How to Protect Yourself from Hoaxes, Frauds, and Identity Theft

Author(s):  
Jerry Pournelle

There are two basic categories of Internet lies: frauds, where the object is to get your money, and hoaxes, where the primary object is just to pull your chain, but there can be far-reaching consequences as well. Hoaxes give the perpetrators ego gratification as they watch their creation spread throughout the Internet. Frauds may give the perpetrators your life savings, and give you months—maybe years—of hassle as you try to repair your credit record and retrieve your very identity. Hoaxes—Hoaxes are spread by e-mail and come in an endless variety of guises. There are, for example, fake virus warnings, chain letters promising riches if you follow their instructions (or threatening dire consequences if you don’t); urban myths about women in peril, dogs in microwaves, and hypodermic needles on theater seats; letters that tug at your heart strings or appeal to your greedy side; Internet petitions (often based on false information); and letters claiming that Bill Gates wants to give you money. Yeah, right. Even the most “innocent” hoaxes are harmful. At the very least, they take up your time, and they try to get you to forward them to other people as well. If you forward a letter to just 40 people, and each of them does the same, and so on, then after just four steps, more than two and a half million copies will have been sent out. That’s a lot of wasted time and wasted bandwidth. These letters can also contain dangerous misinformation and bad advice. One example is a common letter advising women not to stop when pulled over by the highway patrol, but instead to dial #77 on their cell phones to talk to the police—a wrong number in 48 of the 50 states! Perhaps the most common example is the virus hoax—typically a letter forwarded by someone you know warning you that if you find a certain file on your computer it means you are infected with a virus.

Author(s):  
Kannan Balasubramanian

With the arrival of the internet, cell phones, e-mail, instant messaging and social networking sites we can do many wonderful things electronically now that make our lives easier and more productive. We should get used to the idea that a good part of our social life can happen in cyberspace. You can keep up with your friends and meet new ones through a keyboard, microphone and a webcam. You can send a detailed e-mail, send a quick message or alert your circle of friends and followers about the latest details what's happening around you. At the same time, we should come to terms with the fact that the cyberspace is flooded with attacks from people who are unscrupulous in their intent to damage others in the cyberspace. The attacks date back to the time when telephone was invented, when the attackers found way to invade people's privacy. For most users, the web is just part of a well-rounded life that includes both a cyber world and a real world. The internet can be helpful, educational and fun. But It can also become an obsession leading to waste of time and money. Just because cyberspace is virtual, that does not mean that there are not real dangers out there. The same sort of bad people who can cause problems for people in the “real” world are also lurking on the internet. They spend their time looking for ways to steal your money, ruin your name or even cause you harm.


2006 ◽  
Vol 27 (5) ◽  
pp. 587-608 ◽  
Author(s):  
Noelle Chesley

This study analyzes a couple-level ( N = 581), longitudinal data set of employees to provide evidence about technology use over time, the factors that predict use, and the potential for a spouse to influence an individual's use. Although longitudinal usage patterns suggest a trend toward adoption and use of e-mail, the Internet, cell phones, and pagers over time, this trend toward continuing use is stronger for some technologies (e-mail, the Internet) than for others (cell phones, pagers). Furthermore, correlates of use differ by gender and the type of technology used. Last, technology use tends to be an individual-rather than couple-level phenomenon, with one exception. In the case of cell phone or pager use, husbands’ past use influences wives’ use 2 years later.


Author(s):  
Jerry Pournelle

Whether you’re a compulsive gadget freak, an eBay addict, or a restrained occasional buyer, the Internet is a shopper’s paradise—open 24/7, offering unlimited choices, and giving us the luxury of shopping—through sleet and snow or summer heat—from our own homes. But at no time have caveats been more important for emptors than now. Devious and ingenious scam artists are just waiting to pounce on anyone who doesn’t take appropriate precautions. A few sound practices can help assure that you get what you pay for, get it on time, and don’t lose your shirt in the bargain. 1. Use a secure browser—Believe it or not, you can’t take browsers for granted. Be sure that you have the latest version of yours, including the latest updates and security patches, and that you’ve set your browser to notify you when you are entering or leaving a secure site. Be sure as well that it complies, as major browsers do (e.g., Netscape and Internet Explorer), with common industry security standards, like SSL and SET technology (see 2 just below). 2. Check out your vendor—Try to use vendors you’re familiar with. Many well-known bricks-and-mortar stores are now “clicks-and-mortar” operations, with both physical stores and sites on the Internet. If you must buy from a place you don’t know, check the site’s security. A secure site will use VeriSign’s Secure Sockets Layer technology (SSL), displaying a locked padlock at the bottom of the screen, Secure Electronic Transaction technology (SET), which shows an unbroken key, or a VeriSign logo indicating that you are at a secure Site. These are not just decorative icons. They are intended to ensure that all personal information you submit to the site will be scrambled en route through the ether and decrypted only when it reaches the licensed merchant. However, this is just the first step. Particularly if you clicked on an ad or a URL sent to you in an e-mail, and therefore did not type the URL in the address bar yourself, you should verify the security certificate (see How to Protect yourself from Frauds, Scams, and Identity Theft, p. 130).


Author(s):  
Nestor J. Zaluzec

The Information SuperHighway, Email, The Internet, FTP, BBS, Modems, : all buzz words which are becoming more and more routine in our daily life. Confusing terminology? Hopefully it won't be in a few minutes, all you need is to have a handle on a few basic concepts and terms and you will be on-line with the rest of the "telecommunication experts". These terms all refer to some type or aspect of tools associated with a range of computer-based communication software and hardware. They are in fact far less complex than the instruments we use on a day to day basis as microscopist's and microanalyst's. The key is for each of us to know what each is and how to make use of the wealth of information which they can make available to us for the asking. Basically all of these items relate to mechanisms and protocols by which we as scientists can easily exchange information rapidly and efficiently to colleagues in the office down the hall, or half-way around the world using computers and various communications media. The purpose of this tutorial/paper is to outline and demonstrate the basic ideas of some of the major information systems available to all of us today. For the sake of simplicity we will break this presentation down into two distinct (but as we shall see later connected) areas: telecommunications over conventional phone lines, and telecommunications by computer networks. Live tutorial/demonstrations of both procedures will be presented in the Computer Workshop/Software Exchange during the course of the meeting.


Author(s):  
Elly Mufida ◽  
David Wardana Agus Rahayu

The VoIP communication system at OMNI Hospital Alam Sutera uses the Elastix 2.5 server with the Centos 5.11 operating system. Elastix 2.5 by the developer has been declared End of Life. The server security system is a serious concern considering that VoIP servers can be accessed from the internet. Iptables and fail2ban applications are applications that are used to limit and counteract those who try to attack the VoIP server. One application that can be used as an open source VoIP server is the Issabel Application version 4.0. The migration process from Elastix 2.5 application to Issabel 4.0 by backing up all configurations in the Elastix 2.5 application through a web browser including the configuration of endpoints, fax, e-mail, asterisk. After the backup file is downloaded then upload the backup file to the Issabel 4.0 application then run the migration process. Adding a backup path as a failover connection is needed because the VoIP communication protocol between the OMNI Hospitals Group still uses one path so that when there is a problem in the connection path, the communication protocol will stop. The tunnel EoIP is a protocol used as a backup path between the OMNI Hospitals Group site.


Author(s):  
Vaishnavi Bhagwat Savant ◽  
Rupali D. Kasar ◽  
Priti B. Savant

The explosive growth of the Internet has brought many good things such as E-commercebanking, E-mail, cloud computing, but there is also a dark side such as Hacking, Backdoors, Trapdoors etc. Hacking is the first big problem faced by Governments, companies, and private citizens around the world. Hacking means reading email’s of someone, stealing passwords, stealing credit card numbers etc. An ethical hacker is one who can help the people who are suffered by this hackings. This paper describes about Ethical hackers, it’s types and phases of hacking


2012 ◽  
Vol 55 (1) ◽  
pp. 161-190 ◽  
Author(s):  
Dillon Mahoney

Abstract:This article explores recent changes in Kenya's curio or handicrafts industry. In addition to a crisis in access to raw materials and a diversifying tourist market, the rise in the use of cell phones and the Internet during the early 2000s present unique challenges. Nonetheless, innovative Kenyan entrepreneurs are using these challenges to market and brand products in new ways—by representing modern global interconnectedness as “fair trade” or creatively promoting the authenticity of their products in other ways. Kenya's artisans and traders have also adapted to diverse and complex tastes beyond the desire for an invented tradition of ethnic and “tribal” art.


Author(s):  
Nasreen Abdel - Ilah Zahra

The study was used to study the reality of the use of postgraduate students for e- mail. The descriptive descriptive method was used. The questionnaire was used as a tool for study، which averaged 1.99 and a standard deviation of 0.61. It was applied to 45 students from post- Different The results showed that postgraduate students have a desire to use e- mail in university education and to communicate with colleagues and faculty members. However، there are obstacles to their use. The faculty members do not encourage students to use e- mail، lack e- mail skills، Access to the internet laboratory at the college، the reluctance of faculty members to give their email address to students، network problems (slow) In the light of the results، a set of recommendations and proposals were presented to activate the use of e- mail in university education، especially among postgraduate students in the Faculty of Education and various Syrian and Arab universities


Temida ◽  
2013 ◽  
Vol 16 (1) ◽  
pp. 151-162
Author(s):  
Vida Vilic

Global social networks contributed to the creation of new, inconspicuous, technically perfect shape of criminality which is hard to suppress because of its intangible characteristics. The most common forms of virtual communications? abuse are: cyberstalking and harassment, identity theft, online fraud, manipulation and misuse of personal information and personal photos, monitoring e-mail accounts and spamming, interception and recording of chat rooms. Cyberstalking is defined as persistent and targeted harassment of an individual by using electronic communication. The victim becomes insecure, frightened, intimidated and does not figure out the best reaction which will terminate the harassment. The aim of this paper is to emphasize the importance and necessity of studying cyberstalking and to point out its forms in order to find the best ways to prevent this negative social phenomenon. Basic topics that will be analyzed in this paper are the various definitions of cyberstalking, forms of cyberstalking, and the most important characteristics of victims and perpetators.


Sign in / Sign up

Export Citation Format

Share Document