Menu



error This forum is not active, and new posts may not be made in it.
1
Promote
Something that concerns us all - PC Security
9/28/2006 11:12:57 PM
Vooka Technology You might have heard or seen this name around the internet alot lately, but not many people know about the product they are about to release - the Silverbox solution to PC security. This is an amazing product and will be available very soon. "The Silver Box" is...A VERY SIMPLE Set It and Forget It computer data protection solution... It Speeds Up Your Computer! It is a Military grade backup protection that AUTOMATICALLY Backs your data up daily! Each account is encrypted, and partitioned for maximum security! It... Protects your data against identity theft! Protects your data against insidious spyware! Protects your data against spreading viruses! Protects your data against computer theft! Protects your data against hard drive crashes! Protects your data against malicious hacking! Protects your data against torrential flooding! Protects your data against lightning bolts! Protects your data against destructive tornadoes! 7 EYE-OPENING FEATURES IN 1 SIZZLING HOT PRODUCT! 1. Automatic Data Backup Military grade backup protection on your computer, and 2 different offsite U.S. servers. All accounts are encrypted, and partitioned for MAXIMUM security. 2. File Shredder 4 different levels...standard,slow,fast, and military standard which totally shreds everything. 3. System Cleaner Automatically removes temporary internet files, and the cached files. This feature finds garbage file items that truly slow down your computer, and notes them as items found. 4. Firewall Socket Level protection compatible with Windows. This feature GUARDS the in and out doors of your computer. Catches spy ware sent in emails. 5. Pop Up Blocker This pop up blocker catches all pop ups...most others don't. Set to your preference. 6. Internet Cleaner This feature SCANS for cookies, trust and don't trust website settings. Set favorite browser to it. 7. Ad Blocker Different than the pop up blocker, this feature stops inline ads, flash ads, and banner ads that all slow down your computer. Deny or Accept feature. Vooka Technology is a participant in the Microsoft beta test program; as a result we update our product continually to be compatible and complementary. For example, our Personal Firewall adds an extra layer of security to the XP firewall. Hackers will intensify their efforts to penetrate any new Microsoft product. This will only create more value in the Silver Box, since one of the features informs the user of all programs attempting to get in or out of the computer. If you are interested in this as a business opportunity, you can still get your FREE pre-launch position. http://getyourposition.com/getpositioned.php?idReferrer=48436 If you are interested in the product alone, I will have more information, such as price, when they launch. Please send me a message or email if you would like me to give you more information at that time. jdalbello@yahoo.com.au Regards, Jennie
"One could trace every sickness, every disease and every ailment to a mineral deficiency" Dr Linus Pauling, two time Nobel Laureate Get ALL the facts - your health depends on it
+0
Re: Something that concerns us all - PC Security
9/30/2006 9:42:34 AM
Please be FULLY aware that ID thieves can do more damage to you than screw up your computer and your finances.

We each have 5 areas of identity that can be stolen, attacked in the shadows by ID thieves, and ruined... which can be life-threatening:

1) Medical Identity
2) Social Security Number Identity
3) Drivers License Identity
4) Credit / Financial Identity
5) Personal Character Identity

There is only one corporation in the U.S. that gives access to the servicing company that covers all 5 areas for you and straightens out any ID theft messes you acquire from the moment you become a member and forward, and will do it for only 0.43 cents a day!

The servicing company will NOT handle pre-exisiting conditions for 0.43 cents a day (but $1495.00 per occurence!)  So it's the smartest thing you can do to get a membership BEFORE something happens to you.
(please checkout their credentials here via a webcast)


Making Computer Crime Sexy
By David Kushner
Our Science of Hollywood columnist looks at cybercrime in the movies and in real life
Photo: Warner Bros. Entertainment

In "Firewall," Harrison Ford made security engineers into heroes.

Last spring, the teachers, students, and workers at the University of Kentucky Federal Credit Union received an email that seemed routine enough: Because of a problem in the electronic banking system, customers needed to verify their account information. After clicking a link, they were taken to a page with the bank’s logo where they were instructed to enter their personal identification numbers.

Unbeknownst to the 20 victims, however, their financial details were not going back to the campus, they were zipping to South Korea, where they would be used to create pirate debit cards. The only hint of a scam was tucked away in the site’s Web address, which read “http” instead of the usual “https,” designating a secure site. The Wildcats had just been phished. And they’re not alone. Phishing, social and technical engineering aimed at hustling surfers’ personal data, is an insidious form of identity theft that’s on the rise. According to a report by IBM, phishing attacks hit an all-time high, rising by 226 percent in 2005. The Federal Trade Commission receives nearly 200,000 reports of phishing attacks every year.

The phishers feed a larger epidemic of identity theft that is reaching epic proportions. The FTC found that, every year, almost 10 million people are victims of identity theft, costing consumers US $5 billion and businesses $48 billion. But there’s one place where the rise in computer crimes is paying off: Hollywood. In the 21st century, computer crime–from hacked passwords to identity theft–is the stuff of celluloid dreams.

This year in the movie "Firewall," Harrison Ford made security engineers into heroes when he portrayed Jack Stanfield, a banking brainiac whose firewall system becomes a sticking point for a gang of ruthless baddies. Ford gets told to transfer $100 million into a crook’s account–or his family gets it. Of course, Harrison manages to save the bank–and the day–but a larger question looms: can computer crimes be sexy?

Hollywood has been playing this game for decades, but the first–and still most influential – computer crime movie came in 1983 with "War Games." Matthew Broderick plays a teen geek (and future icon for generations of hackers) who nearly starts World War III after launching a thermonuclear war game between the U.S. and Russia. Oops! Twelve years later, Sandra Bullock chased down her own identity thieves in the shlocky thriller, "The Net." Since then, terrible movies, from "Hackers" (teen geeks battle evil computer virus!) to, yes, "The Net 2.0" (tagline: "No. Money. No. Identity. No. Way Out.”) have combed this brave new world.

But the reality of cybercrime is more intriguing than these slapdash films could imagine. Consider the real-life Bonnie and Clyde of spyware. Michael and Ruth Haephrati seemed like any dot-com wannabes. The young married couple, living in London, operated an Internet security firm called Target Eye. But when the two were taken into custody last May, it turned out they were targeting more than anyone suspected. The Haephratis are accused of being the masterminds behind one of the biggest cases ever of commercial espionage; they allegedly pawned services to help some of Israel’s biggest companies infiltrate each other’s inner workings. Their weapon of choice: spyware.

For years, spyware–insidious software that secretly installs itself on a computer and then logs and disseminates a user’s activity–and its dirty cousin, adware, which unleashes unwanted pop-ups, have been a growing nuisance online. The National Cyber Security Alliance has reported that 80 percent of home surfers have had spyware or adware on their computers. Infection is so widespread that there are now Web sites devoted to chronicling spyware horror stories.

The case of the Haephratis reveals just how sophisticated spyware has become. “This marks the appearance of custom-coded spyware that’s targeted for a specific purpose,” says Kurt Opsahl, staff attorney for the Electronic Frontier Foundation, the San Francisco-based civil liberties group, “unlike malicious code [such as viruses and worms] it is designed to be surreptitious.”

The government is stepping up its fight against spyware. The U.S. House of Representatives passed two anti-spyware bills, which could send spyware peddlers to prison for up to five years or face $3 million in fines. But the ultimate protection is to download and update anti-spyware software such as Ad-Aware or Spybot Search and Destroy. Experts suggest shelling out the extra cash for programs that automatically monitor spyware invasions.

Ironically, the rise of interest in Hollywood cyber-drama hasn’t created a boom in consumer awareness. It’s one thing to fall for a phishing scam, which can be avoided easily enough by simply calling a financial institution before submitting private financial information online, but other forms of electronic identity theft are not as easy to protect against. Subscribers who typed in the Web address of the New York City-based Internet service provider, Panix, were stealthily redirected to a dummy site in Australia; once there, the site attempted to lure visitors into submitting compromising personal data. Known as pharming, this insidious spin-off of phishing can be exacted via viruses, such as the notorious Banker Trojan, or hacker exploits of firewall servers. “This could rapidly worsen as attack systems become more automated,” says Peter Cassidy, secretary general of the Anti-Phishing Work Group, an association of business and law enforcement organizations.

Sometimes, however, identity theft doesn’t rely on the consumer’s role at all. Such was the case last year when MasterCard International revealed that names, accounts, and security codes of 40 million customers had been compromised by a hacker attack; of these, 68 000 customers were deemed to be at particularly high risk. What to do? Exercise good online hygiene by downloading browser security patches and by running both firewalls and anti-virus software. Make sure everything is up to date. And don’t get lulled into thinking that cybercrime only happens in the movies.

PROTECT YOURSELF - before it's too late and you can't afford to.
+0
1


facebook
Like us on Facebook!