How To: Keep Your Identity Safe Online

We live in a time when using computers for purchases, bill paying, and banking are becoming more and more the norm. Broadband and constant, fast connectivity are the accepted standards. Given justhow much computers are a part of our daily lives, you should find a couple of recent pieces of news very disturbing.   A government survey in the U.K. found that 12% of respondents had sufferedfrom online fraud in 2006, yet fewer than half of the respondents believed they should be responsible for protecting their personal information online.   The other item was a story in theNew York Times that stated thousands of Social Security numbers are posted online by states and counties. Of course, along with them you often findaddresses, dates of birth, and maiden names. It’s like offering someone’s identity on a platter to thieves.   This pair might be unrelated, but taken together they highlight the growing problemof keeping yourself secure online. In spite of those survey results, protecting personal information should be a vital issue for anyone using a computer. Criminals are becoming more sophisticated,which means the defenses have to be constantly improving.   We assume we’re doing everything possible to safeguard ourselves and our identities, but as these stories show, a significant part ofthe online population is doing no such thing. So, perhaps it’s worthwhile to start by recapping the most obvious precautions.   The Basics of Online Security   Make sureyou have a firewall and that’s it’s properly configured. There are manyavailable, both free and paid, stand-alone or part of a package with anti-virus software.   Use anti-virus software (again, paid or free, like Trend Micro PC-Cillian Internet Security); updateand run full scans regularly. You should also have anti-spyware installed on your computer, and, once again, check it often.   Make sure you don’t use the same password for all accounts. Createyour passwords from a mix of letters and numbers, which makes them far less easy to hack.   Do you use a Wi-Fi network at home? Then you’d better set it up properly, with both a firewall and a password, or anyone sitting outside in a car can enter it and hackinto your system.   Use the spam filters in your e-mail client (also worth considering is a filter called Mailwasher, where you can preview your incoming mail and delete items you don’t want tobother with). If you receive obvious spam, don’t open it, and never open attachments that you’re not expecting, even from people you know and trust; their computers might have been hijacked.  Oh, and if you use a Mac, don’t look so smug. You might be largely safe from virus attacks, but malware and adware can still get you, so take all the appropriate steps.   If you believe yourbank account – or any account – has been used without authorization, report it to the bank immediately.       The Biggest Threat   Possibly thebiggest threats to keeping your identity secure are phishing e-mails and pharming. Phishing mails look like e-mails from PayPal, eBay, or a bank. They’re becoming more and more sophisticated, running variations on the basic theme, which is to get you to part with your personal information so thecrooks can access your accounts.   These days they’re very well done, having moved from the obvious to such things as reporting a transaction you know you’ve never made, hoping to panic you intoclicking on the website link and giving your account access details. Do that and your account will either be sold or drained, and probably the first you’ll know about it is when you discover you haveno money.   Pharming is a more insidious beast, and harder to detect. In essence, when you type in a URL, you’re redirected to a fake (but convincing-looking) site. This is done throughrewriting local host files on your computer with a virus like the Banker Trojan, or DNS server poisoning, which can send a lot of people to the fake site without them knowing.   Althoughfirewalls and security suites can blockunauthorized transfers of data, believe it or not, your PC browser can act as phishing protection. Firefox 2 comes with a default phishing filter, which blocksdata from going to known phishing sites. However, as the database is static, you need to check with Google’s constantly updated list (Tools > Options >Security > Check By Asking Google About Each Site I Visit), which should help keep you safer – although you’ll have to accept the agreement first.     
FireFox Screenshot   If you’re one of those who’ve moved to Internet Explorer 7, you’re also in luck.In fact, as you install it, it asks if you want to install the phishing filter. If you haven’t already, you can get in running by clicking Tools > Phishing Filter> Turn On Automatic Website Checking > OK. The new Opera browser, 9.1,will include a similar feature.       Toolbars   These days, it’s not only eBay that has a free toolbar to help protect you fromphishing. Earthlink and AOL are also among those who provide them. They verify every URL you type or web link you click andinform you if the real address is different. You might balk at the thought of adding yet another toolbar, but it’s a worthwhile addition.   Software   Inevitably, there’ssoftware you can buy to store passwords and logins securely, such as Evidence Blaster or My Security Vault. The latter includes a toolbar plug-in and a number of other bells and whistles to make it seem attractive.Whether you want to invest in the software is a personal decision, of course. While it does offer certain advantages (you don’t need to remember all your logins and passwords, for instance), you dohave to pay for it.   My Security Vault Pro
My Security Vault Pro Screenshot       SecurID   There are a number of alternatives beginning to circulate that help protect your online security,although at present they don’t have wide circulation. SecurID is a code device that looks like the remote opening device for your car, except itshows a different six-digit number each minute. When you log into a system protected by SecurID, you enter your usual login, password, and thenumber on the device. If they match, then bingo, you’re given access.   Of course, it’s a system with problems, not the least of which is cost and having to synchronize the code device andserver (can you enter your number in time?). Because of the expense, it’s currently not much of a consumer option (although AOL has offered it as a paid option).   There are some othercontenders, like Grid Guard or Entrust, but to date, no system has emerged as truly viable for mass use.   Pharming Prevention   There’s no single, simple solution toprevent pharming short of purchasing software, such as Norton Confidential or Websense. But the best safeguards are the oldest ones – check the URL of any site asking for your information. If it’s supposed to be secure, make sure it hashttps:// on it. Be certain before you give any information away that the site is exactly what you typed, and that it has a certificate (in IE and some other browsers, click File >Properties, or simply right click with the cursor anywhere on the webpage and select Properties).   Spam   Yes, you need spam filters enabled tohelp keep your computer safe and help reduce or eliminate the possibilities of viruses arriving in e-mails. One excellent filter is Mailwasher. It works with your mail server, just the same as Outlook, Eudora, or whateveryou use. However, you can delete a message, bounce it back (so it appears your address doesn’t exist), and get information on the mail – all without downloading it. You can even preview themail without having to download it.   You can use it on all Windows systems, and there’s a Linux version, although it’s only for POP3 mail accounts, not web-based mail – at least not inthe free version. Mailwasher Pro, which you have to pay for, supports web mail.You can even set it up to check your mail at pre-defined intervals.       Mailwasher
Mailwasher Free   You should also have spam filters set up in your e-mail program. With Outlook, click on Tools > Options, then the JunkE-Mail button, from which you can set the level for junk mail. Other tabs allow you to list safe senders and recipients, as well as block specific senders by e-mail address. It’s not perfect, byany means, but the filters are updated regularly (check online).   There’s also spam filtering software you can buy. For most people, however, it’s probably not necessary to go to such lengthsif you enable spam filters properly and are careful with your mail. Never open an attachment without knowing exactly what it is.     Keeping Your Social Security NumberSecure   If you’re not worried that your Social Security number might be floating around in cyberspace, then you should be. It’s one of the core parts of your identity, and you give itwhenever you apply for credit, or to open a bank account or account of any kind. Although they’re slowly disappearing, there are still many, many Social Security numbers out there.   There’s aspecial search engine you can use, StolenIDSearch.com, which you can use to see if your Social Security number is out there and available for many to see.It’s a fairly new site, but in its first three weeks of operation, almost a quarter of a million people used it. That’s hardly surprising, giving how important a signifier the number is.  Crooks regularly sell and trade them on the internet just like credit card numbers, and in many ways, they’re far more accessible. Of course, if you discover your number is out there, you’ll findthere’s no easy way to have it removed. But at least you’ll know where you stand.   Conclusion   The only certainty is that the battle to keep your identity safe will benever ending. The crooks and scammers continue to become slicker and more inventive, so the solutions have to be more high-tech.   Yet, at the heart of it all, you can do a lot simply by usingyour common sense. Distrust everything until you know otherwise. Use a lot of caution whenever you’re online. It’s an open environment, but as much as that’s a joy, it also means it can be dangerous.Keep all that in mind, take all the precautions, and you should be as safe as anyone can be.

Computing

Don’t be fooled! Study exposes most popular phishing email subject lines

Phishing emails are on the rise and a new study out by the cybersecurity company Barracuda has exposed some of the most common phishing email subject lines used to exploit businesses. 
Computing

Secure your Excel documents with a password by following these quick steps

Excel documents are used by people and businesses all over the world. Given how often they contain sensitive information, it makes sense to keep them from the wrong eyes. Thankfully, it's easy to secure them with a password.
Computing

Reluctant to give your email address away? Here's how to make a disposable one

Want to sign up for a service without the risk of flooding your inbox with copious amounts of spam and unwanted email? You might want to consider using disposable email addresses via one of these handy services.
Computing

How to change your Gmail password in just a few quick steps

Regularly updating your passwords is a good way to stay secure online, but each site and service has their own way of doing it. Here's a quick guide on how to change your Gmail password in a few short steps.
Computing

Problems with installing or updating Windows 10? Here's how to fix them

Upgrading to the newest version of Windows 10 is usually a breeze, but sometimes you run into issues. Never fear though. Our guide will help you isolate the issue at hand and solve it in a timely manner.
Computing

Delete tracking cookies from your system by following these quick steps

Cookies are useful when it comes to saving your login credentials and other data, but they can also be used by advertisers to track your browsing habits across multiple sites. Here's how to clear cookies in the major browsers.
Gaming

Get a head start mastering Apex Legend's newest character Octane with our guide

Apex Legends' newest legend Octane ran so fast in the Titanfall 2 gauntlet that he blew off his legs. Now dropping into Kings Canyon with prosthetics, Octane's ability set is still centered around speed. Here's how to play as Octane.
Gaming

How to share your best gaming moments on the Xbox One and its mobile app

The current generation of consoles make it easier than ever to share your gaming highlights with the world. Here's a quick guide on how you can record a gameplay video on Xbox One.
Gaming

Here's our Champion's guide to picking the best character in Apex Legends

Apex Legends' use of heroes with different abilities helps separate it from other battle royale games. To help you choose your legend, we've put together a legend guide detailing their abilities, strengths, and weaknesses.
Computing

Still miss Windows 7? Here's how to make Windows 10 look more like it

There's no simple way of switching on a Windows 7 mode in Windows 10. Instead, you can install third-party software, manually tweak settings, and edit the registry. We provide instructions for using these tweaks and tools.
Computing

Go hands-free in Windows 10 with speech-to-text support

Looking for the dictation, speech-to-text, and voice control options in Windows 10? Here's how to set up Speech Recognition in Windows 10 and use it to go hands-free in a variety of different tasks and applications within Windows.
Gaming

How to break Posture and deal a Shinobi Deathblow in Sekiro: Shadows Die Twice

Sekiro: Shadows Die Twice is an incredibly difficult game, and managing the Posture system is a key part of improving and tackling the latest From Software title's most challenging sections.
Gaming

Here's where Xur is and what he has for wares this week in Destiny 2: Forsaken

The weekly vendor in Destiny 2: Forsaken always brings Exotic weapons and armor, some of the toughest loot to find in the game. Here's everything you need to know to track down Xur: Where he is, when he shows up, and what he's stocking.
Mobile

This is the easiest way to save your iPhone data to your computer

Living in fear of losing your contacts, photos, messages, and notes on your iPhone? Fear no more -- in this guide, we'll break down exactly how to back up your iPhone to your computer using Apple's iTunes or to the cloud with iCloud.