IT Librarian

Menu
  • Home
  • Categories
    • World of Computers
    • Computer Hardware
    • Input/Output
    • Software System
    • Word Processing
    • Spreadsheets
    • Networks
    • Internet and the World Wide Web
    • Computer Security
  • About Us

IT Librarian

  • Home
  • Categories
    • World of Computers
    • Computer Hardware
    • Input/Output
    • Software System
    • Word Processing
    • Spreadsheets
    • Networks
    • Internet and the World Wide Web
    • Computer Security
  • About Us
Tags:
  • internet,
  • safety,
  • safe search,
  • safe surfing,
  • internet safety

Identity Theft and Posers

Details
Written by Fem Bartolome
Published: 15 December 2016
Hits: 723

What we have mentioned on the introduction about how the internet helps everything be easier--even shopping is now possible online.

 

Facebook groups have emerged where users can buy and sell stuff through online transactions. The vulnerability of this set up is the tendency of having a case of identity theft.

 

Identity theft is any kind of deception, scam, or crime that results in the loss of personal data, including the loss of usernames, passwords, banking information, credit card numbers, Social Security Numbers and health ID’s, that is then used without your permission to commit fraud and other crimes.

 

If you don’t want anyone using your photo, your name and other details deceiving other people and having the responsibilities fall on your shoulders then you should consider doing the following:

 

  • Limit your audience

    • Set your Instagram photos to private, your Facebook posts, pictures and friends list to private

    • This will enable you to control and know the people with whom you share your personal information

  • Watermark your photos

    • You can always put the link to your original and official account on your photos most importantly on your display photos which show your face

  • Do not post ID cards online

Phishing

Details
Written by Fem Bartolome
Published: 14 December 2016
Hits: 733

 

What is a phishing (pronounced similarly as "fishing") site?

 

According to Yahoo! Safety:

           A phishing website (sometimes called a "spoofed" site) tries to steal your account password or other confidential information by tricking you into believing you're on a legitimate website.

 

Sample scenario:

A (phishing) site poses as an online banking portal requiring the visitor (victim) to enter their online banking details. After pressing the Login button, the website displays a message saying that "Your request cannot be processed. Site is undergoing maintenance"

The victim waits for a few moments to try again only to receive the same message over and over. Finally, the victim decides to use an ATM only to find out that his/her account has been wiped clean and all of his/her hard-earned money is now gone.

That is how most phishing sites operate. They copy a legitimate site's layout and trick the users into keying in their personal accounts.

 

How do I avoid being a victim?

Number 1: Double-check the URL

o  Make sure that you know where you're supposed to be and make sure that you are actually where you're supposed to be

 

Number 2: pro-tip: Try to mistype your password on purpose to check if the site is actually verifying your details or would simply accept anything you’d key in to it.

More Safety Tips

Details
Written by Fem Bartolome
Published: 14 December 2016
Hits: 751

Sometimes, the things you see on the internet are not true. Yes, people deliberately publish fraudulent content on the internet. It may be news articles, promo sites, or a person's profile. Why? We may never know. But to help users be free from being victims of fraud, here are some tips for you:

 
  • Do not assume that everything you read on the internet is true. If an offer online seems too hard to believe, then don’t believe it (as is shown on the first page of this topic). Eye-catching offers or ads may tempt you to click their links. In some cases in the news department, a headline may deliberately be written with a meaning opposite to its content so as to create an intriguing effect on readers.

 Img from https://i.guim.co.uk/img/static/sys-images/Guardian/Pix/audio/video/2013/8/29/1377792199425/The-Onion-at-25-010.jpg?w=700&q=55&auto=format&usm=12&fit=max&s=d6e58e9d111fecf9f6cddd7ddbd1fd38

 

  • Never provide information if the people requesting the data conceal their identities. If you need to disclose information on the internet, make sure that the site is reliable. If you think that the site is not reliable, leave it immediately.
  • Img from http://technofaq.org/wp-content/uploads/2016/01/online-scam.jpg
  • Do not give out personal information, especially credit card numbers and banking info, without knowing who is asking for it. This applies most to online shopping. Be sure to check if your seller is genuine to prevent yourself from being scammed.

 

  • Report fraud immediately to authorities of the site (if there are any). Spam emails or troll comments may be reported to their respective social media authorities. You may also block such sites or users that promote fraud.

    Img from http://www.stopfraudcolorado.gov/sites/default/files/15OAG010_S1-Report-Fraud-Button_600x300.png

 

 

Source: Hofstetter, Fred T., Societal issues, Internet literacy, 2007

Beware of the Internet

Details
Written by Fem Bartolome
Published: 14 December 2016
Hits: 1582

So you've figured out how to access the Net. Congratulations!

 

 

You've probably signed up for a social networking site account (even if you're only supposed to when you're already older than 13)  and are ready to take on the big bright beautiful world of the internet.   

 

There are a lot of things that the internet makes easy for us—it makes communication easier, homework help more accessible and even shopping, faster.

 

However, the internet also makes it easier for unscrupulous individuals to get to their next victim.

So, in order for you to maximize the benefits of using the internet and to protect yourself, your family and the community from these online predators, here are some of the common online threats and tips on how to avoid falling victim to any of them.

 

Things to be aware of:

· Phishing Sites

· Identity Theft and Posers

· False News

Internet Safety Tips

Details
Written by Fem Bartolome
Published: 14 December 2016
Hits: 616

So you've figured out how to access the Net.

Congratulations.

You've probably signed up for a social networking site account (even if you're only supposed to when you're already older than 13) ☺ and are ready to take on the big bright beautiful world of the internet.   

 

There are a lot of things that the internet makes easy for us—it makes communication easier, homework help more accessible and even shopping, faster.

 

However, the internet also makes it easier for unscrupulous individuals to get to their next victim.

So, in order for you to maximize the benefits of using the internet and to protect yourself, your family and the community from these online predators, here are some of the common online threats and tips on how to avoid falling victim to any of them.

 

Things to be aware of:

· Phishing Sites

· Identity Theft

· Posers

· False News

 

· Adult Sites (tips for parents for their children's safety)

  1. Ignored
  2. Clicked
  3. Are you safe?

TechCrunchIT

  • Pivotal Software closed up 5% following IPO, raised $555 million
    Stock market investors showed lukewarm enthusiasm for Pivotal Software’s debut on Friday....
  • Kubernetes and Cloud Foundry grow closer
    Containers are eating the software world — and Kubernetes is the king of containers. So if...
  • Stripe debuts Radar anti-fraud AI tools for big businesses, says it has halted $4B in fraud to date
    Cybersecurity continues to be a growing focus and problem in the digital world, and now Stripe is...
  • Cloud Foundry Foundation looks east as Alibaba joins as a gold member
    Cloud Foundry is among the most successful open source project in the enterprise right now....
  • Cloud.gov makes Cloud Foundry easier to adopt for government agencies
    At the Cloud Foundry Summit in Boston, the team behind the U.S. government’s cloud.gov...
  • You are here:  
  • Home
  • Categories
  • Articles
  • 09 Internet Safety

Latest

  • Improving your Computer
  • Beware of the Internet
  • Word Processors vs Text Editors
  • Communication Inside the System Unit
  • The System Unit

Most Read

  • Beware of the Internet
  • Input Devices: A Closer Look
  • Are you safe?
  • Internet Myths
  • Internet FAQs

Categories

  • 01 Introduction

  • 02 Computer Hardware

  • 03 Input/Output

  • 04 Software System

  • 05 Word Processing

  • 06 Spreadsheets

  • 07 Networking

  • 08 Internet and the World Wide Web

  • 09 Internet Safety

  • 10 Computer Security

Copyright

Copyright © 2018 IT Librarian. All Rights Reserved.
Joomla! is Free Software released under the GNU General Public License.