What are the signs of Identity theft?
Dear Friends,
You have learnt so far that what is Identity theft and how your identity is theft by criminals and we requested to see two films namely “The Net” and “The Net 2” for knowing the original incident in the world as well as cyber world and now we are going to tell you the signs of Identity theft i.e.:- how your will start suspect that your identity might have been theft. So let give a look on the following points:-
• Accounts you didn't open and debts on your accounts that you can't explain.
• Fraudulent or inaccurate information on your credit reports, including accounts and personal information, like your Social Security number, address, name or initials, and employers.
• Failing to receive bills or other mail. Follow up with creditors if your bills don't arrive on time. A missing bill could mean an identity thief has taken over your account and changed your billing address to cover his tracks.
• Receiving credit cards that you didn't apply for.
• Being denied credit or being offered less favorable credit terms, like a high interest rate, for no apparent reason.
• Getting calls or letters from debt collectors or businesses about merchandise or services you didn't buy.
With Thanks
Urproblemmysolution Team
Wednesday, September 16, 2009
Friday, September 11, 2009
What is Identity Theft
What is Identity Theft?
Hallo Friends,
Sorry for being absent from you for a long period. We had already discussed most of the cyber crimes which occurs in cyber world to our personal life and as our motive is to make aware the netizens about the danger of cyber world and how to remain safe from them without knowing any good computer knowledge and just from applying the common sense so we will now bring before you another dangerous cyber crime which may make your life hell even you are not aware of anything about the complaint against you. Yes friend it is Identity theft.
So let us discuss you what does it mean? Suppose your name is Bill Clinton and you have your credit card, social security number, separate bank account, office identity card and so many things which will speak for your identity and someone has stolen all the data of your personal information and reaching all those places before you and taking all the advantages which you should get or doing crime in your name and in this situation cops has reached in your house for arresting you. What will you feel now? We think it will not be a good experience for you and your family. So we can tell that when someone steals someone’s identity that is called identity or ID theft. Let discuss in the voice of cyber world.
Identity theft is a phrase that is used to describe any kind of fraud that results in the loss of personal data, such as passwords, user names, banking information, social security numbers or credit card numbers.
There are two main types of identity theft – account takeover and true name theft. Account takeover identity theft refers to the type of situation where an imposter uses the stolen personal information to gain access to the person’s existing accounts. Often the identity thief will use the stolen identity to acquire even more credit products by changing your address so that you never see the credit card bills that the thief runs up.
True name identity theft means that the thief uses personal information to open new accounts. The thief might open a new credit card account, establish cellular phone service, or open a new checking account in order to obtain blank checks. The Internet has made it easier for an identity thief to use the information they've stolen because transactions can be made without any real verification of someone’s identity.
I would request you to see two great Hollywood movies over this for your better understanding. They are “The Net” and “The Net 2”.
With Thanks
Urproblemmysolution Team
Hallo Friends,
Sorry for being absent from you for a long period. We had already discussed most of the cyber crimes which occurs in cyber world to our personal life and as our motive is to make aware the netizens about the danger of cyber world and how to remain safe from them without knowing any good computer knowledge and just from applying the common sense so we will now bring before you another dangerous cyber crime which may make your life hell even you are not aware of anything about the complaint against you. Yes friend it is Identity theft.
So let us discuss you what does it mean? Suppose your name is Bill Clinton and you have your credit card, social security number, separate bank account, office identity card and so many things which will speak for your identity and someone has stolen all the data of your personal information and reaching all those places before you and taking all the advantages which you should get or doing crime in your name and in this situation cops has reached in your house for arresting you. What will you feel now? We think it will not be a good experience for you and your family. So we can tell that when someone steals someone’s identity that is called identity or ID theft. Let discuss in the voice of cyber world.
Identity theft is a phrase that is used to describe any kind of fraud that results in the loss of personal data, such as passwords, user names, banking information, social security numbers or credit card numbers.
There are two main types of identity theft – account takeover and true name theft. Account takeover identity theft refers to the type of situation where an imposter uses the stolen personal information to gain access to the person’s existing accounts. Often the identity thief will use the stolen identity to acquire even more credit products by changing your address so that you never see the credit card bills that the thief runs up.
True name identity theft means that the thief uses personal information to open new accounts. The thief might open a new credit card account, establish cellular phone service, or open a new checking account in order to obtain blank checks. The Internet has made it easier for an identity thief to use the information they've stolen because transactions can be made without any real verification of someone’s identity.
I would request you to see two great Hollywood movies over this for your better understanding. They are “The Net” and “The Net 2”.
With Thanks
Urproblemmysolution Team
How Identity is theft
How Identity is theft
Hallo Friends,
We have discussed about identity theft and now we will brief you how your identity is theft.
1) Social networking: - This is as good as bad for everybody in the net as most of the person who does not think for evil side of the net supplies their personal details to their new unknown friends.
2) Untrusted web form fill up and Job Sites, where we put our personal details for getting job.
3) Skimming:- This happens for Credit cards. (PL search for details about skimmer and skimming in this blog for)
4) Phishing:- All of you have already been discussed in this blog in details. So please search for it.
5) Old-Fashioned Stealing:- They steal wallets and purses; mail, including bank and credit card statements; pre-approved credit offers; and new checks or tax information. They steal personnel records, or bribe employees who have access.
6) Pretexting:- They use false pretenses to obtain your personal information from financial institutions, telephone companies, and other sources.
Again I would request to see the Hollywood Movies “The Net” and “The Net 2”
With Thanks
Urproblemmysolution Team
Hallo Friends,
We have discussed about identity theft and now we will brief you how your identity is theft.
1) Social networking: - This is as good as bad for everybody in the net as most of the person who does not think for evil side of the net supplies their personal details to their new unknown friends.
2) Untrusted web form fill up and Job Sites, where we put our personal details for getting job.
3) Skimming:- This happens for Credit cards. (PL search for details about skimmer and skimming in this blog for)
4) Phishing:- All of you have already been discussed in this blog in details. So please search for it.
5) Old-Fashioned Stealing:- They steal wallets and purses; mail, including bank and credit card statements; pre-approved credit offers; and new checks or tax information. They steal personnel records, or bribe employees who have access.
6) Pretexting:- They use false pretenses to obtain your personal information from financial institutions, telephone companies, and other sources.
Again I would request to see the Hollywood Movies “The Net” and “The Net 2”
With Thanks
Urproblemmysolution Team
Wednesday, September 2, 2009
What is Infectious Website
What is Infectious Website
Dear Friends,
We have already discussed many topics in our blog and now we are going to tell you about infectious website. We think now you are thinking that is it possible? Website and that is infectious, its cant be possible. But my dear friends it’s possible. Now definitely a question has come to your mind that so what is infectious website.
A infectious website is that website which contains virus or harmful materials for your computer and when you run that website your computer will face problem and if you have strong antivirus or use good browser like Mozilla or IE or Google Chrome they will alert you that you are going to visit an infectious website which can cause problem to your computer. Now if you don’t visit its ok but if you continue there is every possibility of installing virus or Trojan in your computer even your antivirus can’t stop it to install it. So we think you have understood how danger it is. But there are also some websites for which browser will not alert you about its infectiousness but they are infectious. Now you should realize which is dangerous and which is not though it is infectious. The infection report which shows the containing about virus, Trojan and worm and other vulnerable software are dangerous but the others are not so vulnerable.
How the websites get infectious?
When a website is taken control by outsider and installs some hidden vulnerable software or Trojan in its content, it gets infectious or when the web administrator installs it with its content for attacking the target machine which visits its site and this happens in case when you visit some porn site or hackers own site and in this cases your browser even cant alert you about its vulnerability.
Even our experience says that one well known Management and Engineering College’s website is also vulnerable and if you visit you will be attacked by Trojan and virus and those will be installed automatically.
Now see the scan report of that website and we are not telling the name of that College.
Diagnostic page for thatverycollege.org
What is the current listing status for thatverycollege.org?
Site is listed as suspicious - visiting this web site may harm your computer.
Part of this site was listed for suspicious activity 5 time(s) over the past 90 days.
What happened when Google visited this site?
Of the 4 pages we tested on the site over the past 90 days, 3 page(s) resulted in malicious software being downloaded and installed without user consent. The last time Google visited this site was on 2009-08-19, and the last time suspicious content was found on this site was on 2009-08-18.
Malicious software includes 8 trojan(s), 2 scripting exploit(s), 2 virus. Successful infection resulted in an average of 1 new process(es) on the target machine.
Malicious software is hosted on 1 domain(s), including chura.pl/.
This site was hosted on 1 network(s) including AS32244 (LIQUID).
Has this site acted as an intermediary resulting in further distribution of malware?
Over the past 90 days, thatverycollege.org did not appear to function as an intermediary for the infection of any sites.
Has this site hosted malware?
No, this site has not hosted malicious software over the past 90 days.
How did this happen?
In some cases, third parties can add malicious code to legitimate sites, which would cause us to show the warning message.
This was the scan report of thatverycollege.org website
How to Scan a Website?
Now definitely you are very much eager to know what the easiest way to scan a website is. Google helps us to scan a website through their scan system and here is the tool of Google.
http://www.google.com/safebrowsing/diagnostic?site=www.example.com (replace www.example.com with your own site address). It will show whether Google found anything suspicious on your site.
Thanking you
Urproblemmysolution Team
Dear Friends,
We have already discussed many topics in our blog and now we are going to tell you about infectious website. We think now you are thinking that is it possible? Website and that is infectious, its cant be possible. But my dear friends it’s possible. Now definitely a question has come to your mind that so what is infectious website.
A infectious website is that website which contains virus or harmful materials for your computer and when you run that website your computer will face problem and if you have strong antivirus or use good browser like Mozilla or IE or Google Chrome they will alert you that you are going to visit an infectious website which can cause problem to your computer. Now if you don’t visit its ok but if you continue there is every possibility of installing virus or Trojan in your computer even your antivirus can’t stop it to install it. So we think you have understood how danger it is. But there are also some websites for which browser will not alert you about its infectiousness but they are infectious. Now you should realize which is dangerous and which is not though it is infectious. The infection report which shows the containing about virus, Trojan and worm and other vulnerable software are dangerous but the others are not so vulnerable.
How the websites get infectious?
When a website is taken control by outsider and installs some hidden vulnerable software or Trojan in its content, it gets infectious or when the web administrator installs it with its content for attacking the target machine which visits its site and this happens in case when you visit some porn site or hackers own site and in this cases your browser even cant alert you about its vulnerability.
Even our experience says that one well known Management and Engineering College’s website is also vulnerable and if you visit you will be attacked by Trojan and virus and those will be installed automatically.
Now see the scan report of that website and we are not telling the name of that College.
Diagnostic page for thatverycollege.org
What is the current listing status for thatverycollege.org?
Site is listed as suspicious - visiting this web site may harm your computer.
Part of this site was listed for suspicious activity 5 time(s) over the past 90 days.
What happened when Google visited this site?
Of the 4 pages we tested on the site over the past 90 days, 3 page(s) resulted in malicious software being downloaded and installed without user consent. The last time Google visited this site was on 2009-08-19, and the last time suspicious content was found on this site was on 2009-08-18.
Malicious software includes 8 trojan(s), 2 scripting exploit(s), 2 virus. Successful infection resulted in an average of 1 new process(es) on the target machine.
Malicious software is hosted on 1 domain(s), including chura.pl/.
This site was hosted on 1 network(s) including AS32244 (LIQUID).
Has this site acted as an intermediary resulting in further distribution of malware?
Over the past 90 days, thatverycollege.org did not appear to function as an intermediary for the infection of any sites.
Has this site hosted malware?
No, this site has not hosted malicious software over the past 90 days.
How did this happen?
In some cases, third parties can add malicious code to legitimate sites, which would cause us to show the warning message.
This was the scan report of thatverycollege.org website
How to Scan a Website?
Now definitely you are very much eager to know what the easiest way to scan a website is. Google helps us to scan a website through their scan system and here is the tool of Google.
http://www.google.com/safebrowsing/diagnostic?site=www.example.com (replace www.example.com with your own site address). It will show whether Google found anything suspicious on your site.
Thanking you
Urproblemmysolution Team
Subscribe to:
Posts (Atom)