Web Browsing - Collected Information
You may not realize it, but as you are surfing the web all sorts of details are being left behind about your computer and where you have been. Most of this information is used harmlessly in website statistics, but it could also be used to profile you, or identify you as a vulnerable target for an exploit.
There are a few main pieces of information that get saved when you surf the web, this is by no means a full list, or a list of potentially what someone may be able to get, but the 'average' website will collect this data.
Referring URL - The prior website that you were surfing. This information is quite detailed, it will not just say google.com, it'll give the full website url that referred you, including the search words you used. In fact, they can click or copy that in to their web browser and see the exact page you left. Keep in mind that if you were in a website doing banking or something over a secure connection they won't be able to just login, however some less secure websites encode your password and username in to the URL itself, which could make that possible.
IP Address & Hostname - Your IP address and hostname identify you to the world, without a unique identity you wouldn't be able to request anything from the Internet. This will tell them who your ISP (Internet Service Provider) is and often give away where you live (to the city), or if you are working for a government agency, educational facility, or if you are surfing from behind a company proxy server.
Surfing Habits - Websites will record how many pages you have visited, the amount of time you spent at one page (before clicking on the next), the page you enter on, and the one you exited from.
Operating System and Software - This is a big one, as you are surfing information about your Operating System (OS) and the web browser you are using is recorded. Often the version numbers are also sent out. Additionally, they can actually tell your screen resolution and colour depth!
Most websites as I said before, use all of this information for statistical purposes, targeting advertising, developing a more user or operating system friendly website. However, it is good to keep in mind that a malicious person could also use this information.
Many security features are available through your web browsers, such as different levels of security for trusted and untrusted sites. Some linux browsers allow you to remove operating system and web browser information so it won't be available to websites. Personal firewalls, anti-virus software, malware scanners are all a great thing to have if you do a lot of surfing the web, and of course cleaning your internet cache and history!
It's always a good idea to keep privacy and security in mind when you are surfing the web and be careful of what websites you openly provide information to.
Phishing-Based Scams: A Couple of New Ones
Phishing in its "classic" variant is relatively well-known. Actually, 43.4 % of adults have already been contacted by phishers, says the survey released on May, 17 by First Data Corp.
The Never Ending Spyware Story
It's been with us since 1993, it's gotten more intrusive, more complicated.
Can I Guess Your Password?
We all know that it's dangerous to use the same password for more than one program. If you sign up for a program run by someone of low moral fibre, what is to stop them running through various programs with your username and password to see what they can access?
Computer Viruses - How to Remove a Computer Virus from Your Computer
Computer viruses infect millions of computers every day. Viruses can destroy data, steal important information, and even make a computer completely unusable. When a computer is infected by a virus it is imperative that the virus be removed as quickly as possible.
Spyware is Not Like a Nosy Neighbor
Remember the television show about the nosy neighbor Mrs. Kravitzalways peeking out her window or over the fence, sometimes evenknocking on the door just to find out what was going on in herneighborhood? If you don't wait a month or so and the DVD orthe movie will be out. Let's move on.
Click Here To Defeat Evil
Microsoft routinely releases new security updates, many of which are given it's highest severity rating "critical". Here's a typical announcement:
Backup and Save your business!
There you are busily typing away on your PC or yourLaptop, and all of a sudden the strangest thing happens.The screen goes black, extinquished like a candle in thewind.
Identity Theft Offline -- So Many Possibilities
Chris Simpson, head of Scotland Yard's computer crime unit was unpleasantly surprised to learn how easy it is to cheat anybody out of his or her personal info -- by means of a fake survey.
Phishing: An Interesting Twist On A Common Scam
After Two Security Assessments I Must Be Secure, Right?---------------------------------------Imagine you are the CIO of a national financial institution and you've recently deployed a state of the art online transaction service for your customers. To make sure your company's network perimeter is secure, you executed two external security assessments and penetration tests. When the final report came in, your company was given a clean bill of health. At first, you felt relieved, and confident in your security measures. Shortly thereafter, your relief turned to concern. "Is it really possible that we are completely secure?" Given you're skepticism, you decide to get one more opinion.
Steganography ? The Art Of Deception & Concealment
The Message Must Get Through-----------------------------The year is 300A.D., and you're part of a war machine unlike anything the world has ever seen. You are a field General for the Roman Empire and charged with assimilating yet another non-Roman culture. Your current mission; get tactical information you've collected in the field to an outpost one hundred miles away. The land between you and the outpost is treacherous and filled with enemy. The information you've collected is critical to the success of the current campaign and must reach the remote outpost intact. This will call for ingenious deception.
Wells Fargo Report Phishing Scam
First off I should explain what phishing is. Phishing is basically the act of tricking a victim into divulging information. It involves the receiving of an email message with a link to a website where the victim would enter personal information. In this particular scam, you get an email from "Personal Banking: firstname.lastname@example.org" stating that there may have been some unauthorized access to your account and that you should click the link and enter your account and verify some information. When you click the link you are taken to a site which looks identical to the Wells Fargo site.
All About Computer Viruses
Your computer is as slow as molasses. Your mouse freezes every 15 minutes, and that Microsoft Word program just won't seem to open.
Information Security for E-businessmen: Just a Couple of Ideas
If you constantly deal with bank or electronic accounts, it must beyour worst nightmare--to wake up and learn that you are a bankrupt.Some crook stole your personal data and all the money you have beensweating blood for years has flown to somebody else's account. Almosteverybody must have heard that such a tradegy is called identity theftand millions of people in the USA alone suffer the same every year.Poor consolation for its victims, isn't it?
Pharming - Another New Scam
Pharming is one of the latest online scams and rapidly growing threat that has been showing up on the Internet. It's a new way for criminals to try to get into your computer so they can steal your personal data.
The Bad Guys Are Phishing For Your Personal Information
Do you know what "phishing" is?
Traditional Antivirus Programs Useless Against New Unidentified Viruses!
Every now and then you can read about a new virus and the damage it causes. The millions viruses costs companies each time they strike. It is however not only companies that are suffering from the damages caused by viruses. A virus can be just as damaging if not more for a private Internet user by destroying important documents, family pictures and everything else you keep on your computer. Therefore should no home computer be without a good virus protection software. This way you can protect your computer and yourself from loosing data, corrupted hard drives and a number of other problems. There are several anti virus programs available of which some are free and some are not. You should however always remember that you might get what you paying for, meaning that the service and the updates might be better for the paid alternatives and thereby protect your computer better.
5 Simple Steps to Protect your Digital Downloads
A couple of days ago, I was searching for a popular eBook online.
Clown Internet Scam - An Internet Scam is Currently Targeting Clowns and Other Entertainers
I am the victim of an internet scam. It is very hard to write that sentence, but it's necessary in order to warn my fellow clowns, magicians and other entertainers, and to prevent them from being taken for $2,800.00 like I was. Here is what happened to me, and how you can avoid it.
Phishing and Pharming: Dangerous Scams
As soon as almost all computer users already got used to -- or at least heard about -- the word "phishing", another somewhat confusing word appeared not long ago. Pharming. Does it differ from phishing -- and if yes, how?
Spy Scanners ? Don?t Compromise your Privacy
Spies, spyware, internet parasites are among what they are usually called. These are scouts that monitor your web activities. The work undercover to check on your surfing patterns, spending habits, items bought, they extract email addresses, hijack browsers, steal credit card information. These are just some of the things a spyware is capable of.
|© Athifea Distribution LLC - 2013|