Sunday, March 21, 2010

Weekly Poll Analysis - In Your Opinion, Which Website Has Least Online Privacy?

Link to us: http://sn.im/lastpollresult



Hello Readers! From the chart above show the results for the question" In your opinion, which website has least online privacy?" This is the result of our final poll on our blog, thanks for everyone's participation and we has collect 16 votes.

Next, 10 votes (63%) got to www.facebook.com. Through this result, we can know that most of the Internet users think that social networking sites are least privacy because it may cause identity theft and people could take your personal information from social networking sites used for dangerous purposes. Actually, social networking sites like Facebook have enhanced their privacy settings by provided some options to protect against online identity theft but it was up to you to customize them by yourself.

In addition, 4 votes (25%) go to www.maybank2u.com. Online banking have it own risks but always remember the online banking system would not reveal your personal information to third party and they would not request your personal information through phone calls and emails. Online banking is safe to use, but Internet users also need to be alert to online fraudsters.

Lastly, 2 votes (13%) go to www.hotmail.com. This show that Internet users are least pay attention on web based E-mail application. Do you read Cindy's post which is related to E-mails Privacy? E-mail is convenient, easy to use and is FREE (except premium E-mail service)! But, do you know that web base E-mail could bring serious threat such as your private information could be reveal to online fraudsters easily. Internet users can continue using web base E-mail but always remember be alert to the threats and avoid send your private information through web base E-mail services.

In conclusion, we hope that the information we sharing to you have help you to know more about Cyber Law in Malaysia and tips to protecting your online privacy when using Internet. So, readers always remember be aware when explore the web.

Saturday, March 20, 2010

Emails Privacy and Security?

Link to Us: http://sn.im/emailps

Many people use Internet every day and those Internet services that we use very frequently are social networking sites such as Facebook, MySpace, online banking, and also web based E-mails application.

What is web based E-mail application? Maybe you do not know what is that but you know Hotmail which also known as Live Mail, Yahoo! Mail, and Google Mail? They are the three common and popular web based E-mail service providers. Basically, web based E-mail application refers to E-mail service which is available through online, Internet and users are not required to install any software to use this service. Users only have to register to become the service members then, they could send E-mails and keep contact with their family, friends, partner, and others. Nowadays, E-mail is very convenient, easy, fast, and usually it is FREE (except for the premium E-mail service)! People love to use web based E-mail but E-mail could bring privacy risk and issues to users.


First, the most possible issue of E-mail is spam E-mails. Spam E-mails might contain viruses, spyware, worm such as Trojan that could harm your computer. If you accidentally open the spam E-mails and download the attachment inside the spam E-mails, your computer could have a high possibility to be affected by Trojan and other viruses. Trojan could allow intruder take control of your computer therefore, those personal files, information that saved inside your computer might be stalked by intruder. It sounds scary, right?

Next, do you ever encounter problem like sending E-mails to wrong addresses? If you type wrong a character of the receiver's E-mail address, the message (the E-mail) would send to the wrong address that you have type in. For example, Susan* wants to tell her father she is lacking of money to pay her accommodation fee then, she writes an E-mails which contains her account number and request her father to bank in money to that particular bank account. After that, her father E-mail address is J08004222_4307@hotmail.com but she accidentally type a wrong address which is J08004307_4222@hotmail.com. Her E-mail which contained her personal information is sent to a wrong receiver which is J08004307_4222@hotmail.com. This wrong receiver might misuse her personal information such as this wrong receiver uses her name, her account number, and IC number to apply for a loan from other Internet services. Thus, web based E-mail providers do not 100% fully ensure your E-mail could be sent to a correct receiver and your private information could be reveal to strangers easily. Ok, maybe users be more careful and double check the receiver E-mail address could be safe. Users always need to have awareness and double check effort to prevent this problem.

In addition, another threat of web based E-mail is it could be an easy platform to do tracing. An E-mail contains time and date that you sent that particular E-mail, IP address, country, city that shows the exact location you sent the E-mail. Then, the web base E-mail service provider would record down all these information included the message you write in the E-mail in their database and the E-mail admin could always refer back and check the information of the E-mail sender. He could check your IP address and he might trace your IP for hacking attack to your computer. Since web based E-mail is easily to do tracing, people who intrude the database and obtain your IP addresses, other personal information and even telephone number then, they could track on your online habit which included the location you online, the location you send E-mails, and others.



Burglar, Animation Library [Online]
Retrieved on 20th March 2010
URL: http://www.gifs.net/Animation11/Jobs_and_People/Criminals/Burglar.gif



When you want to send message to your business partner and other personal purposes, you would use electronic mail, E-mail because it is convenient and it does not like sending a postcard which requires you to purchase post stamp and put the letter into the post bin and most of the web base E-mail service is free except premium service. Therefore, why not just use web base E-mail to do communication, sending messages instead of posting letters, postcard but think carefully, your E-mail that you sent by using web base E-mail service would pass through many computers or maybe servers throughout the Internet. You might encounter information leakage, your message revealed and it would cause user a heavy lost if the E-mail contains crucial information, private information, business information because most of the web base E-mail could not fully guarantee your E-mail privacy except you use their premium service.

Last, maybe there are some web base E-mail service providers who have stronger privacy protection and security but not all of us are know them and even use them. Internet users still can use web base E-mail but please be more aware to the threats, be more careful on the message that you want to send through web base E-mail and also try to avoid to send too personal information.



References:
Primary Search:
Simson Garfinkel, Gene Spafford (2002), Web Security, Privacy, and Commerce Second Edition, O'Reilly Media, Inc, United States of America.

Secondary Search:
Email Privacy Info, Email Privacy.Info [Online]
Retrieved on 20th March 2010
URL: http://www.emailprivacy.info/

Wednesday, March 17, 2010

Protecting Your Privacy On Facebook

Link to us: http://sn.im/fbsecuretips


Facebook.com, Petition: Facebook, stop invading my privacy! by Facebook.com
Retrieved 16 March 2010
URL: http://www.facebook.com/group.php?gid=5930262681&4


Nowadays, a lot of teenagers are using social networking sites communicate with each others. The most attractive and famous social networking site using by teenagers are Facebook. Many teenagers are visiting the social networks of their older friends, siblings and other relations just to keep up with the fun. Facebook, as you know, is a social network that allows groups and individuals to create their own little corner of the Internet, and people can communicate with each other, share their interests, photos, videos, songs and so on.


But do you know that online fraudsters are always target on Facebook and other social networking sites to harvest information about you. So, now you may ask "How safety Facebook is?" Answer is Facebook has provided some options to protect your online privacy but it was up to you to customize them by yourself. Here we will recommend you few ways to set your Facebook privacy options to protect against online identity theft.

Step 1: Customize Privacy Settings to help protect your identity
At the bottom of every web page on Facebook, there is a link called "Privacy Settings". You can change your profile information like your name, current city and gender. You also can control who can see you in search results of Facebook and set a block list which can control who can interact with you on Facebook. After customize, you can use the "How others see you" tool on Facebook privacy setting to preview and make sure your privacy settings are properly set up.

Step 2: Think carefully before accept any friend requests
Once you have accepted someone as your friend they will able to access any information about you. They might be using your photo and identity for certain purposes. You can remove any friends at anytime when you change your mind about someone.

Step 3: Show "limited friends" half version of your profile
You can choose to make people into "limited friends" who only have access to half version of your profile that you customize it. This can make more secure when you have interact with who you do not wish to give full personal information and status to, or feel uncomfortable sharing information with.

Lastly, Facebook can be a real joy because it can help you keeping in touch with relatives, sharing information with friends and family. But always remember keeping your personal information private and secure when you are using Facebook.

Reference:

allfacebook.com, 10 Privacy Setting Every Facebook User Should Know, by Nick O'Neill
Retrieved on 16th March 2010
URL: http://www.allfacebook.com/2009/02/facebook-privacy/

Sunday, March 14, 2010

Special Online Privacy Act

Link to Us: http://snipr.com/on9pact



Jeremy Douglas-Stewart, Comprehensive Guide to Privacy Law - Private Sector, Presidian Legal Publications. [Online]
Picture retrieved on: 14th March 2010
URL: http://www.presidian.com.au/images/comp-guide-privacy-law.JPG


"The Children's Online Privacy Protection Act of 1998 (COPPA) prohibits the collection, maintenance, and use or disclosure of personal information from children under the age of 13 on commercial Web sites that are directed at children." 1

1_______________________________________________________________________________________________
(Page 104, 4.2.5 paragraph 1, Youth, pornography, and the Internet, Dick Thornburgh, Herbert Lin, National Research Council U.S.


Nowadays, we (teenagers, youngsters, adults, elderly people) are talking about online privacy to protect our online information but do you know that children deserve online privacy too? Based on the book 'Youth, pornography, and the Internet", In U.S. they do have an Act to protect children's online privacy who are aged below 13. That means everyone in U.S. is under protect by Act or Law. There are many cyber laws and acts in U.S. that protect Internet users such as Cybersecurity Act of 2009.

So, what is this Children's Online Privacy Protection Act of 1998 about? Basically, it protects children's private information online which included first and last name, home or physical address, e-mail address, telephone number, and other collection of personal information. Moreover, this Act also addresses to stop commercial web sites or online service use children information and target to children.

In the past, there were some bad people use children appearance in pornography. They use children images and exposure in the online child pornography and at the end would lead to very bad consequence which is the luring of children get into illegal sexual activities. Therefore, this act is created to stop people use children's identity included name, appearance, and other personal information in child pornography through Internet. Furthermore, children's online privacy is being protected. Their online personal information such as name, photos show their identity, and exposure could not be used for commercial web sites, online services without their parents' consent and so, children's private information and identity have their own privacy and could not easily be used or misused by the online service providers or web sites.

This Act is so special. Do not think adults need online privacy protection to guard and secure their personal information only. Children need it too because they have their own identities and exposure especially online.

On the other hand, In Malaysia we do have Data Personal Act to protect all the Internet users' personal information (this Act is progressing but it is believed it would be publicized very soon). Currently, one of the serious cyber issues in Malaysia would be phishing scams. In my opinion, this Data Personal Act could prohibit fraudsters misuse users' personal information such as online banking log in details included log in name and password, credit card numbers, IC number, and other data they use via Internet to obtain illegal benefits especially in terms of financial -- money. This Act is quite new and unique because it aims and major to guard one's online personal information to fight against phishing scams and other misuse of personal information. In my opinion, Malaysia might not need a lawsuit to mainly focus on children's online privacy protection because the social and culture are very different from U.S. We protect children's personal information and illegal and negative children exposure through Internet is always prohibited. In U.S. misuse children exposure and personal information is very serious especially child pornography. Therefore, they must have a lawsuit to against all these negative children's personal information exposure through online.

In conclusion, children deserve online privacy and they need protection on their identity and personal information. Children are innocent, we should not violate their online personal information privacy and use their information on other bad ways. They have their rights to choose how to their information can be used or refuse to be used.



References:
Primary Search:
Dick Thornburgh, Herbert Lin, National Research Council (U.S.) (2002), Youth, Pornography, and the Internet, National Academy Press. 2101 Constitution Avenue, N.W., Washington, D.C. United States of America.


Secondary Search:
Children's Online Privacy Protection Act of 1998, Federal Trade Commission. [Online]
Retrieved on: 14th March 2010
URL: http://www.ftc.gov/ogc/coppa1.htm

Saturday, March 13, 2010

Weekly Poll Analysis- Which of the following act has been introduced on 2001 to protect one's personal data privacy in Malaysia?

The weekly poll results finally came out. Thanks for everyone's participation and totally Online Privacy Zone blog has collect 24 votes. Thanks again.

Which of the following act has been introduced on 2001 to protect one's personal data privacy in Malaysia? Options given are Data Personal Act, Cyber Security Act, Cyber Crime Act, Communication Act, Copyright Act, and I don't know. Majority (9 out of 24 votes, 38%) chose "I don't know". This could be understood because the introduction of the act in Malaysia is still new some more, the act is under progress. Furthermore, poll participators might lack of knowledge on law.

Next, 5 votes (21%) go to Data Personal Act. Congratulations to these participators who chose Data Personal Act because this Act is the correct answer. Malaysia has introduced this Data Personal A and this Act is currently progressing. It aims to give more protection and guard to one's personal information especially online personal information such as credit card number, password and so on. Nowadays, phishing scams are increased, therefore this Act could help to prevent one's online private data is being misused, investigate, and punish who misused someone's private information. Do not think this Data Personal Act is not related to online privacy because it is created for strengthen online information protection.

In addition, Cyber Security Act, Cyber Crime Act, and Communication Act have 3 votes (13%) for each. All these three Acts are not being introduced on 2001, obviously they are not the accurate answer. Moreover, Cyber Security Act is under U.S. lawsuit and the accurate name for this Act is CyberSecurity Act of 2009. Malaysia do have Computer Crimes Act 1997 but not Cyber Crime Act and it addresses to cyber crime activities and monitor those cyber crimes such as unauthorized access and copying of computer programs. On the other hand, Communication Act is not for personal data protection and the correct name for this Act in Malaysia is Malaysian Communications and Multimedia Commission (MCMC) and it oversees framework of broadcasting, telecommunications, and on-line activities.

Lastly, only 1 vote (4%) goes to Copyright Act. In Malaysia, Copyright Act protect the originality of the work, authorship, prevent plagiarism, and others. Personal data deserves copyright? According to Laws of Malaysia, the Copyright Act 1987 only certain works are eligible for copyright such as films, sound recordings, broadcasts, literary works, musical works, and artistic works. Then, how do our personal data is eligible for copyright and its protection?

In conclusion, Malaysia first introduced cyber law is Computer Crimes Act 1997 and it is 13 years ago. Now Malaysia is going to strengthen Internet users' private data protection by introducing this Data Personal Act. That is pretty good job.



Reference:
Is Cyber Crime Reigning On A No Man's Land?, National ICT Security and Emergency Response Centre (NISER) [Online]
Retrieved on 13th March 2010
URL: http://www.cybersecurity.my/data/content_files/13/134.pdf?.diff=1177182839

Friday, March 12, 2010

Cyber Security Tips: Protect Your Privacy

Link to us: http://snipr.com/cybersecuritytips

Nowadays, cyber crime activities are on the rise and become a serious threat. Everyday we might receive uncountable phishing emails from online fraudsters. We should take action to prevent before we become one of the victims of cybercrime. The following steps are simple explanations to protect your privacy when you are using Internet.

Step 1: Read through website privacy policy
Before you fill in your name, email address and other personal information into a website, read clearly the content of the website privacy policy. This policy should state how the information will be used and whether or not the information will be give to other organizations. Some companies may share your information with partner vendors who offer products or options to subscribe to particular mailing lists. You might be added into the mailing lists and receive unwanted spam emails. If you cannot find a privacy policy on a website, try to contact the company to require about the policy before you submit your personal information, or find another website. Remember review the privacy policy regularly because it may change by the company.

Step 2: Confirm that your information is being encrypted
To protect your personal information steal by online fraudsters, any information that submit online should encrypt so that only can read by the appropriate recipient. How to confirm the information that we submit has been encrypt? Many website use SSL which is secure sockets layer to encrypt information. A website that using secure sockets layer to encrypt information will include a URL that begins with "https:" instead of "http:" , https is a secure protocol and often used for payment transactions. For example, CIMB online banking is using https for CIMB Bank secure e-pay, https://www.cimbsecuree-pay.com.my/

Step 3: Avoid submit credit card information online
Certain websites may require you to provide your credit card information. It may give the chances to online fraudsters to steal your credit card information during the submission process. So, don't simply give out your credit card information.

Step 4: Avoid website remember your password
Avoid allow a website to remember your password because if your password being stored, your profile and any account information you have provided on that website can easily access by online fraudsters. Always evaluate and customize your privacy settings on websites used for social networking because other might grab your information from social networking sites and misuse your personal information for certain purposes.

Except that, we should clearly know about what kinds of Malaysian cyber law can protect personal privacy. For instance, MCMC Act which is Malaysian Communications and Multimedia Commission Act 1998 can control the accuracy of the content publish online, broadcast and other media. On the other hand, Computer Crime Act 1997 used to against the misuses computers and computer criminal activites. The new cyber law which enforce on Oct 2009 is Personal Data Protection Act is aimed to be safeguard to every Individual Internet user's private data and prevent Internet users misuse one's private data. As Internet users, we should gain more Malaysian cyber law knowledge to protect our own personal privacy.


References:
1. LawEddie.com, Current Cyber Laws in Malaysia, by Eddie Law
Retrieved on 11th March 2010
URL: http://www.laweddie.com/wordpress/current-cyber-laws-in-malaysia/

2. instantssl.com, Https: What is it and how does it works, by instantssl.com
Retrieved on 11th March 2010
URL: http://instantssl.com/ssl-certificate-products/https.html

Sunday, March 07, 2010

The Truth Revealed: The Act protects your online privacy

Link to Us: http://snipr.com/cyberlaw4

Do you remember one of the previous post "Do You Remember?"? It is time to tell the details of the act that protects Internet users' personal data.

The Act is Personal Data Protection Act and it is progressing now. The Personal Data Protection Bill finalized on 2009 and today Malaysia government is working with the Act now. This Personal Data Protection Act would be aimed to be a safeguard to every individual Internet user's private data and prevent other Internet users misuse one's private data. Moreover, a Personal Data Protection Commission would be formed under this Act to investigate any issues or cases on misuse of one's personal data. Anyone who suspected for the guilty of misuse other people's private information could be investigated by this commission. In addition, this Act also involves the protection of e-commerce transaction and other sectors such as finance, telecommunications. It ensures the user's private data is being used by the servers for commercial activities too.

This Personal Data Protection Act is expected to arrive soon to protect all of the Internet users' personal information and build a safer cyber community. Under this Act, users could have a significant protection to prevent their online private information to be stolen and misused. Furthermore, in the future any victims of phishing scams could report to the commission, ask for an investigation, and get possible compensation if the charge is tenable. Once this Act is established, users' private information could be protected and I believe many people are very happy to have this Act in future.

Since Personal Data Protection Act is coming soon therefore, you might wonder in current which cyber law is protecting our online personal information? The answer is many which included MCMC Act, Communication and Multimedia Act 1998, Computer Crimes Act 1997 and others to punish people who misuse the computer technology and information technology but all these cyber Acts are not fully major to beat online privacy intruders especially fraudsters who cheat victims' properties through phishing scams. Some cyber Acts are stated that the measure of data security. Service Providers have to create and maintain the precaution to protect one's personal information from loss and misuse. It also states the service providers need to assure the transferred information through online is secured and protected to avoid fraudsters encrypt the content of the personal information.

In conclusion, now and future we would have a complete act to protect our personal information and give all the Internet users a space of privacy to keep their personal information safe and secure. Once our personal information is protected by the Act, we would have more privacy and security on the cyber world and the cyber crimes maybe would be lesser.



Reference:
1. Personal Data Protection Act to Protect Personal Information, Bernama.com [Online]
Retrieved on 7th March 2010
URL: http://www.bernama.com/bernama/v5/newsindex.php?id=405278

2. Personal Data Bill To Be Tabled In Dewan Rakyat, Bernama.com [Online]
Retrieved on 7th March 2010
URL: http://www.bernama.com/bernama/v5/newsgeneral.php?id=425714

Saturday, March 06, 2010

How Computer Crimes Act 1997 Protect You?

Link to us:http://snipr.com/cyberlaw3


Hello Everyone! Today I would like to introduce and explain the Computer Crimes Act 1997 in Malaysia. Computer Crimes Act 1997 is the cyber law which been approved by the government and implemented on 1st June 2000.

How Computer Crimes Act 1997 works? Computer Crimes Act is an act used to against the misuses of computers and computer criminal activities. For instance, Internet users who access to any program without permission, illegal transmission of data or messages over the computer and hacking of computer system or networks can be accused under this law.

By attaching the Computer Crimes Act 1997, users can protect their rights to privacy and build trust in the computer system. At the same time, the government can have the right to track the illegal activities on the Internet, thus can reduce the cyber crimes cases.

In conclusion, as Internet users we should clearly know about the cyber laws that can protect our privacy information and establish a secure cyber space and reduce cyber crimes activities in Malaysia.Want to know more about cyber law? How others cyber law protect you? Please stay tune at onlineprivacyzone dot blogspot dot com (http://onlineprivacyzone.blogspot.com/)



Reference:
Law of Malaysia, Computer Crimes Act 1997 [Online]
Retrieved on 05th March 2010
URL:http://www.ktak.gov.my/system/uploaded/files/Computer%20Crimes%201997%20-%20Act%20563.pdf

Tuesday, March 02, 2010

Weekly Poll Analysis- How online information should be protected?

Link to Us: http://snipr.com/6thpoll



This is the analysis for the sixth weekly poll in Online Privacy Zone blog and it is related on how online information should be protected. Total 27 voters have participated in this weekly poll and thanks for everyone's participation.


Nowadays, the cyber world is getting dangerous because of phishing, scam, hacking issues, and many more. Internet is public and your private data or important information might reveal to many people included fraudsters then, it could lead you to phishing threat. You would wonder who can efficiently protect your online information and how to protect your online information. This weekly poll concluded participants' suggestions on the ways to protect online information which are government should come out a law to protect online privacy, websites should disclose policies, and educate Internet users.

First, majority (12 vote, 44%) chose government should come out a law to protect online privacy. In Malaysia, currently we do not have a confirmed law or act to protect our online data and privacy. We do have cyber law to stop cyber crime which can help to defeat cyber crimes such as phishing, scams, illegal access to one's personal computer, and many more but this cyber law is not focus on protection of online data and privacy. Participants feel that law could protect online privacy effectively because people are scare of the punishment therefore, they would avoid themselves to involve in any violation of online information privacy. Moreover, a law which focuses on online privacy protection could guarantee whatever personal information Internet users key in could be protected because individuals, partners, government, businesses, services, and others would work based on this law to gives Internet users a privacy security or protection.

Next, 10 participants (37%) wish that Internet users could receive suitable education to protect their own online privacy and prevent to become victims. 10 participants chose educate Internet users probably is because they think that it is important to increase knowledge and awareness on online privacy among the Internet users. Self awareness could protect users to avoid themselves to become victims because they are guarded by knowledge which related to cyber crimes and online information privacy.

In addition, 5 out of 27 participants (19%) voted websites should disclose policies. Policies refer to the plan written by the company, partner, services, or other businesses on Internet to promise they would protect users' online private information by taking suitable protection, prevention, and other actions. Most of the membership for sign up services which available on Internet require users to agree to their policies or terms and conditions because they want users to understand what kind of circumstances their data would and would not be protected, and what are the parties that should responsible for certain actions. These 5 participants feel that, disclose policies could protect their online data because these policies are like agreements that promise to protect their online data in certain situation and if the company did not achieve the protection which should give to the users, users could complain or sue the company.

In my opinion, it is great if the whole cyber world in worldwide could fulfill all these three ways then, the cyber security only could be protected effectively. Internet users might be alert on the online privacy issues but they do need law or act to punish all those who violate their online privacy. If there are no any relevant law, Internet intruders could never stop their negative activities through Internet because no one could stop them. Luckily, Malaysia have introduced an act to protect personal data and the draft was come out on last year. We could achieve a more secure cyber world soon.

Sunday, February 28, 2010

Do You Know?

Link to Us: http://snipr.com/cyberlaw2

Good evening, everyone! I am sure when you surf the net, you would enter certain information and access to certain services but do you know any cyber law in Malaysia could protect you and your information?

Are you still remember in previous we were talking about online banking privacy issue because fraudsters could obtain your private data illegally through phishing or scam and cause lost or injury? There is an Act that could punish all these fraudsters or other Internet users unauthorized access to your information. On the other hand, if some unauthorized Internet users who edit the content from the computers violate the Act and they would be punished under this particular Act too.

Many Internet users do not know about the cyber law or act in Malaysia. All these law or act are protecting us everyday but do you know any of them? The history of cyber law in Malaysia is still 'young'. Our every first cyber law created on 1997. You want to know what is the law or act please stay tune at onlineprivacyzone dot blogspot dot com (www.onlineprivacyzone.blogspot.com).

Next, do you read Amy's previous post which is related to MCMC Act? Then do you know there are many guidelines under MCMC Act which are responsible for your communication privacy no matter you are using public wireless access or others.
When you talk to other people, the important information that you type in deserve online privacy protection. It is very important to have a lawsuit to protect our online information and privacy.

Lastly, here is a question. "Do you know any of the cyber law or act?" Please reply at the comment field. We could discuss about the law together.



Reference:
The Law, Legislation, The Malaysian Communications and Multimedia Commission [Online]
Retrieved on 28th February 2010
URL: http://www.skmm.gov.my/the_law/legislation.asp

Saturday, February 27, 2010

Introduction On Cyber Law of Malaysia

Link to us: http://snipr.com/cyberlaw1

Hello Readers! Do you know what MCMC Act is? MCMC Act is Malaysian Communications and Multimedia Commission Act 1998 which is effective from 1 November 1998. MCMC Act is taking responsible with the development of the communications and multimedia sector in Malaysia. They are cover on broadcasting, Internet, broadband, radio frequency management, numbering and electronic addressing. The mission of MCMC Act is to create a proper space for Internet users. They will take action when they receive public complaints, they need to investigate the problem and solve it.

So, as one of the Malaysian bloggers, we have the responsible to know what kind of information we should write and what kinds of information we are shouldn't write. We have to be alert when we are in blogging activities, there are two sections from MCMC Act we should take note, which is section 211 and section 233 of the MCMC Act. Section 211 of the MCMC Act is for do not allow personal attack content. For instance, owner of the application service or Internet users who using the application service obtained information that is threaten anyone will be accused under this section. On the other hand, section 233 of the MCMC Act is misuse network service such as an application service which obtained salacious information for business purpose.

As Internet users, we have to clearly know about what kind of information we are sharing with others on application service and we should work together to maintain a proper environment for every Internet users.

Reference:

1. LawEddie.com, The 2 Must Know MCMC Laws that Regulate the Contents in Your Blog or Website, by Eddie Law
Retrieved on 26th February 2010
URL:http://www.laweddie.com/wordpress/the-2-must-know-mcmc-laws-that-regulate-the-contents-in-your-blog-or-website/#more-827

Friday, February 26, 2010

Weekly Poll Analysis- What Is The Biggest Online Privacy Issue You Concern?

Link to us: http://snipr.com/5rdpoll



The chart above shows the results for the question posted on our weekly poll posted last week. The question of weekly poll posted last week is, "What is the biggest online privacy issue you concern?".

Out of the 13 votes, 6 votes(46%) goes to my credit/ bank account details is being stolen, 4 votes(31%) goes to someone is tracking me through online, 2 votes(15%) goes to my identity is being stolen and 1 votes (8%) goes to my photo is being stolen through social networking sites or blog.

Through this weekly poll result, we can conclude that most people are concerned on their bank account details being stolen and someone is tracking them through online. It is because the use of password does not provide strong protection against Internet fraud such as phishing. The problem with password is that when it has been compromised, the fraudsters can easily take control on online transactions. The password is no longer works as an security key because we cannot be sure who is behind the keyboard typing that password in. On the other hand, the problem of identity and photo of Internet users is being stolen through social networking sites is because anyone can obtain your details and used without your permission. This amazing technology allows us to share our photos with friends but Internet users must be realize that any pictures that you put on the Internet can being stolen by anybody and it could used for anything.

What is your opinion? What do you concerned when you are using Internet?

Sunday, February 21, 2010

Podcast III: We Want to Stop Phishing (一起来阻止网络钓鱼)

Link to us:http://snipr.com/podcast3

Here is the third and the last Chinese podcast. It is related to one of our previous post which is 'Opps! I catch a 'phishing'- Give Safety to Online Privacy.' This final podcast is worked together with Cindy and it is quite casual. Hope it could give a guide for every Internet users to stop phishing together.





Title: 一起来阻止网络钓鱼
Duration: 2 minutes and 46 seconds (2:46)

Translation Script:

[00:01-00:08]
Amy: Previously, we talked about the ways on preventing phishing and now I am curious whether there are no ways to stop phishing completely?

[00:09-00:22]
Cindy: Nowadays, phishing is becoming more serious. We as the users of Internet we have to try our very best to avoid ourselves becomes phishing's victims. For the ways to stop phishing, yes there are but it requires a lot of support and cooperation from all the web users.

[00:23-00:35]
Amy: What is the way? Normally, phishing happens on fake E-mail and web sites. What we could do is only ignore all these phishing E-mails.

[00:36-00:44]
Cindy: Besides, ignore or delete those phishing E-mails, we could report these phishing web sites to stop them.

[00:45-00:47]
Amy: Report phishing? How?

[00:48-00:56]
Cindy: Actually, it is very easy. In E-mail functions, you can click on one of the actions which is 'report phishing or scam'.

[00:57-01:07]
Amy: Oh! I know now. Then, those E-mails company would realize these phishing web sites then block the web sites to be sent to E-mails users, right?

[01:08-01:14]
Cindy: Yes, just like Google E-mail allows users to report phishing.

[01:15-01:25]
Amy: I get it already. When you find out any phishing E-mail, you can click 'report phishing' to secure your personal data some more can avoid fraudsters obtain data.

[01:26-01:33]
Cindy: If E-mail company stops these harmful phishing E-mails then, many users do not have to worry much.

[01:34-01:45]
Amy: You have your point, but not all would report what? If someone did not affect by phishing then, he would not spend time to report and what benefits I would get if I report?

[01:46-02:07]
Cindy: Report phishing E-mails can reduce the phishing effect on us. The risk we contact phishing would decrease too. You might understand and alert the danger of phishing but other Internet users even new users might be trapped. Everyone has to try his best to stop phishing to gives protection for our and others' privacy.

[02:08-02:17]
Amy: Once stop more and more phishing web sites, we could build up a safer Internet to protect everyone's personal data and privacy.

[02:18-02:26]
Cindy: Yes! On the other hand, we could report all these phishing web sites to specialized organizations such as antiphishing.org.

[02:27-02:33]
Amy: Oh! After that, these organizations would increase awareness about phishing among us then, everyone would not be cheated.

[02:34-02:41]
Cindy: Really hope that all of us can report phishing together to give Internet users a more secure environment.

[02:42-02:46]
Amy:Ok! We stop and report phishing together.



Glossary

Phishing= 网络钓鱼
Internet= 互联网
Website users= 网民
Website URL= 网址
Function= 功能
Action= 行动
Report Phishing= 举报网络钓鱼
Scam= 网络骗局
Google= 谷歌

Saturday, February 20, 2010

Podcast II: Avoid Phishing to Violate Your Privacy (预防网络钓鱼危害您的隐私)


Welcome to Online Privacy Zone. Here is the second Chinese podcast. It tells how to avoid phishing violate your privacy. Thanks for your support.



Title: 预防网络钓鱼危害您的隐私
Duration: 2 minutes and 42 seconds (2:42)

Translation Script:

Hello everyone. Did you hear the previous podcast? Yes, the topic I am going to discuss is related to phishing too. First, I would like to briefly explain what is phishing. Phishing is a technique used by hackers or fraudsters to obtain victim's personal information which included credit card numbers, account password and others. Then, they hack into the victim's account such as online banking to cheat money. Usually, fraudsters obtain victim's personal information through E-mail and they control the attached link which is located inside the E-mail. Phishing is very dangerous, you have to be alert to identify the bait the fraudsters used easily which is the fake E-mail and the web site URL.

Since you have way to identify the phishing E-mail, obviously you would not be cheated or tricked. You also have to strengthen protection on your personal information. The effective way is set up proxy inside your web browsers. Web browser's proxy setting is similar to the firewall within your computer. They have the same function either proxy or firewall which is monitor your online activities and the usage. Moreover, they could filter the files whether do contain threats like spy ware or malware and other viruses before they transmit to your computer. Proxy could protect your computer by blocking these harmful viruses intrude your computer. Proxy could effectively stop phishing because it could identify and filter the harmful content of the web site and stop the suspicious web site link to be sent to you. If your browsers already set proxy, then proxy would not visit those blacklisted web site which included the exposed phishing web sites. Furthermore, when you use Internet, proxy would stop the unauthorized Internet users hack and interrupt your online activities especially while handling online transaction. These unauthorized Internet users who hack into your online activities are called 'hackers'. They could interfere your online transaction to get benefits. Firewall and proxy could stop suspicious files, harmful viruses to intrude your computer. Remember to set up the proxy inside your web browsers to protect your online privacy. Wish everyone surf Internet happily. I am Cindy, thanks for tune in Online Privacy Blog's podcast.



Glossary:
  1. Podcast- 播客
  2. Phishing- 网络钓鱼
  3. Hackers- 骇客
  4. Fraudsters- 网络行骗者
  5. Attached link- 连接的网址
  6. E-mail- 电子邮件
  7. Web site URL- 网址
  8. Proxy- 代理主机
  9. Browser- 浏览器
  10. Firewall- 防火墙
  11. Spy ware- 间谍程序
  12. Maleware- 恶意软件
  13. Viruses- 病毒
  14. Internet- 互联网

Friday, February 19, 2010

Podcast I: Phishing Threatens Your Online Privacy?

Link to us: http://snipr.com/podcas1





Translation Script

Hello everyone, today the topic that I am going to discuss is how phishing threatens your online privacy?

In this technology generation, Internet becomes dangerous and threatening. All of us need to be alert and against all the possible threats when we use Internet. Everyone also need to strengthen their Internet knowledge to protect themselves from become the victims of phishing.

So, I'm here to explain what phishing is.

Phishing is a technique that hackers, fraudsters request to obtain other people's personal information such as credit cards numbers, password.

Many Internet users received anonymous emails that state they have problem to log in to the system and request them to go to the provided link and insert their log in ID and password. The provided link could be fake and it controls by the hacker or fraudster at the other server. Once you enter your log in details, fraudster might obtain those information and hack into your account. If more serious, you might lose money!

Online users can protect your online information by checking a phishing email then you would not become a phishing victim. Please be reminded, bank will never ask you to confirm your account details by an emails. So, you also need to beware of other phishing emails which look like send by other possible companies that you trust. We conclude three ways to find out a phishing email.

Step 1: Check your name.
Your name will not appear in the emails. Usually fraudsters write" Dear Valued Customer" because the same email sends to many people. Therefore, it is not trustable.

Step 2: Check for the spelling mistake.
Phishing emails use the real logo and the name of the company but it is not authentic if you found spelling mistake in content or title of the email. That must be a phishing email.

Step 3: Look at the URL links attach in the emails.
If the emails ask you to click on the provided, never click it and you check the link whether is look different from the original web site URL. This anonymous link hosts by the fraudsters, it just looks like similar to the original web site URL if you are not aware of it.

If you have received phishing email, don't panic. Please don't reply and click on anything, because it is phishing scams! You could be safe from phishing and protect your online information easily.

Thank You.





Glossary

Internet = 互联网
Phishing = 网络钓鱼
Fraudster = 行骗者
URL (Universal Resource Locater) = 网址

Monday, February 15, 2010

Weekly Poll Analysis- What Would You Clear In Setting First Before You Quit Your Web Browser?

Link to us: http://snipr.com/4rdpoll



The pie chart above shows the result for the question posted on our weekly poll posted last week. The question of last week is, " What would you clear in setting first before you quit your web browser?

From the total of 9 voters, 5 voters (56%) seldom clear anything before they quit web browser, 3 voters (33%) will clear all at the same time which is web browser history, web browser cookie and web browser cache, while 1 voter (11%) has choose clear web browser history only.

From the result, we can know that the Internet users are not really concerned about online privacy issues. They do not know that if they do not clear up the "private data" on web browser can cause a serious consequence. The serious threats are anyone in the Internet can easily discover the websites that users have been visited before using web browser and users information might be easily access by others.

So, to protect users online privacy, users should take right action which is delete all the web history, web cache and web cookie on web browser regularly. Except that, for those who want to have more privacy protection can use special software to protecting privacy information.

Do you believe that do not clear up web history, web cookie and web cache in setting before quit web browser can bring you a serious consequence?

Sunday, February 14, 2010

The Serious Threats of Proxy Cache.

Link to us:http://snipr.com/proxyca



New Media Musings website, online privacy in digital age, by New Media Musings [Online]
Retrieved 11 February 2010
URL: http://www.newmediamusings.com/2006/08/online_privacy_.html

Hey Readers, Happy Chinese New Year. I was here to continue last week topic which is web cache. Last week we have finished the topic of browser cache so this week we will discuss how proxy caches can threaten your online privacy?

First, proxy cache function as a computer system serves many internet users in the same time and proxy cache maintains as relay between client and server. Proxy cache can prevent attack from invalid private network by build up a firewall. The word of proxy means “to act on behalf of another” and proxy cache is same as what meaning of proxy which is acts on behalf of the user.

Second, proxy cache is a serious threat to Internet users due to poorly developed application code and session management can cause security problem arise. For instance, a cases study of a Internet users using the Google Doc for business usage but suddenly realize that in his Google Doc account list obtain a lot of documents are not belong with him which means his Google Doc has been intrude by another Internet users.

Except that, if users make inappropriate use of proxy cache for web application can cause a serious consequence. For instance, when user A seek behind a web proxy log in and log out in a web application and user B log in the website and log out but are you sure user B can completely logged out the web application? On the server side, the ‘logout’ page is control by user A and user B log in session will be invalid and he/ she cannot access the actual page without logging in again.

Lastly, Internet user should pay attention to web caching and proxy cache even it can improve users accessibility of website and reduce network traffic but we should be guard to against become one of the victims of web caching.

References:

Cyberstrategics, A New Security Breach in Google Docs Revealed, by Tim Bass [Online]
Retrieved 11 February 2010
URL: http://www.thecepblog.com/2008/09/15/a-new-security-breach-in-google-docs-revealed/

Slide share website, proxy caches and web application security, by Tim Bass [Online]
Retrieved 11 February 2010
URL: http://www.slideshare.net/TimBass/OWASPTAIPEIThailandTBass

Saturday, February 13, 2010

The Truth Revealed: The Cookies In Cyber


Happy Chinese New Year, everyone! Are you guys enjoy eating the Chinese New Year cookies? Now I am continue with my discussion on cookies, but not that cookies you guys eating. The cookies are the browser cookies or the cookies save inside your browser. If you want to know what are the cookies, you could refer to our old post 'Cookie? Biscuit?'. It tells what are the cookies in cyber world.

Let's start with something quite boring first - the history of browser cookies. Do not worry, it is just a brief history on cookies. Actually, the browser cookies are invented by Netscape Communication in 1994. Cookies also known as 'magic cookies' but nowadays, we keep it short therefore, we just call them 'cookies'.

Next, some arguments stated that browser cookies are harmless because they are just a text file without exceed 4kb and they are not virus or spy ware and they do not even store any viruses and spy wares. There are two types of cookies, one is session cookie which is temporary save inside your browser. When you turn off your computer, those session cookies are bye bye (disappear)! The other one is persistent cookie which can save until one month and even years. We do not care which type of cookies and their differences, they could be privacy risk to Internet users because cookies could be used to track an user's online shopping habits, browse the web sites habit and others.

Cookies are specialized to keep information for online shopping sites such as 'shopping basket', personalize web sites, and give information on how users use the web sites to the web owners or servers. They could be a big risk to online shoppers because when they shop through online, they do not have any privacy actually. It is all because the online shopping site's server could track their purchase habits and their browse habits. Would you feel comfortable when someone is tracking you when you do your shopping either online or outlet. Since cookies are invented to keep information on your shopping basket therefore, the web servers could retrieved the items you have saved inside the shopping basket. If other people hack into your browser cookies, they might know what you have purchased and even what sites you have visited. If you buy a lingerie to your girl friend, they might know too.

On the other hand, cookies can affect your online privacy especially to those online shoppers, their online shopping histories might be tracked but users could always protect them by disabling the browser cookies. This can be done inside the browser setting. Some users disable all the cookies from all the web sites, deny some of the cookies from certain web sites, or enable all the cookies but some web sites require cookies otherwise they would not perform well. Sometimes it is very hard to avoid browser cookies for certain web sites like Blogger (http://www.blogger.com) because it needs cookies to help you personalize or modify your blog. Believe or not? Cookies enables tracking and stalking through the Internet, through your browser.



References:
Primary Search
1. Grey Elmer, (2002). Critical Perspectives on the Internet, Rowman & Littlefield Publisher, Inc., United Kingdom.

2. Mark Ciampa (2009). Security + Guide to Network Security, Course Technology, Cengage Learning, Boston, USA.

Saturday, February 06, 2010

Weekly Poll Analysis- Do You Read The Privacy Policies When You Sign Up For Certain Services?

Link to Us: http://snipr.com/uatya



The pie chart above shows that out of 14 voters, 7 voters (50%) choose just simply read through the privacy policies, 6 voters (43%) never read any information in the privacy policies and only one voter (7%)have finish read the privacy policies when register for certain services.

Through the poll result of this week, we can know that a lots of people are overlook and do not pay attention to online privacy policies when they register for certain website. They are assume that exist of privacy policy is means their data can keep as private and confidential. But they are not read through and understand the content of privacy policy. This can cause a serious consequence because some of the privacy policy is to inform the data of internet users would be default be public and not private.

In my opinion, reasons of people do not read privacy policies is because the information of given by the website is too confusing. Website can consider creating a simplifying privacy policy to focus on important issues and more users friendly.

What is your opinion? Do you think web application should come out a new simplifying privacy policy?

How Web Cache Threaten You and Your Online Privacy?

Secure Business Infrastructure website, Network Security Auditing Solutions, by Secure Business Infrastructure website. [Online]
Retrieved 05 February 2010


Web cache stores representation (it has been discussed in previous post). There are two types of web caches which are browser caches and proxy caches, they work differently in the client-server computers. So now, let's discussion how browser caches can threaten your online privacy?

First, browser caches is functioned to keep images, HTML pages, and files in your browsers temporary. Internet users always can check what types of file are being cached inside their web browsers by typing about:cache in the address text box.

Next, since browser caches store those representations temporary, you can always refresh the current page, back to previous page easily and faster without requesting response from the server again. Actually browser caches can be harmful only if you key in your private data and your computer contains viruses and spyware. It is all because when you key in your private data, browser cache would store every data you have enter. If other users, viruses, and spyware hack into your browsers and duplicate the cache files then, your private data would be dangerous. If you check your cache files inside your web browsers, you might think those cache files are some text that you could not understand but there are some specify applications that could read the content of the cache files. Therefore, hackers can read your private data by using that particular application.

Moreover, if you did not clear your web cache frequently, the chances to expose your data would be higher especially what are the web pages you have visited. Browser caches record the content which is the representation and also each representation's URL link and the pages' URL inside your browsers. When hackers intrude your computers and copy your browser cache, they might know what web sites you have visited, what images you have seen, what text you have inserted and many more. Maybe you would not care browser cache could threaten you or not but it can be a online privacy issues because others can know what sites you are visiting now and ease other people to track your Internet usage. You have no online privacy as you could be spied by the hackers if they steal your browser cache files. Hackers look through all your browser cache files and they know what you have visited even those censored web sites or web pages. Thus, be careful when you surf the net, browser cache files in your browsers could lead you zero online privacy.




Reference:

Caching Tutorial for Web Authors and Webmasters, Mnot.net [Online]

Retrieved on 6th January 2010

URL: http://www.mnot.net/cache_docs/#DEFINITION

Thursday, February 04, 2010

Cookie? Biscuit?

Link to Us: http://snipr.com/wcookie

Remember the last two week's poll "What Is A Cookie"? Actually, not much blog visitors knows about the cookie or may be too much of visitors thought it is just a piece of sweet biscuit but obviously, since this blog is talking about online privacy, the cookie we talk at here is the web browser cookie. So, what is the cookie? Who "bake" the cookie?

In most of the computers, once they connect to the Internet, there are not only one cookie. It is a lot of cookies stored inside your computer if you surf the Internet frequently and visit different web sites. Basically, Cookies are those small file size text which contain the information such as identity, your name, your interests, users ID and others inside your computer. The servers "bake" the cookies and store inside your computer if your browsers did not disable the cookies. These cookies store inside your browsers therefore, the browsers send cookies to the web site's server and the server could identify you.

For example, blogger.com requires Javascript and cookies because it needs cookies to identify which user are you, your name and other log in information to let you do change of setting or make changes of posts. If your browser has disable the cookies, when you log in to blogger.com it would show message like this:



On the other hand, cookies can be harmless because they are text files with bits information only but some arguments said that cookies ease to track people. Let's analyze it briefly. Since cookies store your identity, it is possible cookies could reveal your information easily to third party then, you would no have online privacy? What are the truths? All these would be discussed on the next time.

Remember, web browser cookies are not those biscuits that we eat.


Reference:
What Is An Internet Cookie?, HowStuffWorks.com [Online]
Retrieved on 4th February 2010

Sunday, January 31, 2010

Is Cache Related to My Online Privacy?

Link to Us: http://snipr.com/cachenprivacy

Nowadays, it is very important for every Internet users to protect their online private information but for the new users, how many of them are really aware of the online privacy issues? If you as a Internet user, do you realize one setting in your web browser which is cache setting? So, how does cache relate to online privacy?

Cache is pronounced as "cash" but it is not the money we use everyday. Cache has many different types since our blog is discussing about online privacy therefore, let's start with web cache or known as browser cache. Internet users can always change their cache setting within their web browser. Basically cache is technology or tool that copies responses temporarily from the site that you are visiting such as images, URL, and files. It is like a middleman and it observes the requests and all the responses from clients (you) and servers (the web site or page server). Moreover, it helps to store responses from the server at your computer thus, during the next time when you visit the same site, it respond faster because cache could refresh the responses or data it kept.

Due to the function of cache which is store data or responses from the web site server, is it safe to enable cache within your browser when you use the Internet? Many arguments said that web caching could bring dangers to security, copyright and also privacy because it copies data even just temporary. an URL which starts from https:// is cannot be cached. The responses from https:// site cannot be copied because the process of transmitting data is being blocked and guarded therefore, cache would not affect the privacy of data from https:// sites. Then, what about the non secured site? Based on a book "Web Caching" written by Duane Wessels, he says

"One way in which users' privacy can be compromised is by cache access log."1

Hmm... it sounds like it can protect your online privacy. On the other hand, topics like threats, advantages, and disadvantages of a browser cache would be discussed on next and also included possible solution.


1_________________________________________________________________________

One way in which users' privacy can be compromised is by cache access log.

Duane Wessels, (2001) Web Caching, O'Reilly & Associates, Inc., Morris Street, United States of America


References:

Primary Search

1. Duane Wessels, (2001). Web Caching, O'Reilly & Associates, Inc., Morris Street, United States of America

Secondary Search

2. Caching Tutorial for Web Authors and Webmasters, Mnot.net [Online]

Retrieved on 31st January 2010

URL: http://www.mnot.net/cache_docs/#DEFINITION

Friday, January 29, 2010

Opps! I catch a 'phishing' - Give Safety to Online Privacy

Link to Us: http://snipr.com/safety4on9

Phishing can threaten your online privacy and phishing cases increase year by year. It is a very serious cyber crime in nowadays. We need to know the latest phishing cases to stay alert and increase Internet privacy knowledge to prevent yourself to become a phishing victim. Many ways to protect your information and avoid phishing scams are shared in previous post.


So, now you are alert to phishing scams. What else we could do to against phishing? The answer would be one easy step: report phishing! Then, why we should report? Nowadays, the cyber world is very scary and dangerous. You might do enough of prevention but to really secure your online privacy and your private data more, you need to report phishing to certain organizations and you even could help to stop phishing and avoid others to become victims of phishing!

If you received an anonymous email please do not nervous. You could keep your identity and personal information safe if you did not reply and click on the links which provided by the emails. After that, report spam or phishing. If you are a gmail user, you could watch the below video.

To Detect Phishing, GoogleAccountsHelp, Youtube [online]
Video Retrieved on 24th January 2010
URL: http://www.youtube.com/watch?v=0SyzRdeyDYk

Click on the 'report phishing' at the action bar which is located at the top of the email there. For other email service providers, you could report spam. The companies would help to investigate and block the particular phishing site or page. Furthermore, you could report phishing site to certain organizations such as http://www.antiphishing.org/

Your private information can be stolen through phishing scams! Please do prevention and report phishing! You could secure your personal information and help to protect other people's private information by wiping and stop phishing scams!



A real case happened on me! Recently, I received a lot phishing emails from maybank.com. I am user of the Maybank2u.com.my and I understand Maybank would not request my log in details by sending me emails. Furthermore, the sender maybank.com is not authorized therefore, I could spot and identity those emails are phishing scam and I just ignore them. In this case, users could always report the phishing link to the bank, you could find a report phishing form at the authentic website.


Always report phishing if you found it to secure your online privacy more and also build up a safer cyber world for everyone.

Thursday, January 28, 2010

Weekly Poll Analysis- What Is Cookie?

The second weekly poll is ended and thanks for everyone who participated.

The weekly poll is related to cookie. So, "What Is Cookie?" The given choices were "The Biscuit", "Browser Cookie/ http Cookie", "A Video Game", and lastly "Handphone". Totally, we received 18 votes and below is the pie chart for the poll result.



The result shows 9 out of 18 people which is 50% who chose "The Biscuit". After that, total 8 people chose "Browser Cookie/ http Cookie" which is 44% and only one vote for "Handphone" which is 6%. There was no people vote for "A Video Game".

Many people might think this poll question is quite "lame" but the aim to create this poll is to test whether Internet users understand what is cookie in terms of computing and IT, and how it affects online privacy. If our blog's visitor is paying attention to our blog's contents, he or she could guess the most appropriate answer which is "Browser Cookie/ http cookie". On the other hand, half of the voters chose "The Biscuit", probably they did not concern much on the web technology, or maybe they did not relate our blog to this poll therefore, they could not get the real answer. Nowadays, more people are surfing the net, use the Internet but not all know what is a cookie which you can always see it in your web browsers.

Do you believe that web browser cookies can affect and threaten your online privacy as it keeps your data and information? Thus, we would discuss this on next.

Sunday, January 24, 2010

Avoid Phishing to Violate Your Privacy

Link to Us: http://snipr.com/avoidphishing

In previous, phishing threatens your privacy by stealing your bank account details, passwords, credit card numbers and others without your knowledge. To protect your online information you could always identify the emails you received whether are phishing scams or not then, you would not easily to be cheated.

Once you have identify that particular email is not authentic and it is a phishing email, you never click on links and download the attachments. It is all because those links could be controlled by the fraudsters and hackers at the other servers and the server could obtain your personal information and hack your account once you log in the fake system with your real id and password. On the other hand, attachments are usually containing virus, spyware that could steal your online activities too. Hackers send you the attachments, once you download it, those viruses and spyware would start to gather your information without your consent.

So now you are aware of the phishing emails, what kind of computer setting that could strengthen your protection of your online privacy?

The answer is PROXY. Set up proxy or use firewall in your computer. They could monitor your online activities and scan transmitted file before it delivers to your computer. Proxy also could guard your computer by stopping any threats which included spyware or malware. Proxy filters the content of the site and URL so, it could help to block suspicious content to be sent to your computer, deny access to those blacklisted sites and prevent unauthorized users to interrupt your online activities. Moreover, firewall could filter and detect any suspicious files or viruses too. They could detect and guard your computer when other servers are trying to intrude or hack your computer.



Reference:
Bradley Mitchell, Proxy Servers Tutorial - About Proxy Servers, About.com [Online]
Retrieved on 24th January 2010
URL: http://compnetworking.about.com/cs/proxyservers/a/proxyservers.htm

Friday, January 22, 2010

Phishing Threatens Your Online Privacy?

Link to Us: http://snipr.com/threatenprivacy

Nowadays, the cyber world can be dangerous and threatening. All of us need to be alert and against all the possible threats when we use Internet. Everyone also need to strengthen their Internet knowledge to protect themselves from become the victims of phishing.



How to city, video articles, tips things, How to avoid online security threats and online frauds [Online]
Image Retrieved on 22nd January 2010.
URL:
http://www.goc.vn/wp-content/uploads/2009/10/online_fraud.jpg


So what is "phishing"?

"Phishing" pronounces as "fishing". Basically, phishing is a technique that hackers, fraudsters request and obtain other people's personal information such as credit card numbers, password under a false pretense of a particular web page such as online banking through Internet.

Many Internet users received anonymous emails that state they have problem to log in to the system and request them to go to the provided link and insert their log in id and password. The provided link could be fake and it controls by the hacker or fraudster at the other server. Once you enter your log in details, fraudster might obtain those information and hack into your account. If more serious, you might lose money!

Here is a video to help you understand more on how phishing works?

Phishing Scams in Plain English, leelefever, Youtube [online]
Video Retrieved on 22nd January 2010

URL: http://www.youtube.com/watch?v=sqRZGhiHGxg


Protect your online information by spotting a phishing email then you would not become a phishing victim. Please be reminded, bank will never ask you to confirm your account details by an emails so, you also need to beware of other phishing emails which look like send by other possible companies that you trust! We conclude three ways to find out a phishing email:

Step 1: Check your name.
Your name will not appear in the emails. Usually fraudsters write "Dear Valued Customer" because the same email sends to many people. Therefore, it is not trustable.

Step 2: Check for the spelling mistake.
Phishing emails use the real logo and the name of the company but it is not authentic if you found spelling mistake in the emails include the title. A fake site usually contains mistakes!

Step 3: Look at the URL links attach in the emails.
If the emails ask you to click on the provided, never click it and you check the link whether is look different from the original web site URL. This anonymous link hosts by the fraudsters, it just looks like similar to the original web site URL if you are not aware of it.

If you found out these three suspicious points in the emails that you have received please don't reply and click on anythings, it is phishing scams! You could be safe from phishing and protect your online information easily.


Reference:
John Bisner, How Online Security Threats Can Damage Your Computer, Knol [Online]
Retrieved on 22nd January 2010
URL: http://knol.google.com/k/how-online-security-threats-can-damage-your-computer#

Highlighter

Now you could highlight the content easily by clicking the below yellow highlighter then select and drag the content that you want to highlight inside this blog. markkit
 
back to top