Indahfashion Shop's Fan Box

GOOGLE TRANSLATE

Thursday 21 January 2010

Customer Money disappearance Identity Theft



Wednesday, January 20, 2010 | 13:44 pm

TEMPO Interactive, Jakarta - The case of the disappearance of the money number of customers several banks, the BCA, BNI, Bank Permata, occurred in Bali. Police have not found indications of involvement of people in the banks concerned in the case.

In this case there is the possibility of identity theft for customers, since this case using the transfer system in automatic teller machines (ATMs). In addition to the ATM identity theft, identity theft can also be done by way of phishing (deception).

Most people probably have heard about phishing (deception). In the dictionary Wikipedia, phishing explained:

In computers, deception (phishing) is a form of fraud which is characterized by attempts to obtain sensitive information, such as ID cards or driver's license ID card, your financial ID (accounts, credit cards, PIN numbers), user names, passwords, and other personal information confidential.

In electronic communications, which is commonly used to lure victims phishing, among other popular sites (YouTube, Facebook, MySpace, Windows Live Messenger), auction site (eBay), online banking (Wells Fargo, Bank of America, Chase), a payment online ( PayPal), or IT Administrators (Yahoo, ISPs, corporate), and others.


Most common techniques used by perpetrators of phishing are as follows:

* By e-mail or instant messages, which lead users to believe the validity of email or web site. In order to look convincing, the perpetrators often use company logos or trademarks of formal institutions, such as bank or credit card issuer. Forgery is done to lure the victim handed over personal data, like passwords, PIN or credit card numbers.

* Create a fake website identical to the official site, or the perpetrators phishing email containing a link to a fake site.

* Create a hyperlink to a fake website or provide a form attached to the e-mail that is sent.


How do we avoid it?

* At Facebook, or IM, there is usually a message from a contact list that contains the URL with the words "Check this out". Do not you click on the url that will bring you to submit your identity without your players aware of phishing.

* Do not believe every warning you read, especially the pop-up warning that appears when you're browsing the Internet. Companies are not good to use pop-up ads to display false warnings about your computer. Just ignore them.

* Do not click all the buttons in the pop-ups, like the "Close (Cover)" or "No (No)", or the "Close (Cover)" which may appear in the upper right corner of the pop-up. If you do this, a virus or other malicious software may be installed on your computer. To close the pop-up ads with the safer, press Ctrl + W (if you're using Windows) or Command + W (on Macs). You may receive an email claiming to come from a computer expert, who warned you about a virus. This generally is a sham. Do not follow the steps described in any email unless you are sure that the threat is very real.

* Yahoo! Lottery does not exist. Do not be fooled by people claiming to be from Yahoo! and offering cash prizes. Yahoo will never send you information about a contest you never follow. If you receive a message like "Final Notification: Yahoo Mail Winner! (Last Notification: Winner of Yahoo Mail!)" Or "Your Email Address Has Won $ XX million (Your Email Address Have Won $ XX million)" is a fraud. Do not reply to this email, do not click any links in it, and never reveal any personal information. However, click the "Spam".

* Use a browser that provides web filtering service / website or giving false web reports / forgery sites, such topics.

* Make sure the site is asking for our data is a trusted site by looking at the address bar where we used to write the site address that we want to visit. If you are listed there is the correct website address so you can then enter the data yourself.

* Observe the usual perwajahan sites we visit. If there are things that are different from usual, you better write back the site address in question, because phishing negligence often utilize internet users.

* Be careful with phishing emails, the most common form of phishing emails is validated by retailers, banks, organizations, or government agencies. Sender to ask for "confirmation" of your personal information for several reasons illusory, for instance about your account will be closed, so that something that has been placed in your name or your information has been lost because of computer problems. Another tactic is used, they say the department is well-known companies and ask you to verify the information because they suspect you may be a victim of identity theft! In some cases, phishing perpetrators claimed from the lottery commission agencies and request your banking information to be included in their accounts.

* Do not click on links in emails that request your personal information. Phishing perpetrator uses these links to lure people directly to a website that looks like really from the company website, organization or entity which they imitate. If you follow the instructions and enter your personal information on the Web site, you will submit directly into the hands of identity thieves. To determine whether a message really from the company or agency, direct calls or go to his web site of the original (using a search engine to find it).

source: web tempointeraktif.com/hg/it/2010/01/20/brk .20100120 to 220,297, id.html

0 Comments:

Custom Search

DAFTAR ISI (CONTENT)