Tuesday, February 24, 2009

A review on "UK to get tough with illegal downloader "

Nowadays, the development of the internet provides a lot of conveniences to the internet users. The users can find a lot of songs, movies, photos, and other materials in internet and easily illegal download the songs and movies by just clicking the mouse and wait for few minute and hours.

In year 2008, UK government is working on a new law to cut off the illegal download problem. In my opinions, others countries such as Malaysia also should work on the relevant law to solve the illegal download problem. The illegal download problem causes the movie and music industrial suffers a large amount of losses annually because the people are reducing the purchases of legal edition CD and DVD. This causes some company have substantial drop in income as well as close down the business.

The implementation of the relevant laws can bring a lot of advantages. Firstly, it can be useful in reducing the illegal downloading activities. Secondly, the elimination of the illegal downloading can improve the sales of the music and movies company because the people who want to listen the song or watching the movie need buy the original CD or DVD. Thirdly, the law can protect the singer and artist. The illegal downloading activities are denying the effort of the singer and artist such as the selling result of their CD or DVD are not goods. In other respect, this will causes them less motivation to achieve their goals and expectation.

In conclusion, the implementation of the laws is necessary for the whole world. The illegal downloading problem should be dispose off in order to create a piracy free environment.

Monday, February 23, 2009

A review of local ecommerce website

As the internet has been rapidly developed, there is a significant increasing number of internet users. This make the internet become a big market for doing business. After the success of ebay and Amazon.com, many companies started to pay attention to the potential value of internet and try to increase them more competitive in this market.
The website that I reviewed is a local website that selling the accessories of cats and dogs. ( http://catsndogs.my/store/index.php?main_page=index&cPath=22)

So many ecommerce website in the internet, how can you make people to view your website instead of others? Is the design, a great design speaks a thousand words. A good design will attract people’s attentions, a bad design will ruin the website. In the catsdogs.my, it uses some pictures and a simple design but make me feel comfortable when looking into the website. The categories are clear and simply easy to find whatever you want from here. This website has a category to differentiated the price level from RM5 until RM 100 and above, easier for the customer from different range.


The second factor is the online storefront (shopping cart), it enables customers to build an electronic catalog of the product which allow online ordering and seamlessly integrate with modules like order management, tax and payment gateway. In the website, it provide shopping cart and immediately show how much the price you need to pay under the shopping cart. Easy for customer to evaluate how much they have been spending.
The third factor is the payment gateway, it is a service between the online storefront software and the credit card processing network. It is used in real-time authentication and charging of the customers’ credit cards. The website using Paypal as their only payment gateway, the only payment gateway will limited their scope of customer.
The fourth factor is the commercial bank accounts set up between a retail business and a financial institution to allow a business to accept credit card transactions. The only merchant that the website provides is Maybank2u, this make some customer without an account in Maybank will not be able to buy good from the website.
A good website will provide live chat service to ensure the customer will get helped when they meet any problem in the process of buying the product. This website did not provide the live chat service, when a customer meets any problem, he or she cannot get immediate response.
A review of the product is needed for an ecommerce website as before every customer buys their thing, they want to know what other think about the product. In the website, it did not have many review of their product. This is a problem that needed to improve.
Online users will require to surf in a safe website, therefore, a good ecommerce website must show clearly online security and hacker seal and any anti-viruses that used by the website. The website did not provide these online security issues.
The last factor is the delivery, fast and convenient delivery will be preferred, the website has provide three choices of the delivery merchandise. Let the customer to choose the merchant that they trusted most.

In conclusion, this website still have many thing to improve and I feel that it have potential to become a popular website.

Saturday, February 21, 2009

Prevention of E-auction Fraud for Consumer

E-auction is a market mechanism by which buyers make bids and sellers place offers; characterized by the competitive and dynamic nature by which the final price is reached which conducted online.

But beware, there are several types of E-auction fraud such as:

  • Bid shielding (Having phantom bidders bid at a very high price when an auction begins; they pull out at the last minute, and the real bidder who bid a much lower price wins)
  • Shilling (Placing fake bids on auction items to artificially jack up the bidding price)
  • Fake photos and misleading descriptions
  • Improper grading techniques
  • Bid siphoning
  • Selling reproductions as originals
  • Failure to pay
  • Failure to pay the auction house
  • High shipping costs and handling fees
  • Failure to ship merchandise
  • Loss and damage claims
  • Fake escrow services
  • Switch and return


Ways to prevent E-auction fraud:




  • Authentication service-it is a service to determine whether an item is genuine and described in proper manner.

  • Grading services-a service that determines the physical of the product whether is in a good manner

  • Feedback forum- this is a forum that provides users to express out their experience dealing with e-auction.

  • Insurance policy- there is some insurance policy that provide to customers or users like the insurance policy by Ebays with no cost at all.

  • Escrow services- Both buyers and sellers in a deal are protected with an independent third party. Buyers mail the payment to escrow services which verifies the payment and alerts the sellers when everything checks out. Eg: i-escrow

  • Physical inspection- eliminates many problems especially for collector’s item. When the seller and buyers are in the same vicinity, it is easy to arrange for such inspection.

  • Item verification- is a way of confirm the identity and evaluate the condition of an item. Third parties will evaluate and identify an item through a variety of means.

  • Become familiar with the auction website. Look into the websites protection policies. Never assume you are protected from auction fraud.

  • Before placing a bid, learn as much as you can about the seller. If you can’t find anything out about the seller, than avoid doing business with them. Never fall for promises of better deals by moving away from the original auction website.

  • If the seller wants you to use an escrow service you’ve never heard of, look into it. Check out the website. Call up customer support. Contact crimcheck.com to dig up data on the business in question. If you can’t confirm the legitimacy, don’t use it.

  • Never ever give out your social security number, driving license number, credit card number, or bank account information until you have thoroughly checked out the seller and the escrow service.

  • Always save 100% of the transaction information. You’ll be glad you did in the event your case makes it to court.

  • If after the sale you feel the item/payment should have been delivered already, try to work it out with the seller/buyer. If at that point you feel that fraud is involved, immediately contact your state attorney general’s office and the FTC at www.ftc.gov or call toll-free 1-877-FTC-HELP (1-877-382-4357).

Corporate Blogging: A new marketing communication tool for companies


In these modern time, there are more and more organization start using Corporate Blogging. Whether internal or external, blogs are not strange to the corporate world. A corporate weblog is advertised and used by an organization to achieve its organizational objectives. The corporate weblog enable others more convenient to find those posts and comments and follow due to centralized hosting and generally structured conversation threads. With different types of web browsers, such as Firefox, Safari and Internet Explorer 7, RSS technology are supported, which allow readers to read recent post without visiting the actual blog, which is beneficial to low-volume blogs.

There are many different types of corporate blogs. However, they can be categorized into 2 sectors, which are internal and external blogs.

(i) An Internal Blog is mostly accessed through the organization's intranet, is a weblog that provided to employees of the firm. Besides that, many blogs are published as public to allow anyone can access and post to them. The informal nature of job may encourage the participation of employee and it allows free discussion of any issues. Morever, it's a way of collective intelligence and provide direct communication between various hierarchies of an organization.

(ii) An External Blog is blog that allows company employees, teams or spokesperson to share their view publicly. It's also used by company to promote new product and services, to explain and simplified company policies, or to response on public criticism on certain issues. Furthermore, it also provide transparency of a company culture and treated more informally than traditional press releases. In some corporate blog, those posts need to go through a review before they post it. Some other corporate blog, they allow outsiders to leave comment to the posts.

When done correctly, blogging can be extremely valuable to a company. There are several benefits for corporate blogging:

(a) Blogs build and brands your company to be a thought leader in your industry. People always think a lot everyday. However, they are less people will take time to record these thoughts. Record the business thoughts on the corporate blog will force you to think even harder about yout industry. If you think hard enough and work regarding to your idea that you thought yesterday, can be sure that you find the success way for your company.

(b) Blogs help to engage customers in conversation and help in building relationships with them. Relationship marketing is important. The more trust and familiarity between 2 parties will result in higher posibility of a transaction.

(c) Blogs help you to show to the world that you have nothing to hide. There is nobody like to deal business with someone who always keep dark secrets and refuse to disclose anything. Not saying that a business can't have any secrets. Business secret are necessary and should be well kept with appropraite staff education and a proper blogging policy. Blogging will help a corporate to show to its stakeholder that you have nothing to hide against them, and to show that you are not trying to cheat their money. This will help a corporate to build trust in society.

(d) Blogs help you to get feedback from customer towards company's services. It can be a direct communications channel to get response from customers. Blogs provide a way that for you to get feedback from customers and understand with their need. With a global reach through internet, it also allow you to have more time with your customers, so you can provide services which customer prefer with. Then they will leave a good comment on the blog and this help to build good image for the company.


Like everything else in the world, blogging also has its disadvantages to be used:

(I) Need to remember that blogging will lead to sharing of information about individual or company, which will be harmful for employee or the company in general due to unappropriate use of information by employees or outsider.

(II) Blogging can lead to a legal pitfalls. If the comments make by some employees in the corporate blog that negatively affected others, company will be responsible for it.

(III) Blogging can be harmful too because some employees may use corporate blog to express their dissatisfaction about the company and this will lead to a bad publicity and bad reputation of company toward society.

(IV) Like everything elso in internet, blog are easy to start but difficult to maintain. Writing corporate blog coherently is difficult and time-consuming for a person to undertake it during free time. As a result, many blog are not updated according to what actual have been happened, this will lead to harm a company's reputation rather than enhancing it.





References:
1. http://en.wikipedia.org/wiki/Corporate_blog
2. http://www.blogopreneur.com/2007/03/30/the-benefits-of-corporate-blogging/
3. http://www.enterpriseblogs.info/corporate-blogging/disadvantages
4. http://www.morebusiness.com/running_your_business/businessbits/Corporate-Blogging-Secrets.brc

Tuesday, February 17, 2009

The Application of Prepaid Cash Card for Consumers

There are more and more type of prepaid card exist in the market nowadays. For eg, touch & go card, ATM card, mobile prepaid card, debit card and many other.


Then WHAT are prepaid card?


Prepaid card are the card that have the amount value of money that the holder put enter into a card for transaction purpose. It also a reload able debit card allows you to only spend up to the amount you have pre-deposited into the account.


Though the functions are about the same as a credit card, but a prepaid cash card can be consider as opposite of credit card. Credit card perform transaction where the holder owes a 3rd party money, where else prepaid card perform transaction where the holder have already pay earlier.


Prepaid cash card allowed customer to have a better control over their finance. This is due to it limit the user spending limit to the amount the user have enter into the card. Besides that it provides consumers a better alternative in keeping record of your spending.


Other than that, a prepaid cash card is surely safer than carrying cash. Consumers refer Prepaid Cash Card because they act virtually the same as cash only with more security. It also has security features, such as personal identification number (PINs) protect consumers against theft and fraud


For those who find it hard to get credit, prepaid card can help you take control of your finances, if you have found normal credit card interest rates too high and the balance offered too tempting. You can be confident that you will stick to your budget with a pre-paid card, as you are the one who sets it by deciding how much to top-up your card with. Moreover, most prepaid credit cards can enable you to need not longer to carry cash when shopping because you may use an ATM to withdraw money. Besides, it also can be at home and abroad transfer funds to send money to other cardholders shop on the internet with security. As for Visa’s prepaid cash card, it’s offer a secure, cost-effective and convenient alternative to paying by checks or cash. These products enable many consumers to access their pre-funded pool of funds to make everyday purchases, pay bills, and even receive direct deposits with a Visa prepaid cash card.




Sunday, February 15, 2009

A review on "Amazon plan to sell DRM-free songs online"

Amazon has announced plans to launch a digital music store that allow customers to download music without any digital copying protection in year 2007 later. Amazon will sell millions of song without the Digital Rights Management (DRM) such as allow the customers to burn their own CDs freely and can play the music on any devices. The implementation of digital music store not only for the benefit for Amazon but also for the customers and music company.

Although Amazon was already a successful internet website in selling the physical CD it is good for Amazon selling the digital music online. Nowadays, online shopping was common for customers. Some of the company such as Apple had already selling music through online. Amazon can improve their occupancy rate and competitive advantage in this area.

In other respects, the launch of Amazon digital music store also brings a lot of advantage to consumers. One of the advantage is they have more option when purchasing the music. For example, they can compare the price and song quality between Amazon and Apple. Besides that, consumers can play the music in any devices such as hand phone,mp3 player and others. This brings a lot of convenience to consumer because the music buying from apple just can play in the itunes software.

The launching of digital music store also benefits for music company. Nowadays, many people like to online download the music freely without license. This problem causes the music company facing the loss of income. Cooperate between Amazon and those music companies is good because this can improve the sales and eliminate the piracy problem through selling the related company songs in the Amazon website.

Saturday, February 14, 2009


Electronic currency

Introduction
Electronic currency is the money in electronic form that is backed by monetary values in actual circulation and can be used as tools of payment. Electronic currency is being developed as a next-generation method of electronic settlement. This involves use of computer networks, the internet and digital stored vales system, Electronic Funds Transfer and direct deposit are examples of electronic money. However, electronic currency required the collective term for financial cryptography and technologies to enable it.

Types of Electronic Currency
There are two distinct types of e-currency, identified e-currency and anonymous. Identified e-currency contains information of the person who withdrew the money from the bank. This type of e-currency enables the bank to track the money when it moves through the economy. Anonymous e-currency is just like real paper money. Once anonymous e-currency is withdrawn from an account, it can be spent or given away without leaving a transaction trail. It can be done in off-line; the merchants collect multiples e-money from users and deposit them into the bank.

There are several benefits by using Electronic currency, it is convenience and increased efficiency of transactions, lower transaction fees. However, the transfer of e-currency raises some problem such as how to levy taxes and the possible ease of money laundering. These issues may need some types cyberspace regulations to regulate the transactions.

Wednesday, February 11, 2009

The Threat of Online Security: How SAFE is Our Data?

Computers have become a need and not a want anymore in the modern era. Without computer, human can’t perform most of their daily routine. One of the major functions of computer is to create, store and manage information. Therefore, it is important for users to have the basic knowledge to protect the data from losing, damaging, and misuse.


However, nowadays computer users are facing the threats of cyber crime, phishing, internet and network attacks such as computer viruses, worms and Trojan horses and back doors.

NOT SAFE!!!

Twenty years after the release of the Morris Worm, one of the first worms discovered on the Internet, the Web has proven to be the primary place where bad guys lurk, looking for poorly secured websites to plant malicious code. And, they find plenty.


According to the 2009 Security Threat Report [PDF] from Sophos, one new infected Web page is discovered every 4.5 seconds. With that in mind, we thought we'd take a look at the top security threats you should be looking out for in 2009.

SQL Injection Attacks

The Sophos research showed that over the past year the number of SQL injection attacks against innocent websites increased, a trend Sophos expects will continue next year.

Web insecurity, notably weakness against automated remote attacks such as SQL injections, will continue to be the primary way of distributing web-borne malware.

A recent report from the Internet Crime Complaint Center also points to an increase in SQL injection attacks in 2008, specifically relating to financial services and the online retail industry. Unfortunately, cyber criminals prey on the needs of Web users at any given time, and this time the economic crisis is their meal ticket.

The article is well worth reading if you're interested in how attackers compromise websites by SQL Injection or if you want ideas on how to reduce the likelihood of intruders gaining access to your private data.

Third Party Advertising Agencies and Scareware

In February 2008, Sophos confirmed a 'poisoned Web advertising campaign' on BBC competitor ITV's website that affected both Windows and Mac machines. While we've all seen Scareware, the pop ups designed to scare people into buying anti-virus software, this is the first time it has been seen for the Mac.

According to Sohpos, a Flash file was injected into traffic served up by ITV.com via third party advertisin

g agencies. Designed to promote a program called Cleanator (Windows) or MacSweeper (Macs), the programs claimed to detect "compromising files" and encouraged users to purchase a full version of the package.

As websites often use third parties to serve up their advertising, Graham Cluley, senior technology consultant at Sophos suggests taking care when selecting agencies. "Website owners should ask the third party agencies they use what procedures they have implemented to positively vet the adverts that they deliver for malicious content or unsavory links.

Social Networking Sites

With social networking on the rise, the bad guys have found yet another playground on the Web. The Sophos report reveals 1800 Facebook users had their profiles defaced in August by an attack that installed a Trojan while displaying an animated graphic of a court jester.

Gated sites appeal to the bad guys because they form a "launching pad" for mass distributing malware attacks and spam, like the recent Koobface Trojan which attacked both MySpace and Facebook and transformed victim machines into zombie computers to form botnets.

Twitter too has become a tool for cyber criminals to distribute malware and marketing messages. In many cases, the bad guys steal members' usernames and passwords and bombard the victims' friends with marketing messages or direct them to third party websites. With Twitter especially, it is difficult to discern where links are going due to the 140 character limit and the use of services that shorten URLs.

On the flip side however, Chris Boyd of FaceTime Security Labs at this years RSA Conference explained that social networking sites are incredibly useful for security researchers. "The people that create these things have been on social networking sites since the beginning; they need to be on them a lot to understand them intimately enough to exploit them. But many times they leave a trail online that we can use to track them, to find out things like their names, ages and friends."

There are more others Top security threats in 2009. IF you are interested, do visit TOP ONLINE SECURITY THREAT FOR 2009.

Reference:

http://www.readwriteweb.com/archives/top_online_security_threats_for_2009.php

Credit Card debts: Causes and Prevention

Credit card, which is a part of system of payment named after a small plastic card giving to users of the system. The card holder can use the card to pay for the goods and services according to the promise of holder to buy those goods and services. The issuer of the card has a limit of credit for the consumer to make payment to merchant or as a cash advance to the cardholder to make payment. Cardholder have to pay for the money used in advance at each month, interest will be charged if the payment can't be made in time. The creation of this card has been facilitating a lot of people. However, it also causes lot of serious problem for users who use it improper and unplanned way. Recently, the credit card users are increasing. Even though there are financial crisis since 2007, but this does not affect the users who apply for using of credit card. With improper and unplanned use of credit card, it has been creating a lot of credit card debt for cardholders. Credit card debt is unpaid balance on credit line, there are several factors which causes the appearance of credit card debt:

i) Penalties and Interest
One of the main factors that causes debt accumulated is due to penalties and interest. Once the cardholder can't effort to make the payment for the month, the debt will be accumulated to next month and penalties and interest will be calculated due to late payment. Debt can be increased rapidly due to penalties and interest charged on late payment. Nowadays, most credit card companies allow cardholder to make several payment through online services.

ii) "Over-the-limit" Fees
Another main factor which causes the debt accumulated is "over-the-limit" fees. This excessive fees will be charged when the cardholder spend over the credit limit. This fees will be continuously charged unless the balance is paid below the credit limit. Cardholders have to know their limit.

iii) "Universal Default"

The credit card companies will raise the interest rate when one of the cardholder cannot make the payment for the month or late payment. This increased interest charged is applied to the cardholders who fail make the payment and also those cardholders who make their payment in time. This methodology is known as Universal Default. So, do not be the bad apple and let others paid for your mistakes.

iv) APR, or annual percentage rate
Annual percentage rate is also one of the factor that contribute to the credit card debt. This annual percentage rate is charged by the credit card companies and pay by the cardholders. It does not fixed, can be changed by the decision of the credit card companies. The increased rate will increase the credit card debt.




Credit card debt is just like gaining weight, easy to get but hard to lose. However, losing weight is not impossible, neither getting out from debt. Keeping yourself away from debt, by taking few steps of prevention, your finance will have a clean bill of health.



Here are some ways to prevent from making credit card debt:
i) Manage your finances
Everything starting with planning, well management of finance will help you keep on track before you being pull out the credit card. For the first and important step, you must figure out your monthly income and needed expenses. 10% of the monthly income should be save and prepared for emergency used or as a saving. You will be never have a large amount of credit card debts once you have saving the money each month. Besides that, you should be never spend more than 30%-50% of your available limit. Otherwise you will not be able to handle the payment after deduction of needed expenses.

ii) Shop for the right card

It is important for you to shop around and get the right card personalized for your particular situation. It is always important for which card you choose based on the lower interest rate or lower fees. It maybe need to spend some time to compare each credit card, but it will help you prevent from making heavily credit card debt.

iii) Read the fine print
Do not ignore this step! Many people will think that it's not important to read through the fine print, but it's worth! Spend few hours to look through and understand it can save you hours of headaches and hundred even thousand of dollar in long run. You will know everything from the interest rate and fees to learn how to get rewards and how long of the grace period you have.

iv) Pay the balance in full
It's always important that to control the use of credit card. You should ask yourself whether you are able to pay for the price before you want to use credit card. In case of emergency situation, if your emergency fund are not enough to cover all the debt, at least you have to pay more than the required minimum payment.

v) Pay on time
Never make any late payment including car and house payments. Due to the universal default, credit card company can raise the interest rate if you make late payment. Besides that, you are encourage to make payment before the mail time. If you are able to make payment before the actual due date then it can help you to save money from interest due to the interest charged is based on average daily balance. So, if you make payment earlier then you can save money from paying less interest.

vi) Use it like cash, not a credit card
In one sense, you have to bear in mind that you need to use credit card like cash because you have to pay the amount at the end of each month. However, it is really not cash! It maybe convenient for you to keep it in wallet and it look sleek. Maybe you will feel rich and each time you hold and spending with it and you will feel the same. With cash you can feel it when the cash in hand are increasing or decreasing. You cannot physically feel that your debts are increasing when you are using credit card. So, you need to control in spending with credit card and spending habits. It's easier to make more debt if you're using credit card for all your purchases.






References:
i) http://en.wikipedia.org/wiki/Credit_card
ii) http://www.debtsolution-strategies.com/creditcarddebt.htm
iii) http://www.cardratings.com/howtoavoidcreditcarddebt.html

Sunday, February 8, 2009

A review on a post on internet Security from My E-commerce blog



Nowadays, computers have been very common in our life and many people are using the internet. There are a lot of advantages by using internet such as online shopping, online chatting, online reserve ticket and others. However, according to Symantec bi-annual Internet Security Threat Report, there are more than a million of computer viruses, worms and Trojans circulation in year 2007 and so far Symantec already detected 1,122,331 malware. Based on the report, the problem of internet security is getting serious compare to last time and causes many problems such as losing of personal private information, hacking of company system, computer system attack by viruses and others. This causes some people losing their private important information, company private information getting stolen and others consequences.

Although the problem is existing in our life, many people are ignore the problem such as didn’t using antivirus to protect their pc. Besides that, some of the organizations still not do enough to prevent their data breaches. Actually we should avoid the internet security problem such as using the appropriate antivirus software. Organization can hire some it specialist to design the protection system such as firewall to prevent the information unauthorized accessed by outsiders. Government also can improve the law such as intellectual property act and enable the users taking legal action to the hackers.

In conclusion, control on internet security is important to internet users nowadays. Everybody are responsible to control and eliminate those internet security threat in order to create a safety internet environment.

Phishing: Examples and its prevention methods


Introduction
Phishing is the criminally fraudulent process of attempting to acquire personal information such as usernames, password and credit card details by pretending as a trustworthy entity using a communication form of electronic. Popular social websites, auction sites, online banks, online payment processor, and IT administrators are commonly used to lure the users. Phishing is normally using e-mail or instant messaging and it often directs users to enter details in a fake website which look and feel like the legitimate one.

Below are the examples of phishing



In the example PayPal phish(above), there is spelling mistakes in the e-mail and the presence of an IP address in the link are both clues that this is a phishing attempt. Legitimate PayPal will always greet the users with his or her real name, not just with a generic greeting like ‘Dear Accountholder’.


In the example above, phishing using the generic address ‘Dear USbank Cardmember’. The legitimate website will use their user’s real name. So we can know that this is a phishing website.


The methods for avoiding from phishing
There are few effective methods that helps to avoid from being phished:
1.) Do not trust email which required personal financial information urgently. A phishing website will request the user to react immediately and therefore include upsetting or exciting statements. Never give any account information on the web, there is no any bank or any internet commerce will need to ask you for your account information. Report the incident to your bank or the actual company supposed to have sent you the email so they can take steps to prevent the fraud from scamming people.
2.) Do not call any number or use any link in the suspected email as this may put you in the hands f those responsible for the phishing attack. It is safer to write the banks specific address in the address field or call the banks specific number as found on their official pages. However, phishers can change your host’s file which thereby redirects specific URL’s to a page of their choosing.
3.) Be suspicious of impersonal emails, as phishing attacks are directed towards millions of people through email spam. The emails are therefore impersonal and general and a email from your bank will be usually personal in nature.
4.) Do not fill out personal financial information that forms in email messages. Typically phishing scams or hoaxes will ask for personal information such as usernames, passwords, credit card numbers, and security number through an online form. Actually, the banking companies will never ask for account information. Therefore, a request for these types of information should ring the alarm bell.
5.) Try to log into your online accounts at least once a month or more frequently. Always check all credit, bank and debit card statement to make sure that all notations are accurate.
6.) Always ensure that you are using a secure website when you are submitting your financial information via web browser. However, phisher can get you entering their own website and create a”secure link” for you to give all the information they need.
7.) Ensure that your browser is up to date and security patches applied. The Microsoft Internet Explorer browser has several security holes exploited by phishing attacks. Download the security patches at Microsoft Security home page, http://www.microsoft.com/security/

8.) Help stop phishing by reporting "phishing attacks" or “spoofed” e-mails to the following groups:
· Forward the email to reportphishing@antiphishing.com
· Forward the email to the Federal Trade Commission at spam@uce.gov
· Forward the email to the "abuse" email address at the company that is being spoofed (e.g. "spoof@ebay.com") when forwarding spoofed messages, always include the entire original email with its original header information intact
· Notify the Internet Fraud Complaint Center of the FBI by filing a complaint on their website: www.ifccfbi.gov

Saturday, February 7, 2009

How to safeguard our personal and financial data?


Nowadays, we have more and more personal information and financial data which are important to us. Furthermore, in this 21st century, there is becoming gradually difficult to protect our personal information and financial data due to all data are computerized. Besides that, it's hard not to share personal information, such as credit/debit card number, security password, bank account number and so on through internet because it's more convenient for company or individual to do monetary and other transactions more than using traditional method which used paper and pen to record the transaction. However, in these modern time, there are lot of advanced technologies which let hackers and predators have more chances to thieve or hack companies or individual's personal and financial data.Moreover, with the spyware, viruses and etc, there is getting easily to for anyone to become the victim of online fraud or theft.

Here are the 8 ways which can secure your personal information when making monetary or others transaction from being theft or hacked in daily computer life:

1) Keep your personal and sensitive data off from your computer
It's difficult for spyware program or viruses to hack your personal information if you don't have any record in computer. Human prefer convenient and easy ways when they are doing their work, so they just save those needed information in computer. Why can't just save those information in a thumbdrive which just cost around RM20 to prevent from saving in computer? Keep those information in a safe place and when you need it, just plug it to computer and access to those personal file.This is easy, effective and protective way to secure those sensitive data.

2) Do not use the same password for every thing on the internet
Nowadays, there are many website which need password to access for it. Definitely, there are nobody who like to memorize lot of different passwords everyday, so they just use same password for all website they access. However, hacker love those people who just use their name or birth date to be their password. It's very easy for hacker to access to other websites. Actually, it's no need to use different password in every website, but need to make sure not using only one password. Furthermore, it just need to add one or two number behind the password then will make it more complicated to being stolen or hacked.

3) Always think before providing information when solicited
If you get an email that has a link that require you to provide personal information, be careful and make sure that you visit the website manually to check for the existence of the website. Some artificial websites are very close to existence website, maybe just miss out a word. Besides that, if the website exist also doesn't mean it is legal. If you never heard about the website before, use an search engine to search for the website, and if see anything like " xxx is a scams", just don't access for it.

4) Only collect to those secure wireless network
For those who're using wireless network at home, make sure you secure it with password. Don't let trouble troubles you, connecting to a nonsecure network is finding troubles for yourself. Furthermore, there are always lot of spyware if you connect to nonsecure network. Just avoid from them!

5) Make sure the anti-virus and anti-spyware are installed and always up-to-date
Definitely, it's important to get an anti-virus and anti-spyware for your computer. You can either buy an excellent anti-virus program like Norton or use free anti-virus program such as Avast, AVG and etc, those are good program too. Besides that, must make sure that the program are always up-to-date to get the latest program to secure the computer. There are lot people who believe that anti-spyware program is not useful. It's wrong! Spyware program can send your data to their creator so they can make money from it. There are lot of good anti-spyware program such as Windows Defender, AdWare, SpywareBlaster, and SpySweeper. It's better to spend some time to get a protection from it rather than being infected.

6) Turn your computer off or in standby when you're not using it
This is the basic step to secure your computer, it is no way for being hack or get infected by virus or spyware if turn off the computer. There are lot of people always switch on their desktop and laptop at home even if they're not at home.Just switch it off when you're not using it.

7) Lock your computer at home and at office
This is another basic way to protect your computer but ignore by most people. Especially in office, it's better to swich off or lock off the computer when you're not in office to prevent from others to look through and get your personal information through your computer. Just spend some time to use password to lock it off or switch off the computer is saver then let co-worker to get access to your computer.

8) Be careful who you give your computer to when it needs fixing
Unfortunately, you will need to give your computer to others to fix it when computer has problem if you're not a technician. It's very easy to let others to get all your personal information or sensitive data from your computer when you're giving others to fix your computer. So, it's better to save all the personal information or sensitive data in an external hard drive before send the computer to the technician. Besides that, if you get a technician to your house to fix your computer, make sure you're with him when he's fixing. It's also an easy way to let the technician to access to your personal document if you are in another room.




Reference:
http://www.online-tech-tips.com/computer-tips/13-ways-to-protect-personal-data-from-online-fraud-and-identity-theft/