TITLE

TAKING A BITE OUT OF IDENTITY THEFT

AUTHOR(S)
Lewis, Peter
PUB. DATE
May 2005
SOURCE
Fortune;5/2/2005, Vol. 151 Issue 9, p36
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article mentions how companies mishandle personal data and recommends using a paper shredder at home. Last year, according to a Better Business Bureau report, more than nine million Americans were victims of identity theft. Security experts say that, contrary to popular belief, the majority of identity-theft cases do not involve criminal computer masterminds. More commonly the modi operandi involve Dumpster-diving--going through trash cans for discarded bank statements, preapproved credit card solicitations, old bills, computer printouts, and other financially revealing documents--or the telephone, scamming gullible people into revealing their bank-account or Social Security numbers and passwords. Using a shredder certainly won't protect you from all the risks of ID theft, but it's something tangible you can do while waiting for Congress to address the issue. When shopping for a shredder, it's worth paying extra for a durable cross-cut or confetti-cut model. Higher-end shredders also have better safety features, like auto reverse and motors that shut down before overheating. The Royal 1280mx ($130) converts up to 12 sheets at a time to confetti. Norton Internet Security 2005 ($70) can help guard your Windows-based PC against known viruses, spyware, and Trojan Horse programs, which can capture your passwords and user IDs and smuggle them back to the hackers.
ACCESSION #
16805879

 

Related Articles

  • The evolution of application layer firewalls. Greene, Tim // Network World;2/2/2004, Vol. 21 Issue 5, p20 

    Features the Internet defense technology called deep packet inspection firewalls, being touted as the best line of defense against worms that can sneak past earlier technology, introduced in 2004. Debates on whether to install the technology on all Internet gateways; Cost evaluations;...

  • The Computer Security of Public/Open Computer Spaces: Feedback of a Field Study in Europe. Filiol, Eric // Proceedings of the European Conference on Information Warfare & ;2011, p106 

    Many public places offer free or low-paying accesses to the Internet network: Internet cafes, hotels (especially high quality hotels). These places are experiencing a large attendance, especially near sites like railway stations, airports, international conference lounge....A number of questions...

  • Research and Application of an Improved Support Vector Clustering Algorithm on Anomaly Detection. Sheng Sun; Yuan Zhen Wang // Journal of Software (1796217X);Mar2010, Vol. 5 Issue 3, p328 

    Anomaly detection approaches build models of normal data and detect deviations from the normal model in observed data. Anomaly detection applied to intrusion detection and computer security has been an active area of research. The major benefit of anomaly detection algorithms is their ability to...

  • PROTECTING YOUR PASSWORDS.  // APC (Bauer Media Group);Nov2008, Vol. 28 Issue 11, p88 

    The article provide tips on how to protect computer passwords. The author stated that the key in protecting password is to create a secure password. He added that salting is the key in creating a secure password, since it cannot be easily guessed or cracked. Moreover, one must also ensure to use...

  • Crime Watch. Mayne, Mark // SC Magazine: For IT Security Professionals (UK Edition);Aug2006, p30 

    The article offers advice from several computer security experts on dealing with cyber criminals. The experts looked at some of the security issues and trend in the threat landscape and what worries them most about the future. Jon Callas of PGP Corp. sees the rise in Internet crimes to be...

  • Digital Dangers. Bellows, Laurel // ABA Journal;Jan2013, Vol. 99 Issue 1, p8 

    The article focuses on the efforts of the American Bar Association (ABA) in dealing with cyber-security threats through legislative ways. It mentions that the digital revolution is an easy target of attack for hackers, terrorists and nations with an intention of stealing personal, corporate and...

  • Online Banking: It's Still Safe. Bigda, Carolyn // Money;Aug2005, Vol. 34 Issue 8, p48C 

    Offers information about how to conduct online banking while still protecting your identity and data. Report that the majority of identity theft occurs outside of the Internet; Security features used by banks, credit-card issuers, and online retailers; Use of anti-virus and anti-spyware programs...

  • USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS. Malempati, Sreelatha; Mogalla, Shashi // International Journal of Network Security & Its Applications;Nov2011, Vol. 3 Issue 6, p149 

    Information security is necessary for any organization. Intrusion prevention is the basic level of security which requires user authentication. User can be authenticated to a machine by passwords. Traditional textual passwords are vulnerable to many attacks. Graphical passwords are introduced as...

  • 10 steps to greater information security. Bilger, Michael // Accounting Today;8/4/2003, Vol. 17 Issue 14, p6 

    Presents steps to avoid computer security breaches. Need to define the firm's information security; Assignment of responsibility for security; Inventory of information assets; Development of a business continuity plan.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics