[X]
Feedburner count

4
Helpful
Votes

Part II: Preventing Identity Theft Informative - Part II: Preventing Identity Theft

Review by MRM on 2007-09-13
VIRGINIA -- Three years ago, I was checking my credit card statement online and notice there were fraudulent activites appearing on the card. I immediately called the card company and they immediately resolved the issue. The credit card that I used wasn't lost or stolen, but how did thief was able to purchase goods online without having the card, physically, in their hand? Answer: they use keylogging software to capture the victim's keystroke as they type in their personal information online websites. How does keylogging program works? First the victim visits a website that is filled malicious codes and spywares. When the victim visits a malicious website, a program is, unknowingly, installed on their computer. When the victim begins typing, the keylogging program captures the keyboard stroke and the captured information is sent to the thief's location that is on the other side of the world. Then the thief would use captured keystroke for criminal activites such as buying goods online or reading victim's email.

Ways to prevent identity theft while shopping online:

● Install a firewall program.
● Install a program called CCleaner which deletes private information.
● If you need to enter personal information, such as home address or credit card number, I highly recommend a program called AI Roboform which automatically fills out a website or online forms with your personal information, thus eliminating the need to use the keyboard. Without having to use the keyboard to fill out the personal information, the keylogging program cannot capture any keystrokes. It has been three years ago since I was victim of identity theft and three years since Ive used this great program and have never been a victim since. Please see my review on "AI Roboform".

Please add tips or advice that I may have forgot to mention with the readers.
Comments:5 Replies - Latest reply on 2007-09-14
Posted by Principissa on 2007-09-13:
Another great review. Like I said in the last post, when shopping online we use a pre-paid Visa card. It has the CVC number on the back, and the would be thief would not be able to use any of the funds once they were spent. Especially if you only load the amount of purchase on the card. Now the thief has no money, a gift card number instead of your credit card and personal information, and you are not stuck fighting with the credit card companies and your bank to reverse charges that were not yours. We also use it for groceries and going out to dinner. It's free to put money on it, and the card itself is only a few bucks and can be purchased at most stores as well as your bank.
Posted by Anonymous on 2007-09-13:
I use CCleaner all the time but a keylogger won't be affected by it. What's needed is a true spyware detector such as SpyWareDoctor. Adware or Spybot may not detect keyloggers. The best firewall is in your router. Most people know nothing about a firewall or even how to configure it.

MRM Keep up the good work.
Posted by MRM on 2007-09-13:
No Adware or or any kind of anti-spyware program will detect keylogging or other aggressive malwares. If I know that if I had any kind of malwares or viruses on my computer, I would format my harddrive and re-install Windows.
Posted by Anonymous on 2007-09-14:
The really good anti-spyware applications will find keyloggers. But there are also applications that can list all programs running which is another good way to find out.
Posted by Anonymous on 2007-09-14:
When using a laptop you should encrypt all your data. Laptop can be replaced, personal and/or confidential data cannot be replaced.

I use PGP disk to encrypt all my data.

When you delete data, it can be recovered.

Department of Defense – DoD 5220.22-m required 3 passes.

I use PGP wiping for all deleted files. It supports up to 28 passes using AES 256bits.

Your Name:
(displayed with your comment)
Your E-mail:
(required)

Your Experience/Advice:
Check spelling


By clicking submit you agree that you have read and accept the Terms of Service & Privacy Policy.


Note: All comments are reviewed by a moderator before being published. Please be sure to read our guidelines before commenting.