Category: Technology

Topics about improving your knowledge in technology and how technology can help you improve your financial life.

  • The Hack at Yahoo: Causes and Possible Consequences

    The Hack at Yahoo: Causes and Possible Consequences

    On September 22nd, 2016 computer magnate Yahoo disclosed information about a hack on their email platform in 2014. ABC news explains how this led to the theft of data from over 500 million accounts. This is particularly worrisome for the company as they were trying to close a sale of $4.8 Billion to Verizon. The fact that it happened over 2 years ago and it is just being reported now raises serious questions about Yahoo’s security. On Thursday’s event, Yahoo has said that evidence from this hack had been concealed very well, hidden from their sight until this July when they found a hacker attempting to sell information of over 200 million Yahoos user accounts. In this article we will cover what may have happened and what will be its consequences.

    “No bank data or payment information was hacked, says Yahoo CEO Marissa Mayer. Details that were taken include names, email addresses, telephone numbers, dates of birth, and passwords”

    What happened?

    So, turns out in 2014 a hacker managed to enter Yahoo’s network and managed to steal data from over 500 million accounts. According to Yahoo they believe it was a “state-sponsored” hacker, meaning a foreign government could have been involved. “We take these hacks very seriously and will find out who could’ve done this.” Says the FBI at Thursday’s event.

    No bank data or payment information was hacked, says Yahoo CEO Marissa Mayer. Details that were taken include names, email addresses, telephone numbers, dates of birth, and passwords (Although passwords are partially obscured by the encryption system). Some security questions might have also been stolen, claims yahoo, information like mother’s maiden name or dogs name are possibly out there as well.

    Read Also: The Worst Cyber Attacks in History.

    Who’s to blame?

    Now that it is out there, the question remains, whose fault is it? While there is no one to directly point a finger at, there are many people that can be blamed. Since internet keeps on evolving, and hackers keep getting better and better, it’s no real surprise that large companies such as Yahoo can be their target, at this certainly won’t be the last time this happens.

    Alex Stamos was the leader of Yahoo’s security until a year ago, when Bob Lord took his place. They are certainly a bit responsible for this, it’s not their fault that the hacker managed to make it through, but it is undoubtedly their fault for going on 2 years without noticing. Worse part is, the investigation that led to the discovery of this hack started because a hacker named Peace was selling information of 200 million Yahoo accounts for $1,800. Once the investigation started, it was revealed that there was a security breach 2 years ago that led to the theft of all of this data. This makes us question, if no one had attempted to sell the accounts in public, would Yahoo have ever noticed?

    Do we know who is responsible?

    At first, the hacker who wanted to sell the accounts, Peace was thought to be the one likely to have performed the hack. However internal investigation found no evidence pointing out to this being true. After finding out that the attack had been the largest ever, deeper investigations have led Yahoo to claim the hacker was state-sponsored. This means that this attack was meant to survey a large amount of people, rather than plan to extract money from them individually. However, since this data was probably sold to third parties, undesirables probably have it by now.

    Read Also: Top Public Wi-Fi Risks and How to Prevent Them

    I have a Yahoo account, am I in danger?

    It’s safe to assume that your data has already been in danger for a while. There is no way to know for sure if you are part of those 500 million accounts. Yahoo has said that those who were involved are being contacted individually in order to notify them, but let’s face it with 500 million people involved, it’s highly likely that you won’t be getting a message from Yahoo any time soon.

    Is there anything I can do?

    Since we have assumed that it’s likely that you are in danger, the safest bet is to change all your passwords and make sure they are all different. Using methods like password generators from now on would be a safe bet, while this involves a bit more work, it guards you in a much safer way.

    If you have accounts that can be put under 2-factor security do so, such as getting a code on your cellphone whenever your account is starting. This way you can guarantee that no one will be able to access your account without physical contact with your cellphone.

    Yahoo recommends pay attention to your accounts and watch for suspicious activity in them.

    Will this impact Yahoo’s sales?

    Absolutely, the sale of Yahoo to Verizon was supposed to close in the first months of the upcoming year. Now that this information has been released it will set back the sale at least a couple of months. This will allow for Verizon to haggle on the price or back out completely if they feel that this hack will destroy Yahoo’s business. While a Verizon spokesman has said that they do not know enough information on the hack yet to assess potential consequences, they will certainly keep an eye open for customer reactions and the shareholder community.

    This year has been rough for cyber security, first the bitcoin hack losing millions of dollars and now Yahoo losing information belonging to millions of accounts. It is important for users to understand just how important it is to be safe online. Every time these events happen, people will have to be more careful, and know that having similar information for many accounts can lead to a theft of all their online data.

    As we become more proficient online, so do hackers, and we can’t leave it only to companies to deal with them. It is also our responsibility to make at least as hard as we can for people who want to obtain our information and use it for their benefit.

  • Online Dating: A Risk Worth Taking?

    Online Dating: A Risk Worth Taking?

    Have you ever wondered when will you find a romantic partner? Are you willing to try online dating? Some may consider it a desperate move, but the truth is, in hope to find love, it has become definitely attractive nowadays. We have to consider that we now live in a digital era; it is not a surprise that this has also reached romantic relationships. The wide range of eligible partners is one of the reasons why this new way to meet people and date is appealing to some.

    Online dating is very simple; there are many sites in order to do so, such as eHarmony, match.com, Lovestruck.com, DatingDirect.com, PlentyofFish.com, among others. Some of them are free, some are not. In most of them it is required to create a profile, submit personal information, and then start looking for people you may be interested in or receiving invitations from other people, and then start dating via Internet. Sooner or later you will both decide whether you would like to meet face to face, which let’s be honest it is what most of us hope when we meet someone. The other option is to keep dating the same way, for several reasons like not living in the same city, or simply because you don’t want to.

    Online dating is very simple; there are many sites in order to do so, such as eHarmony, match.com, Lovestruck.com, DatingDirect.com, PlentyofFish.com, among others. 

    That’s just the happy part of the story, one can say the fairytale. But, there are several dangers you take when online dating. In this article, we are going to develop those risks, but first, let’s consider the benefits of this type of dating:

    1. As mentioned before, there is a wide spectrum of people in these web sites, so you have access to a long list of potential candidates.
    2. Some of these sites offer personality testing and matching to make sure the users find like-minded possible partners.
    3. Some may consider these sites offer the possibility to safely and conveniently interact with other people. Later, we will see this is not entirely true.
    4. As you are accessing to an online dating site, you are looking for potential partners to date and start a relationship with. Hence, you are supposed to find people that are logged in for the same reasons as you are.
    5. Online dating is a good option for those who are introverted, because somehow they will interact better with someone else via internet, since they won’t feel the pressure of having to see each other face to face.

    Online dating implicates several risks you may want to consider before trying it.

    We have already seen the good side of the story, but what about the bad one? The following are some of the risks you take while online dating:

    1. First of all, consider that you don’t know who you are talking to. You are making the decision to meet certain person based on their profile, and remember that everyone can lie in the internet. It is the easiest thing to do, write some words that someone else may consider cute or likeable.
    2. Related to the previous one is the risk of being cat fished. Again, someone can create a false profile, with false pictures in order to attract more people. For more on this you can watch the MTV show called Catfish.
    3. You may not know it but the data you provide on the Internet is permanent. This happens even with Facebook, where if you delete your account, somehow the information stays there in a database. If you take this into consideration, then you must know that if you send compromising pictures of yourself, they will stay stored in the net, so there’s no confidentiality, at all.
    4. You can also be a victim of scams. There are several malicious people on the Internet, and they act in different ways. In the particular case of online dating, they create a profile, pretend to be someone with an overseas job, find a suitable victim and they will try to start gaining their trust. This process may take months, but once they do gain their trust, something bad will “happen” to them, therefore, they will ask for money in order to “solve” the problem. As soon as you give them the money, they will disappear.
    5. As it was stated before, when you start using one of these sites to find a potential lover, you don’t actually know who you are talking to. In fact, you may be dating a psychopath, a stalker, a sexual predator, and you probably don’t even notice, because they are experts. Online sites are very appealing to this kind of people.
    6. You can also be a victim of blackmails, defamation or damage of your reputation. Consider this before sending pictures of yourself that can be later used against you.

    If you are willing to try this method, then, consider the following advices:

    1. Be careful when sending compromising pictures. If you are determine to do so, then try to avoid picturing your face. Remember there is no confidentiality on the Internet.
    2. Read carefully the terms of service and privacy policy of the online dating site.
    3. Listen to yourself and your instinct. If you get suspicious about someone then trust yourself.
    4. Consider reputable sites only.
    5. Protect your personal information.
    6. Be honest and take it slow.

    Read also: Internet Crimes: Am I Safe?

    It is quite possible that you know of one story about a couple who met online. Online dating gives you the opportunity to meet a lot of people, but not necessarily potential partners, though. It is difficult to get to know someone only through these sites, some of us prefer the traditional way, where you can actually get information that only comes from the interaction between two people, for example, determine whether you have chemistry or not, if you get along, what are their hopes and dreams, or just to try to peel the onion date by date. Furthermore, remember that online dating carries several risks you may want to consider, take into consideration our previous recommendations if you’re bold enough to try this way of dating.

  • The Future of Credit Cards: Security Measures

    The Future of Credit Cards: Security Measures

    Long past are the days when manual credit card machines were the standard for processing credit card payments worldwide. Several technologies have followed since, but nowadays the most widely used within the U.S. is the magstripe, in which card data is statically encoded on a magnetic stripe that is then run through point-of-sale (POS) system, requiring the user to authenticate their identity via a PIN code or by providing a signature. The problem? Well, for starters, that operation sets us way behind in relation to the rest of the world, and these cards, both credit and debit, are very easy to duplicate using inexpensive reader machines, which may allow criminals to begin purchase right away with little to deter them.

    Thus, a new standard was introduced as early as the mid-2000s for Europe and 2013 for Australia, and even some banks in Latin American countries have transitioned to this new technology. First developed by Europay, Mastercard and Visa, the EMV standard uses a chip which generates single-transaction codes.  It also requires that the users, in addition to inserting the card in a compatible POS machine, provide a PIN code and a signature in order to authenticate the transaction.

    After seeing that there are currently some technology developers who are willing to invest in Research and Development for the improvement of this technology, we might conclude that EMV is expected to be the direction credit card security that is going to take in the next few years, making it an absolute imperative.

    “EMV is the to be expected direction credit card security is going to take in the next few years, making it an absolute imperative”

    There are, however, many concerns that this technology is not completely secure or effective to deter fraud. Visa and Mastercard, big supporters of the EMV technology, set a deadline in October 2015 for what they then termed a “liability shift.” By doing so, they have effectively shifted liability to whichever party –merchant or financial institution– uses a less secure technology. Thus, it is now the case that if a merchant has chip capability but a bank fails to issue chip cards, the bank will bear the cost of fraud. Conversely, if the merchant chooses to swipe a card regardless of possessing chip capability, they will be held liable for the occurrence of fraud.

    Read also: Identity Theft: Damage Control

    Although the introduction of EMV cards has reduced the number of counterfeit card fraud, the number of card-not-present, or CNP, fraud is actually on the rise, which occurs during telephone or online transactions –such as purchasing something on Amazon.com or buying a pizza by phone. Moreover, even if the business opts for transitioning to chip card compatible POS, using a PIN is not necessary in the case of Credit Cards, meaning that a stolen card can easily be used at such businesses that choose not to verify the accuracy of a signature, which is not a rare occurrence at all.

    There are also concerns that the technology itself may not be completely secure, even if used correctly. According to The Hacker News, there are several inherent vulnerabilities to chip cards. For example, researchers have been able to predict the pattern of what were supposed to be unpredictable numbers. This allowed them to duplicate chip cards.

    Security researchers also found a way to bypass PIN or signature requirements altogether by performing man-in-the-middle attacks on chip cards. Finally, Wired reported that a British team found flaws in some “contactless” Visa chip cards, allowing the approval of foreign currency transactions up to USD 999,999.99. Of course, a “contactless” chip card is not made riskier just by that fact, but rather because it does not require any form of security check in order to approve a transaction, since these are all contained within the card itself. So it would be easier for a criminal to simply steal a contactless chip card and use it without having to do much in order to cover their crime –or they could simply manufacture a homemade contactless card reader, bypassing the need for touching the card at all.

    Read Also: Ten Actions You Can Take Right Now To Improve Your Computer Security. Am I Really At Risk?

    In the face of all this, what choice is left to us, the consumers?  It seems that while bank and credit card companies decide on the best technology to implement, and until technology itself catches up to increasingly versatile criminals, the best protection against credit card fraud still seems to be the old-fashioned precaution, since there is no choice in the type of card technology that will end up inside our wallets. Much of the world has decided to switch to chip card technology years ago, and the U.S. just began to make the transition towards it. There is no going back now, but we will definitely have to look into the future for whatever it may hold and be prepared for it.

  • Mobile Banking Apps: What They Are and How You Can Start Using Them Safely

    Mobile Banking Apps: What They Are and How You Can Start Using Them Safely

    Internet has become an important part of our lives, getting to the point where it is a necessity for many. In this part of the 21st Century, many banks all over the world have taken the initiative to invest in developing virtual platforms to catch up with the necessities and satisfy the needs of a globalized, interconnected society. Some banks began to develop their websites and enable them for customer use, what lead to a popular concept called “Online Banking”. This refers to using a Bank’s web platform through a computer, as simple as that. However, in the last few years, many banks have tried to go one step further, creating applications (or “Apps”) so users could keep track of their accounts just by checking on their phones. Now, that old concept was repowered and “Mobile banking” was the result.

    While an individual can access their bank accounts by the internet browser on a phone, Mobile Banking differentiates from Online Banking since it uses a platform, usually an Application, that can be downloaded into a smartphone or tablet and allow its users to perform different types of transactions on the go.

    “One way to keep your bank accounts safe is by setting password locks on your phones or tablets, so in case you lose it, no one is going to steal your information.”

    This whole idea of being able to manage one’s bank accounts using electronic devices became so popular that by last year, according to a survey made by the Federal Reserve, 74% of customers use online banking and 35% of them use mobile banking. Experts predict that this number will progressively increase as more individuals find out how comfortable this type of account management is.

    10 Actions You can Take Right Now To Improve Your Computer Security: Am I really at risk?

    As said before, mobile banking uses a smartphone or tablet to connect to a financial institution in order to access bank/credit account information and perform actions like: view balances, transfer funds between accounts, pay bills, receive account alerts, locate ATMs, and even deposit checks using the camera.

    If you still feel wary about getting into Mobile banking apps, Premier Consumer will guide you on this enterprise. The first thing is start little by little. Use your bank’s text message services to get snapshots of your account balances and latest transactions. This kind of service works just fine for those beginners that prefer safer methods because it is used only to exchange data.
    Before fully taking the next step into banking apps, it is important to know what characteristics they have, so you are aware of which ones suit you better. Compare functions to see what you are actually able to do. There might be certain features that are not available in every banking app. Also, fees have to be considered. Most of the Mobile Banking Apps that you can find in App Stores are free, but check carefully for fee rates per transactions and evaluate whether they work for you, or not. Most of the things you can do on a banking app are cost free; however, it is never bad to double check so you do not get any undesirable surprise.

    Five Tips To Protect your Personal and Financial Information on The Internet and A Surprise for You.
    Safety Is Key

    Like any mobile service, Banking apps have their downside. Being 100% safe from identity theft or hackers is quite difficult; however, there are certain considerations to keep in mind if you want to minimize risks.

    One way to keep your bank accounts safe is by setting password locks on your phones or tablets, so in case you lose it, no one is going to steal your information. Also, you can check your accounts regularly, so if there is an irregularity you can spot it and report it. Many mobile banking apps and online banks can offer support and solution when money is leaking out of your accounts, as long as you inform it within 60 days. Keeping your log in information -such as user names, passwords, security questions, and so on- written somewhere safe (that means: particularly not in your phone) can guarantee much more security. In relation to passwords, many banking services support the use of longer passwords. More characters, capital letters, numbers, or even special characters will certainly make hackers’ job of breaking protection more difficult.

    Finally, it is always good to take care when using public or unsecured Wi-Fi networks, since others connected to them too may be able to access your personal information.

  • Learning About E-Banking

    Learning About E-Banking

    A few years ago, the only image that may come to your mind when you thought about a bank was a solemn building where money remains safe thanks to a transparent management of data and information. While having a bank account is the start of a financial life, the services that this institution offered at the moment were nothing but the regular banking credit procedures. And this is what happened until the technology advanced in the 90’s when the banking started broadening its services to new businesses models.

    It was not until the beginning of the century that Elizabeth Daniel in 1999 introduces on an article written for the International Journal of Bank Marketing the term “e-banking”, referring to the provision of products and services that makes a bank to its customers through the use of the Internet. On 2004, the e-banking emerged as the fastest growing internet activity in the United States, being used by 44% of web users, according to Pew Internet and American Life organization.

    “E-banking provides an added value in its services: efficiency”.

    But as is often the case, novelty is also associated with doubts and controversy, and technological level is no exception. Certainly, when talking about managing our money, we also need to take into consideration the particulars: Internet access at the rural areas is not optimum, since we must have an active broadband internet connection to carry out all the operations without connection failures, this can be a disadvantage in such cases. Also, the management of our financial data via online can be a risky move for some people. If we think of all the cases of images, videos, documents, etc. that have been leaked on the network, the question that arises: Is my financial statement information safe?

    The answer to the question above is “yes”. Although the leak of information on the net is a reality in many cases, as the philosopher Hermann Keyserling once said “generalize is always wrong”, especially in this occasion because when we talk about a bank, security and transparency are values ​​that identify these institutions. Actually, E-banking provides an added value in its services: efficiency.

    So, if you are careful with the information you share on the Internet, you can just enjoy the benefits that e-banking has to offer. Especially by reading the terms and conditions of privacy that leads you agree to provide information, guaranteeing that the page is responsible for the protection of your data. But what all these benefits after all? Well, we can summarize them in three points as follow:

    1. Comfort: Just the fact of not having to go out of home or your workplace to go to the bank –which may seem tedious to many people– is such a great comfort. You don’t need to wait behind a long line for be attended so you can really save some time. All of this 24 hours a day!

    Read also: Five Tips To Protect your Personal and Financial Information on The Internet and A Surprise for You.

    2. Successful Management: You aren’t exposed to make mistakes in your bank operations via the Internet, because current e-banking systems are designed to guide you while you run your transactions. No matter if you forget or don’t know how to use e-banking, it works like an instructive too.

    3. A world of possibilities: The Internet can be used any time at any moment, and it doesn’t take a genius to use it. In the 21st century, the cyber world become part of your days, and e-banking allows you to manage your money with a tool just as wide as the web.

    Read also: Three Secrets to Making Personal Finance Work for You.

    All in all, e-banking gave birth to e-commerce. Whether you are buying or selling services, objects, music or even food; the truth is that having a bank account will allow you to expand your business and finances with just one click. E-banking provides efficiency and value to your banking services, and also improves your business. It represents economic expansion not only for dedicated and large companies or for stores, it also represents economic expansion for you. So we invite you to learn about the online services offered by the bank of your choice and expand your finances.

  • Keeping Your Device Clean And Virus Free

    Keeping Your Device Clean And Virus Free

    A healthy body is a happy body, the same happens with your computer and mobile device. Just like your body, your computer is a system of parts that work together to function and each part has to be taken care of. And just like people, sometimes our computers get sick. Everyone has heard the term computer virus but not everyone knows exactly what it is and how it is passed along.

    A computer virus is just a program like your internet browser or a text processor. The difference lies in the intent behind the program, while most programs in your computer serve to benefit the user viruses do the opposite. They are programmed to damage your system, steal your information, and make your life miserable. They can be transmitted from one computer to another through the internet or they can infect a flash drive and contaminate every computer it is passed along.

    Viruses not only affect computers, they can also affect your smart phone or tablet. Remember that they are just smaller portable computers and as such they are also vulnerable to viruses. So it is up to you as a user to arm yourself and your devices against this kind of threat. There are plenty of ways in which this can be done. Here are nine tips on how to keep your device clean and virus free.

    A computer virus is just a program like your internet browser or a text processor. The difference lies in the intent behind the program, while most programs in your computer serve to benefit the user viruses do the opposite.

    1. Install software only from trusted sources. Both on your computer and mobile phone, check the sources of any software you want to install. When buying a physical copy of a software trust only renowned sellers, avoid buying pirated software as they may come infected with some kind of virus that you do not want. If you want to download a software make sure you do so from the official website of the software developer, third parties download can sometimes come infected as well.

    On your cellphone it would be better to only download apps from the Apple App Store or the Android Play Store. Try to avoid websites that offer apps for free as they also could be contaminated. Trust only respected and renowned sources.

    Also read 8 Smart Ways To Use Your Smartphone To The Fullest 

    2. Install a strong antivirus. The simplest way to keep your device virus free by definition. There are many good antivirus software out there that the choice is quite easy. A good antivirus will constantly scan your device and eliminate any possible danger, it will warn you when there is a threat detected and tell you what you can do about it. Think of an antivirus as the immunological system of your computer, you want to give it the best, would you not?

    Some antivirus software costs some money but do not be discouraged, think of the money you spend on it as an investment or as a medical insurance for your computer. Most antivirus developers only require a single payment upfront for the use of their program so it is not like you are going to be paying for it for the rest of your life.

    3. Keep your antivirus updated. Just because you already bought a good antivirus it does not mean that you are set for life. Computer viruses evolve just like their biological counterpart and your antivirus may no longer be able to fight them off once they have changed. That is why you should always renew and update your antivirus software. Most developers offer free updates or discounts to existing customers.

    4. Install security updates. Many of the programs you use on a daily basis can have bugs or holes that can be exploited by a virus, to counteract this most developers constantly release what they call patches for their software. A patch will fix the bug or hole in the program and prevent it from being affected by viruses. The thing about updates is that most people will not be bothered to update their systems, keep in mind that for the most part, this is a process that can be authorized to be done automatically so you need not worry about this.

    Also read 10 Actions You can Take Right Now To Improve Your Computer Security 

    5. Install a good anti-spyware/adware/malware software. Another name for computer viruses is malware, a software designed to damage your system. But there are also spyware and adware. Spyware works by tracing and sending your personal information to its source. This can be files in your computer, pictures, personal information, and even accessing your webcam without your knowledge or consent. Adware is software designed to show you ads for all kinds of products, they take over your web browser to the point where everything you see is an ad, and not even a good one. Clicking on these ads can lead you to malicious websites where your system can catch even more malware.

    The best way to fight this off is by installing an app on your web browser that detects and prevents this type of software from being installed in your computer.

    6. Beware of emails. Emails are the silliest way to catch malware. Opening a contaminated email can be enough for the virus to infect your system and wreak havoc in it. We are not telling you not open any email ever, just be careful about it. For example, do not open an email from someone you do not know, if a friend sends you an email with a weird attachment ask them about it before opening it. If you receive an email from a bank regarding any kind of trouble with your accounts of credit cards delete it immediately, banks will always contact you by phone first

    Also beware of any email asking for money, telling you that you have won a contest you did not enter, carrying a compressed file attached, or written in poor or broken English. In any of this cases you should just delete the email and mark the sender as spam.

    7. Browse smart. Another silly way of catching malware is by simply visiting a contaminated website. Once you do this the malware will download into your system without you realizing this. To prevent this visit popular and trusted websites and also have your antivirus scan every website you visit just to be sure. If you happen to stumble upon an infected site your antivirus should warn you and ask you to leave it.

    8. Create a strong password. A good password is the best way to keep your information and data safe. Try not to use the same password on every website you visit and be creative when setting them. The most common password is a person’s birth date which is something relatively easy to find. Try using a phrase or a purposely misspelled word.

    9. Routine maintenance. Just like you need to go to the doctor from time to time, you should also take your computer to a technician every so often. There is just so much you can do on your own, let a professional take a look at it and follow their advice, they know what they are doing.

    Keeping your system clean and virus free is no extraordinary task but it does take some time and effort. But would you not prefer spending a few hours from time to time updating your antivirus than having your system wrecked by a virus and your data stolen by some spyware? Think about it.

  • Internet Crimes: Am I Safe?

    Internet Crimes: Am I Safe?

    Internet is now one of the most useful tools used for communication. It allows us to send, receive, share, even perform financial transactions, and more. That is the reason why being cautious is a must. There are people who want to take advantage of the Internet and use it with fraudulent purposes. Nonetheless, Governments have taken actions to preserve security and avoid any type of action against public safety.

    The United States Government has passed laws and statutes (or modified previous ones) regarding Internet crimes in order to regulate and treat them in the most accurate way. One of the governmental agencies authorized to be in charge of the most important Internet crime cases reported is the Federal Bureau of Investigation (FBI).

    “The United States Government has passed laws and statutes (or modified previous ones) regarding Internet crimes in order to regulate and treat them in the most accurate way”

    Here we have compiled a list of the most relevant laws passed in order to fight Internet crimes, their specificities, their scope, and possible consequences.

    The Computer Fraud and Abuse Act (CFAA), first enacted in 1986 and most recently amended in 2008, declares illegal knowingly accessing a “federal interest computer” without authorization or exceeding authorized access to the transmission of a harmful component of a program, information, code, or command. A federal interest computer includes a computer used by a financial institution, used by the United States Government, or one of two or more computers used in committing the offense, not all of which are located in the same State. Because of the nature of most Internet communication, any ordinary computer has come under the jurisdiction of the law, including cell phones and other electronic devices. Committing an offense to this Act may result in a fine under this title, and imprisonment up to 20 years.

    With the intention of amending (and expanding) the CFAA, in 1996 it was passed The National Information Infrastructure Act (NIIA) in order to encompass unauthorized access to a protected computer in excess of a party’s authorization.

    Read also: Credit Card Act of 2009

    Communications Assistance for Law Enforcement Act (CALEA)

    The Congress enacted CALEA on 1994 in response to concerns that new technologies made it increasingly difficult for law enforcement agencies to execute authorized surveillance. CALEA was intended to preserve the ability of law enforcement agencies to conduct electronic surveillance by requiring that telecommunications carriers and manufacturers of telecommunications equipment modify and design their equipment, facilities, and services to ensure that they have the necessary surveillance, wiretapping capabilities.

    Computer Software Privacy and Control Act

    It is a law that prevents transmission of software and other components that can collect, modify, monitor or transfer personal information or established settings out of a protected computer. It was meant to preserve computer privacy and to maintain computer control since, by law, the only ones with the power to do so are only the computer’s owners or operators.

    Electronic Communications Privacy Act

    Passed in 1986, Electronic Communications Privacy Act (ECPA) was an amendment to the federal wiretap law, and it was ultimately amended in October 2001 with the USA PATRIOT Act. The Act stated that it was illegal to intercept stored or transmitted electronic communication without previous authorization.

    Fraudulent Online Identity Sanctions Act

    FOISA attempts to fight criminals registering, maintaining or renewing online domains providing false identification, and states that it would increase jail times for those who provide false contact information to a domain name register and then use that domain to commit copyright and trademark infringement crimes.

    Internet Freedom Preservation Act of 2008

    It establishes certain Internet neutrality duties for broadband service providers, including not discriminating against any person to use broadband service in a lawful manner. This act also allows providers to engage in activities in favor of certain management and business-related practices, such as protecting network security and offering services like parental controls for consumer protection.

    FBI – Cyber Crime Division

    The FBI’s cyber mission is divided in four major tasks:

    • First, to stop serious computer intrusions and the spread of malicious code.
    • Second, to identify and put a stop to online sexual predators using the Internet to meet and take advantage of children and producing, possessing, or sharing child pornography.
    • Third, to neutralize operations that target U.S. intellectual property.
    • Fourth, to dismantle national and international organized enterprises engaging in Internet fraud.

    Read also: Identity Theft: Damage Control

    Fraud and Related Activity in Connection with Computers

    This is one of the most intricate and delicate statutes in relation to Internet crimes. According to Section 1030 (a)(1) it is “illegal to access a computer without authorization or in excess of one’s authorization and obtain information about national defense, foreign relations, or restricted data as defined in the Atomic Energy Act of 19549, which covers all data concerning design, manufacture or utilization of atomic weapons and production of nuclear material. […] Section 1030 a )(1) requires proof that the individual knowingly accessed the computer without authority or in excess of authorization for the purpose of obtaining classified or protected information. Section 1030(a)(1) criminalizes the use of a computer to gain access to the information, not the unauthorized possession of it or its transmission.”

    Additionally, some traditional laws regarding non-internet crimes can apply to these cases, such as the Economic Espionage Act (EEA), among others.

  • How Hackers Identify And Attack Their Victims

    How Hackers Identify And Attack Their Victims

    How Hackers Identify And Attack Their Victims

    Internet has become a huge part in today’s society. Everybody uses it for many different purposes. Whether it is for job or for fun, your life almost revolves around it, and with the increasing amount of things you can do online, many have the tendency to ignore -at a certain degree- how exposed they actually are to possible attacks. Thanks to the fact that many ignore that, hackers have “free way” and take advantage of those who do not pay much attention to their internet security, or, for some reason, got unprotected.

    Read Also: Identity Theft: Damage Control

    First, you should know what a Hacker is.

    Hackers are people that commit illicit activities, operating through electronic devices for many types of purposes:

    • To find sensitive information such as credit card numbers, your bank account or your Social Security number.
    • To have complete access to databases, websites, web servers, and other network resources.
    • To spread viruses on computers.
    • To fool Operating Systems.
    • To take down websites.
    • To steal identities.
    • To take control over personal computers in order to hide their actual location and identity while committing a cybercrime.
    “The biggest advantage hackers have is anonymity; no one is ever sure of who can be found on the other side of the screen”

    That last point has a lot to do with possibly the biggest advantage hackers have, which is anonymity; no one is ever sure of who can be found on the other side of the screen. Since virtually everyone with a connection (wireless, or not) can access the World Wide Web, a virtual crime of that kind can be executed even from a foreign country.

    Now, one important question: How do hackers identify their victims?
    The answer is: researching.

    By using different types of sophisticated hardware and software, they are able to scan thousands of computers at a time. Those softwares allow them to find vulnerable ports through which they can start the hacking process. Such attacks tend to take place after a time of target’s vulnerability research.

    First, the hacker will create an initial map of the target’s vulnerabilities, focusing on platform version and usage. They could also fill out the map with information taken out of public sources such as government databases, financial filings and court records.

    By doing so, hackers find out what your level of security is. For companies, they are most likely to look for previously suffered breaches, or to find out whether you’re using LDAP or federated authentication systems. Some hackers might also try to hack partners, customers and suppliers, since they could be easier to attack. Think of it as a form of “small to big” kind of attack. That kind of information is usually found on job sites, corporate career sites, and even basic search engines such as Google; it will depend on how safe your information is.

    Now, the hacker is able to perform the attack. But… how do they attack their victims? It will depend on the type of hacker, and the purpose of the hack. Some of the most common types of attacks are done by:

    • Creating fake wireless access points to receive unprotected data that the victims, without knowing, send to the remote hosts in clear text. They could be even receiving your passwords.
    • Stealing Cookies, so they can freely log in to your websites as if they were you the one who supplied a username and password. To this, the best answer is to use the latest crypto cipher, or to disable certain features that people do not use any longer.
    • Using fake names on files in order to trick people into thinking that is something different. Some computers change or hide a file’s extension, so it is better to search for the real name of the file before opening it.
    • Changing, placing or replacing files, usually with the same name as built-in features of the computer. With this file location trick, they create a malicious identical file and hide it in the current directory or your home folder, so when you just execute it, it will run the infected copy instead. This is an easy way to use a computer’s own operating system against itself.

    Read Also: Tips And Tricks To Protect Your Children On Internet.

  • How Criminals Target You At ATMs

    How Criminals Target You At ATMs

    Since their appearance in common day life, ATMs have become a commodity and even necessity for some people. ATMs or Automatic Teller Machines have been around since the late sixties and ever since then they have become the best way for people to make cash withdrawals from their bank accounts in a fast and easy manner that do not involve having to stand in line inside of a bank.

    ATMs usually work by two fundamental security steps: reading the card of the bank account owner and their personalized and secret PIN, a short password used for these transactions. The combination of the magnetic band in the card and the PIN will allow the client to make quick and simple transactions such as cash withdrawals, checking their account, and even check balancing. But if history has taught us something is that wherever there is money involved, there is surely going to be criminals trying to steal that money.

    Since their creation, ATMs have been the target of several criminal attempts to steal the money they contain. Having access to sensible information from a bank and their customers, people have tried all sorts of things to gain this by all sorts of creative means. From physical attacks to an ATM such as trying to steal the whole machine altogether, threatening people while they are making a transaction, and more sophisticated methods such as stealing the card and PIN of a person to empty their bank accounts.

    “The combination of the magnetic band in the card and the PIN will allow the client to make quick and simple transactions such as cash withdrawals, checking their account, and even check balancing. But if history has taught us something is that wherever there is money involved, there is surely going to be criminals trying to steal that money”

    There are several ways in which criminals target unsuspecting victims to steal their information and money. Here, Premier Consumer is going to explain the most common ones that threat your physical and financial security. We recommend to take a close look at these security tips and apply them whenever you need to use an ATM beginning with the simplest method and then moving on to the more sophisticated ones. We will also give you some countermeasures you can use against these types of criminals.

    The simplest way for a criminal to steal money from an ATM is to jump on someone who is in the process of using the machine or just finished. They will force the person to make a withdrawal or simply ask for the money that was just taken out. All this people have to do is pick an ATM that is located in a low-traffic and poorly lit area and stake out, usually at night. The first recommendation we give you would be to simply avoid using these ATMs and go for machines that are located in a more public and trafficked area.

    During the transaction, try to be aware of your surroundings and look out for suspicious behavior. Most ATMs come with a mirror on the side that will allow you to check behind your back to see if there is someone snooping. Be wary of strangers that offer to help you, they may be after your card and pin or may snatch the money out of your hands as soon as you withdraw it. If you have a problem with the machine try to contact the bank directly instead of having someone else help you. Do not count your money at the ATM, just wait until you are in a safe place, comply with them and then report the incident to the authorities and your bank; your life is worth far more than a few dollars.

    Read also Money Does Not Buy Happiness for more information.

    On the more technological side, there are criminals that act as ghost in the sense that most victims never see them coming. The most advanced and modern form of ATM crime is done through a device called a skimmer. These are little pieces of equipment that can read the information on the magnetic band of your card and steal information from them like their magnetic pattern and the card’s number and expiration date. Skimmers can be placed in the ATM’s card slot and some of them are so small that most people do not notice that it is there. Hidden in place skimmers will record the data of any card that is inserted in the machine and then the criminal will simply download this information and clone your card.

    Along with skimmers, criminals often place small hidden cameras on the ATM pointed towards the keypad in order to learn their victims secret PIN. With a cloned card and their respective PIN all the criminal needs to do is go to an ATM or any store with a point of sale and swipe the card to withdraw cash or make purchases.

    Another method criminals use to obtain your secret PIN is by installing a fake keypad on top of the original. The top one will record all the numbers typed into it and then all the criminal needs to do is download this information and clone the card.

    Read also Mobile Banking Apps: What They Are and How You Can Start Using Them Safely for more information.

    What can you do to fight off such sophisticated methods? You can start by checking the ATM’s hardware for signs of tampering like scratches close to the keypad or things that look out of place; especially if it is a machine you visit often. Keep a close eye on your bank account movements and report any unusual or unidentified activity to your bank immediately. The sooner you notify the proper authorities the better their response can be. Most banks do not hold their clients accountable for these crimes and in most cases will refund the money that was stolen.

    Changing your PIN on a regular basis is another way to fend off these types of attacks, try to do it at least once a month. Try to always memorize it and never write it down on the back of your card or piece of paper you carry with you.

    Banks and ATMs manufacturers are continuously to improve the level of security in their machines. They have installed anti-skimmer technology on their hardware that blocks the signal the skimmer uses to read your card. Many banks around the world have also began to issue smart cards that come with an integrated microchip. ATMs now read the microchip instead of the magnetic band of the card because the chip is virtually impossible to replicate. They also offer an SMS service that notifies their clients whenever a transaction has been made. Ask your bank if they offer this kind of technology and ask for a smart card if they do.

  • Five Tips To Protect your Personal and Financial Information on The Internet and A Surprise for You.

    Five Tips To Protect your Personal and Financial Information on The Internet and A Surprise for You.

    Presently internet offers a great variety of possibilities to perform transactions, without moving from their current place. You can perform bank operations, make payments to entities for their services, buy products and even request legal documents. However, your personal information can fall into the hands of delinquents.

    It is important that you protect your online information and that you make sure that you use trust worthy websites.

    Read also Want To Get Rid Of Your Computer? Discover What You Should Do Before That.

    Here are five tips to adequately protect your personal and financial information when you make online transactions:

    1. Usually, the entities that offer online transaction services protect personal information so that it cannot be intercepted. This is done with the objective of protecting their customers.  You can verify that a website is secure through the message that appears in the screen that lets you know that you are in a secure website. You can also see a closed safety lock or key in the lower part of your screen. Another signal that lets you identify that you are in a secure website, is that the first words of the website address change from “http” to “https”.
    2. Take into account that using Wi-Fi networks from airports, stores, libraries, hotels, restaurants or where available, is not always safe since another person could have access to the information that you sent while you had the network activated in your device.
    3. Verify that your cellphone or device is not set up to connect automatically to open Wi-Fi networks..
    4. Most secure websites have published their privacy policies. It is important that you read them to have full knowledge of how they handle your information.
    5. You can setup anti spyware programs thus avoiding that a third party has Access to your information.                                                                                             And the Surprise we have for you is five more tips…
    6. Do not answer e-mails that you receive from perceived bank entities requesting information update.
    7. Perform your transactions from personal devices; do not use other people´s devices or public computers to do so.
    8. Keep the digital support of all your online transactions.
    9. Do not remain permanently connected to the accounts. Perform your transactions and log off immediately.
    10. There are browsers that let you know when you are about to enter an unsecure website, be aware to these notifications and close the website immediately.

    Be online smart and benefit from using technology in a correct manner. Be careful regarding the safety of your information and that of your loved ones. Remember that once a criminal has access to your information, they can make incommensurable thefts that will gravely affect your financial life.

    Sources:

    https://gobierno.usa.gov/proteja-su-privacidad#item-212150

    http://www.alertaenlinea.gov

    http://revista.seguridad.unam.mx