Cyber-Stalkers Invade Personal Spaces
You know that the world is becoming a smaller place when it is possible to find an address and get directions with a few clicks on a mobile device. Another few clicks and you can find out the precise coordinates marking your location in space. You may even keep a record of it in time, if you were so inclined.
If itís easy for you, think about how easy it is for others. But why would anyone want to know your precise whereabouts, and what could they do with that information?
Plenty, it turns out.
You donít need to be a high-profile artist to be the subject of unwanted attention. Cyber-stalking can come from a former partner or spouse, a total stranger, or perhaps an estranged co-worker.
The Washington Post recently reported that stalkers with cursory computer knowledge have been able to track the e-mail and Web activity of current or recently divorced spouses. Stalkers can choose from an array of spyware, GPS devices on their own or embedded in mobile phones, and tiny cameras, to keep track of their victims. By working in this way, they can remain anonymous and operate anywhere from a distance of a few blocks, to many time zones away.
The victims of cyber crime may not readily know who is invading their privacy. This, in itself, can make victims feel powerless. But what is worse is that they may not know the extent of the information that may have been compromised. The range of possibilities, from legal documents and financial transactions, to intimate correspondence, is enormous.
Armed with that information, a stalker can decide to show up unannounced to track a victim. Another may choose to send harassing e-mails, electronic junk mail, and computer viruses. And yet another, as reported on CNET News, could intend to use the collected information as ammunition to help win a divorce settlement.
Whichever form they take, these tactics are meant to induce fear. Police departments are being trained to deal with cyber-stalking, but prosecuting these crimes presents many challenges.
How can you protect yourself against cyber-stalking? According to Douglas Schweitzer, an Internet security specialist with Computer World, it is wise to be cautious with your personal information. Follow these guidelines to protect yourself:
- Donít use your real name as your screen name or user ID.
- Donít share personal information in public online spaces or give it to strangers in e-mail or chat rooms.
- Donít post personal information as part of a user profile.
- Make sure that your Internet provider and any online communities you frequent have policies that prohibit cyber-stalking.
- Change passwords frequently.
- Hand-deliver important documents.
Computer users are safety savvy when it comes to understanding potential threats coming in through their e-mail inboxes, like phishing, viruses, and malware. Results from an E-mail Sender and Provider Coalition survey show that over 80 percent of users recognize and report spam through functions in their e-mail service. Yet, it only takes one e-mail user in 10,000 to buy something from a spammer to keep them in business.
Source: Network World
Term of the Month
is a type of web feed format used to publish constantly updated web-based content like blogs and news feeds. RSS stands for Really Simple Syndication, and can also refer to Rich Site Summary or RDF Site Summary. RSS delivers information as an XML file called an RSS feed or webfeed. By subscribing to a website's RSS feed, new content from that site is retrieved and presented to the computer user through their feed reader or feed aggregator program.
It can be difficult and time consuming to keep track of all the news available on the web. Sign up for RSS feeds to stay up-to-date with news from your favorite websites. RSS is a convenient way to distribute news, plus it allows you to control the amount of data you receive online and decrease your online traffic, saving you time by not having to visit individual sites. To use RSS feeds, simply choose an RSS reader tool and then load RSS feeds into your reader from the sites you are interested in.
Lavasoft's Company Blog and the News from Research
blog have RSS feeds up and running. By subscribing to the News from Research blog, you will be notified whenever a new Definitions File is released.
is a "neighborhood watch" group dedicated to fighting badware - spyware, malware and deceptive adware. Educate yourself by reading their in-depth reports on applications and websites, or fight back by submitting your badware story to aid their clearinghouse effort.