Identity Protection and More
In this program we take you into the world of hackers, to explain how they operate, the types of information that is vulnerable and the best ways to protect yourself from identity theft.
Hacker reveals how easy it is to steal credit card numbers from thin air … by dailymail – Hacker reveals how easy it is to steal credit card numbers in seconds …. 'RFID payment cards need to be backed by a mobile device that generates … As well as using it in his backpack, Mr Bryan successfully stole numbers by …
If you are carrying a credit card in your wallet or purse that has an RFID chip inserted in it, all the hacker has to do is get close and he/she can get your credit or debit card information. This video shows how it works and what you can do to protect yourself.
How Hackers Can Hack Your Chip-and-PIN Credit Cards by TheHackerNews – October 1, 2015, was the end of the deadline for U.S. citizens to switch to Chip-enabled Credit Cards for making the transactions through swipe cards safer. Now, a group of French forensics researchers have inspected a real-world case in which criminals played smart in such a way that they did a seamless chip-switching trick with a slip of plastic that it was identical to a normal credit card.
Cell phone hacking
Your phone number is all a hacker needs to read texts, listen to calls and track you. by Guardian News – Weaknesses within mobile phone network interconnection system allows criminals or governments to remotely snoop on anyone with a phone. Hackers have again demonstrated that no matter how many security precautions someone takes, all a hacker needs to track their location and snoop on their phone calls and texts is their phone number.
Identity/personal information theft by Spoofing/Phishing attacks
Here the hacker is trying to trick you into willingly providing information. The articles at the links below explains what the hacker is doing and how to protect yourself against the attack:
Spoofing and Phishing
What Is 'Email Spoofing'? How Does Spoofing Work? by LifeWire – The word “spoof” means “falsified”. A spoofed email is when the sender purposely alters parts of the email to masquerade as though it was authored by someone else. Commonly, the sender’s name/address and the body of the message are formatted to appear from a legitimate source, as though the email came from a bank or a newspaper or legitimate company on the Web.
Email Spoofing by TechTarget – Email spoofing is the forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual source. Email spoofing is a tactic used in phishing and spam campaigns because people are more likely to open an email when they think it has been sent by a legitimate source. The goal of email spoofing is to get recipients to open, and possibly even respond to, a solicitation.
What are phishing scams and how can I avoid them? by Indiana University
Hacking an email account
There are many approaches that hackers may use to get access to your email account. The first one here uses vulnerability in Yahoo (which may now have been corrected).
And the one above is only one provider of hacking tools. Here are more:
What to do if your Identity has been stolen
To positively prevent hackers from establishing credit in your name you can contact the three credit reporting agencies, i.e., Transunion, Equifax and Experian (by Internet or phone) and place a credit freeze on your account. You may unfreeze, as necessary. However, any company that is trying to get your credit information while it is frozen will be unsuccessful and will deny credit to the applicant (even you).
Improve your passwords to make it tough for the hacker
The following are very good articles on password creation and protect
How to avoid being hacked like Honan – A tech writer has just had his digital life erased by one or more hackers. Sarah Taylor would like to know what the rest of us should do to avoid a similar fate.
Steps to fix your hacked email address:
This is an interesting video that presents the steps you should take if you feel your email may have been compromised;