Tag Archives: Users

iPhone Users Vulnerable to Data Theft

iPhone Users Vulnerable to Data Theft

While the iPhone is the undeniable king of smartphones, security flaws in the operating system create vulnerabilities hackers can exploit to steal email, contact and personal data. Surprisingly, smartphone users are seemingly unaware of data security issues with their cellular phones. According to a recent Trend Micro report, respondents (44%) feel surfing the internet on their smartphone is just as safe as surfing the web on their computer, despite the fact that most smartphones offer no internet surfing security. What can you do to protect your iPhone? Use these tips:

1. Wifi Hotspots Attract Hackers – those bent on maliciously collecting information from laptop and smartphone users know that wifi hotspots offering broadband internet access to anyone are great places to troll for the unprotected equipment. When surfing at your local hot spot, make sure you know whose network you are connecting to. Reference the name of the hotspot and ask yourself if the name makes sense with the location. For instance, all Starbucks have a hotspot named “att” that requires validation through the iPhone’s Safari internet browser. Connecting to any other wifi network increases your risk of data theft.

2. Wifi Hotspot Login Page – many wifi hotspots require you to accept terms of service and login to a web page on your internet browser. While checking a box to accept terms of service is rather innocuous, no other information is typically collected (such as name, address, credit card number, etc) so be wary of any login process requesting such information. Also (more applicable to laptops) if the login page seems to be taking an extraordinary amount of time to load or appears to be loading a large file to your laptop or smartphone immediately disconnect your wireless internet connection as malicious software may be downloading to your device.

3. Password Protect Your Data – most smartphones provide a feature to password protect your device and the data inside it. This is typically enabled in a settings panel on the phone and requires the owner to enter a password before gaining access to phone data and functionality. While this might be annoying it is a great way to protect your data from theft, especially if your phone is lost or is left unattended in public for an extended period of time.

4. Layered Protection – exercising caution when connecting with wifi hotspots and password protecting your data is a great start, but you can increase your data protection with additional layers of security such as the Trend Micro application Trend Smart Surfing freely available on the iPhone application store that blocks users from accidentally visiting a site that could exploit an iPhone vulnerability.

These simple steps will greatly increase data security on your smartphone device and better protect you from identity theft. Also be certain to regularly update your smartphone or iPhone to receive the most up-to-date security patches made available from hardware manufacturers.

Hackers Black Chain Set Off The Money For One Year 7.6 Billion Internet Users (figure) – Hackers,

Hackers Black Chain Set Off The Money For One Year 7.6 Billion Internet Users (figure) – Hackers,
Internet Forum “Said the network” set of money “has become a black chain

HC Network Security With the increasing development of online transactions, more than 300 million Chinese Internet users are increasingly trading platform in the network, when the hot money flows in the network, Hacker They also planted on the network “black hole” swallowing money. Yesterday, reporters from the “2009 Jiangsu (Nanjing) Internet Summit” was informed, a web-based underground black industry chain has been gradually formed, the Chinese Internet users every year Network Security The loss was “black out” the money is as high as 7.6 billion!

Horse chain link diagram

Click here to view all news photos

Swallowed every 5 seconds a page

Present, the number of Chinese Internet users reached 360 million, new business transactions are increasingly hot. Network Security Expert Li Na introduction, according to statistics, China to complete online transactions each year the amount has reached 30 billion yuan.

Hot money flows in the network, many hackers think we misrepresent, they use the network through various means Virus To earn a “black money.” According to the U.S. Internet security firm Sophos released a report, in the first quarter of 2008, there will be every 5 seconds a page to become hackers, “dishes on the menu.”

In China, the Internet’s security problems are very serious situation. China has become the world’s Internet users than any other country, but also became the country with the most zombie computers, network security are likely to be hardest hit.

Network “set of money,” the formation of black chain How black holes devour

network users money? According to Li Na introduced accounts by stealing Trojan virus is the most common means by which the most deadly is the “network linked to horse.” Li Na said, “Some people go to the website linked to horses, there are visitors in the horse after his machine was implanted with viruses or Trojan horse, if his computer on a network of bank account or game account, then those valuable part of, he may be kind of Trojan horse stolen. such as money inside your savings card to do online banking in the transfer or purchase to be secretly transferred away. “

Li Na said safety monitoring shows that small and medium site suffered “network linked to the race” likely as high as five thousandths. Money laundering has formed a network of underground black chain, threatening the security of user information and property.

Expert Tips

Experts advise users should maintain the habit of constantly updating antivirus software, the Internet should open the web page linked to anti-horse software; boot time antivirus software Monitor For those who are familiar with the website, try not to visit, do not download software, download web browser plug-in application should be careful and dedicated Players .

Read the article were also viewed:
? Gray chain mature virus proliferation challenges of network security
? Chinese hackers caused the rapid expansion of chain loss of nearly 8 billion
? Over 200 million yuan in output value of Chinese hackers gray chain survey

Ebay Users- What You Need To Know About Phishing Scams

Ebay Users- What You Need To Know About Phishing Scams

Are you an eBay user? Whether you use eBay to do your online shopping or if you use eBay to generate extra income for yourself, as an eBay seller, there is something that you need to be aware of. As an eBay user, whether you are a seller or a buyer, you need to be on the lookout for phishing scams. Phishing scams are rapidly increasing in popularity and many are using eBay as a front. To protect your identity, as well as you finances, you need to be on the lookout for them.

If you are relatively new to eBay or online shopping in general, you may not know exactly what phishing scams are. Do you? If not, you should know that phishing scams are actually complex online scams. A shady individual or a scammer makes a fake website that is similar to eBay or at least a fake eBay sign in page. You are then sent an email that appears as if it was from eBay. The only thing is that it wasnt. The goal of a phishing scam is to get you to visit the fake page and enter in your eBay sign in information, including your eBay screen name and your eBay password. Once a scammer has your information, they get access to you personal information stored on eBay, as well as free use of your eBay account.

One of the reasons why phishing scams are so easy to fall victim to is because they give you the impression that is something is wrong with you eBay account or that you did something wrong yourself. For instance, many phishing scams contain a message asking why you didnt pay for an item that you ordered or outline the fact that your eBay account has been suspended. The goal is to get you so worried that you will automatically click on the link to get the problem solved; however, as previously mentioned, the link takes you to a site that looks just like eBay, but it isnt. There is where the trouble comes in.

If you get an eBay phishing scam email, you will want to do a little bit of detective work, before actually clicking on the link. In fact, you shouldnt even click on the link. The first thing that you will want to do is look at your name, as most eBay phishing emails start with Dear eBay Member, or something along those lines. Real eBay messages will refer to you by your eBay screen name or even your real name. You can also roll your mouse over the link provided to you and see where it will actually take you. In most cases, you will find that you are being directed to another site, not eBay.com. All eBay messages should appear in your My eBay, message box. To see if eBay really sent you an email, you can log into your eBay account, from a brand new window that you open up, and check your messages, if you even have any at all.

If you do receive an eBay phishing scam email, you are advised to contact eBay or examine eBays help center. There you will find instructions on how to report the email or send a copy of it to eBay. Although your first thought may be to delete the eBay phishing scam email, you will actually want to follow eBays reporting instructions. You may know that you are being scammed, but other may not. Reporting an eBay phishing scam to eBay allows them to take care of the problem; thus likely reducing the number of eBay users who fall victim to similar scams.

Now that you know exactly what eBay phishing scams are, you are urged to be on the lookout for them. Keeping an open eye is your best line of defensive against eBay phishing scams or any phishing scams for that matter.