<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xml:base="http://blog.intelius.com"  xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
 <title>Intelius - Cyber Safety</title>
 <link>http://blog.intelius.com/taxonomy/term/49/0</link>
 <description></description>
 <language>en</language>
<item>
 <title>Latest Phishing Scam: Email Scamers are Taking Advantage of Twitter-style Alerts!</title>
 <link>http://blog.intelius.com/latest-phishing-scam-email-scamers-are-taking-advantage-twitter-style-alerts</link>
 <description>&lt;p&gt;With an estimated &lt;a href=&quot;http://www.networkworld.com/news/2010/061610-37-billion-phishing-emails-were.html&quot; target=&quot;_new&quot;&gt;3.7 billion&lt;/a&gt; phishing emails sent in the past year it is no surprise that phishers have set their sights on Twitter. The latest &lt;a href=&quot;http://news.cnet.com/8301-27080_3-20007246-245.html&quot; target=&quot;_new&quot;&gt;phishing scam&lt;/a&gt; sweeping the ‘Net&#039; is a spam campaign designed to look like legitimate Twitter notifications. &lt;/p&gt;&lt;p&gt;The emails take &lt;a href=&quot;http://news.cnet.com/8301-27080_3-20007246-245.html&quot;&gt;many forms&lt;/a&gt;: Some resemble messages from Twitter customer support claiming that the site has detected an attempt to steal the receiver&#039;s Twitter password. Others claim that the recipient has changed the e-mail address associated with their account and ask them to confirm. The links in these emails lead either to a downloadable &quot;secure module&quot; which the emails claim will protect the account but is actually malware or to a phishing site designed to steal the user&#039;s account information. Online pharmacy spammers have also taken to Twitter-formatted emails to advertise non-FDA approved pills. &lt;/p&gt;&lt;p&gt;Those these scams don&#039;t seem very threatening at first (I mean, how much damage can some do with 140 characters?) but the repercussions having your Twitter account hacked are HUGE! Many people use the same password they use for Twitter for many other online sites; from Facebook to online banking, people just aren&#039;t taking necessary precautions with their passwords. So, if you enter your account information into phishing site and you use the same password for Twitter as sites like Facebook or your email that may house more personal information, the scammer can potentially get into your other accounts. &lt;/p&gt;&lt;p&gt;These scams, discovered by Trend Micro, are easily avoidable if you are aware of them and know what a legitimate Twitter email does and does not contain.* &lt;/p&gt;&lt;ul&gt;&lt;li&gt;Twitter does not send links to &quot;secure modules&quot;. &lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;Twitter emails request confirmations include the new account information.&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;Twitter emails do no describe or promote new services or products. &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;* Twitter email specifications via &lt;a href=&quot;http://blog.trendmicro.com/page/2/&quot; target=&quot;_new&quot;&gt;Trend Micro&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Before you get hacked, consider taking these precautions:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Always read emails completely and thoroughly before clinking though the links. It can take a while for news of the latest scam to reach your ears so keeping a vigilant eye on all your emails is a must! &lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;Use different, high quality, passwords for Twitter, Facebook, your email, and your online banking account. Secure passwords contain a random series of lower and upper case letters, numbers, and approved symbols. Such passwords should be more than 8 characters in length&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;Consider and Identity Protection service. Investing in and identity protection service, such as Intelius &lt;a href=&quot;http://www.intelius.com/idprotect.html&quot; target=&quot;_new&quot;&gt;IdentityProtect&lt;/a&gt;, can prevent a scammer that acquires your information from using it. This useful advantage could save you tons of time and money. &lt;/li&gt;&lt;/ul&gt;&lt;div class=&quot;comment-link&quot;&gt;&lt;a href=&quot;/latest-phishing-scam-email-scamers-are-taking-advantage-twitter-style-alerts#comments&quot;&gt;0 comments&lt;/a&gt; &amp;ndash; &lt;a href=&quot;/latest-phishing-scam-email-scamers-are-taking-advantage-twitter-style-alerts#comments&quot;&gt;Read/add comments&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;service-links&quot;&gt;&lt;div class=&quot;service-label&quot;&gt;Bookmark/Search this post with: &lt;/div&gt;&lt;ul class=&quot;links&quot;&gt;&lt;li class=&quot;service_links_delicious first&quot;&gt;&lt;a href=&quot;http://del.icio.us/post?url=http%3A%2F%2Fblog.intelius.com%2Flatest-phishing-scam-email-scamers-are-taking-advantage-twitter-style-alerts&amp;amp;title=Latest+Phishing+Scam%3A+Email+Scamers+are+Taking+Advantage+of+Twitter-style+Alerts%21&quot; title=&quot;Bookmark this post on del.icio.us.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/delicious.png&quot; alt=&quot;Delicious&quot; /&gt; Delicious&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_digg&quot;&gt;&lt;a href=&quot;http://digg.com/submit?phase=2&amp;amp;url=http%3A%2F%2Fblog.intelius.com%2Flatest-phishing-scam-email-scamers-are-taking-advantage-twitter-style-alerts&amp;amp;title=Latest+Phishing+Scam%3A+Email+Scamers+are+Taking+Advantage+of+Twitter-style+Alerts%21&quot; title=&quot;Digg this post on digg.com.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/digg.png&quot; alt=&quot;Digg&quot; /&gt; Digg&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_stumbleupon&quot;&gt;&lt;a href=&quot;http://www.stumbleupon.com/submit?url=http%3A%2F%2Fblog.intelius.com%2Flatest-phishing-scam-email-scamers-are-taking-advantage-twitter-style-alerts&amp;amp;title=Latest+Phishing+Scam%3A+Email+Scamers+are+Taking+Advantage+of+Twitter-style+Alerts%21&quot; title=&quot;Thumb this up at StumbleUpon.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/stumbleit.png&quot; alt=&quot;StumbleUpon&quot; /&gt; StumbleUpon&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_propeller&quot;&gt;&lt;a href=&quot;http://www.propeller.com/submit/?U=http%3A%2F%2Fblog.intelius.com%2Flatest-phishing-scam-email-scamers-are-taking-advantage-twitter-style-alerts&amp;amp;T=Latest+Phishing+Scam%3A+Email+Scamers+are+Taking+Advantage+of+Twitter-style+Alerts%21&quot; title=&quot;Submit to Propeller.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/propeller.png&quot; alt=&quot;Propeller&quot; /&gt; Propeller&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_reddit&quot;&gt;&lt;a href=&quot;http://reddit.com/submit?url=http%3A%2F%2Fblog.intelius.com%2Flatest-phishing-scam-email-scamers-are-taking-advantage-twitter-style-alerts&amp;amp;title=Latest+Phishing+Scam%3A+Email+Scamers+are+Taking+Advantage+of+Twitter-style+Alerts%21&quot; title=&quot;Submit this post on reddit.com.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/reddit.png&quot; alt=&quot;Reddit&quot; /&gt; Reddit&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_magnoliacom&quot;&gt;&lt;a href=&quot;http://ma.gnolia.com/bookmarklet/add?url=http%3A%2F%2Fblog.intelius.com%2Flatest-phishing-scam-email-scamers-are-taking-advantage-twitter-style-alerts&amp;amp;title=Latest+Phishing+Scam%3A+Email+Scamers+are+Taking+Advantage+of+Twitter-style+Alerts%21&quot; title=&quot;Submit this post on ma.gnolia.com.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/magnoliacom.png&quot; alt=&quot;Magnoliacom&quot; /&gt; Magnoliacom&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_furl&quot;&gt;&lt;a href=&quot;http://www.furl.net/storeIt.jsp?u=http%3A%2F%2Fblog.intelius.com%2Flatest-phishing-scam-email-scamers-are-taking-advantage-twitter-style-alerts&amp;amp;t=Latest+Phishing+Scam%3A+Email+Scamers+are+Taking+Advantage+of+Twitter-style+Alerts%21&quot; title=&quot;Submit this post on furl.net.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/furl.png&quot; alt=&quot;Furl&quot; /&gt; Furl&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_facebook&quot;&gt;&lt;a href=&quot;http://www.facebook.com/sharer.php?u=http%3A%2F%2Fblog.intelius.com%2Flatest-phishing-scam-email-scamers-are-taking-advantage-twitter-style-alerts&amp;amp;t=Latest+Phishing+Scam%3A+Email+Scamers+are+Taking+Advantage+of+Twitter-style+Alerts%21&quot; title=&quot;Share on Facebook.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/facebook.png&quot; alt=&quot;Facebook&quot; /&gt; Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_google&quot;&gt;&lt;a href=&quot;http://www.google.com/bookmarks/mark?op=add&amp;amp;bkmk=http%3A%2F%2Fblog.intelius.com%2Flatest-phishing-scam-email-scamers-are-taking-advantage-twitter-style-alerts&amp;amp;title=Latest+Phishing+Scam%3A+Email+Scamers+are+Taking+Advantage+of+Twitter-style+Alerts%21&quot; title=&quot;Bookmark this post on Google.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/google.png&quot; alt=&quot;Google&quot; /&gt; Google&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_yahoo&quot;&gt;&lt;a href=&quot;http://myweb2.search.yahoo.com/myresults/bookmarklet?u=http%3A%2F%2Fblog.intelius.com%2Flatest-phishing-scam-email-scamers-are-taking-advantage-twitter-style-alerts&amp;amp;t=Latest+Phishing+Scam%3A+Email+Scamers+are+Taking+Advantage+of+Twitter-style+Alerts%21&quot; title=&quot;Bookmark this post on Yahoo.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/yahoo.png&quot; alt=&quot;Yahoo&quot; /&gt; Yahoo&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_technorati last&quot;&gt;&lt;a href=&quot;http://technorati.com/cosmos/search.html?url=http%3A%2F%2Fblog.intelius.com%2Flatest-phishing-scam-email-scamers-are-taking-advantage-twitter-style-alerts&quot; title=&quot;Search Technorati for links to this post.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/technorati.png&quot; alt=&quot;Technorati&quot; /&gt; Technorati&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;&lt;p&gt;&lt;a href=&quot;http://blog.intelius.com/latest-phishing-scam-email-scamers-are-taking-advantage-twitter-style-alerts&quot; target=&quot;_blank&quot;&gt;read more&lt;/a&gt;&lt;/p&gt;</description>
 <comments>http://blog.intelius.com/latest-phishing-scam-email-scamers-are-taking-advantage-twitter-style-alerts#comments</comments>
 <category domain="http://blog.intelius.com/category/tags/culture">Culture</category>
 <category domain="http://blog.intelius.com/category/tags/cyber-crimes">Cyber Crimes</category>
 <category domain="http://blog.intelius.com/category/tags/cyber-safety">Cyber Safety</category>
 <category domain="http://blog.intelius.com/category/tags/cyber-security">Cyber Security</category>
 <category domain="http://blog.intelius.com/category/tags/email-scam">Email Scam</category>
 <category domain="http://blog.intelius.com/category/tags/employment">Employment</category>
 <category domain="http://blog.intelius.com/category/tags/identity-management">Identity Management</category>
 <category domain="http://blog.intelius.com/category/tags/identity-protection">Identity Protection</category>
 <category domain="http://blog.intelius.com/category/tags/identity-theft">identity theft</category>
 <category domain="http://blog.intelius.com/category/tags/intelius">Intelius</category>
 <category domain="http://blog.intelius.com/category/tags/personal-security">Personal Security</category>
 <category domain="http://blog.intelius.com/category/tags/phishing">phishing</category>
 <category domain="http://blog.intelius.com/category/tags/scam">Scam</category>
 <category domain="http://blog.intelius.com/category/tags/social-media">Social Media</category>
 <category domain="http://blog.intelius.com/category/tags/social-networks">Social Networks</category>
 <category domain="http://blog.intelius.com/category/tags/twitter">Twitter</category>
 <pubDate>Fri, 25 Jun 2010 00:59:00 +0000</pubDate>
 <dc:creator>drupal_admin</dc:creator>
 <guid isPermaLink="false">253 at http://blog.intelius.com</guid>
</item>
<item>
 <title>The latest scam YOU need to be aware of: &#039;tabnabbing&#039;</title>
 <link>http://blog.intelius.com/latest-scam-you-need-be-aware-tabnabbing</link>
 <description>&lt;p&gt;Think ‘tabnabbing’ sounds like the latest prank involving filing 
supplies and the office clown? Think again.&amp;nbsp; Tabnabbing (also referred 
to as tabnapping) is a new type of phishing attack that is sweeping the 
internet.&amp;nbsp; Most phishing scams rely on you clicking on an imbedded link 
or downloading a file you find in a suspect email, sketchy website or a 
pop up window.&amp;nbsp; Tabnabbing occurs in the background after your focus 
shifts away from a malicious or compromised site.&amp;nbsp; &amp;nbsp;&lt;/p&gt;&lt;p&gt;“What we 
don’t expect is that a page we’ve been looking at will change behind our
 backs, when we aren’t looking. That’ll catch us by surprise,” Said Aza 
Raskin, Firefox&#039;s creative lead who identified the attack.&amp;nbsp; “Most people
 keep multiple tabs open, often for long periods.” &lt;/p&gt;&lt;p&gt;This 
attack uses JavaScript to discretely change the contents of an open but 
not active tab in your browser to look like the log-in screen of a bank,
 credit card company, popular retail site, social networking site or 
email provider.&amp;nbsp; This page transformation only occurs after the page 
becomes “inactive” while a victim moves to another tab or open program. 
The scammers are relying on users thinking they left a login page tab 
open.&amp;nbsp; &amp;nbsp;&lt;/p&gt;&lt;p&gt;&quot;When they click back to the fake tab, they&#039;ll see 
the standard Gmail log-in page, assume they&#039;ve been logged out, and 
provide their credentials to log in,&quot; says Raskin. &lt;/p&gt;&lt;p&gt;Raskin was
 able to recreate “tabnabbing” on his own blog to show users what to 
look for.&amp;nbsp; You can try it &lt;a href=&quot;http://www.azarask.in/blog/post/a-new-type-of-phishing-attack/&quot; target=&quot;_new&quot;&gt;here&lt;/a&gt;.
 After clicking the link, open a new tab, or simply click away from the 
page for a few seconds and then go back to the original tab.&amp;nbsp; While the 
URL hasn’t changed, the original blog content you saw only moments ago 
has been replaced with what appears to be a Gmail login page.&amp;nbsp; In this 
case the Gmail login page is just an image; however, in the case of an 
actual tabnabbing attack the page will be a functional login form. &lt;/p&gt;&lt;p&gt;In
 an actual attack after the user enters their login information, it’s 
sent it back to the attacker, and then the victim redirected back to the
 site they think they are logging into. This often goes completely &lt;br /&gt;undetected
 because often the victim was never logged out in the first place, and 
it will simply appear as if the login was successful, never realizing 
that they just handed over the all credentials the attacker needed to 
access their account.&amp;nbsp; &amp;nbsp;&lt;/p&gt;&lt;p&gt;It is even possible for attackers to 
detect which sites are in your history as well as what sites you are 
currently logged into and then customize the fake page to resemble a 
site you often use or are currently logged into, making this form of 
attack extremely effective and difficult to detect.&amp;nbsp; All major browsers 
are susceptible to this attack. &amp;nbsp;&lt;/p&gt;&lt;p&gt;Here’s what to watch for and
 how to avoid a potential tabnabbing attack and keep your identity, 
information, and login credentials safe:&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Don&#039;t log-in on a
 tab that you haven&#039;t opened yourself.&lt;/strong&gt; Since the tabnabbing tactic 
banks on you trusting that you opened the tab -- and that the site 
simply timed out -- the best defense is this offensive move. In other 
words, if you see a tab that contains a seemingly-legit log-in form, 
close it, then head to the site yourself in a new tab. &lt;/p&gt;&lt;p&gt;&lt;strong&gt;Enable
 browser settings and filters that will alert you to potential attacks.&lt;/strong&gt;
 For Internet Explorer (IE) use SmartScreen. In Firefox and Chrome it&#039;s 
called &quot;Phishing and Malware Protection;&quot; Safari doesn&#039;t give it a name,
 but offers a setting that reads, &quot;Warn when visiting a fraudulent 
website&quot; in the Security section of its Preferences settings. &lt;/p&gt;&lt;p&gt;&lt;strong&gt;Look
 at the URL in your browser&#039;s address bar before filing in any&lt;/strong&gt; form 
or giving out any personal information and verify the URL matches the 
login page. If there’s a discrepancy, close the tab &lt;br /&gt;immediately. &lt;/p&gt;&lt;p&gt;&lt;strong&gt;Use
 a password manager.&lt;/strong&gt; Third-party browser password managers like &lt;a href=&quot;http://www.roboform.com/&quot; target=&quot;_new&quot;&gt;RoboForm&lt;/a&gt; for Windows or &lt;a href=&quot;http://agilewebsolutions.com/products/1Password&quot; target=&quot;_new&quot;&gt;1Password&lt;/a&gt;
 for Mac link saved log-in usernames and passwords to a specific URL. 
When you save the username and password on the log-in page of the 
legitimate site, the password manager won&#039;t auto enter the username and 
password into a non-matching URL which should alert you to a possible 
tabnabbing attempt. &lt;/p&gt;&lt;p&gt;For more info on avoiding Tabnapping read 
ComputerWorld’s &lt;a href=&quot;http://www.computerworld.com/s/article/9177398/How_to_foil_Web_browser_tabnapping_&quot; target=&quot;_new&quot;&gt;How
 to Foil Web Browser Tabnapping. &lt;/a&gt;&lt;/p&gt;&lt;div class=&quot;comment-link&quot;&gt;&lt;a href=&quot;/latest-scam-you-need-be-aware-tabnabbing#comments&quot;&gt;2 comments&lt;/a&gt; &amp;ndash; &lt;a href=&quot;/latest-scam-you-need-be-aware-tabnabbing#comments&quot;&gt;Read/add comments&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;service-links&quot;&gt;&lt;div class=&quot;service-label&quot;&gt;Bookmark/Search this post with: &lt;/div&gt;&lt;ul class=&quot;links&quot;&gt;&lt;li class=&quot;service_links_delicious first&quot;&gt;&lt;a href=&quot;http://del.icio.us/post?url=http%3A%2F%2Fblog.intelius.com%2Flatest-scam-you-need-be-aware-tabnabbing&amp;amp;title=The+latest+scam+YOU+need+to+be+aware+of%3A+%27tabnabbing%27&quot; title=&quot;Bookmark this post on del.icio.us.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/delicious.png&quot; alt=&quot;Delicious&quot; /&gt; Delicious&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_digg&quot;&gt;&lt;a href=&quot;http://digg.com/submit?phase=2&amp;amp;url=http%3A%2F%2Fblog.intelius.com%2Flatest-scam-you-need-be-aware-tabnabbing&amp;amp;title=The+latest+scam+YOU+need+to+be+aware+of%3A+%27tabnabbing%27&quot; title=&quot;Digg this post on digg.com.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/digg.png&quot; alt=&quot;Digg&quot; /&gt; Digg&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_stumbleupon&quot;&gt;&lt;a href=&quot;http://www.stumbleupon.com/submit?url=http%3A%2F%2Fblog.intelius.com%2Flatest-scam-you-need-be-aware-tabnabbing&amp;amp;title=The+latest+scam+YOU+need+to+be+aware+of%3A+%27tabnabbing%27&quot; title=&quot;Thumb this up at StumbleUpon.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/stumbleit.png&quot; alt=&quot;StumbleUpon&quot; /&gt; StumbleUpon&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_propeller&quot;&gt;&lt;a href=&quot;http://www.propeller.com/submit/?U=http%3A%2F%2Fblog.intelius.com%2Flatest-scam-you-need-be-aware-tabnabbing&amp;amp;T=The+latest+scam+YOU+need+to+be+aware+of%3A+%27tabnabbing%27&quot; title=&quot;Submit to Propeller.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/propeller.png&quot; alt=&quot;Propeller&quot; /&gt; Propeller&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_reddit&quot;&gt;&lt;a href=&quot;http://reddit.com/submit?url=http%3A%2F%2Fblog.intelius.com%2Flatest-scam-you-need-be-aware-tabnabbing&amp;amp;title=The+latest+scam+YOU+need+to+be+aware+of%3A+%27tabnabbing%27&quot; title=&quot;Submit this post on reddit.com.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/reddit.png&quot; alt=&quot;Reddit&quot; /&gt; Reddit&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_magnoliacom&quot;&gt;&lt;a href=&quot;http://ma.gnolia.com/bookmarklet/add?url=http%3A%2F%2Fblog.intelius.com%2Flatest-scam-you-need-be-aware-tabnabbing&amp;amp;title=The+latest+scam+YOU+need+to+be+aware+of%3A+%27tabnabbing%27&quot; title=&quot;Submit this post on ma.gnolia.com.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/magnoliacom.png&quot; alt=&quot;Magnoliacom&quot; /&gt; Magnoliacom&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_furl&quot;&gt;&lt;a href=&quot;http://www.furl.net/storeIt.jsp?u=http%3A%2F%2Fblog.intelius.com%2Flatest-scam-you-need-be-aware-tabnabbing&amp;amp;t=The+latest+scam+YOU+need+to+be+aware+of%3A+%27tabnabbing%27&quot; title=&quot;Submit this post on furl.net.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/furl.png&quot; alt=&quot;Furl&quot; /&gt; Furl&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_facebook&quot;&gt;&lt;a href=&quot;http://www.facebook.com/sharer.php?u=http%3A%2F%2Fblog.intelius.com%2Flatest-scam-you-need-be-aware-tabnabbing&amp;amp;t=The+latest+scam+YOU+need+to+be+aware+of%3A+%27tabnabbing%27&quot; title=&quot;Share on Facebook.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/facebook.png&quot; alt=&quot;Facebook&quot; /&gt; Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_google&quot;&gt;&lt;a href=&quot;http://www.google.com/bookmarks/mark?op=add&amp;amp;bkmk=http%3A%2F%2Fblog.intelius.com%2Flatest-scam-you-need-be-aware-tabnabbing&amp;amp;title=The+latest+scam+YOU+need+to+be+aware+of%3A+%27tabnabbing%27&quot; title=&quot;Bookmark this post on Google.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/google.png&quot; alt=&quot;Google&quot; /&gt; Google&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_yahoo&quot;&gt;&lt;a href=&quot;http://myweb2.search.yahoo.com/myresults/bookmarklet?u=http%3A%2F%2Fblog.intelius.com%2Flatest-scam-you-need-be-aware-tabnabbing&amp;amp;t=The+latest+scam+YOU+need+to+be+aware+of%3A+%27tabnabbing%27&quot; title=&quot;Bookmark this post on Yahoo.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/yahoo.png&quot; alt=&quot;Yahoo&quot; /&gt; Yahoo&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_technorati last&quot;&gt;&lt;a href=&quot;http://technorati.com/cosmos/search.html?url=http%3A%2F%2Fblog.intelius.com%2Flatest-scam-you-need-be-aware-tabnabbing&quot; title=&quot;Search Technorati for links to this post.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/technorati.png&quot; alt=&quot;Technorati&quot; /&gt; Technorati&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;&lt;p&gt;&lt;a href=&quot;http://blog.intelius.com/latest-scam-you-need-be-aware-tabnabbing&quot; target=&quot;_blank&quot;&gt;read more&lt;/a&gt;&lt;/p&gt;</description>
 <comments>http://blog.intelius.com/latest-scam-you-need-be-aware-tabnabbing#comments</comments>
 <category domain="http://blog.intelius.com/category/tags/cyber-crimes">Cyber Crimes</category>
 <category domain="http://blog.intelius.com/category/tags/cyber-safety">Cyber Safety</category>
 <category domain="http://blog.intelius.com/category/tags/cyber-security">Cyber Security</category>
 <category domain="http://blog.intelius.com/category/tags/hacking">hacking</category>
 <category domain="http://blog.intelius.com/category/tags/identity-theft">identity theft</category>
 <category domain="http://blog.intelius.com/category/tags/intelius">Intelius</category>
 <category domain="http://blog.intelius.com/category/tags/phishing">phishing</category>
 <category domain="http://blog.intelius.com/category/tags/raskin">Raskin</category>
 <category domain="http://blog.intelius.com/category/tags/scam">Scam</category>
 <category domain="http://blog.intelius.com/category/tags/tabnabbing">tabnabbing</category>
 <category domain="http://blog.intelius.com/category/tags/tabnapping">tabnapping</category>
 <pubDate>Fri, 11 Jun 2010 01:55:00 +0000</pubDate>
 <dc:creator>drupal_admin</dc:creator>
 <guid isPermaLink="false">247 at http://blog.intelius.com</guid>
</item>
<item>
 <title>TMI: Does Your Social Networking Activity Make You Vulnerable to Online Criminals?</title>
 <link>http://blog.intelius.com/tmi-does-your-social-networking-activity-make-you-vulnerable-online-criminals</link>
 <description>&lt;p&gt;&lt;img src=&quot;/corp/files/corp/blog/shutterstock_9782032-resized-600.jpg&quot; width=&quot;350&quot; height=&quot;233&quot; style=&quot;float: left; border: 0pt none; margin: 0px 10px;margin-bottom:10px;&quot; /&gt;&lt;/p&gt;&lt;p&gt;MySpace, Facebook, Twitter, LinkedIn - with all the options and advantages, who doesn&#039;t have at least one social networking profile these days? The growth of online social networking in recent years has provided people with a new way to keep up with friends and family and connect with people all over the world. &lt;br /&gt;&lt;br /&gt;What we sometimes don&#039;t realize, is that a lot of the information we post on these sites intended for our friends, family or trusted colleagues can also be seen by complete strangers.&amp;nbsp; Criminals have found a new source for information that can be used for crimes like identity theft, fraud and other scams that are sweeping the internet.&amp;nbsp;&amp;nbsp; These criminals aren&#039;t looking for simple public record data, rather; it is the content of posts, updates and tweets that is putting social networking site users at increasing risk.&lt;br /&gt;&lt;br /&gt;Social networking sites allow us to be constantly connected, to post whatever we want whenever we want, and we often don&#039;t think twice about what we post. Even in Twitter&#039;s 140 characters you have the opportunity to divulge enough personal information for an experienced online criminal to do harm. You may inadvertently give away your location by posting about your job, or you may post about a struggle you&#039;ve been having with your bank and thus alert the social networking universe as to where you bank, what kind of banking you do, and what kind of account you have. Posting you mother&#039;s maiden name, mentioning an upcoming high school or college reunion, or talking about your favorite pets can provide criminals with just enough information about you to guess your password. &lt;br /&gt;&lt;br /&gt;So what can you do to keep you identity from being stolen based on the information on your social networking profile? Check out the tips bellow to find out how you can keep safe:&lt;/p&gt;&lt;ul class=&quot;unIndentedList&quot;&gt;&lt;li&gt; &lt;strong&gt;Keep your information to yourself.&lt;/strong&gt; Don&#039;t post your full name (at least leave out your middle initial), your address, your email address, birth date, or your phone number to any of your social networking profiles. Though most social networking sites prompt for them they aren&#039;t required, so don&#039;t post them. &lt;/li&gt;&lt;/ul&gt;&lt;ul class=&quot;unIndentedList&quot;&gt;&lt;li&gt; &lt;strong&gt;Make all of your social networking profiles private&lt;/strong&gt;, allowing only limited information to be viewed by people you have not approved as ‘friends&#039; or ‘followers&#039;.&lt;/li&gt;&lt;/ul&gt;&lt;ul class=&quot;unIndentedList&quot;&gt;&lt;li&gt;&lt;strong&gt; Only ‘friend&#039; people you actually know.&lt;/strong&gt; It isn&#039;t uncommon for people to accept a friend request from someone because they have a mutual friend or even a complete stranger. Often online fraudsters will friend as many users as they can with the hope that someone will take the bait. If you aren&#039;t sure if you know someone, confirm their identity before you add them. If you can&#039;t confirm, don&#039;t add them. Remember, the casual social networker uses their profile to keep up with friends and family, so why would you allow someone into your network who wasn&#039;t a friend or family member?&lt;/li&gt;&lt;/ul&gt;&lt;ul class=&quot;unIndentedList&quot;&gt;&lt;li&gt; &lt;strong&gt;Use secure passwords. &lt;/strong&gt;Pick your passwords wisely, passwords that reflect your personal tastes or are ‘easy&#039; to remember are often easy to guess. Consider a random set of capital and lower case letters and numbers, no less than eight characters. It&#039;s also a good idea to use different passwords for things like bank accounts than you do for social networking sites or email accounts. &lt;/li&gt;&lt;/ul&gt;&lt;ul class=&quot;unIndentedList&quot;&gt;&lt;li&gt;&lt;strong&gt; Always think twice before you post.&lt;/strong&gt; Remember that if you post something online it can&#039;t be taken back. Just because you delete something, there is a chance that the information is cached on the site or is available on archiving sites. So before you update your page on-the-fly from your cell phone be sure to THINK about what you are posting and how the information could be used and who has the ability to see it. &lt;/li&gt;&lt;/ul&gt;&lt;ul class=&quot;unIndentedList&quot;&gt;&lt;li&gt; &lt;strong&gt;Talk to your kids about the risks.&lt;/strong&gt; You aren&#039;t the only one online; if you have kids make sure they are practicing safe online habits. Talk to them about internet and social networking safety before anything has the chance to go wrong. &lt;/li&gt;&lt;/ul&gt;&lt;div class=&quot;comment-link&quot;&gt;&lt;a href=&quot;/tmi-does-your-social-networking-activity-make-you-vulnerable-online-criminals#comments&quot;&gt;0 comments&lt;/a&gt; &amp;ndash; &lt;a href=&quot;/tmi-does-your-social-networking-activity-make-you-vulnerable-online-criminals#comments&quot;&gt;Read/add comments&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;service-links&quot;&gt;&lt;div class=&quot;service-label&quot;&gt;Bookmark/Search this post with: &lt;/div&gt;&lt;ul class=&quot;links&quot;&gt;&lt;li class=&quot;service_links_delicious first&quot;&gt;&lt;a href=&quot;http://del.icio.us/post?url=http%3A%2F%2Fblog.intelius.com%2Ftmi-does-your-social-networking-activity-make-you-vulnerable-online-criminals&amp;amp;title=TMI%3A+Does+Your+Social+Networking+Activity+Make+You+Vulnerable+to+Online+Criminals%3F&quot; title=&quot;Bookmark this post on del.icio.us.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/delicious.png&quot; alt=&quot;Delicious&quot; /&gt; Delicious&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_digg&quot;&gt;&lt;a href=&quot;http://digg.com/submit?phase=2&amp;amp;url=http%3A%2F%2Fblog.intelius.com%2Ftmi-does-your-social-networking-activity-make-you-vulnerable-online-criminals&amp;amp;title=TMI%3A+Does+Your+Social+Networking+Activity+Make+You+Vulnerable+to+Online+Criminals%3F&quot; title=&quot;Digg this post on digg.com.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/digg.png&quot; alt=&quot;Digg&quot; /&gt; Digg&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_stumbleupon&quot;&gt;&lt;a href=&quot;http://www.stumbleupon.com/submit?url=http%3A%2F%2Fblog.intelius.com%2Ftmi-does-your-social-networking-activity-make-you-vulnerable-online-criminals&amp;amp;title=TMI%3A+Does+Your+Social+Networking+Activity+Make+You+Vulnerable+to+Online+Criminals%3F&quot; title=&quot;Thumb this up at StumbleUpon.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/stumbleit.png&quot; alt=&quot;StumbleUpon&quot; /&gt; StumbleUpon&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_propeller&quot;&gt;&lt;a href=&quot;http://www.propeller.com/submit/?U=http%3A%2F%2Fblog.intelius.com%2Ftmi-does-your-social-networking-activity-make-you-vulnerable-online-criminals&amp;amp;T=TMI%3A+Does+Your+Social+Networking+Activity+Make+You+Vulnerable+to+Online+Criminals%3F&quot; title=&quot;Submit to Propeller.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/propeller.png&quot; alt=&quot;Propeller&quot; /&gt; Propeller&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_reddit&quot;&gt;&lt;a href=&quot;http://reddit.com/submit?url=http%3A%2F%2Fblog.intelius.com%2Ftmi-does-your-social-networking-activity-make-you-vulnerable-online-criminals&amp;amp;title=TMI%3A+Does+Your+Social+Networking+Activity+Make+You+Vulnerable+to+Online+Criminals%3F&quot; title=&quot;Submit this post on reddit.com.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/reddit.png&quot; alt=&quot;Reddit&quot; /&gt; Reddit&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_magnoliacom&quot;&gt;&lt;a href=&quot;http://ma.gnolia.com/bookmarklet/add?url=http%3A%2F%2Fblog.intelius.com%2Ftmi-does-your-social-networking-activity-make-you-vulnerable-online-criminals&amp;amp;title=TMI%3A+Does+Your+Social+Networking+Activity+Make+You+Vulnerable+to+Online+Criminals%3F&quot; title=&quot;Submit this post on ma.gnolia.com.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/magnoliacom.png&quot; alt=&quot;Magnoliacom&quot; /&gt; Magnoliacom&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_furl&quot;&gt;&lt;a href=&quot;http://www.furl.net/storeIt.jsp?u=http%3A%2F%2Fblog.intelius.com%2Ftmi-does-your-social-networking-activity-make-you-vulnerable-online-criminals&amp;amp;t=TMI%3A+Does+Your+Social+Networking+Activity+Make+You+Vulnerable+to+Online+Criminals%3F&quot; title=&quot;Submit this post on furl.net.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/furl.png&quot; alt=&quot;Furl&quot; /&gt; Furl&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_facebook&quot;&gt;&lt;a href=&quot;http://www.facebook.com/sharer.php?u=http%3A%2F%2Fblog.intelius.com%2Ftmi-does-your-social-networking-activity-make-you-vulnerable-online-criminals&amp;amp;t=TMI%3A+Does+Your+Social+Networking+Activity+Make+You+Vulnerable+to+Online+Criminals%3F&quot; title=&quot;Share on Facebook.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/facebook.png&quot; alt=&quot;Facebook&quot; /&gt; Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_google&quot;&gt;&lt;a href=&quot;http://www.google.com/bookmarks/mark?op=add&amp;amp;bkmk=http%3A%2F%2Fblog.intelius.com%2Ftmi-does-your-social-networking-activity-make-you-vulnerable-online-criminals&amp;amp;title=TMI%3A+Does+Your+Social+Networking+Activity+Make+You+Vulnerable+to+Online+Criminals%3F&quot; title=&quot;Bookmark this post on Google.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/google.png&quot; alt=&quot;Google&quot; /&gt; Google&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_yahoo&quot;&gt;&lt;a href=&quot;http://myweb2.search.yahoo.com/myresults/bookmarklet?u=http%3A%2F%2Fblog.intelius.com%2Ftmi-does-your-social-networking-activity-make-you-vulnerable-online-criminals&amp;amp;t=TMI%3A+Does+Your+Social+Networking+Activity+Make+You+Vulnerable+to+Online+Criminals%3F&quot; title=&quot;Bookmark this post on Yahoo.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/yahoo.png&quot; alt=&quot;Yahoo&quot; /&gt; Yahoo&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_technorati last&quot;&gt;&lt;a href=&quot;http://technorati.com/cosmos/search.html?url=http%3A%2F%2Fblog.intelius.com%2Ftmi-does-your-social-networking-activity-make-you-vulnerable-online-criminals&quot; title=&quot;Search Technorati for links to this post.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/technorati.png&quot; alt=&quot;Technorati&quot; /&gt; Technorati&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;&lt;p&gt;&lt;a href=&quot;http://blog.intelius.com/tmi-does-your-social-networking-activity-make-you-vulnerable-online-criminals&quot; target=&quot;_blank&quot;&gt;read more&lt;/a&gt;&lt;/p&gt;</description>
 <comments>http://blog.intelius.com/tmi-does-your-social-networking-activity-make-you-vulnerable-online-criminals#comments</comments>
 <category domain="http://blog.intelius.com/category/tags/cyber-safety">Cyber Safety</category>
 <category domain="http://blog.intelius.com/category/tags/identity-theft">identity theft</category>
 <category domain="http://blog.intelius.com/category/tags/social-networks">Social Networks</category>
 <category domain="http://blog.intelius.com/category/tags/teen-safety">teen safety</category>
 <category domain="http://blog.intelius.com/category/tags/teens-facebook">teens on facebook</category>
 <category domain="http://blog.intelius.com/category/tags/tmi">TMI</category>
 <pubDate>Tue, 27 Apr 2010 19:04:00 +0000</pubDate>
 <dc:creator>drupal_admin</dc:creator>
 <guid isPermaLink="false">211 at http://blog.intelius.com</guid>
</item>
<item>
 <title>Child Internet Safety: Is Your Child Practicing Safe Habits Online?</title>
 <link>http://blog.intelius.com/child-internet-safety-your-child-practicing-safe-habits-online</link>
 <description>&lt;p&gt;&lt;strong&gt;Do you talk to your kids about cyber safety?  This is an issue that many parents overlook as it was not a topic of conversation when they were growing up.  Nonetheless it is a topic that we encourage you to discuss with your kids.&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;img src=&quot;/corp/files/corp/blog/parents.JPG&quot; width=&quot;263&quot; height=&quot;176&quot; style=&quot;float: right; border: 0pt none; margin: 10px;&quot; /&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Cyberbullying &lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Schools, parents, and teachers are being faced with the issue of cyberbullying for the first time.  Bullying has always been a problem, but the onslaught of virtual communications such as text messages, emails and instant messages has given way to a whole new form of bullying. There have been numerous stories in the news recently of children falling victim to &lt;a href=&quot;http://www.wmur.com/education/23085193/detail.html&quot; target=&quot;_new&quot;&gt;cyberbullying&lt;/a&gt;.  The state of New Hampshire is currently in the process of passing a bill which will give schools the authority to address cyberbullying if it has an impact on the educational environment.  If the bill passes, many states will likely follow New Hampshire&#039;s lead. &lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;•	Monitor your children&#039;s online activity. Know which sites they are visiting and who they are talking to.  &lt;/p&gt;&lt;p&gt;•	In many cases parents are unaware that their child is being picked on online, talking to your kids about cyberbullying and encourage them to talk to you if they feel they are falling victim to a cyberbully. &lt;/p&gt;&lt;p&gt;•	Be aware that children and adults may have more than one profile on social sites such as facebook.com or myspace.com.  As a condition for allowing them online access, ask them to share their online profiles with you. &lt;/p&gt;&lt;p&gt;•	If you suspect that your child is hiding something from you, ask them to show you the most recent pictures they posted from their phone to their Facebook profile after they attend special events like a school dance, concert or party. Most likely they will post to their most active profile. &lt;/p&gt;&lt;p&gt;•	Establish limits for online use. If your child knows you&#039;re around or if they can only use the internet for a limited amount of time each day they will be less likely to put themselves in situations that make them vulnerable to cyberbullying. &lt;/p&gt;&lt;p&gt;•	Review your child&#039;s browsing history or set up parental controls that only allow your children to visit approved sites.  &lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;While computers have become a main staple in the curriculum of schools in the United States, &lt;a href=&quot;http://www.eschoolnews.com/2010/02/26/study-too-few-schools-are-teaching-cyber-safety/&quot; target=&quot;_new&quot;&gt;a study recently released&lt;/a&gt; by the National Cyber Security Alliance (NCSA) and supported by Microsoft Corp., revealed that less than 1/4 of teachers in the U.S. have spent more than six hours teaching cyber ethics, safety, or security in the last year.&lt;/p&gt;&lt;p&gt;As a parent you cannot depend upon your child&#039;s school to teach them about cyber safety.  If internet safety and security is part of the curriculum, sit down with your kids and ask them to tell you what they have learned.   If you feel that the school has missed some important points, this is your opportunity to bridge the gap. &lt;/p&gt;&lt;p&gt;As a parent you are raising a new technology driven generation of computer savvy Americans and it is up to us to make sure that they have the knowledge needed to remain safe while using these skills.  In each of these cases the most effective defense is having an open dialog with your kids.  This will make them more likely to come to you if a problem should arise.&lt;/p&gt;&lt;p&gt;&lt;u&gt;&lt;em&gt;What do you do to protect your kids online?&lt;/em&gt;&lt;/u&gt;&lt;/p&gt;&lt;p&gt;Comment below or send us a tweet &lt;a href=&quot;http://twitter.com/inteliusgal&quot; target=&quot;_new&quot;&gt;@Inteliusgal&lt;/a&gt; &lt;img src=&quot;/corp/files/corp/blog/icon_twitter.png&quot; align=&quot;left&quot; border=&quot;0&quot; /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;div class=&quot;comment-link&quot;&gt;&lt;a href=&quot;/child-internet-safety-your-child-practicing-safe-habits-online#comments&quot;&gt;0 comments&lt;/a&gt; &amp;ndash; &lt;a href=&quot;/child-internet-safety-your-child-practicing-safe-habits-online#comments&quot;&gt;Read/add comments&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;service-links&quot;&gt;&lt;div class=&quot;service-label&quot;&gt;Bookmark/Search this post with: &lt;/div&gt;&lt;ul class=&quot;links&quot;&gt;&lt;li class=&quot;service_links_delicious first&quot;&gt;&lt;a href=&quot;http://del.icio.us/post?url=http%3A%2F%2Fblog.intelius.com%2Fchild-internet-safety-your-child-practicing-safe-habits-online&amp;amp;title=Child+Internet+Safety%3A+Is+Your+Child+Practicing+Safe+Habits+Online%3F&quot; title=&quot;Bookmark this post on del.icio.us.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/delicious.png&quot; alt=&quot;Delicious&quot; /&gt; Delicious&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_digg&quot;&gt;&lt;a href=&quot;http://digg.com/submit?phase=2&amp;amp;url=http%3A%2F%2Fblog.intelius.com%2Fchild-internet-safety-your-child-practicing-safe-habits-online&amp;amp;title=Child+Internet+Safety%3A+Is+Your+Child+Practicing+Safe+Habits+Online%3F&quot; title=&quot;Digg this post on digg.com.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/digg.png&quot; alt=&quot;Digg&quot; /&gt; Digg&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_stumbleupon&quot;&gt;&lt;a href=&quot;http://www.stumbleupon.com/submit?url=http%3A%2F%2Fblog.intelius.com%2Fchild-internet-safety-your-child-practicing-safe-habits-online&amp;amp;title=Child+Internet+Safety%3A+Is+Your+Child+Practicing+Safe+Habits+Online%3F&quot; title=&quot;Thumb this up at StumbleUpon.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/stumbleit.png&quot; alt=&quot;StumbleUpon&quot; /&gt; StumbleUpon&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_propeller&quot;&gt;&lt;a href=&quot;http://www.propeller.com/submit/?U=http%3A%2F%2Fblog.intelius.com%2Fchild-internet-safety-your-child-practicing-safe-habits-online&amp;amp;T=Child+Internet+Safety%3A+Is+Your+Child+Practicing+Safe+Habits+Online%3F&quot; title=&quot;Submit to Propeller.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/propeller.png&quot; alt=&quot;Propeller&quot; /&gt; Propeller&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_reddit&quot;&gt;&lt;a href=&quot;http://reddit.com/submit?url=http%3A%2F%2Fblog.intelius.com%2Fchild-internet-safety-your-child-practicing-safe-habits-online&amp;amp;title=Child+Internet+Safety%3A+Is+Your+Child+Practicing+Safe+Habits+Online%3F&quot; title=&quot;Submit this post on reddit.com.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/reddit.png&quot; alt=&quot;Reddit&quot; /&gt; Reddit&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_magnoliacom&quot;&gt;&lt;a href=&quot;http://ma.gnolia.com/bookmarklet/add?url=http%3A%2F%2Fblog.intelius.com%2Fchild-internet-safety-your-child-practicing-safe-habits-online&amp;amp;title=Child+Internet+Safety%3A+Is+Your+Child+Practicing+Safe+Habits+Online%3F&quot; title=&quot;Submit this post on ma.gnolia.com.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/magnoliacom.png&quot; alt=&quot;Magnoliacom&quot; /&gt; Magnoliacom&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_furl&quot;&gt;&lt;a href=&quot;http://www.furl.net/storeIt.jsp?u=http%3A%2F%2Fblog.intelius.com%2Fchild-internet-safety-your-child-practicing-safe-habits-online&amp;amp;t=Child+Internet+Safety%3A+Is+Your+Child+Practicing+Safe+Habits+Online%3F&quot; title=&quot;Submit this post on furl.net.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/furl.png&quot; alt=&quot;Furl&quot; /&gt; Furl&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_facebook&quot;&gt;&lt;a href=&quot;http://www.facebook.com/sharer.php?u=http%3A%2F%2Fblog.intelius.com%2Fchild-internet-safety-your-child-practicing-safe-habits-online&amp;amp;t=Child+Internet+Safety%3A+Is+Your+Child+Practicing+Safe+Habits+Online%3F&quot; title=&quot;Share on Facebook.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/facebook.png&quot; alt=&quot;Facebook&quot; /&gt; Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_google&quot;&gt;&lt;a href=&quot;http://www.google.com/bookmarks/mark?op=add&amp;amp;bkmk=http%3A%2F%2Fblog.intelius.com%2Fchild-internet-safety-your-child-practicing-safe-habits-online&amp;amp;title=Child+Internet+Safety%3A+Is+Your+Child+Practicing+Safe+Habits+Online%3F&quot; title=&quot;Bookmark this post on Google.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/google.png&quot; alt=&quot;Google&quot; /&gt; Google&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_yahoo&quot;&gt;&lt;a href=&quot;http://myweb2.search.yahoo.com/myresults/bookmarklet?u=http%3A%2F%2Fblog.intelius.com%2Fchild-internet-safety-your-child-practicing-safe-habits-online&amp;amp;t=Child+Internet+Safety%3A+Is+Your+Child+Practicing+Safe+Habits+Online%3F&quot; title=&quot;Bookmark this post on Yahoo.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/yahoo.png&quot; alt=&quot;Yahoo&quot; /&gt; Yahoo&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_technorati last&quot;&gt;&lt;a href=&quot;http://technorati.com/cosmos/search.html?url=http%3A%2F%2Fblog.intelius.com%2Fchild-internet-safety-your-child-practicing-safe-habits-online&quot; title=&quot;Search Technorati for links to this post.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/technorati.png&quot; alt=&quot;Technorati&quot; /&gt; Technorati&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;&lt;p&gt;&lt;a href=&quot;http://blog.intelius.com/child-internet-safety-your-child-practicing-safe-habits-online&quot; target=&quot;_blank&quot;&gt;read more&lt;/a&gt;&lt;/p&gt;</description>
 <comments>http://blog.intelius.com/child-internet-safety-your-child-practicing-safe-habits-online#comments</comments>
 <category domain="http://blog.intelius.com/category/tags/cyber-bully">Cyber Bully</category>
 <category domain="http://blog.intelius.com/category/tags/cyber-crimes">Cyber Crimes</category>
 <category domain="http://blog.intelius.com/category/tags/cyber-safety">Cyber Safety</category>
 <category domain="http://blog.intelius.com/category/tags/cyber-security">Cyber Security</category>
 <category domain="http://blog.intelius.com/category/tags/cyberbully">Cyberbully</category>
 <category domain="http://blog.intelius.com/category/tags/cyberbullying">Cyberbullying</category>
 <category domain="http://blog.intelius.com/category/tags/facebook-safety">Facebook Safety</category>
 <category domain="http://blog.intelius.com/category/tags/identity-theft">identity theft</category>
 <category domain="http://blog.intelius.com/category/tags/schools-cyber-bullying">Schools Cyber-Bullying</category>
 <category domain="http://blog.intelius.com/category/tags/teen-safety">teen safety</category>
 <category domain="http://blog.intelius.com/category/tags/teens-facebook">teens on facebook</category>
 <pubDate>Fri, 09 Apr 2010 14:12:00 +0000</pubDate>
 <dc:creator>drupal_admin</dc:creator>
 <guid isPermaLink="false">215 at http://blog.intelius.com</guid>
</item>
</channel>
</rss>
