Translate

Friday, April 29, 2011


Cyberstalking - Spyware and Privacy Protection
Know the Tools Cybercriminals Use to Access Your Information

There are so few people who understand how to stop a cyberstalker and repair the damage. Thousands become victims every year, and each of us is vulnerable. I know this firsthand because I was once a victim of cyberstalking. It took me years to recover my life and get my credit in order. Ever since then, my goal has been to shake people up and instill enough awareness of cyberstalking to get everyone to take protective and preventative steps both on and offline.

Cyberstalking CAN Happen To You
Think again. It can happen to you and here are some of the reasons:

  • Our global society's over reliance on technology
  • The increasing affordability of technology and its ease of use (virus software that used to be in the thousands is now less than a hundred dollars to purchase)
  • The remote distance and anonymity technology provides to give cover to those who would hesitate to do something more traceable
  • Not to mention the lack of enforceable laws – or even laws that address the problem period - to protect people
For all these reasons there has been a rapid rise in cyberstalking incidents.

We are all vulnerable.

The New Wild West Is Online
Here are some other famous people who have been hacked and harassed in the last few years: Sarah Palin, Bill O'Reilly, Miley Cyrus. While it isn't surprising that a celebrity might draw more ire or attention, they represent our collective vulnerability. Despite the familiarity and ease we feel while using the Internet, it is still a technological frontier town. The internet is only just coming out of its infancy and in many ways as unprotected as the Western one of our past. Lawmakers and consumers can't keep up with the swift leaps in accessible technology to know what is truly possible and what isn't.

Privacy protection programs for consumers including victims of crime are inadequate. Often police can't make an arrest because there is no evidence of a crime being committed. Over and over I've heard about victims being treated like idiots by law enforcement. I've been there, trying to explain what happened on my computer and why it's important, and meanwhile the cop taking my report pats me on the head and tells me to go home. With no smoking gun, it's only your word that a crime happened at all.

Cyberstalkers don't have to be super-hackers or have superior intelligence to achieve their goals. A quick search on the internet can reveal various cyberstalker tool kits making it easy for cyberstalkers to wreak havoc with little or no effort.

The Tools of the Trade
Take keylogging spyware for example. Keylogging spyware can be purchased online which provides a cyberstalker with detailed instructions explaining how to disguise the spyware as an innocuous file, such as a photo, attached to an email to send out to an unsuspecting victim. When you click on the disguised file thinking you're going to see a photograph of kittens in a basket, the keylogger spyware is silently installed in the background without your knowledge. This spyware records every keystroke typed on the victim's computer.

Think about that…your passwords, captured images on your computer screen and tracking all the websites you visit (including your credit card information if you log it in anywhere). To access the information, RemoteSpy clients would log into a website maintained by the online keylogging spyware company.

Sounds far-fetched, but millions of people have been victimized by this spyware and probably don't even know it. At the request of the Federal Trade Commission, a U.S. District Court has issued a temporary restraining order halting the sale of keylogger spyware. According to the FTC's complaint, the Florida-based CyberSpy Software, LLC marketed and sold RemoteSpy keylogger spyware to clients who would then secretly monitor unsuspecting consumers' computers.

And yet in law terms a "complaint" is not a finding or ruling that the defendants have actually violated the law. Another website selling key logging spyware will surely (if not already) pop up and continue to sell the keylogging spyware under another name.

Thursday, April 28, 2011

Cyberstalking and Your Credit Rating Falsely Damaging Credit Is Another Way To Cause Significant Harm



A cyberstalker out to get you can easily hit you where it hurts the most -- in the wallet -- by deliberately destroying your credit rating. As the story below illustrates, it's a very simple process with a number of surprising loopholes that make us all vulnerable.

Messing With Credit - A Cautionary Tale
Margret was applying for a car loan. It was going to be her first brand new car and her first major debt. With building excitement she chose the perfect car within her budget and the salesperson took her to see the finance manager to complete the deal. But after a few minutes at the computer, the finance manager told Jenna that her car loan was denied.

"But that's not possible!" Jenna cried. After pressing the finance manager for a reason, she finally told Jenna that her rating showed an excessive number of credit inquiries, a big no-no that brings the credit rating down and gives an unfavorable impression.
Jenna was shocked — she had not applied for any new credit.

Turns out what she had done was move out of the apartment that she shared with a college friend. That "friend" was not very happy with Jenna because when Jenna left, the roommate had to find another roommate fast to make rent. Instead of working it out with Jenna in person, she'd pulled a cheap vengeful trick and put in several credit inquires on Jenna's behalf. No one asks for ID when you fill out a credit card application online or when one is completed and dropped in the mail.

Simple Tricks Have Huge Impact
Your credit report is the key to your financial health in our society, and yet it is one of the most vulnerable areas in your online portfolio. Very simple tricks like sending in multiple credit card applications with wrong addresses or spelling can start taking points off your credit rating and are nearly impossible to clean up – and take endless hours to handle.

The major credit institutions (Equifax, Trans Union and Experian) aren't in the least bit customer service oriented. You will rarely if ever get an actual person on the phone. The only method for repairing falsely damaged credit is a long, arduous letter-writing campaign which has unpredictable results. It's damaging to your safety and future and eats up huge amounts of time.

Worse, you have no way of finding out if any third party checks your credit report without your knowledge.

Remember that a 'cyberstalker' can obtain almost any information needed about you by his/her willingness to Google Search you nanme and or pay money to a company that specializes in furnishing data to the public . These companies are called "data furnishers" and they have the right to tap into your credit information without telling you – or who, exactly, was asking for it.
Powered By Blogger

Labels

Abduction (2) Abuse (3) Advertisement (1) Agency By City (1) Agency Service Provided Beyond Survival Sexual Assault (1) Aggressive Driving (1) Alcohol (1) ALZHEIMER'S DISEASE (2) Anti-Fraud (2) Aspartame (1) Assault (1) Auto Theft Prevention (9) Better Life (1) Books (1) Bribery (1) Bullying (1) Burglary (30) Car Theft (8) Carjackng (2) Child Molestation (5) Child Sexual Abuse (1) Child Abuse (2) Child Kidnapping (3) Child Porn (1) Child Rape (3) Child Safety (18) Child Sexual Abuse (9) Child Violence (1) Classification of Crime (1) Club Drugs (1) College (1) Computer (4) Computer Criime (4) Computer Crime (8) Confessions (2) CONFESSIONS (7) Cons (2) Credit Card Scams (2) Crime (11) Crime Index (3) Crime Prevention Tips (14) Crime Tips (31) Criminal Activity (1) Criminal Behavior (3) Crimm (1) Cyber-Stalking (2) Dating Violence (1) Deviant Behavior (6) Domestic Violence (7) E-Scams And Warnings (1) Elder Abuse (9) Elder Scams (1) Empathy (1) Extortion (1) Eyeballing a Shopping Center (1) Facebook (9) Fakes (1) Family Security (1) Fat People (1) FBI (1) Federal Law (1) Financial (2) Fire (1) Fraud (9) FREE (4) Fun and Games (1) Global Crime on World Wide Net (1) Golden Rules (1) Government (1) Guilt (2) Hackers (1) Harassment (1) Help (2) Help Needed (1) Home Invasion (2) How to Prevent Rape (1) ID Theft (96) Info. (1) Intent (1) Internet Crime (6) Internet Fraud (1) Internet Fraud and Scams (7) Internet Predators (1) Internet Security (30) Jobs (1) Kidnapping (1) Larceny (2) Laughs (3) Law (1) Medician and Law (1) Megans Law (1) Mental Health (1) Mental Health Sexual (1) Misc. (11) Missing Cash (5) Missing Money (1) Moner Matters (1) Money Matters (1) Money Saving Tips (11) Motive (1) Murder (1) Note from Birdy (1) Older Adults (1) Opinion (1) Opinions about this article are Welcome. (1) Personal Note (2) Personal Security and Safety (12) Porn (1) Prevention (2) Price of Crime (1) Private Life (1) Protect Our Kids (1) Protect Yourself (1) Protection Order (1) Psychopath (1) Psychopathy (1) Psychosis (1) PTSD (2) Punishment (1) Quoted Text (1) Rape (66) Ravishment (4) Read Me (1) Recovery (1) Regret (1) Religious Rape (1) Remorse (1) Road Rage (1) Robbery (5) Safety (2) SCAM (19) Scams (62) Schemes (1) Secrets (2) Security Threats (1) Serial Killer (2) Serial Killer/Rapist (4) Serial Killers (2) Sexual Assault (16) Sexual Assault - Spanish Version (3) Sexual Assault against Females (5) Sexual Education (1) Sexual Harassment (1) Sexual Trauma. (4) Shame (1) Sociopath (2) Sociopathy (1) Spam (6) Spyware (1) SSN's (4) Stalking (1) State Law (1) Stress (1) Survival (2) Sympathy (1) Tax Evasion (1) Theft (13) this Eve (1) Tips (13) Tips on Prevention (14) Travel (5) Tricks (1) Twitter (1) Unemployment (1) Victim (1) Victim Rights (9) Victimization (1) Violence against Women (1) Violence. (3) vs. (1) Vulnerable Victims (1) What Not To Buy (2)