Posts Tagged ‘computer security’

Smart Phone Applications can Compromise Your Privacy!

Listen/watch this quick video and be aware of what you reveal with your usage habits!!

FBI posts ways to prevent being scammed over the Holiday Season

The thieves are always ready to take your money or your identity. Thinking gift card? Trying the auction websites? The FBI this year has posted the top ways to prevent the various types of scams from happening to you or your family or your business: http://www.fbi.gov/news/pressrel/press-releases/escams_112410
For more information on e-scams, including take over of financial accounts of small to medium size businesses visit the FBI’s E-Scams and Warnings web page: www.fbi.gov/scams-safety/e-scams

Data Breeches in Health Care

Data Breeches are costing millions each year. The HITECH Act has not changed data protection as first thought. Dr. Larry Ponemon from the Ponemon Institute (which conducts independent research on privacy, data protection and information security policy) has submitted a great blog on the statistics which is available at : http://www.ponemon.org/blog/post/poor-privacy-practice-is-ailing-healthcare-industry

FBI Press Release: A Chilling Case of ‘Sextortion’

It can happen to you. Worse it can happen to your children. Computer hackers. Taking control of you computer. Watching every move. The hacker used social networking sites to spread a virus and infect computers with malicious code, thus infect and take over more than 100 computers. This is more than just identity theft, it was for extortion and control. Read the following FBI press release and verify you have not had communications with the screen names or email addresses listed: http://www.fbi.gov/news/stories/2010/november/web-of-victims/web-of-victims

Data Breaches for the first half of 2010

Despite the law stating medical breaches involving more than 500 people must be listed on the Health and Human Services (HHS) breach list, the Identity Theft Resource Center recorded medical breaches which never made the list. Do you know why? The HHS list allows the loophole of “risk of harm” without requiring federal law enforcement verification. One state has reported more than 200 breaches. Most are not included in the Identity Theft Resource Center Breach Report because they did not include sufficient pertinent details regarding the event. Some states now harbor a protected breach list which is not made public at all, or is only accessible by exercising the Freedom of Information Act. Doesn’t this make you wonder why is it all so protected? Read the entire article from the Office of Inadequate Security
http://www.databreaches.net/?p=12436

Copy Machines your latest source of Identity Theft

Watch this “Youtube” video so find out how easy it is to gain personal information from the coy machines built since 2002. They have a hard drive to store infomation, but to buy an encyrption package is an extra $500.00, so most users do not do it. These machines for resale come from everywhere and go everywhere including overseas.
It begins with a bit of advertising but be prepared to be amazed at what you hear and see.