What to do if you're a victim of Identity Theft. Click here to find out
There are many potential risks to your computer. Some are more serious than others. Among these dangers are:
There's no guarantee that even with the best precautions, some of these things won't happen. However, you can take steps to minimize the risks to your computer and your sensitive information. Ultimately, the security of your computer is dependent upon you.
Think before you click. Don't open unexpected email attachments from unknown persons. Just because an email message looks like it came from someone doesn't mean that it did. Scammers can "spoof" the return address, making it look like the message came from someone else. If you can, check with the person who supposedly sent the message to make sure it's legitimate before opening any attachments. For more information, visit https://www.us-cert.gov/ncas/tips/ST04-010
Wireless networks have spawned a past-time among hobbyists and corporate spies called war-driving. The data voyeur drives around a neighbourhood or office district using a laptop and free software to locate unsecured wireless networks in the vicinity, usually within 100 yards of the source.
The laptop captures the data that is transmitted to and from the network's computers and printers. The data could include anything from one's household finances to business secrets.
Home networks should be secured with a minimum of WPA2 (Wi-Fi Protected Access version 2) encryption. Routers purchased in the last six years should include WPA2 security technology.
Wi-Fi hotspot locations have grown dramatically, including schools, libraries, cafes, airports, and hotels. With a Wi-Fi connection, you can be connected to the Internet almost anywhere.
Man-In-The-Middle Attack refers to the act of intercepting the connection between your computer and the wireless router that is providing the connection.
Eavesdropping refers to the act of using sniffer software to steal data transmitted over the network. Looking over the shoulder is the simple act of others peering over your shoulder to see your activities?