequences such as 123456 and abcdef and your firstname.lastname all make fine, easy-to-remember default passwords for you and for hackers. For maximum exposure, keep passwords short, don't mix letters and numerals, and use the same password for all accounts.
Tip No. 5: Avoid installing the latest anti-malware tools and security updates. Keeping operating systems properly patched and antivirus and antispyware tools updated makes life hard for hackers. Users can help them out by making sure their antivirus software and antispyware tools are at least 18 months out of date, or by not using them at all. Either way, it's very likely that your computer will be infected with a full spectrum of malware.
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Path Selection Infographic Path Selection Infographic
- Hyperconvergence Infographic A wide range of observers agree that data centers are now entering an era of "hyperconvergence" that will raise network traffic levels faster...
- Preparing Your Infrastructure for the Hyperconvergence Era From cloud computing and virtualization to mobility and unified communications, an array of innovative technologies is transforming today's data centers.
- How WAN Optimization Helps Enterprises Reduce Costs If you wanted to break down innovation into a tidy equation, it might go something like this: Technology + Connectivity = Productivity. Productivity...
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users? All Cybercrime and Hacking White Papers | Webcasts