iPhone Users Vulnerable to Data Theft
While the iPhone is the undeniable king of smartphones, security flaws in the operating system create vulnerabilities hackers can exploit to steal email, contact and personal data. Surprisingly, smartphone users are seemingly unaware of data security issues with their cellular phones. According to a recent Trend Micro report, respondents (44%) feel surfing the internet on their smartphone is just as safe as surfing the web on their computer, despite the fact that most smartphones offer no internet surfing security. What can you do to protect your iPhone? Use these tips:
1. Wifi Hotspots Attract Hackers – those bent on maliciously collecting information from laptop and smartphone users know that wifi hotspots offering broadband internet access to anyone are great places to troll for the unprotected equipment. When surfing at your local hot spot, make sure you know whose network you are connecting to. Reference the name of the hotspot and ask yourself if the name makes sense with the location. For instance, all Starbucks have a hotspot named “att” that requires validation through the iPhone’s Safari internet browser. Connecting to any other wifi network increases your risk of data theft.
2. Wifi Hotspot Login Page – many wifi hotspots require you to accept terms of service and login to a web page on your internet browser. While checking a box to accept terms of service is rather innocuous, no other information is typically collected (such as name, address, credit card number, etc) so be wary of any login process requesting such information. Also (more applicable to laptops) if the login page seems to be taking an extraordinary amount of time to load or appears to be loading a large file to your laptop or smartphone immediately disconnect your wireless internet connection as malicious software may be downloading to your device.
3. Password Protect Your Data – most smartphones provide a feature to password protect your device and the data inside it. This is typically enabled in a settings panel on the phone and requires the owner to enter a password before gaining access to phone data and functionality. While this might be annoying it is a great way to protect your data from theft, especially if your phone is lost or is left unattended in public for an extended period of time.
4. Layered Protection – exercising caution when connecting with wifi hotspots and password protecting your data is a great start, but you can increase your data protection with additional layers of security such as the Trend Micro application Trend Smart Surfing freely available on the iPhone application store that blocks users from accidentally visiting a site that could exploit an iPhone vulnerability.
These simple steps will greatly increase data security on your smartphone device and better protect you from identity theft. Also be certain to regularly update your smartphone or iPhone to receive the most up-to-date security patches made available from hardware manufacturers.
Stop Identity Theft With Password Management
A strong password protects you from identity theft. Even if it is a personal computer, have a secure password to prevent intrusion of hackers who are in search of personal information such as social security number, credit card information etc. Here are some best practices given by professionals in password management.
Never write or reuse an old password
The first rule of password management is that the user should not write the password anywhere. If you are unable to remember difficult passwords, take time and frame a password that you can remember and yet secure.
Prevent dictionary attack
Professionals in password management recommend selecting a password that cannot be guessed easily or can be found in a dictionary. This helps to prevent dictionary attack in which, the words in the dictionary are compared with the hash stored in the computer. The word that matches with the hash is regarded as the password. To prevent identity theft, it is recommended to use a password which is eight characters in length and is a mix of capital letters and small letters. You can even consider using special symbols to make it more secure. Avoid using social security number or birthday dates as passwords.
Prevent brute force attack
A well framed password that escapes dictionary attack is susceptible to brute force attack. Brute force attack is the process where the hacker generates hash code for every possible combination of alphabets, number and special symbols and compares it with the hash stored by the computer. Protect yourself from identity theft via brute force attack by setting a security hurdle that will disable the account after repeated failed attempts to login the account.
Set time limit for your passwords
Another best password management practice is to set limit for passwords. By setting a time limit to the password, the system will force you to change the password after the given time period. It is recommended to change the password every 90 days and to avoid reuse of the same password within a period of 180 days.
Check the logs
It is recommended to check the logs periodically to identify unsuccessful attempts to login your account. If there are any attempts to break the password, change the password immediately to prevent identity theft.
Put the above password management tips in practice and fight against identity theft.
Property of RecoverMyPc Inc.
ID Theft Is International Business
Simply in the week there was a serious ring of ID thieves that were caught. Most were from Romania although some of them were from the United States. They were stealing names, Social Security numbers, mastercard knowledge and alternative personal information. This was all part of a “phishing” scam. The apply called phishing sometimes involves sending fraudulent e-mails that embody links directing recipients to pretend Net sites where they’re asked to input sensitive data. Phishers might also include attachments that, when clicked, secretly install “spyware” that can capture personal information and send it to 3rd parties over the Internet.
Prosecutors say phishers primarily based in Romania snagged info concerning thousands of credit and debit card accounts and alternative personal data from individuals who answered spam e-mail. The data were then sent to the U.S. and encoded on magnetic cards that might be used to withdraw money from bank accounts. Therefore, why would you open spam email? Some ID thieves apprehend how to conceal the truth in an email and build it seem authentic.
If you suspect it’s something however authentic, contact your bank or local authorities. But NEVER ever send any personal informational through an email that you opened up. Always be the one to initiate the contact when sending personal info and even then you have to be careful. Build positive clear your cache usually if you’re using it for e-commerce transactions.
There has never been a time in history that therefore several of our technologies will be used against us. But the criminals and international rings are not growing tired nor are they slowing down. We tend to ought to not curtail either but press even more durable to stay on prime of the game. Build sure you have got anti-spyware and anti-virus protection on your pc to battle this crime.
Never offer out your password to anyone and make sure that you simply initiate the contact when you give out personal data on a website. Don’t click on any links in emails that are asking you to input any of your account information. Your bank or mastercard agency will not want to send you an email asking you for your account information. And if you discover that they do, hurry and find another bank or credit card.
Do not hesitate to query any new accounts opened up in your name that you probably did not open. Don’t hesitate to ask ANY questions when it comes to YOUR account and good name. This can be your business and if you have to get aggressive therefore be it. The bank doesn’t care concerning your name the method you are doing, therefore why not be proactive. Stay the steps to safeguard yourself and fight ID theft.