Thursday, June 19, 2008

How to safeguard our personal and financial data?


1. Keep our personal and sensitive data off your computer- Nowadays, there are many network threats that hack into our computer. We might not know when our computer is being infected by the virus or spyware program; therefore, we must try our best to keep our personal and sensitive data such as bank account numbers, passwords etc off from our computer. Lots of people tend to leave their computers on for long periods of time and it can be compromised at any time, so if there is no data to steal, then we have already done a lot to prevent data theft. If we really want it on our computer, then at least make sure we encrypt it using certain security program.
2. Avoid saving credit card info, etc on shopping sites- It is quite risky to save our credit card info on shopping site such as Amazon, eBay to avoid repeatedly type; someone might eventually hack into their database and downloads thousands of credit card numbers, bank account numbers, etc.
3. Only connect to secure wireless networks if you can- We must always aware of not to connect to any unknown wireless network. Connecting to non-secure wireless networks is asking for trouble. Therefore, we must make sure we connect to known wireless network instead of simply connecting to an unknown network.
4. Clear your browser’s cache after an online transaction- We must always remember not to save our password in the computer. Sometimes we will get message from our browser asking us whether we want it to automatically save your passwords, etc, click NO.
5. Make sure anti-virus and anti-spyware are installed and up-to-date- We can either buy excellent anti-virus programs like Kaspersky Anti-Virus or free programs like AVG, which is pretty good too. Either way, make sure we have something installed. However, most people usually stop there and don’t install any anti-spware programs. That’s a big mistake! Nowadays, spyware programs send our data to their creators so they can make money. Some good anti-spyware apps are Windows Defender, SpySweeper, SpywareBlaster, AdWare, and Spybot Search and Destroy.
6. Use a secure Internet browser when you are online- Firefox is considered more secure than IE and that’s what a number of sites also have tested. IE 7 has more security features than ever before, but it still has lots of holes also. Using a more secure browser can help protect against browser hijacking, etc. Anyway, most viruses are written for IE since it’s more common, so it’s more likely to be hacked.

The application of 3rd party certification programme in Malaysia


MSC Trustgate.com Sdn Bhd
is a licensed Certification Authority (CA) in Malaysia since 1999. It is one of the 3rd party certification programme in Malaysia. It offer complete security solutions and leading trust services that are needed by individuals, enterprises, government, and e-commerce service providers using digital certificates, digital signatures, encryption and decryption. The vision is to enable organizations to conduct their business securely over the Internet, as much as what they have been enjoying in the physical world.

The following is the certificate application processing. Upon MSC Trustgate.com’s receipt of the necessary payment and upon completion of authentication procedures required for the Certificate customer has purchased, MSC Trustgate.com will process the Certificate Application. MSC Trustgate.com will notify whether the Certificate Application is approved or rejected. If the Certificate Application is approved, MSC Trustgate.com will issue a Certificate for customer’s use in accordance with this Subscriber Agreement. The use of the Personal Identification Number (“PIN”) from MSC Trustgate.com to pick up the Certificate or otherwise installing or using the Certificate is considered your acceptance of the Certificate. After customer pick up or otherwise install the Certificate, customer must review the information in it before using it and promptly notify MSC Trustgate.com of any errors. Upon receipt of such notice, MSC Trustgate.com may revoke the Certificate and issue a corrected Certificate.

To improve customers’ trust, MSC Trustgate.com represents and warrants to customers that (i) there are no errors introduced by MSC Trustgate.com in the Certificate information as a result of MSC Trustgate.com’s failure to use reasonable care in creating the Certificate; (ii) the Certificate complies in all material respects with the MSC Trustgate.com CPS; and (iii) MSC Trustgate.com’s revocation services and use of a repository conform to the MSC Trustgate.com CPS in all material aspects.

For more detail information, please visit https://www.msctrustgate.com.


Wednesday, June 18, 2008

The Threat of Online Security: How Safe is Our Data?

The same Internet connection that lets you reach out and touch millions of Web servers, e-mail addresses, and also endangers your PC and the information it contains about you. It has been published that over 100 million cases of identity theft, stealing names, credit card data and other personal information from unsuspecting Internet users have taken place since 2005.


A happened of threats to confidential information due to the increase of Trojans and bot networks enabling an attacker to gain access to a victim’s computer. Attacks that obtain sensitive data stored on an infected computer can result in significant financial loss, particularly if credit card or banking information is exposed. Confidential information used in identity theft is often confiscated as a result of a data breach. Data breaches and the potential use of confidential information for identity theft can result in a loss of public confidence, legal liability, or costly litigation. Not only can compromises that result in the loss of personal data undermine customer and institutional confidence and result in costly damage to an organization’s reputation.


In this unsafe Internet world, home users can lose valuable personal data with one click to the wrong website. Sometimes, when you receive an email request an update to your payment details, and a hacker gains access to your bank account. You've probably seen your share of phishing attacks, which look like communications from your bank, PayPal, eBay, or another online account. The message may ask you to click a link that leads to a bogus Web page, complete with realistic user-name and password log-in fields, or it might ask for a credit-card number. When you take the bait, the phisher harvests your data, and either sells it to someone else, or uses it to drain your account right away.

In any case, an Internet user should protect yourself against data theft and should have some safeguard to protect your confidential information.


Symantec had publish a report about the global Internet security threat. The Symantec Global Internet Security Threat Report provides a six-month update of worldwide Internet threat activity.

To review the three biggest threat in 2007, click here.

Phishing: Examples and its Prevention Methods


Phishing is defined by committing fraud to get financial information to trick people into providing bank or credit-card information by sending a fraudulent e-mail purporting to be from bank, internet provider, etc. They will be asked to disclose personal information such as credit card number, validation code, password or personal identification number.
Here is the common example for phishing that found in Msn e-mail for asking personal information. In order to prevent yourself for becoming next victims, there are some ways to protect yourself.
First, NEVER GIVE sensitive personal information in an e-mail, instant message or pop-up window. Just delete it. Most legitimate and established businesses will not use these methods to ask for passwords, account, or credit card numbers or other confidential information.
Second, be wary of clicking a link in a message or pop-up window. If you get an e-mail, instant message or pop-up window that asks for personal information, DO NOT CLICK any link the link as it would take you to a phony site where any information you give may be sent to the scam artist who built it.
Third, improve your computer’s security. Microsoft suggests that you use a firewall, install antivirus software and update it routinely, and keep your Windows and Office software up to date.
If someone had stolen your identity, you should IMMEDIATTELY file a report with the police and IMMDEDIATELY change the passwords on all your accounts. On the other hand, send the fraudulent message with its original header to the company that has been misrepresented. The company may have a special e-mail address to report such abuse. For example, if you received phisher e-mail from a fake “MSN”, you should send it to abuse@msn.com site.


REMEMBER: No legitimate company will ever send out an e-mail for asking confidential information! No matter how real they look, they are phishing scams!!