Skip to main content

Home/ Digiteen/ Group items tagged theft

Rss Feed Group items tagged

Vicki Davis

New ID theft targets kids' Social Security numbers | Washington Examiner - 3 views

  • The latest form of identity theft doesn't depend on stealing your Social Security number. Now thieves are targeting your kid's number long before the little one even has a bank account.
    • Jillian N
       
      People are stealing not adults social security numbers but kids even before they have bank accounts
  • "If people are obtaining enough credit by fraud, we're back to another financial collapse," said Linda Marshall, an assistant U.S. attorney in Kansas City. "We tend to talk about it as the next wave."
  • Online companies use computers and publicly available information to find random Social Security numbers. The numbers are run through public databases to determine whether anyone is using them to obtain credit. If not, they are offered for sale for a few hundred to several thousand dollars.Because the numbers often come from young children who have no money of their own, they carry no spending history and offer a chance to open a new, unblemished line of credit. People who buy the numbers can then quickly build their credit rating in a process called "piggybacking," which involves linking to someone else's credit file.Many of the business selling the numbers promise to raise customers' credit scores to 700 or 800 within six months.If they default on their payments, and the credit is withdrawn, the same people can simply buy another number and start the process again, causing a steep spiral of debt that could conceivably go on for years before creditors discover the fraud
  • ...2 more annotations...
  • A "clean" CPN is a number that has been validated as an active Social Security number and is not on file with the credit bureaus. The most likely source of such numbers are children and longtime prison inmates, experts said.
  • "Those are the numbers criminals want. They can use them several years without being detected," Damosi said. "There are not enough services that look at protecting the Social Security numbers or credit history of minors."
  •  
    The new Identity theft steals children's social security numbers before they have bank accounts.
  •  
    This article is very interesting and I didn't know why people try to take little kid's social security numbers before i read this article.( this may be caused by the recent econimical failure in the past years.) Isn't it illegal for businesses to sell card numbers though?
Johnny H

Fair use and theft | Kris Straub | humor scientist - 0 views

  •  
    "The reason why eBaumsworld gets away with so many video thefts is that there's no way to search for a video or picture if it doesn't have associated text you could search for." I think that every video and picture should have associated words so no they could not take the video and take credit for it.
WestR WHSB

Photography Copyright Protection: Online Resources ‹ Photography business ins... - 0 views

  •  
    Protection of copyrighted photographs  "Yes, getting your work online exposes you to risk of theft." "Shut everything down and only share images when asked directly by a potential client. This is obviously a really bad idea," -understand rights to your works -prevent theft of your works by knowing what to do if someone steals
Valerie B.

How to Protect Yourself from Online Fraud and Identity Theft - 1 views

  •  
    How to Protect Yourself from Online Fraud and Identity Theft
James D

digiteen2008 - Digital Rights and Responsibilities - 1 views

  • Cyber-bullying is a growing problem that has torn many families apart. Some kids have actually gone as far as committing suicide
  • . Most adults are expected to show responsibiliy and follow the law while on the web.
  • extended to every digital citizen.
  • ...7 more annotations...
  • There is a basic set of rights
  • Many of their toys involve the use of the internet, and as children they may not know how to use the internet responsibly.
  • nternet is becoming a bigger and bigger part of the peaople of todays way of life this means that everybody has to contribute to keeping it safe and fun and easy to use.
  • Nine out of ten students get bullied on the web.
  • Identity theft is a crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, usually for profitable gain.
  • The internet as a whole is a privilege.
  • Our responsibility as digital citizens is to stop identity theft, and other harmful things on the internet. Here are some steps into stopping identity theft. - Keep all identification and financial documents in a safe and private place. - Check your credit reports annually - Don’t carry around credit, debit, or ATM cards you don’t need. - Update virus protection software periodically
  •  
    stuff
  •  
    james
Ahmed Kiyoshi El Maghraby

Case of stolen online identity - Technology - smh.com.au - 1 views

  • is daughter was among those who received the fake appeal and alerted him. The Balmain resident tried to log in to his Facebook account to see what was happening but couldn't.
  • "It said my email wasn't registered," he says.
  • Identity theft and scams on social networking sites, though, are not uncommon occurrences.
  • ...5 more annotations...
  • "ID theft has existed in both the online and physical world for some time."
  • Some users have their identity compromised via phishing sites that fool them
  • he threats to users on social networking sites
  • Other users click an email or website link that leads them to a web page that installs malicious software
  • criminals become "friends" and check a user's profile in the hope of guessing a password.
October H

Spyware, Trojans, Hackers & other PC Threats | Comodo - 0 views

  •  
    Online shopping, online banking and general storage of personal information on personal computers have made consumers more vulnerable to identity theft than ever before."
  •  
    This is about how hackers can know where you live, what your banking is done, etc. All this is found by using Trojans,Hackers, and Spyware.
Callie S

ID Theft & Fraud | StaySafeOnline.org - 0 views

  • Ways to Prevent Cybercrime Many cybercrimes start with malware. Criminals use malware to steal personal information and commit fraud. Avoid malware with these STOP. THINK. CONNECT. Tips: Keep a clean machine: Having the latest security software, web browser, and operating system are the best defenses against viruses, malware, and other online threats. Automate software updates: Many software programs will automatically connect and update to defend against known risks. Turn on automatic updates if that’s an available option. Protect all devices that connect to the Internet: Along with computers, smart phones, gaming systems, and other web-enabled devices also need protection from viruses and malware. Plug & scan: “USBs” and other external devices can be infected by viruses and malware. Use your security software to scan them. Protect your $$: When banking and shopping, check to be sure the sites is security enabled. Look for web addresses with “https://” or “shttp://”, which means the site takes extra measures to help secure your information. “Http://” is not secure. Back it up: Protect your valuable work, music, photos, and other digital information by making an electronic copy and storing it safely.
  •  
    Malware is one way criminals steal personal information. To make sure you can avoid malware and be safe you should use these tips.
Summer T

Protecting your information teenagers.ashx (application/pdf Object) - 0 views

  •  
    Personal information is disclosed to, and used responsibly by, many legitimate online businesses to conduct business and online social interactions. However, if not managed carefully, it is possible for personal information to be accessed and misused for marketing, identity theft or for cyberbullying or cyberstalking.
  •  
    Parents watch what your teens put online because other teens or older people could be stalking your child.
Steve Madsen

LimeWire 'induces' copyright theft - 2 views

  •  
    "A US judge has ruled in favor of 13 music companies in a copyright case against popular online file-sharing service LimeWire."
  •  
    the evidence establishes that LimeWire users directly infringed plaintiffs' copyrights, and that LimeWire engaged in purposeful conduct intended to foster that infringement
Hayes G.

"Internet Scams, Identity Theft, and Urban Legends: Are You at Risk?" - 0 views

  • being smart is NOT enough to protect yourself from dangerous Internet scams, frustrating spam, or devious identity theft
Callie S

11 Ways to Stay Safe Online & Protect Your Privacy - FindLaw.com How-To - FindLaw Insider - 0 views

  • 11 Ways to Stay Safe Online & Protect Your Privacy By Nerissa Sardi on September 1, 2009 2:25 PM | No TrackBacks Nearly everyone is using the internet these days to find information or connect with others. But surfing the web can still sometimes feel like the Wild West. Despite technological advances to help reduce the risk of identity theft, becoming the victim of an internet scam or having your privacy invaded is a persistent threat. And, as a number of recent incidents involving social networking websites have shown us, it can even be fatal Keeping your guard up is essential to avoid trouble on the internet. Here are eleven tips from FindLaw.com to help you stay safe online: 1. Be careful who you give your information Avoid giving out personal information such as your name, address, telephone number or other personal information on websites until read and understand their privacy policy. For example, be on guard for online promotions or contests in which you may be asked to provide details about yourself. This information could be used to market to you in the future. Never give out your Social Security number or passwords online, unless you are certain the site is secure. 2. Know you're being watched Be careful of the e-mails you send and the websites you visit while at work. In most U.S. states, employees are exempt from protection by employers who may be monitoring e-mails and internet use while on the job. 3. Don't reply to spamEver get one of those strange, unexpected e-mails for real estate, weight loss, work-at-home or investment opportunities? Your best bet is to delete those e-mails without opening them. Never reply to these e-mails, even to request they remove your name from their lists. Replying will alert the sender that your e-mail is a "live" e-mail attached to an actual person.  4. Use secured websites Before you purchase a product or service online with a credit card, make sure the connection is secure or encrypted. Look for a small lock icon on the website, or look at the URL address line; a secure connection will begin with https:// ("s" for secured) instead of http:// 5. Beware of public wireless accessDon't send personal or confidential information when using public wireless connections in cafes and other public places. Fellow wireless users could potentially monitor what you are doing only a few feet away. 6. Think before you post Avoid revealing personal information or photos on websites such as Facebook, MySpace or SecondLife. Personal or embarrassing information and images can haunt you in years to come like when you are applying for college or a new job. If it's on the internet, it's available for a potential employer, your school, a future or current spouse, your mother or grandmother to find it. 7. Don't trust your friends A number of recent incidents involving "sexting" demonstrate, sending photos of yourself in the nude or in compromising positions could not only be extremely embarrassing when a partner or ex-partner starts to share those photos with his or her friends, but it also could be illegal. 8. Beware of classified listing meet-upsWhen using websites such as Craigslist or Freelist to buy or exchange goods locally, always bring someone you trust with you to meet the seller/buyer. Be cautious about letting strangers into your home or meeting in unsafe places 9. Watch your cookies Cookies are tidbits of information that websites store on your computer. Some cookies are useful, such as those that store information about you so you don't have to retype info every time you go to that site. Other cookies are used to track your motions through a website. Some companies keep this data for their own usages - however, some sell your information to other marketers. You can monitor and edit the cookies on your computer through your browser. 10. Use anti-spyware Spyware is sneaky software that rides its way onto computers during the download of screensavers, games, music and other applications. Spyware sends information about what you're doing on the internet to a third-party, usually to target you with pop-up ads. Anti-spyware will help block this threat. 11. Monitor your kids' internet useMove computers out of the bedroom and into family space where parents and others can check on your child's internet use by simply walking by. Set specific times that your child may surf the web, and set rules about social media websites, such as Facebook, My Space and Twitter.
  •  
    If you follow these 11 rules you will be safer on line and your identity will be more protected.
Callie S

Tips on how to stay safe online - South Florida Sun-Sentinel.com - 0 views

  • General security Don't use public or shared computers for online banking or investment transactions. Don't give out your account password to anyone, even someone claiming to be from your online service. Your account can be hijacked, and you can find unexpected charges on your bill. Be careful about giving out your credit card number, phone number and home address. Never provide your Social Security number to anyone unless required by law. Email is relatively private -- but not completely. Don't put anything into an electronic message that you wouldn't want to see posted on a neighborhood bulletin board. Delete junk email without even reading it. Never download an email attachment from an unknown source. Opening a file could expose your system to a virus. Be cautious about opening any attachment or downloading any files from emails you receive, regardless of who sent them. These files can contain viruses or other software that can weaken your computer's security. Don't "unsubscribe" on unwanted, un-requested or unsolicited e-mail. That just lets the senders know that they had reached a valid email address. Don't sign up for free offers. Shopping online Know who you're dealing with. Confirm the online seller's physical address and phone number in case you have problems. Know what you're buying. Read the seller's description of the product closely, especially the fine print. Name-brand items at unusually low prices might be stolen or counterfeit. Know what it will cost, including shipping and handling. Never send cash. Pay by credit or charge card. If you pay by credit or charge card online, your transaction will be protected by the Fair Credit Billing Act. Under this law, you have the right to dispute charges under certain circumstances and temporarily withhold payment while the creditor is investigating them. Check out the terms of the deal, like refund policies and delivery dates. A Federal Trade Commission rule requires sellers to ship items as promised or within 30 days after the order date if no specific date is promised. Phishing and identity theft You may receive emails that appear to be from a financial institution, bill paying service, government agency or other business that say something like: "We suspect an unauthorized transaction on your account. To ensure that your account is not compromised, please click the link below and confirm your identity." Do not reply, and do not click on the links. The messages direct you to a website that looks legitimate, but it is a trick to get you to reveal personal information and passwords. Operators can steal your identity and run up bills or commit crimes in your name. Forward these emails to the Federal Trade Commission at spam@uce.gov and to the company, bank, or organization impersonated in the email. Most organizations have information on their websites about where to report problems. Email is not a secure method of transmitting information, so never use it to transmit financial information. Legitimate businesses should not ask you to send sensitive information by email. Area codes can mislead. Some scammers send an email that appears to be from a legitimate business and ask you to call a phone number to update your account or access a "refund." Because they use voice over internet protocol technology, the area code you call does not reflect where the scammers really are. Review credit card and bank account statements as soon as you receive them to check for unauthorized charges.
  •  
    Here are tips to ways to protect your general security,identity, and yourself when shopping online. If you follow these simple rules you will be safer when online.
Alex r

Individual Awareness - 1 views

  •  
    Individuality on a computer
Vicki Davis

FOXNews.com - Cyberbullying: Parents, Tech Companies Join Forces to Keep Kids Safe - Sc... - 1 views

  • An ex-friend’s mother faces charges in federal court as a result, and Missouri has made Internet harassment a crime.
  • Cyberbullies often commandeer e-mail accounts and social-networking profiles, attacking kids while pretending to be someone they trust, like a best friend. They use cell phones and the Web to spread embarrassing and cruel material, and they can harass their victims well beyond the schoolyard -- even when they're "safe" at home.
  • 85 percent of 5,000 middle-school students surveyed said they had been cyberbullied. Only 5 percent of them said they’d tell someone about it.
    • Vicki Davis
       
      This is important research to share.
  • ...10 more annotations...
  • Fake profiles and anonymous screen names are used in 65 percent of cyberbully attacks,
  • she went to a mental-health clinic
  • assuming that if they haven’t received a death threat or had a picture of their face posted on a naked body on the Internet, they haven’t been bullied.
  • They think that’s just part of online life,
  • Aftab said she knows of three other teens who have committed suicide after cyberbullying attacks, and that the problem is on the rise.
  • Cyberbullying peaks in 4th and 7th grade
  • 4th graders are especially into blackmail and threatening to tell friends, parents or teachers if the victim doesn’t cooperate.
    • Vicki Davis
       
      This is essential to discuss in 4th and 7th grades as this says these are the places where this happens most.
  • The most outrageous recent way is through theft of a cell phone for a few minutes," Aftab said. "If your kids leave their cell phone unattended or accessible in their backpack, the cyberbully will take it and send a bunch of bad text messages or reprogram it.”
    • Vicki Davis
       
      Taking cell phones is part of cyberbullying.
  • “This whole password thing freaks people out ... but a good password doesn’t have to be hard to remember, just hard to guess,” Criddle said. “Friends don’t ask friends for passwords.
    • Vicki Davis
       
      Friends don't ask friends for passwords, that is an important thing to share!!
  • October as National Cyber Security Awareness Month,
    • Vicki Davis
       
      October - National Cyber Security Awareness Month
  •  
    Important article about cyberbullying and some recent legislation.
  •  
    Excellent article on cyberbullying and an example of a girl who was harrassed online and killed herself. This sort of thing is tragic and we should consider what we think aboutinternet harrassment penalties, particularly against children. There are mention of several websites including one I'd never heard of called CyberBully Alert.
Dylan Cochrac

Internet safety - Wikipedia, the free encyclopedia - 0 views

  • Internet. safety or online safety is the security of people and their info when using the Internet.
  •  
    "Internet safety or online safety is the security of people and their info when using the Internet. Numerous groups, Internet sites and governments have expressed concerns over the safety of children using the Internet. In the UK the Get Safe Online campaign has received sponsorship from government agency SOCA and major Internet companies such as Microsoft and eBay. Several crimes can be committed on the Internet such as stalking, identity theft and more. Most social networking and chat sites have a page about safety."
  •  
    Internet safety overview
Liz Luby

Fake Social Network Profiles: a New Form of Identity Theft in 2009 - ReadWriteWeb - 0 views

  • identity hijacking
  • We've already seen some high-profile examples of people creating fake online personas over the past year, the most notable case being that involving Lori Drew and MySpace. In this instance, a mother created a fake online identity to bully her daughter's rival
  • To test their prediction, his team was able to set up fake online identities which ended up connecting to the real network of friends and acquaintances easily.
Maggie B

Nine Elements - 3 views

  • one has the opportunity to communicate and collaborate with anyone from anywhere and anytime. Unfortunately, many users have not been taught how to make appropriate decisions when faced with so many different digital communicatio
  • communicate with other people. In the 19th century, forms of communication were limited. In the 21st
  • Digital Citizenship
  • ...23 more annotations...
  • citizenship can be defined a
  • to create rules and policy, we must teach everyone to become responsible digital ci
  • ic standards of conduct or procedure. Technology users often see this area as one o
  • l uncomf
  • oral goods and services are surfacing such as pornography and gambling. Users need to learn about how to be effective consumers in a new digital economy. 
  • t economy is being done electronically. Legitimate and legal exchanges are occurring, but the buyer or seller need
  • n electronic society. All people should have fair access to technology no matter who they are.  Places or organizations with limited connectivity need to be addressed as well.  To become productive citizens, we need to be committed
  • norms of appropriate, responsible behavior with regard to technology use. 
  • 1.   Digital Access:   full electronic participation in society. Technology users need to be aware of and support electronic access for all to create a foundation for Digital Citizenship.
  • s the
  • We need to have virus protection, backups of data, and surge control of our equipment. As responsible citizens, we must protect our information from outside forces that might cause disruption or harm.
  • 2.   Digital Commerce:   electronic buying and selling of goods. Technology users need to understand that a large share of marke
  • 3.   Digital Communication:   electronic exchange of information.
  • One of the significant changes within the digital revolution is a person’s ability to
  • offer a wide variety of choices (e.g., e-mail, cellular phones, instant messaging).  The expanding digital communication options have changed everything because people are able to keep in constant communication with anyone else.
  • n options.
  • 4.   Digital Literacy:   process of teaching and learning about technology and the use of technology. While schools have made great progress in the area of technology infusion, much remains to be done. A renewed focus must be made on what technologies must be taught as well as how it should be used.
  • 5. Digital Etiquette:   electron
  • 9.   Digital Security (self-protection):   electronic precautions to guarantee safety.
  • Digital
  • Digital Law:   electronic responsibility for actions and deeds
  • Digital Rights & Responsibilities:   those freedoms extended to everyone in a digital world
  • Digital Health & Wellness:   physical and psychological well-being in a digital technology world.
  •  
    Most people make the wrong health decisions. When they make these decisions, they mess up their whole life. Online health is the same. If you mess up there, you mess up your life.
  • ...2 more comments...
  •  
    "Nine Themes of Digital Citizenship Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use. 1. Digital Etiquette: electronic standards of conduct or procedure. Technology users often see this area as one of the most pressing problems when dealing with Digital Citizenship. We recognize inappropriate behavior when we see it, but before people use technology they do not learn digital etiquette (i.e., appropriate conduct). Many people feel uncomfortable talking to others about their digital etiquette. Often rules and regulations are created or the technology is simply banned to stop inappropriate use. It is not enough to create rules and policy, we must teach everyone to become responsible digital citizens in this new society. 2. Digital Communication: electronic exchange of information. One of the significant changes within the digital revolution is a person's ability to communicate with other people. In the 19th century, forms of communication were limited. In the 21st century, communication options have exploded to offer a wide variety of choices (e.g., e-mail, cellular phones, instant messaging). The expanding digital communication options have changed everything because people are able to keep in constant communication with anyone else. Now everyone has the opportunity to communicate and collaborate with anyone from anywhere and anytime. Unfortunately, many users have not been taught how to make appropriate decisions when faced with so many different digital communication options. 3. Digital Literacy: process of teaching and learning about technology and the use of technology. While schools have made great progress in the area of technology infusion, much remains to be done. A renewed focus must be made on what technologies must be taught as well as how it should be used. New technologies are finding their way into the work place that are not being used in schools (e.g., videoconfer
  •  
    9 elements to digital citizenship
  •  
    In order for students to be achieve digital citizenship, we must know how to communicate properly.
  •  
    Nine Themes of Digital Citizenship Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use. 1. Digital Access: full electronic participation in society. Technology users need to be aware of and support electronic access for all to create a foundation for Digital Citizenship.
Callie S

Online Safety - 0 views

  • How could we live without the Internet?
  • Smart Surfing First rule of smart surfing? Remain as anonymous as possible. That means keeping all private information private. Here are some examples of private information that you should never give out on the Internet: full name home address phone number Social Security number passwords names of family members credit card numbers Most credible people and companies will never ask for this type of information online. So if someone does, it's a red flag that they may be up to no good.
  •  
    safety and security
  •  
    How could we live without the internet? The internet plays a big role in our lives. Teens surfing the internet is a big problem now days because they are looking at things that they don't need to be looking at. Quotes: 'But besides the millions of sites to visit and things to do, the Internet offers lots of ways to waste time - and even get into trouble. And just as in the non-cyber world, some people you encounter online might try to take advantage of you - financially or physically.' From the Website.
  •  
    educational website for teens, parents and kids
1 - 20 of 24 Next ›
Showing 20 items per page