There is no shortage of bad guys, identity thieves, and hackers trying to separate you from your money. They range from previously discussed pickpockets, Trojan viruses, and ATM skimmers to dumpster divers, spies, and wireless hackers.
Dumpster Diver Dan is a liar who poses as a garbage man and turns trash into cash. Dan dives into dumpsters and trashcans seeking financial statements, credit card applications, and any other personally identifiable information he can piece together. Once the puzzle is complete, he may have enough data to take over existing accounts or create new ones in your name.
Invest in a quality crosscut shredder and shred everything with any information that can be used against you. Names, account numbers, statements etc. Consider turning off paper statements and going entirely digital. Invest in identity protection, too, because even if you shred sensitive documents, your accountant, school, or doctor may toss your data in the trash.
Sly Spy the Silver Fox may pretend to be a free Wi-Fi hot spot, acting as an “evil twin,” providing wireless Internet access through her laptop while sniffing your account information, logins, and personal data. If you have file sharing turned on, she can browse your PC’s folders and files, and even plant a malicious program that gives her backdoor access whenever you connect to the web in the future.
Never choose an “ad-hoc” computer-to-computer wireless network that may imitate a legitimate wireless connection. It’s best to invest in a cell-based Internet, requiring a username and password. Always wait until you’re on a secure network before doing any banking or shopping. And turn off file sharing whenever you do connect to a hotspot.
Derek the Driver (as in war driver) navigates your neighborhood and local office parks on foot or in a car, seeking out unprotected, unsecured wireless connections to exploit. He hops on your Internet and looks through your data. Worse, he can use your Internet connection and your IP address to conduct illegal activities like downloading child porn, sending spam, or launching hack attacks. It gets scary when the law knocks on your door, blaming you for what a war driver did using your Internet connection.
Learn how to secure your wireless Internet connection at www.McAfee.com/wireless. It is important to observe basic security precautions to protect your identity. However, the safety of your information with corporations and other entities that you transact business with is very often beyond your control. Consumers should consider a McAfee Identity Protection product that offers daily credit monitoring, proactive identity surveillance, lost wallet protection, and alerts when suspicious activity is detected on your accounts.
ROBERT SICILIANO, CEO of IDTheftSecurity.com is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds. His "tell it like it is" style is sought after by major media outlets, executives in the C-Suite of leading corporations, meeting planners, and community leaders to get the straight talk they need to stay safe in a world in which physical and virtual crime is commonplace. Siciliano is accessible, real, professional, and ready to weigh in and comment at a moment's notice on breaking news.
- Steps to Take When Connecting to WiFi at the Coffee Shop
Consumers are oblivious to the dangers of connecting in a free wireless environment. If they actually knew how vulnerable they are, all that coffee shops would do is sell coffee.Nobody would stick around and connect to the internet. Everyone—and I mean everyone—always asks me if they should connect to public WiFi. The short answer is yes,
- 10 Ways to Help Protect Yourself from Identity Theft
No one wants to be a victim of identity theft (at least not that I’m aware of). But even though we may say this, our actions don’t always indicate this—and actions speak louder than words. Some of this information may seem basic or like common sense, but these are still tactics that identity thieves utilize because
- Hacking Wireless for Identity Theft
The ability to connect wirelessly has a lot to do with the indispensability of the Internet in our daily lives. Wireless Internet is available in our homes, offices, cafes, restaurants, parks, hotels, airports, cars, and even airplanes. The mobility factor allows us to work anytime, anywhere, on numerous devices. “Being connected” is at an all-time
- How to Protect WiFi When Flying
When getting on a flight that’s three to five hours (or more), many business professionals wrestle in their heads whether to spend the $12.95 on airplane WiFi, take a nap or watch the movie—or, if their company is paying for it, they might do all three. But here’s the thing: If you are connecting to
- Why Should You be Careful When Using Hotspots or Free Wi-Fi?
These days, it’s not uncommon for us to connect to Wi-Fi wherever we go. In fact, we’ve come to expect there will be a Wi-Fi connection—at hotels, coffee shops, airports, and now even on some flights—pretty much everywhere. While the ability to connect just about anywhere is convenient, it also has opened the door for
Leave a Comment
You must be logged in to post a comment.