<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xml:base="http://blog.intelius.com"  xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
 <title>Intelius - Cyber Security</title>
 <link>http://blog.intelius.com/taxonomy/term/66/0</link>
 <description></description>
 <language>en</language>
<item>
 <title>The New Threat Landscape</title>
 <link>http://blog.intelius.com/new-threat-landscape</link>
 <description>&lt;p&gt;&lt;strong&gt;There’s a new threat landscape&lt;/strong&gt; and it’s you! So, what does that mean? According to the latest reports
from data breach experts (namely the &lt;a href=&quot;http://securityblog.verizonbusiness.com/2011/04/19/2011-data-breach-investigations-report-released/&quot;&gt;Verizon
Business Data Breach Investigations Report&lt;/a&gt;), attackers are no longer
spending as much time directly attacking servers and data. One of the most
common methods of access today is for attackers to target employees and their
systems to gain a foothold into the network.&lt;/p&gt;

&lt;p&gt;This means that you are more important than ever to the confidentiality,
integrity, and availability of the systems that you &lt;em&gt;and&lt;/em&gt; your company
rely on each day. What can you do? Here are some things to keep in mind as the
new front-line defenders of information security:&lt;/p&gt;

&lt;ul&gt;&lt;li&gt;&lt;strong&gt;E-mail is not secure by default&lt;/strong&gt;. If you need to
     exchange confidential information, ask the other party if they have a
     secure or encrypted e-mail mechanism. E-Mail is typically transmitted
     across the Internet in plain-text, which makes it vulnerable to eaves-dropping
     by many parties along the way. If you need to send confidential or private
     information at work and the other party does not have a secure mail
     gateway, speak with your Helpdesk about possible alternatives. There may
     already be an enterprise-wide solution in place that you can use. For
     sending confidential and private information at home you may have to
     investigate an encrypted e-mail provider, or consider simply calling the
     party you need to share information with. With some apps in the various marketplaces
     today you can easily encrypt both your voice calls and text messages.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Any pond with fish will eventually be Phished.&lt;/strong&gt; The days of e-mails
     that contain viruses or malicious links from unknowns are far from behind
     us. Several of the largest data breaches this year have happened because
     of an infected e-mail sent to a handful of employees. However prescient
     (and frightening) these attacks account for only a small number of data
     breaches today. The same principal is still being applied in ever-more versatile
     ways, however. Attackers have started moving their phishing scams,
     malicious links, viruses, and spam to social networks to keep up with the
     times.&amp;nbsp; Be wary of strange (especially “viral”) links that show up on
     Facebook or Twitter, as these are the latest ponds to be phished. These
     links can lead to viruses or infected pages which can, in turn, infect
     your machine and even grant attackers access into your company’s networks.
     &lt;/li&gt;&lt;li&gt;&lt;strong&gt;Smart Phone viruses are a growing trend.&lt;/strong&gt; Mobile phones now only
     carry the moniker of “phone” for the sake of tradition. They are just as
     much (if not more) a computer as the desktops that we used a decade ago.
     No matter what your phone of choice (iPhone, Android, BlackBerry, et
     cetera), there are most likely attackers trying to write malicious code
     for it or (on some platforms) sneak malicious apps into the app
     marketplace. It is probably worth researching some Anti-Virus and firewall
     solutions for your mobile device platform of choice. This is another among
     many good reasons to consider e-mail &lt;em&gt;insecure&lt;/em&gt;. The infancy of smart
     phone operating systems makes it easier for attackers and harder for
     anti-virus and anti-malware makers, which makes your mobile device an easy
     point of entry for an attacker looking to gain access to confidential
     company data, or your own private information.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Posted by Ben, Senior Information Security Engineer at Intelius&lt;/p&gt;&lt;div class=&quot;comment-link&quot;&gt;&lt;a href=&quot;/new-threat-landscape#comments&quot;&gt;0 comments&lt;/a&gt; &amp;ndash; &lt;a href=&quot;/new-threat-landscape#comments&quot;&gt;Read/add comments&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;service-links&quot;&gt;&lt;div class=&quot;service-label&quot;&gt;Bookmark/Search this post with: &lt;/div&gt;&lt;ul class=&quot;links&quot;&gt;&lt;li class=&quot;service_links_delicious first&quot;&gt;&lt;a href=&quot;http://del.icio.us/post?url=http%3A%2F%2Fblog.intelius.com%2Fnew-threat-landscape&amp;amp;title=The+New+Threat+Landscape&quot; title=&quot;Bookmark this post on del.icio.us.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/delicious.png&quot; alt=&quot;Delicious&quot; /&gt; Delicious&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_digg&quot;&gt;&lt;a href=&quot;http://digg.com/submit?phase=2&amp;amp;url=http%3A%2F%2Fblog.intelius.com%2Fnew-threat-landscape&amp;amp;title=The+New+Threat+Landscape&quot; title=&quot;Digg this post on digg.com.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/digg.png&quot; alt=&quot;Digg&quot; /&gt; Digg&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_stumbleupon&quot;&gt;&lt;a href=&quot;http://www.stumbleupon.com/submit?url=http%3A%2F%2Fblog.intelius.com%2Fnew-threat-landscape&amp;amp;title=The+New+Threat+Landscape&quot; title=&quot;Thumb this up at StumbleUpon.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/stumbleit.png&quot; alt=&quot;StumbleUpon&quot; /&gt; StumbleUpon&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_propeller&quot;&gt;&lt;a href=&quot;http://www.propeller.com/submit/?U=http%3A%2F%2Fblog.intelius.com%2Fnew-threat-landscape&amp;amp;T=The+New+Threat+Landscape&quot; title=&quot;Submit to Propeller.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/propeller.png&quot; alt=&quot;Propeller&quot; /&gt; Propeller&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_reddit&quot;&gt;&lt;a href=&quot;http://reddit.com/submit?url=http%3A%2F%2Fblog.intelius.com%2Fnew-threat-landscape&amp;amp;title=The+New+Threat+Landscape&quot; title=&quot;Submit this post on reddit.com.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/reddit.png&quot; alt=&quot;Reddit&quot; /&gt; Reddit&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_magnoliacom&quot;&gt;&lt;a href=&quot;http://ma.gnolia.com/bookmarklet/add?url=http%3A%2F%2Fblog.intelius.com%2Fnew-threat-landscape&amp;amp;title=The+New+Threat+Landscape&quot; title=&quot;Submit this post on ma.gnolia.com.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/magnoliacom.png&quot; alt=&quot;Magnoliacom&quot; /&gt; Magnoliacom&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_furl&quot;&gt;&lt;a href=&quot;http://www.furl.net/storeIt.jsp?u=http%3A%2F%2Fblog.intelius.com%2Fnew-threat-landscape&amp;amp;t=The+New+Threat+Landscape&quot; title=&quot;Submit this post on furl.net.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/furl.png&quot; alt=&quot;Furl&quot; /&gt; Furl&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_facebook&quot;&gt;&lt;a href=&quot;http://www.facebook.com/sharer.php?u=http%3A%2F%2Fblog.intelius.com%2Fnew-threat-landscape&amp;amp;t=The+New+Threat+Landscape&quot; title=&quot;Share on Facebook.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/facebook.png&quot; alt=&quot;Facebook&quot; /&gt; Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_google&quot;&gt;&lt;a href=&quot;http://www.google.com/bookmarks/mark?op=add&amp;amp;bkmk=http%3A%2F%2Fblog.intelius.com%2Fnew-threat-landscape&amp;amp;title=The+New+Threat+Landscape&quot; title=&quot;Bookmark this post on Google.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/google.png&quot; alt=&quot;Google&quot; /&gt; Google&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_yahoo&quot;&gt;&lt;a href=&quot;http://myweb2.search.yahoo.com/myresults/bookmarklet?u=http%3A%2F%2Fblog.intelius.com%2Fnew-threat-landscape&amp;amp;t=The+New+Threat+Landscape&quot; title=&quot;Bookmark this post on Yahoo.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/yahoo.png&quot; alt=&quot;Yahoo&quot; /&gt; Yahoo&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_technorati last&quot;&gt;&lt;a href=&quot;http://technorati.com/cosmos/search.html?url=http%3A%2F%2Fblog.intelius.com%2Fnew-threat-landscape&quot; title=&quot;Search Technorati for links to this post.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/technorati.png&quot; alt=&quot;Technorati&quot; /&gt; Technorati&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;&lt;p&gt;&lt;a href=&quot;http://blog.intelius.com/new-threat-landscape&quot; target=&quot;_blank&quot;&gt;read more&lt;/a&gt;&lt;/p&gt;</description>
 <comments>http://blog.intelius.com/new-threat-landscape#comments</comments>
 <category domain="http://blog.intelius.com/category/tags/cyber-security">Cyber Security</category>
 <category domain="http://blog.intelius.com/category/tags/data">data</category>
 <pubDate>Fri, 02 Dec 2011 23:20:42 +0000</pubDate>
 <dc:creator>glynch</dc:creator>
 <guid isPermaLink="false">311 at http://blog.intelius.com</guid>
</item>
<item>
 <title>Draft Bill to Protect Consumer Privacy</title>
 <link>http://blog.intelius.com/draft-bill-protect-consumer-privacy</link>
 <description>&lt;p&gt;Follow-up to post: &lt;a href=&quot;../../cutting-costs-expense-privacy-mobile-coupons-help-companies-get-know-their-customers-never&quot;&gt;Cutting
Costs at the Expense of Privacy&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The issue of &lt;a href=&quot;http://www.forbes.com/2010/05/04/boucher-bill-advertising-marketing-online-ads-iab-google-facebook-cmo-network-privacy-regulation.html&quot;&gt;online privacy&lt;/a&gt; has been an ongoing battle – companies have continued to develop methods to gather consumer data to maximize their advertising revenue in this $25 billion industry. Lawmakers finally unveiled their proposed bill to regulate privacy on the Internet. The recently drafted bill aims to protect consumer privacy and regulate how marketers are aggregating information about consumers. The legislation will require companies to disclose how they are collecting, using, and sharing personally identifying data. Consumers will also need to give consent before using more protected information, such as social security numbers, medical records and financial accounts. With this bill, the Federal Trade Commission hopes to create a more secure online environment.&lt;/p&gt;&lt;p&gt;Do you think these regulations will be enough to protect consumers?&lt;/p&gt;&lt;div class=&quot;comment-link&quot;&gt;&lt;a href=&quot;/draft-bill-protect-consumer-privacy#comments&quot;&gt;6 comments&lt;/a&gt; &amp;ndash; &lt;a href=&quot;/draft-bill-protect-consumer-privacy#comments&quot;&gt;Read/add comments&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;service-links&quot;&gt;&lt;div class=&quot;service-label&quot;&gt;Bookmark/Search this post with: &lt;/div&gt;&lt;ul class=&quot;links&quot;&gt;&lt;li class=&quot;service_links_delicious first&quot;&gt;&lt;a href=&quot;http://del.icio.us/post?url=http%3A%2F%2Fblog.intelius.com%2Fdraft-bill-protect-consumer-privacy&amp;amp;title=Draft+Bill+to+Protect+Consumer+Privacy&quot; title=&quot;Bookmark this post on del.icio.us.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/delicious.png&quot; alt=&quot;Delicious&quot; /&gt; Delicious&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_digg&quot;&gt;&lt;a href=&quot;http://digg.com/submit?phase=2&amp;amp;url=http%3A%2F%2Fblog.intelius.com%2Fdraft-bill-protect-consumer-privacy&amp;amp;title=Draft+Bill+to+Protect+Consumer+Privacy&quot; title=&quot;Digg this post on digg.com.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/digg.png&quot; alt=&quot;Digg&quot; /&gt; Digg&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_stumbleupon&quot;&gt;&lt;a href=&quot;http://www.stumbleupon.com/submit?url=http%3A%2F%2Fblog.intelius.com%2Fdraft-bill-protect-consumer-privacy&amp;amp;title=Draft+Bill+to+Protect+Consumer+Privacy&quot; title=&quot;Thumb this up at StumbleUpon.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/stumbleit.png&quot; alt=&quot;StumbleUpon&quot; /&gt; StumbleUpon&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_propeller&quot;&gt;&lt;a href=&quot;http://www.propeller.com/submit/?U=http%3A%2F%2Fblog.intelius.com%2Fdraft-bill-protect-consumer-privacy&amp;amp;T=Draft+Bill+to+Protect+Consumer+Privacy&quot; title=&quot;Submit to Propeller.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/propeller.png&quot; alt=&quot;Propeller&quot; /&gt; Propeller&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_reddit&quot;&gt;&lt;a href=&quot;http://reddit.com/submit?url=http%3A%2F%2Fblog.intelius.com%2Fdraft-bill-protect-consumer-privacy&amp;amp;title=Draft+Bill+to+Protect+Consumer+Privacy&quot; title=&quot;Submit this post on reddit.com.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/reddit.png&quot; alt=&quot;Reddit&quot; /&gt; Reddit&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_magnoliacom&quot;&gt;&lt;a href=&quot;http://ma.gnolia.com/bookmarklet/add?url=http%3A%2F%2Fblog.intelius.com%2Fdraft-bill-protect-consumer-privacy&amp;amp;title=Draft+Bill+to+Protect+Consumer+Privacy&quot; title=&quot;Submit this post on ma.gnolia.com.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/magnoliacom.png&quot; alt=&quot;Magnoliacom&quot; /&gt; Magnoliacom&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_furl&quot;&gt;&lt;a href=&quot;http://www.furl.net/storeIt.jsp?u=http%3A%2F%2Fblog.intelius.com%2Fdraft-bill-protect-consumer-privacy&amp;amp;t=Draft+Bill+to+Protect+Consumer+Privacy&quot; title=&quot;Submit this post on furl.net.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/furl.png&quot; alt=&quot;Furl&quot; /&gt; Furl&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_facebook&quot;&gt;&lt;a href=&quot;http://www.facebook.com/sharer.php?u=http%3A%2F%2Fblog.intelius.com%2Fdraft-bill-protect-consumer-privacy&amp;amp;t=Draft+Bill+to+Protect+Consumer+Privacy&quot; title=&quot;Share on Facebook.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/facebook.png&quot; alt=&quot;Facebook&quot; /&gt; Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_google&quot;&gt;&lt;a href=&quot;http://www.google.com/bookmarks/mark?op=add&amp;amp;bkmk=http%3A%2F%2Fblog.intelius.com%2Fdraft-bill-protect-consumer-privacy&amp;amp;title=Draft+Bill+to+Protect+Consumer+Privacy&quot; title=&quot;Bookmark this post on Google.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/google.png&quot; alt=&quot;Google&quot; /&gt; Google&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_yahoo&quot;&gt;&lt;a href=&quot;http://myweb2.search.yahoo.com/myresults/bookmarklet?u=http%3A%2F%2Fblog.intelius.com%2Fdraft-bill-protect-consumer-privacy&amp;amp;t=Draft+Bill+to+Protect+Consumer+Privacy&quot; title=&quot;Bookmark this post on Yahoo.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/yahoo.png&quot; alt=&quot;Yahoo&quot; /&gt; Yahoo&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_technorati last&quot;&gt;&lt;a href=&quot;http://technorati.com/cosmos/search.html?url=http%3A%2F%2Fblog.intelius.com%2Fdraft-bill-protect-consumer-privacy&quot; title=&quot;Search Technorati for links to this post.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/technorati.png&quot; alt=&quot;Technorati&quot; /&gt; Technorati&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;&lt;p&gt;&lt;a href=&quot;http://blog.intelius.com/draft-bill-protect-consumer-privacy&quot; target=&quot;_blank&quot;&gt;read more&lt;/a&gt;&lt;/p&gt;</description>
 <comments>http://blog.intelius.com/draft-bill-protect-consumer-privacy#comments</comments>
 <category domain="http://blog.intelius.com/category/tags/consumer">consumer</category>
 <category domain="http://blog.intelius.com/category/tags/cyber-security">Cyber Security</category>
 <category domain="http://blog.intelius.com/category/tags/legislation">legislation</category>
 <category domain="http://blog.intelius.com/category/tags/privacy">Privacy</category>
 <category domain="http://blog.intelius.com/category/tags/transparency">transparency</category>
 <pubDate>Tue, 27 Jul 2010 21:15:20 +0000</pubDate>
 <dc:creator>tlien</dc:creator>
 <guid isPermaLink="false">266 at http://blog.intelius.com</guid>
</item>
<item>
 <title>Latest Phishing Scam: Email Scamers are Taking Advantage of Twitter-style Alerts!</title>
 <link>http://blog.intelius.com/latest-phishing-scam-email-scamers-are-taking-advantage-twitter-style-alerts</link>
 <description>&lt;p&gt;With an estimated &lt;a href=&quot;http://www.networkworld.com/news/2010/061610-37-billion-phishing-emails-were.html&quot; target=&quot;_new&quot;&gt;3.7 billion&lt;/a&gt; phishing emails sent in the past year it is no surprise that phishers have set their sights on Twitter. The latest &lt;a href=&quot;http://news.cnet.com/8301-27080_3-20007246-245.html&quot; target=&quot;_new&quot;&gt;phishing scam&lt;/a&gt; sweeping the ‘Net&#039; is a spam campaign designed to look like legitimate Twitter notifications. &lt;/p&gt;&lt;p&gt;The emails take &lt;a href=&quot;http://news.cnet.com/8301-27080_3-20007246-245.html&quot;&gt;many forms&lt;/a&gt;: Some resemble messages from Twitter customer support claiming that the site has detected an attempt to steal the receiver&#039;s Twitter password. Others claim that the recipient has changed the e-mail address associated with their account and ask them to confirm. The links in these emails lead either to a downloadable &quot;secure module&quot; which the emails claim will protect the account but is actually malware or to a phishing site designed to steal the user&#039;s account information. Online pharmacy spammers have also taken to Twitter-formatted emails to advertise non-FDA approved pills. &lt;/p&gt;&lt;p&gt;Those these scams don&#039;t seem very threatening at first (I mean, how much damage can some do with 140 characters?) but the repercussions having your Twitter account hacked are HUGE! Many people use the same password they use for Twitter for many other online sites; from Facebook to online banking, people just aren&#039;t taking necessary precautions with their passwords. So, if you enter your account information into phishing site and you use the same password for Twitter as sites like Facebook or your email that may house more personal information, the scammer can potentially get into your other accounts. &lt;/p&gt;&lt;p&gt;These scams, discovered by Trend Micro, are easily avoidable if you are aware of them and know what a legitimate Twitter email does and does not contain.* &lt;/p&gt;&lt;ul&gt;&lt;li&gt;Twitter does not send links to &quot;secure modules&quot;. &lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;Twitter emails request confirmations include the new account information.&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;Twitter emails do no describe or promote new services or products. &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;* Twitter email specifications via &lt;a href=&quot;http://blog.trendmicro.com/page/2/&quot; target=&quot;_new&quot;&gt;Trend Micro&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Before you get hacked, consider taking these precautions:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Always read emails completely and thoroughly before clinking though the links. It can take a while for news of the latest scam to reach your ears so keeping a vigilant eye on all your emails is a must! &lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;Use different, high quality, passwords for Twitter, Facebook, your email, and your online banking account. Secure passwords contain a random series of lower and upper case letters, numbers, and approved symbols. Such passwords should be more than 8 characters in length&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;Consider and Identity Protection service. Investing in and identity protection service, such as Intelius &lt;a href=&quot;http://www.intelius.com/idprotect.html&quot; target=&quot;_new&quot;&gt;IdentityProtect&lt;/a&gt;, can prevent a scammer that acquires your information from using it. This useful advantage could save you tons of time and money. &lt;/li&gt;&lt;/ul&gt;&lt;div class=&quot;comment-link&quot;&gt;&lt;a href=&quot;/latest-phishing-scam-email-scamers-are-taking-advantage-twitter-style-alerts#comments&quot;&gt;0 comments&lt;/a&gt; &amp;ndash; &lt;a href=&quot;/latest-phishing-scam-email-scamers-are-taking-advantage-twitter-style-alerts#comments&quot;&gt;Read/add comments&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;service-links&quot;&gt;&lt;div class=&quot;service-label&quot;&gt;Bookmark/Search this post with: &lt;/div&gt;&lt;ul class=&quot;links&quot;&gt;&lt;li class=&quot;service_links_delicious first&quot;&gt;&lt;a href=&quot;http://del.icio.us/post?url=http%3A%2F%2Fblog.intelius.com%2Flatest-phishing-scam-email-scamers-are-taking-advantage-twitter-style-alerts&amp;amp;title=Latest+Phishing+Scam%3A+Email+Scamers+are+Taking+Advantage+of+Twitter-style+Alerts%21&quot; title=&quot;Bookmark this post on del.icio.us.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/delicious.png&quot; alt=&quot;Delicious&quot; /&gt; Delicious&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_digg&quot;&gt;&lt;a href=&quot;http://digg.com/submit?phase=2&amp;amp;url=http%3A%2F%2Fblog.intelius.com%2Flatest-phishing-scam-email-scamers-are-taking-advantage-twitter-style-alerts&amp;amp;title=Latest+Phishing+Scam%3A+Email+Scamers+are+Taking+Advantage+of+Twitter-style+Alerts%21&quot; title=&quot;Digg this post on digg.com.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/digg.png&quot; alt=&quot;Digg&quot; /&gt; Digg&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_stumbleupon&quot;&gt;&lt;a href=&quot;http://www.stumbleupon.com/submit?url=http%3A%2F%2Fblog.intelius.com%2Flatest-phishing-scam-email-scamers-are-taking-advantage-twitter-style-alerts&amp;amp;title=Latest+Phishing+Scam%3A+Email+Scamers+are+Taking+Advantage+of+Twitter-style+Alerts%21&quot; title=&quot;Thumb this up at StumbleUpon.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/stumbleit.png&quot; alt=&quot;StumbleUpon&quot; /&gt; StumbleUpon&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_propeller&quot;&gt;&lt;a href=&quot;http://www.propeller.com/submit/?U=http%3A%2F%2Fblog.intelius.com%2Flatest-phishing-scam-email-scamers-are-taking-advantage-twitter-style-alerts&amp;amp;T=Latest+Phishing+Scam%3A+Email+Scamers+are+Taking+Advantage+of+Twitter-style+Alerts%21&quot; title=&quot;Submit to Propeller.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/propeller.png&quot; alt=&quot;Propeller&quot; /&gt; Propeller&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_reddit&quot;&gt;&lt;a href=&quot;http://reddit.com/submit?url=http%3A%2F%2Fblog.intelius.com%2Flatest-phishing-scam-email-scamers-are-taking-advantage-twitter-style-alerts&amp;amp;title=Latest+Phishing+Scam%3A+Email+Scamers+are+Taking+Advantage+of+Twitter-style+Alerts%21&quot; title=&quot;Submit this post on reddit.com.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/reddit.png&quot; alt=&quot;Reddit&quot; /&gt; Reddit&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_magnoliacom&quot;&gt;&lt;a href=&quot;http://ma.gnolia.com/bookmarklet/add?url=http%3A%2F%2Fblog.intelius.com%2Flatest-phishing-scam-email-scamers-are-taking-advantage-twitter-style-alerts&amp;amp;title=Latest+Phishing+Scam%3A+Email+Scamers+are+Taking+Advantage+of+Twitter-style+Alerts%21&quot; title=&quot;Submit this post on ma.gnolia.com.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/magnoliacom.png&quot; alt=&quot;Magnoliacom&quot; /&gt; Magnoliacom&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_furl&quot;&gt;&lt;a href=&quot;http://www.furl.net/storeIt.jsp?u=http%3A%2F%2Fblog.intelius.com%2Flatest-phishing-scam-email-scamers-are-taking-advantage-twitter-style-alerts&amp;amp;t=Latest+Phishing+Scam%3A+Email+Scamers+are+Taking+Advantage+of+Twitter-style+Alerts%21&quot; title=&quot;Submit this post on furl.net.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/furl.png&quot; alt=&quot;Furl&quot; /&gt; Furl&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_facebook&quot;&gt;&lt;a href=&quot;http://www.facebook.com/sharer.php?u=http%3A%2F%2Fblog.intelius.com%2Flatest-phishing-scam-email-scamers-are-taking-advantage-twitter-style-alerts&amp;amp;t=Latest+Phishing+Scam%3A+Email+Scamers+are+Taking+Advantage+of+Twitter-style+Alerts%21&quot; title=&quot;Share on Facebook.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/facebook.png&quot; alt=&quot;Facebook&quot; /&gt; Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_google&quot;&gt;&lt;a href=&quot;http://www.google.com/bookmarks/mark?op=add&amp;amp;bkmk=http%3A%2F%2Fblog.intelius.com%2Flatest-phishing-scam-email-scamers-are-taking-advantage-twitter-style-alerts&amp;amp;title=Latest+Phishing+Scam%3A+Email+Scamers+are+Taking+Advantage+of+Twitter-style+Alerts%21&quot; title=&quot;Bookmark this post on Google.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/google.png&quot; alt=&quot;Google&quot; /&gt; Google&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_yahoo&quot;&gt;&lt;a href=&quot;http://myweb2.search.yahoo.com/myresults/bookmarklet?u=http%3A%2F%2Fblog.intelius.com%2Flatest-phishing-scam-email-scamers-are-taking-advantage-twitter-style-alerts&amp;amp;t=Latest+Phishing+Scam%3A+Email+Scamers+are+Taking+Advantage+of+Twitter-style+Alerts%21&quot; title=&quot;Bookmark this post on Yahoo.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/yahoo.png&quot; alt=&quot;Yahoo&quot; /&gt; Yahoo&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_technorati last&quot;&gt;&lt;a href=&quot;http://technorati.com/cosmos/search.html?url=http%3A%2F%2Fblog.intelius.com%2Flatest-phishing-scam-email-scamers-are-taking-advantage-twitter-style-alerts&quot; title=&quot;Search Technorati for links to this post.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/technorati.png&quot; alt=&quot;Technorati&quot; /&gt; Technorati&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;&lt;p&gt;&lt;a href=&quot;http://blog.intelius.com/latest-phishing-scam-email-scamers-are-taking-advantage-twitter-style-alerts&quot; target=&quot;_blank&quot;&gt;read more&lt;/a&gt;&lt;/p&gt;</description>
 <comments>http://blog.intelius.com/latest-phishing-scam-email-scamers-are-taking-advantage-twitter-style-alerts#comments</comments>
 <category domain="http://blog.intelius.com/category/tags/culture">Culture</category>
 <category domain="http://blog.intelius.com/category/tags/cyber-crimes">Cyber Crimes</category>
 <category domain="http://blog.intelius.com/category/tags/cyber-safety">Cyber Safety</category>
 <category domain="http://blog.intelius.com/category/tags/cyber-security">Cyber Security</category>
 <category domain="http://blog.intelius.com/category/tags/email-scam">Email Scam</category>
 <category domain="http://blog.intelius.com/category/tags/employment">Employment</category>
 <category domain="http://blog.intelius.com/category/tags/identity-management">Identity Management</category>
 <category domain="http://blog.intelius.com/category/tags/identity-protection">Identity Protection</category>
 <category domain="http://blog.intelius.com/category/tags/identity-theft">identity theft</category>
 <category domain="http://blog.intelius.com/category/tags/intelius">Intelius</category>
 <category domain="http://blog.intelius.com/category/tags/personal-security">Personal Security</category>
 <category domain="http://blog.intelius.com/category/tags/phishing">phishing</category>
 <category domain="http://blog.intelius.com/category/tags/scam">Scam</category>
 <category domain="http://blog.intelius.com/category/tags/social-media">Social Media</category>
 <category domain="http://blog.intelius.com/category/tags/social-networks">Social Networks</category>
 <category domain="http://blog.intelius.com/category/tags/twitter">Twitter</category>
 <pubDate>Fri, 25 Jun 2010 00:59:00 +0000</pubDate>
 <dc:creator>drupal_admin</dc:creator>
 <guid isPermaLink="false">253 at http://blog.intelius.com</guid>
</item>
<item>
 <title>The latest scam YOU need to be aware of: &#039;tabnabbing&#039;</title>
 <link>http://blog.intelius.com/latest-scam-you-need-be-aware-tabnabbing</link>
 <description>&lt;p&gt;Think ‘tabnabbing’ sounds like the latest prank involving filing 
supplies and the office clown? Think again.&amp;nbsp; Tabnabbing (also referred 
to as tabnapping) is a new type of phishing attack that is sweeping the 
internet.&amp;nbsp; Most phishing scams rely on you clicking on an imbedded link 
or downloading a file you find in a suspect email, sketchy website or a 
pop up window.&amp;nbsp; Tabnabbing occurs in the background after your focus 
shifts away from a malicious or compromised site.&amp;nbsp; &amp;nbsp;&lt;/p&gt;&lt;p&gt;“What we 
don’t expect is that a page we’ve been looking at will change behind our
 backs, when we aren’t looking. That’ll catch us by surprise,” Said Aza 
Raskin, Firefox&#039;s creative lead who identified the attack.&amp;nbsp; “Most people
 keep multiple tabs open, often for long periods.” &lt;/p&gt;&lt;p&gt;This 
attack uses JavaScript to discretely change the contents of an open but 
not active tab in your browser to look like the log-in screen of a bank,
 credit card company, popular retail site, social networking site or 
email provider.&amp;nbsp; This page transformation only occurs after the page 
becomes “inactive” while a victim moves to another tab or open program. 
The scammers are relying on users thinking they left a login page tab 
open.&amp;nbsp; &amp;nbsp;&lt;/p&gt;&lt;p&gt;&quot;When they click back to the fake tab, they&#039;ll see 
the standard Gmail log-in page, assume they&#039;ve been logged out, and 
provide their credentials to log in,&quot; says Raskin. &lt;/p&gt;&lt;p&gt;Raskin was
 able to recreate “tabnabbing” on his own blog to show users what to 
look for.&amp;nbsp; You can try it &lt;a href=&quot;http://www.azarask.in/blog/post/a-new-type-of-phishing-attack/&quot; target=&quot;_new&quot;&gt;here&lt;/a&gt;.
 After clicking the link, open a new tab, or simply click away from the 
page for a few seconds and then go back to the original tab.&amp;nbsp; While the 
URL hasn’t changed, the original blog content you saw only moments ago 
has been replaced with what appears to be a Gmail login page.&amp;nbsp; In this 
case the Gmail login page is just an image; however, in the case of an 
actual tabnabbing attack the page will be a functional login form. &lt;/p&gt;&lt;p&gt;In
 an actual attack after the user enters their login information, it’s 
sent it back to the attacker, and then the victim redirected back to the
 site they think they are logging into. This often goes completely &lt;br /&gt;undetected
 because often the victim was never logged out in the first place, and 
it will simply appear as if the login was successful, never realizing 
that they just handed over the all credentials the attacker needed to 
access their account.&amp;nbsp; &amp;nbsp;&lt;/p&gt;&lt;p&gt;It is even possible for attackers to 
detect which sites are in your history as well as what sites you are 
currently logged into and then customize the fake page to resemble a 
site you often use or are currently logged into, making this form of 
attack extremely effective and difficult to detect.&amp;nbsp; All major browsers 
are susceptible to this attack. &amp;nbsp;&lt;/p&gt;&lt;p&gt;Here’s what to watch for and
 how to avoid a potential tabnabbing attack and keep your identity, 
information, and login credentials safe:&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Don&#039;t log-in on a
 tab that you haven&#039;t opened yourself.&lt;/strong&gt; Since the tabnabbing tactic 
banks on you trusting that you opened the tab -- and that the site 
simply timed out -- the best defense is this offensive move. In other 
words, if you see a tab that contains a seemingly-legit log-in form, 
close it, then head to the site yourself in a new tab. &lt;/p&gt;&lt;p&gt;&lt;strong&gt;Enable
 browser settings and filters that will alert you to potential attacks.&lt;/strong&gt;
 For Internet Explorer (IE) use SmartScreen. In Firefox and Chrome it&#039;s 
called &quot;Phishing and Malware Protection;&quot; Safari doesn&#039;t give it a name,
 but offers a setting that reads, &quot;Warn when visiting a fraudulent 
website&quot; in the Security section of its Preferences settings. &lt;/p&gt;&lt;p&gt;&lt;strong&gt;Look
 at the URL in your browser&#039;s address bar before filing in any&lt;/strong&gt; form 
or giving out any personal information and verify the URL matches the 
login page. If there’s a discrepancy, close the tab &lt;br /&gt;immediately. &lt;/p&gt;&lt;p&gt;&lt;strong&gt;Use
 a password manager.&lt;/strong&gt; Third-party browser password managers like &lt;a href=&quot;http://www.roboform.com/&quot; target=&quot;_new&quot;&gt;RoboForm&lt;/a&gt; for Windows or &lt;a href=&quot;http://agilewebsolutions.com/products/1Password&quot; target=&quot;_new&quot;&gt;1Password&lt;/a&gt;
 for Mac link saved log-in usernames and passwords to a specific URL. 
When you save the username and password on the log-in page of the 
legitimate site, the password manager won&#039;t auto enter the username and 
password into a non-matching URL which should alert you to a possible 
tabnabbing attempt. &lt;/p&gt;&lt;p&gt;For more info on avoiding Tabnapping read 
ComputerWorld’s &lt;a href=&quot;http://www.computerworld.com/s/article/9177398/How_to_foil_Web_browser_tabnapping_&quot; target=&quot;_new&quot;&gt;How
 to Foil Web Browser Tabnapping. &lt;/a&gt;&lt;/p&gt;&lt;div class=&quot;comment-link&quot;&gt;&lt;a href=&quot;/latest-scam-you-need-be-aware-tabnabbing#comments&quot;&gt;2 comments&lt;/a&gt; &amp;ndash; &lt;a href=&quot;/latest-scam-you-need-be-aware-tabnabbing#comments&quot;&gt;Read/add comments&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;service-links&quot;&gt;&lt;div class=&quot;service-label&quot;&gt;Bookmark/Search this post with: &lt;/div&gt;&lt;ul class=&quot;links&quot;&gt;&lt;li class=&quot;service_links_delicious first&quot;&gt;&lt;a href=&quot;http://del.icio.us/post?url=http%3A%2F%2Fblog.intelius.com%2Flatest-scam-you-need-be-aware-tabnabbing&amp;amp;title=The+latest+scam+YOU+need+to+be+aware+of%3A+%27tabnabbing%27&quot; title=&quot;Bookmark this post on del.icio.us.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/delicious.png&quot; alt=&quot;Delicious&quot; /&gt; Delicious&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_digg&quot;&gt;&lt;a href=&quot;http://digg.com/submit?phase=2&amp;amp;url=http%3A%2F%2Fblog.intelius.com%2Flatest-scam-you-need-be-aware-tabnabbing&amp;amp;title=The+latest+scam+YOU+need+to+be+aware+of%3A+%27tabnabbing%27&quot; title=&quot;Digg this post on digg.com.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/digg.png&quot; alt=&quot;Digg&quot; /&gt; Digg&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_stumbleupon&quot;&gt;&lt;a href=&quot;http://www.stumbleupon.com/submit?url=http%3A%2F%2Fblog.intelius.com%2Flatest-scam-you-need-be-aware-tabnabbing&amp;amp;title=The+latest+scam+YOU+need+to+be+aware+of%3A+%27tabnabbing%27&quot; title=&quot;Thumb this up at StumbleUpon.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/stumbleit.png&quot; alt=&quot;StumbleUpon&quot; /&gt; StumbleUpon&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_propeller&quot;&gt;&lt;a href=&quot;http://www.propeller.com/submit/?U=http%3A%2F%2Fblog.intelius.com%2Flatest-scam-you-need-be-aware-tabnabbing&amp;amp;T=The+latest+scam+YOU+need+to+be+aware+of%3A+%27tabnabbing%27&quot; title=&quot;Submit to Propeller.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/propeller.png&quot; alt=&quot;Propeller&quot; /&gt; Propeller&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_reddit&quot;&gt;&lt;a href=&quot;http://reddit.com/submit?url=http%3A%2F%2Fblog.intelius.com%2Flatest-scam-you-need-be-aware-tabnabbing&amp;amp;title=The+latest+scam+YOU+need+to+be+aware+of%3A+%27tabnabbing%27&quot; title=&quot;Submit this post on reddit.com.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/reddit.png&quot; alt=&quot;Reddit&quot; /&gt; Reddit&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_magnoliacom&quot;&gt;&lt;a href=&quot;http://ma.gnolia.com/bookmarklet/add?url=http%3A%2F%2Fblog.intelius.com%2Flatest-scam-you-need-be-aware-tabnabbing&amp;amp;title=The+latest+scam+YOU+need+to+be+aware+of%3A+%27tabnabbing%27&quot; title=&quot;Submit this post on ma.gnolia.com.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/magnoliacom.png&quot; alt=&quot;Magnoliacom&quot; /&gt; Magnoliacom&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_furl&quot;&gt;&lt;a href=&quot;http://www.furl.net/storeIt.jsp?u=http%3A%2F%2Fblog.intelius.com%2Flatest-scam-you-need-be-aware-tabnabbing&amp;amp;t=The+latest+scam+YOU+need+to+be+aware+of%3A+%27tabnabbing%27&quot; title=&quot;Submit this post on furl.net.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/furl.png&quot; alt=&quot;Furl&quot; /&gt; Furl&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_facebook&quot;&gt;&lt;a href=&quot;http://www.facebook.com/sharer.php?u=http%3A%2F%2Fblog.intelius.com%2Flatest-scam-you-need-be-aware-tabnabbing&amp;amp;t=The+latest+scam+YOU+need+to+be+aware+of%3A+%27tabnabbing%27&quot; title=&quot;Share on Facebook.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/facebook.png&quot; alt=&quot;Facebook&quot; /&gt; Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_google&quot;&gt;&lt;a href=&quot;http://www.google.com/bookmarks/mark?op=add&amp;amp;bkmk=http%3A%2F%2Fblog.intelius.com%2Flatest-scam-you-need-be-aware-tabnabbing&amp;amp;title=The+latest+scam+YOU+need+to+be+aware+of%3A+%27tabnabbing%27&quot; title=&quot;Bookmark this post on Google.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/google.png&quot; alt=&quot;Google&quot; /&gt; Google&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_yahoo&quot;&gt;&lt;a href=&quot;http://myweb2.search.yahoo.com/myresults/bookmarklet?u=http%3A%2F%2Fblog.intelius.com%2Flatest-scam-you-need-be-aware-tabnabbing&amp;amp;t=The+latest+scam+YOU+need+to+be+aware+of%3A+%27tabnabbing%27&quot; title=&quot;Bookmark this post on Yahoo.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/yahoo.png&quot; alt=&quot;Yahoo&quot; /&gt; Yahoo&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_technorati last&quot;&gt;&lt;a href=&quot;http://technorati.com/cosmos/search.html?url=http%3A%2F%2Fblog.intelius.com%2Flatest-scam-you-need-be-aware-tabnabbing&quot; title=&quot;Search Technorati for links to this post.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/technorati.png&quot; alt=&quot;Technorati&quot; /&gt; Technorati&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;&lt;p&gt;&lt;a href=&quot;http://blog.intelius.com/latest-scam-you-need-be-aware-tabnabbing&quot; target=&quot;_blank&quot;&gt;read more&lt;/a&gt;&lt;/p&gt;</description>
 <comments>http://blog.intelius.com/latest-scam-you-need-be-aware-tabnabbing#comments</comments>
 <category domain="http://blog.intelius.com/category/tags/cyber-crimes">Cyber Crimes</category>
 <category domain="http://blog.intelius.com/category/tags/cyber-safety">Cyber Safety</category>
 <category domain="http://blog.intelius.com/category/tags/cyber-security">Cyber Security</category>
 <category domain="http://blog.intelius.com/category/tags/hacking">hacking</category>
 <category domain="http://blog.intelius.com/category/tags/identity-theft">identity theft</category>
 <category domain="http://blog.intelius.com/category/tags/intelius">Intelius</category>
 <category domain="http://blog.intelius.com/category/tags/phishing">phishing</category>
 <category domain="http://blog.intelius.com/category/tags/raskin">Raskin</category>
 <category domain="http://blog.intelius.com/category/tags/scam">Scam</category>
 <category domain="http://blog.intelius.com/category/tags/tabnabbing">tabnabbing</category>
 <category domain="http://blog.intelius.com/category/tags/tabnapping">tabnapping</category>
 <pubDate>Fri, 11 Jun 2010 01:55:00 +0000</pubDate>
 <dc:creator>drupal_admin</dc:creator>
 <guid isPermaLink="false">247 at http://blog.intelius.com</guid>
</item>
<item>
 <title>Child Internet Safety: Is Your Child Practicing Safe Habits Online?</title>
 <link>http://blog.intelius.com/child-internet-safety-your-child-practicing-safe-habits-online</link>
 <description>&lt;p&gt;&lt;strong&gt;Do you talk to your kids about cyber safety?  This is an issue that many parents overlook as it was not a topic of conversation when they were growing up.  Nonetheless it is a topic that we encourage you to discuss with your kids.&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;img src=&quot;/corp/files/corp/blog/parents.JPG&quot; width=&quot;263&quot; height=&quot;176&quot; style=&quot;float: right; border: 0pt none; margin: 10px;&quot; /&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Cyberbullying &lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Schools, parents, and teachers are being faced with the issue of cyberbullying for the first time.  Bullying has always been a problem, but the onslaught of virtual communications such as text messages, emails and instant messages has given way to a whole new form of bullying. There have been numerous stories in the news recently of children falling victim to &lt;a href=&quot;http://www.wmur.com/education/23085193/detail.html&quot; target=&quot;_new&quot;&gt;cyberbullying&lt;/a&gt;.  The state of New Hampshire is currently in the process of passing a bill which will give schools the authority to address cyberbullying if it has an impact on the educational environment.  If the bill passes, many states will likely follow New Hampshire&#039;s lead. &lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;•	Monitor your children&#039;s online activity. Know which sites they are visiting and who they are talking to.  &lt;/p&gt;&lt;p&gt;•	In many cases parents are unaware that their child is being picked on online, talking to your kids about cyberbullying and encourage them to talk to you if they feel they are falling victim to a cyberbully. &lt;/p&gt;&lt;p&gt;•	Be aware that children and adults may have more than one profile on social sites such as facebook.com or myspace.com.  As a condition for allowing them online access, ask them to share their online profiles with you. &lt;/p&gt;&lt;p&gt;•	If you suspect that your child is hiding something from you, ask them to show you the most recent pictures they posted from their phone to their Facebook profile after they attend special events like a school dance, concert or party. Most likely they will post to their most active profile. &lt;/p&gt;&lt;p&gt;•	Establish limits for online use. If your child knows you&#039;re around or if they can only use the internet for a limited amount of time each day they will be less likely to put themselves in situations that make them vulnerable to cyberbullying. &lt;/p&gt;&lt;p&gt;•	Review your child&#039;s browsing history or set up parental controls that only allow your children to visit approved sites.  &lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;While computers have become a main staple in the curriculum of schools in the United States, &lt;a href=&quot;http://www.eschoolnews.com/2010/02/26/study-too-few-schools-are-teaching-cyber-safety/&quot; target=&quot;_new&quot;&gt;a study recently released&lt;/a&gt; by the National Cyber Security Alliance (NCSA) and supported by Microsoft Corp., revealed that less than 1/4 of teachers in the U.S. have spent more than six hours teaching cyber ethics, safety, or security in the last year.&lt;/p&gt;&lt;p&gt;As a parent you cannot depend upon your child&#039;s school to teach them about cyber safety.  If internet safety and security is part of the curriculum, sit down with your kids and ask them to tell you what they have learned.   If you feel that the school has missed some important points, this is your opportunity to bridge the gap. &lt;/p&gt;&lt;p&gt;As a parent you are raising a new technology driven generation of computer savvy Americans and it is up to us to make sure that they have the knowledge needed to remain safe while using these skills.  In each of these cases the most effective defense is having an open dialog with your kids.  This will make them more likely to come to you if a problem should arise.&lt;/p&gt;&lt;p&gt;&lt;u&gt;&lt;em&gt;What do you do to protect your kids online?&lt;/em&gt;&lt;/u&gt;&lt;/p&gt;&lt;p&gt;Comment below or send us a tweet &lt;a href=&quot;http://twitter.com/inteliusgal&quot; target=&quot;_new&quot;&gt;@Inteliusgal&lt;/a&gt; &lt;img src=&quot;/corp/files/corp/blog/icon_twitter.png&quot; align=&quot;left&quot; border=&quot;0&quot; /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;div class=&quot;comment-link&quot;&gt;&lt;a href=&quot;/child-internet-safety-your-child-practicing-safe-habits-online#comments&quot;&gt;0 comments&lt;/a&gt; &amp;ndash; &lt;a href=&quot;/child-internet-safety-your-child-practicing-safe-habits-online#comments&quot;&gt;Read/add comments&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;service-links&quot;&gt;&lt;div class=&quot;service-label&quot;&gt;Bookmark/Search this post with: &lt;/div&gt;&lt;ul class=&quot;links&quot;&gt;&lt;li class=&quot;service_links_delicious first&quot;&gt;&lt;a href=&quot;http://del.icio.us/post?url=http%3A%2F%2Fblog.intelius.com%2Fchild-internet-safety-your-child-practicing-safe-habits-online&amp;amp;title=Child+Internet+Safety%3A+Is+Your+Child+Practicing+Safe+Habits+Online%3F&quot; title=&quot;Bookmark this post on del.icio.us.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/delicious.png&quot; alt=&quot;Delicious&quot; /&gt; Delicious&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_digg&quot;&gt;&lt;a href=&quot;http://digg.com/submit?phase=2&amp;amp;url=http%3A%2F%2Fblog.intelius.com%2Fchild-internet-safety-your-child-practicing-safe-habits-online&amp;amp;title=Child+Internet+Safety%3A+Is+Your+Child+Practicing+Safe+Habits+Online%3F&quot; title=&quot;Digg this post on digg.com.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/digg.png&quot; alt=&quot;Digg&quot; /&gt; Digg&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_stumbleupon&quot;&gt;&lt;a href=&quot;http://www.stumbleupon.com/submit?url=http%3A%2F%2Fblog.intelius.com%2Fchild-internet-safety-your-child-practicing-safe-habits-online&amp;amp;title=Child+Internet+Safety%3A+Is+Your+Child+Practicing+Safe+Habits+Online%3F&quot; title=&quot;Thumb this up at StumbleUpon.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/stumbleit.png&quot; alt=&quot;StumbleUpon&quot; /&gt; StumbleUpon&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_propeller&quot;&gt;&lt;a href=&quot;http://www.propeller.com/submit/?U=http%3A%2F%2Fblog.intelius.com%2Fchild-internet-safety-your-child-practicing-safe-habits-online&amp;amp;T=Child+Internet+Safety%3A+Is+Your+Child+Practicing+Safe+Habits+Online%3F&quot; title=&quot;Submit to Propeller.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/propeller.png&quot; alt=&quot;Propeller&quot; /&gt; Propeller&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_reddit&quot;&gt;&lt;a href=&quot;http://reddit.com/submit?url=http%3A%2F%2Fblog.intelius.com%2Fchild-internet-safety-your-child-practicing-safe-habits-online&amp;amp;title=Child+Internet+Safety%3A+Is+Your+Child+Practicing+Safe+Habits+Online%3F&quot; title=&quot;Submit this post on reddit.com.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/reddit.png&quot; alt=&quot;Reddit&quot; /&gt; Reddit&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_magnoliacom&quot;&gt;&lt;a href=&quot;http://ma.gnolia.com/bookmarklet/add?url=http%3A%2F%2Fblog.intelius.com%2Fchild-internet-safety-your-child-practicing-safe-habits-online&amp;amp;title=Child+Internet+Safety%3A+Is+Your+Child+Practicing+Safe+Habits+Online%3F&quot; title=&quot;Submit this post on ma.gnolia.com.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/magnoliacom.png&quot; alt=&quot;Magnoliacom&quot; /&gt; Magnoliacom&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_furl&quot;&gt;&lt;a href=&quot;http://www.furl.net/storeIt.jsp?u=http%3A%2F%2Fblog.intelius.com%2Fchild-internet-safety-your-child-practicing-safe-habits-online&amp;amp;t=Child+Internet+Safety%3A+Is+Your+Child+Practicing+Safe+Habits+Online%3F&quot; title=&quot;Submit this post on furl.net.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/furl.png&quot; alt=&quot;Furl&quot; /&gt; Furl&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_facebook&quot;&gt;&lt;a href=&quot;http://www.facebook.com/sharer.php?u=http%3A%2F%2Fblog.intelius.com%2Fchild-internet-safety-your-child-practicing-safe-habits-online&amp;amp;t=Child+Internet+Safety%3A+Is+Your+Child+Practicing+Safe+Habits+Online%3F&quot; title=&quot;Share on Facebook.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/facebook.png&quot; alt=&quot;Facebook&quot; /&gt; Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_google&quot;&gt;&lt;a href=&quot;http://www.google.com/bookmarks/mark?op=add&amp;amp;bkmk=http%3A%2F%2Fblog.intelius.com%2Fchild-internet-safety-your-child-practicing-safe-habits-online&amp;amp;title=Child+Internet+Safety%3A+Is+Your+Child+Practicing+Safe+Habits+Online%3F&quot; title=&quot;Bookmark this post on Google.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/google.png&quot; alt=&quot;Google&quot; /&gt; Google&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_yahoo&quot;&gt;&lt;a href=&quot;http://myweb2.search.yahoo.com/myresults/bookmarklet?u=http%3A%2F%2Fblog.intelius.com%2Fchild-internet-safety-your-child-practicing-safe-habits-online&amp;amp;t=Child+Internet+Safety%3A+Is+Your+Child+Practicing+Safe+Habits+Online%3F&quot; title=&quot;Bookmark this post on Yahoo.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/yahoo.png&quot; alt=&quot;Yahoo&quot; /&gt; Yahoo&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_technorati last&quot;&gt;&lt;a href=&quot;http://technorati.com/cosmos/search.html?url=http%3A%2F%2Fblog.intelius.com%2Fchild-internet-safety-your-child-practicing-safe-habits-online&quot; title=&quot;Search Technorati for links to this post.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/technorati.png&quot; alt=&quot;Technorati&quot; /&gt; Technorati&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;&lt;p&gt;&lt;a href=&quot;http://blog.intelius.com/child-internet-safety-your-child-practicing-safe-habits-online&quot; target=&quot;_blank&quot;&gt;read more&lt;/a&gt;&lt;/p&gt;</description>
 <comments>http://blog.intelius.com/child-internet-safety-your-child-practicing-safe-habits-online#comments</comments>
 <category domain="http://blog.intelius.com/category/tags/cyber-bully">Cyber Bully</category>
 <category domain="http://blog.intelius.com/category/tags/cyber-crimes">Cyber Crimes</category>
 <category domain="http://blog.intelius.com/category/tags/cyber-safety">Cyber Safety</category>
 <category domain="http://blog.intelius.com/category/tags/cyber-security">Cyber Security</category>
 <category domain="http://blog.intelius.com/category/tags/cyberbully">Cyberbully</category>
 <category domain="http://blog.intelius.com/category/tags/cyberbullying">Cyberbullying</category>
 <category domain="http://blog.intelius.com/category/tags/facebook-safety">Facebook Safety</category>
 <category domain="http://blog.intelius.com/category/tags/identity-theft">identity theft</category>
 <category domain="http://blog.intelius.com/category/tags/schools-cyber-bullying">Schools Cyber-Bullying</category>
 <category domain="http://blog.intelius.com/category/tags/teen-safety">teen safety</category>
 <category domain="http://blog.intelius.com/category/tags/teens-facebook">teens on facebook</category>
 <pubDate>Fri, 09 Apr 2010 14:12:00 +0000</pubDate>
 <dc:creator>drupal_admin</dc:creator>
 <guid isPermaLink="false">215 at http://blog.intelius.com</guid>
</item>
</channel>
</rss>
