BE PREPARED FOR CELL PHONE HACKS

What Can You Do?

It seems that the major cell phone companies, at least at this point, really are not interested in bringing the system up to be able to cope with this threat. Meetings are starting to take place, but for now it is not perceived to be real serious. This could be because it is primarily the older phones that are most susceptible to some types of this mobile hacking.

Until the cell phone manufacturers are able to cope with, or eliminate, the glitches in the system that allows them to overcome these problems, you will largely have to help yourself to cope with these things. Here are a couple of tips that will help you protect your cell phone, its information, and other things.
  • Use Your Passwords
    The cell phone companies tell us that many people have turned off their passwords when they access their voice mail messages, or other things. This little feature, though it may seem to be an annoyance to some, could protect your phone from unauthorized purposes.
  • Leave The Phone Off
    This one is obviously the harder choice, here, simply because most of us who have cell phones like to be reached anytime and anywhere. Others do need to be reachable at all times.
  • Upgrade Your Phone
    While this cannot guarantee that your phone is not hackable, it certainly will help. It should be remembered that the phone companies work hard to deliver the best technology and conveniences - but the cell phone hacks work just as hard to be the first to break the systems designed to defeat them. It is an ongoing battle.

    Cellular phone hacking, for now, is a fact of life that affects a few of us. Gladly, the numbers are still small, but many feel this problem is just getting started. By being aware of the problems, you can wisely take steps to prevent them from happening to you. Cellphone hacking does not need to catch you unprepared.

CELL PHONES--HACKERS NEXT TARGET

It was bound to happen - they have hacked just about everything else. Now it's the cell phones. Cellphone hacking has just recently surfaced and been made public ever since some one did some cellular phone hacking on Paris Hilton's cell phone.
This article will give you some information about what is going on out there and what you can do to better protect your cell phone information.


WHAT DOES IT INVOLVE>>>>>
The fact of someone hacking cell phone became public knowledge when Paris Hilton's cell phone, along with her information was recently hacked. Unfortunately for her, all her celebrity friends and their phone numbers were also placed on the Internet - resulting in a barrage of calls to each of them.

Cell phone hackers have apparently found a glitch in the way the chips are manufactured. The good news, though, is that it only applies to the first generation models of cell phones that use the Global System for Mobile communications (GSM). Another requirement is that the hacker must have physical access to the cell phone for at least three minutes - which is a real good reason not to let it out of your sight. Currently, although the problem has been remedied (at least for now) in the second and third generation phones, it seems that about 70% of existing cell phones fall within the first generation category.

Another way that mobile phone hacking can take place is for a hacker to walk around an area with people that have cell phones and a laptop that has cellphone hacker programs on it. Through an antenna, and a little patience, his computer can literally pick up your cell phone data - if it is turned on. This is more applicable to cell phones that use Bluetooth technology


WHAT HACKERS DO>>>>>>
Surprisingly, there are quite a number of things that can be accomplished by the hacker. Depending on their intent here are a few of them.
  • Steal Your Number
    Your phone number can be accessed and obtained by cellphone hacking. This allows them to make calls and have it charged to your account.
  • Take Your Information
    Mobile hacking allows a hacker to contact your cell phone, without your knowledge, and to download your addresses and other information you might have on your phone. Many hackers are not content to only get your information. Some will even change all your phone numbers! Be sure to keep a backup of your information somewhere. This particular technique is called Bluesnarfing.
  • Rob Your Money
    Other options might use a particular buying feature called SMS. This refers to the fact that money can be taken from your account and transferred into another
    - and a good hacker can sit in one place and access a lot of phones and transfer a lot of money rather quickly - probably in less time than you think!

    Give The System A Virus
    By using another cell phone hack code, a hacker could kidnap your phone, send it a camouflaged program or send it a virus. But it does not end there, since, from that point, he can use your phone to retransmit the virus to many other phones almost instantly - potentially disabling the system.
  • Spy On You--------A hacker can also gain access and take over for cell phone spying and remote mobile phone hacking. Literally, once secured, the hacker can have the phone call him, and then be able to listen to all conversations going on around the owner of the phone
  • Access Your Voice Mails
    Voice mails can also be retrieved by a hacker through a hacking cell phone. After stealing your number, this can easily be done - if your password is disabled. The main thing that needs to be understood here, is that the electronics that give you the modern convenience of interacting with the Internet (getting your voice mails, emails, Web surfing, etc.) , is also the same technology that allows you to receive the same ills as can befall someone on the Internet.

HACKERS TARGETTING MOBILE DEVICES

ANYONE with a portable device – from notebook PCs to cellphones – should be constantly on guard for hackers trying to gain access to corporate or personal information through such gadgets.

Internet security expert Symantec Corp said today’s workforce is becoming increasingly mobile, with more workers using portable devices. This could allow hackers to access corporate or personal data over insecure networks, said Brian Foster, Symantec vice-president of product management.

“Hackers can easily latch on to a mobile device and use it to open a backdoor into an organisation’s database and steal vital information undetected,” he said.

An IDC report forecasts that the number of mobile workers in Malaysia will grow from the 976,500 recorded in 2004 to two million by next year.

Symantec said the growth of the mobile workforce would keep IT security experts on their toes as they try to keep hackers at bay.

According to its survey, it said, 46% of all data breaches are connected to the theft or loss of a mobile device.

It said its Symantec Endpoint Protection 11.0 data-loss prevention solution is aimed at making the management of IT security easier for corporations by integrating antivirus protection, antispyware, firewall, and device-access control into a single console.

HOW ARE MOBILE PHONES DANGEROUS FOR OUR HEALTH


With practically everyone owning a mobile phone and spending a considerable amount of time on them each day, it is wise to ask the question: Are mobile phones dangerous to our health? While there are no conclusive answers at the moment, there are conflicting studies. Some show that mobile phones are safe and others show that mobile phones may pose a health risk.


Arguments Supporting the Belief That Mobile Phones are Dangerous-----------------


There are a few arguments that support the theory that mobile phones are dangerous to the user's health

  1. While the evidence is still not clear, it is possible that using a mobile phone on a regular basis can increase the susceptibility to brain tumors or brain cancer by 2.5 times.
  2. Mobile phones operate using magnetic fields. Studies based on research in the past have shown that in certain circumstances, magnetic fields can affect living cells.
  3. Those that spend long periods of time talking on a mobile phone have mentioned fatigue, a loss of concentration and sometimes headaches.
  4. It is possible that radio waves that are given off by mobile phones can heat up and damage tissue.

Arguments Supporting the Belief That Mobile Phones are Safe---------------


  1. Radio waves emitted when a mobile phone is used are not hot enough to affect or damage near by tissue.
  2. Regarding brain tumor incidence, researchers admit that the evidence still is not clear as to whether tumors or cancer are directly related to mobile phone use.
  3. Factors regarding loss of concentration, fatigue or headaches are likely false, since they can not be replicated in the laboratory
  4. Magnetic fields emitted by a mobile phone are extremely small and not likely to affect living cells in harmful ways.

Some Tips on Mobile Phone Safety-------------


Obviously, the jury is still out on whether or not mobile phones are dangerous to our health. If you feel threatened by the potential health aspects of using a mobile phone, the easiest way to avoid this threat is to simply not use these phones. While extremely convenient, our society lived comfortably without mobiles in the past. If you would like to have the convenience of a mobile phone, but also want to lessen your risk, there are a few simple things you can do.

  • Use a headset to keep the mobile phone away from your head
  • Only talk for short periods of time on a mobile phone.- Use a land line for longer conversations

If you still have any questions, please consult your doctor regarding this issue.

ALL THE BEST---------------------

QUESTION RELATED MOBILE VIRUS

Q.HELP!! I have a virus on my mobile (Nokia OR OTHER) and I want to delete it .How can I?

ANSWER--- Yes, one can get viruses for mobile phones - although only some models are infectable. No, you can't scan your phone with a PC-based anti-virus program - your phone's file system is not visible to the PC it is connected to; you have to use Nokia PC Suite to transfer information from and to the phone.

Now, regarding your question. First of all, Fontal.A is not a virus - it is a Trojan horse. Both are malicious programs but there is a substantial difference between them. Viruses replicate themselves. Trojan horses do not. The only way to get a Trojan horse on your phone is if you install on it pirated software downloaded from dubious places - while a virus can infect your phone from any other infected phone nearby.

Second, I kinda doubt that you really have this Trojan horse. If that were the case, your phone wouldn't even boot and you wouldn't know what exactly it is infected with. Why exactly do you think that your phone has this particular Trojan horse? Most likely, you've been mislead by a false positive in some anti-virus program.

Anyway, if your phone indeed has this Trojan horse - and especially if you have already rebooted it - the only fix is formatting the phone. (You can't use an anti-virus program, because the phone won't boot and won't let you install one.) See the link below for instructions.

MOBILE SECURITY OPERATION

Security applications complement the native security offering of Nokia devices. Solutions such as anti-virus, personal firewall, data security and authentication are available for Nokia devices.

F SE

F-Secure Mobile Security allows smartphone users to experience the full potential of their devices without the fear of mobile threats. In the unfortunate event your phone is lost, stolen, infected by mobile malware or even spied on, Mobile Security helps to safeguard your personal and confidential data. F-Secure Mobile Security makes your smartphone completely safe for today's connected lifE

Kaspersky Mobile Security
Kaspersky Mobile Security is world-class security software for Nokia devices. Use its Anti-theft capabilities and block, locate, trace your device when it is lost or stolen. Have your sensitive data encrypted. Stop unwanted calls and SMSs. Control your kid’s calls and messages. Feel secure against viruses and network attacks. Feel confident and private with your Nokia and Kaspersky Mobile Security.

Pointsec Mobile
Complete data security for smartphones. Pointsec mobile is the only solution needed to protect the data at rest on your mobile phone. With built-in On-the-fly encryption there is minimal user intervention when you want to view or edit your encrypted emails or files.

RSA
RSA, The Security Division of EMC, provides the RSA SecurID two-factor authentication system that generates a one-time password every 60 seconds for secure access to network resources. RSA offers an RSA SecurID software token that runs on Nokia mobile devices, allowing IT administrators to make strong authentication a convenient part of doing business.

SMobile Systems
SMobile Security Shield, Enterprise Edition, provides anti-malware, anti-spam, firewall, anti-theft components, and comprehensive policy management that allow an enterprise to control the applications running on their mobile devices. A multitude of application commands are available to the IT administrator through our hosted or deployed management console.

Symantec
Symantec Mobile Security 4.3 for Symbian OS protects Symbian OS Version 9.x, Nokia Series 60, and UIQ smartphones from malicious threats and network intrusions. It can automatically allow, deny access, or quarantine upon detecting an infected file. Centralized management enables administrators to configure, lock, and enforce security policies remotely or locally.

Trend Micro

Trend MicroTM Mobile Security can protect Smartphones and wireless handhelds against viruses, worms, Trojans, and short message service (SMS) text message spam. A new built-in firewall guards Wi-Fi-enabled devices against hackers, intrusions, and denial-of-service attacks. Enterprises can use Trend Micro Mobile Security to prevent data theft and mobile service disruptions, which can interfere with employee productivity. Mobile operators can also benefit by offering the security software to their customers as a pre-installed or aftermarket solution to protect their mobile devices. This helps operators maximize airtime and increase revenues while minimizing related customer service costs.

WHAT WILL YOU DO ?.WHEN VIRUS HAS ENTERED IN YOUR MOBILE

What to do?

* Be careful when accepting files via Bluetooth
* If you do infect your mobile, turn off the Bluetooth functions so that malware does not find new

targets
* Delete messages from unknown senders
* Do not install programmes if you are unsure of their origin
* Download ringtones and games from official websites
* Delete the infected application programmes and re-install them

COMMON MOBILE VIRUSES

Cabir: Infects mobile phones running on Symbian OS. When a phone is infected, the message 'Caribe' is displayed on the phone's display and is displayed every time the phone is turned on. The worm then attempts to spread to other phones in the area using wireless Bluetooth signals

Duts: A parasitic file infector virus and is the first known virus for the PocketPC platform. It attempts to infect all EXE files in the current directory (infects files that are bigger than 4096 bytes)

Skulls: A trojan horse piece of code. Once downloaded, the virus, called Skulls, replaces all phone desktop icons with images of a skull. It also renders all phone applications, including SMSes and MMSes useless

Comwar: First worm to use MMS messages in order to spread to other devices. Can spread through Bluetooth too. It infects devices running under OS Symbian Series 60. The executable worm file once launched hunts for accessible Bluetooth devices and sends the infected files under a random name to various devices.

THE COMPUTER VIRUS MELISSA

There are a number of different computer viruses that have become very well known. Even the man in the street is familiar with them, not just computer nerds. One of these is the computer virus Melissa.

What is it?

The Melissa computer virus caused havoc to many computer networks by causing email messages to be sent that contained a copy of itself. This caused the email servers to become swamped with the number of emails that were being sent.

Although it is generally referred to as a computer virus, Melissa is actually correctly called a computer worm. This is because it can replicate itself but doesn't need to be transported in a host file.

How it works

Melissa affects users that have Microsoft Word 97 and Word 2000. When a computer is infected the program runs a macro and then tries to mass mail itself. It searches for the email program Outlook 97 or 98. If found, it will take the first 50 email addresses and email itself to them. The program doesn't work with any other versions of Word or Outlook. At the time of the first outbreak in 1999, these were the most popular versions being used.

Who created it?

The program was created by David Smith from New Jersey. He named the program after a lap dancer that he met in Florida. He was eventually caught and sentenced to 20 months in prison and fined $5,000.

Protection from Melissa

It is now quite easy to protect your self from the Melissa computer virus. All of the most recent antivirus software will have this program in the virus databases. New variations of computer viruses are being brought out all the time, including some variations on the original Melissa program. This emphasizes the need to keep your antivirus software up to date and download any recommended security patches from Microsoft.

5 WAY TO SPEED UP YOUR PC

By following a few simple guidelines, you can maintain your computer and keep it running smoothly. This article discusses how to use the tools available in Windows XP Service Pack 3 (SP3) and Windows Vista to more efficiently maintain your computer and safeguard your privacy when you're online.----------------
-----------------------------------------------------------------------------
1.Free up disk space
2.Speed up access to data
3.Detect and repair disk errors
4.Protect your computer against spyware
5.Learn all about ReadyBoost
11111111111111111111111111111111111111111111111111111111111

Free up disk space

By freeing disk space, you can improve the performance of your computer. The Disk Cleanup tool helps you free up space on your hard disk. The utility identifies files that you can safely delete, and then enables you to choose whether you want to delete some or all of the identified files.
Use Disk Cleanup to:

Remove temporary Internet files.

Remove downloaded program files (such as Microsoft ActiveX controls and Java applets).

Empty the Recycle Bin.

Remove Windows temporary files.

Remove optional Windows components that you don't use.

Remove installed programs that you no longer use.

Tip: Typically, temporary Internet files take the most amount of space because the browser caches each page you visit for faster access l

5 WAY TO SPEED UP YOUR PC

Free up disk space

Speed up access to data

Detect and repair disk errors

Protect your computer against spyware

Learn all about ReadyBoost

New Internet Security

Welcome...Cyberspace has a New Internet Security...and YOU and your Cybersecurity Community are part of a growing concern regarding Cybercrime and the general state of Internet Security.

Congratulations...your interest in the New Internet Security and computer safety is a positive affirmation of becoming a Safe & Responsible Cybercitizen.


my commitment to make sure what has happened to me and others I know...won't happen to your family...or your business.

There's no mystery here...I like the Internet; it's Cyberspace...the new frontier...it's exciting and the idea of the Internet being trashed doesn't appeal to me. The New Internet Security is my way of providing like-minded individuals (Safe & Responsible Cybercitizens) a way to BYTE back. Cyberspace is my place of business; for others it's homework, research, or communicating with friends and family. The Internet is many things to many individuals, but for me it's an entrepreneur's delight.

If you're interested in YOUR computer safety as an individual, a physician concerned about the Health Insurance Portability and Accounting Act (HIPAA), or a small business owner wanting to know about the Gramm-Leach-Bliley Act (GLBA) compliancy, then this New Internet Security information is what you're looking for.

Computers weren't designed for security, they were designed to do complex work.

Cybersecurity Czar, Greg Garcia, has made a public appeal to the private sector..."Security is a network of defenders... We're all in this together and there is another network out there that is technologically sophisticated and well-organized and out to get your money and disrupt operations. Together we can strengthen defenses, reduce vulnerabilities, and help maintain our way of life." (eWeek)

Equip every home and small business computer (an end user) with world class professional technology (called Enterprise Grade Level) and provide every end user with his/her own expert security technician... WOW...a great "network of defenders". It's called Managed Security Service and has been employed by government agencies and Fortune 500 corporations for years.

The Internet is only limited by our imagination...

When people first started using the Internet, it was a mixed blessing. On the one hand...suddenly, you had at your fingertips an unlimited wealth of information. You could advance your education, reach businesses anywhere (ecommerce) and communicate instantly. The ports of entry into Cyberspace were thrown open and we all rushed in to explore the new frontier.

On the other hand, even with all the amazing benefits the Internet provides (and there will be more), there has developed an unsavory element of organized cybercriminals.

The premise of the Internet is that it is free and open to everyone but, unfortunately, these Cybergangs, for varied reasons, develop malicious codes (viruses, spyware, Trojans, worms, etc.) designed to prey on poorly or unprotected computers... ultimately for their financial gain at our expense.

It may seem you need a PhD in computer security or that you must become a cybersecurity IT specialist to protect yourself on the Internet, but thank goodness that's not necessary.

Here, on this website, you'll find what you need to do to make sure your family or business, just like mine, is safe from cybercriminals. New Internet Security is imperative and a Managed Security Service is the consumers ultimate weapon against cybercrime and the cybercriminal's pervasive and malicious codes.

Here are some statistics you should know regarding Cybercrime and why New Internet Security is so important for you and your family's protection.


* Global cybercrime now generates more money than illegal drug trafficking (US Treasury Dept.)

* More than 170,000 individuals lose control of their computers EVERY DAY (Red Herring) Do you know what this means? Who's taking control of your computer? What are they doing with your computer?

* 87% of businesses had a cyber attack last year...a total of $67 billion in losses (FBI) How much did that cost you?

* More than 1 in 20 adults are now victims of Identity Theft (Federal Trade Commission)

* 20% of our children (1 in 5) have been sexually solicited on-line (FBI) and most of those children will not tell for fear of losing computer privileges.


Remember...Knowledge is your New Internet Security assurance for your computer's safety against cybercrime and the cybercriminal's malicious codes (viruses, spyware, Trojans, worms, etc.).

You'll find most of what you need right here and I'll provide links to more of what you're looking for.

Be Safe Online...Become a Safe & Responsible Cybercitizen.

Again...WELCOME and please share with others what you learn because we don't need to be victims of cybercrime.

Internet Security Software from SoftForYou

Internet Security Software can help you:
  • Filter harmful websites and newsgroups.
  • Restrict Internet time to a predetermined schedule.
  • Decide which programs can have internet access.
  • Block e-mails, online chats, instant messages and P2P connections with inappropriate words.
  • Limit the amount of data that can be sent or received to/from your computer.
  • Set different levels of restrictions for every member of your family depending on their maturity, interest, habits, and parental control needs.
  • Get detailed Internet activity logs.

Top 10 Online Scams

We’ve all opened our email and found something suspicious in the inbox. It happens to me nearly everyday. I just hit delete and away it goes - until the next one comes in 24 hours later.

Unless you’ve been living in a cave, you know the Internet is riddled with correction and crime. While you can’t avoid it, you can defend yourself.

With a little knowledge and common sense you can recognize what types of schemes Internet criminals are trying to pull off.


Please take a look at these — before someone tries to pull the wool over your eyes.----------------------

1. Auction Fraud

Auction fraud typically involves the misrepresentation or non-delivery of a product advertised for sale through an online auction site. In one common auction fraud, the seller posts the item as if he resides in the United States, then responds to the “winner” (buyer) with an e-mail stating that he is out of the country for some reason and requests that payment be wired directly to him via Western Union, MoneyGram, or bank-to-bank wire transfer. Using those sources makes the money virtually unrecoverable and leaves the victim with no recourse. For more details on auction fraud and how to avoid it, visit www.eBay.com and www.paypal.com.

2. Counterfeit Cashier’s Check

This scam targets individuals who use internet classified ads to sell merchandise or vehicles as well as landlords who advertise their rental properties online. Typically, an interested party outside the United States contacts the advertiser and agrees to make the purchase or rent the property. To make the payment, the “buyer” explains that someone owes him money and he will have that individual send a cashier’s check in the amount owed to the seller. The amount of the cashier’s check will be significantly more than the purchase and the seller is asked to deposit the check and wire the excess funds to the buyer or an associate of the buyer.

Most banks will release the funds on a cashier’s check immediately or within a day or two. Many consumers believe this means the check is valid, but it can take up to several weeks for a bank to determine that a cashier’s check is counterfeit. When that happens, the bank will hold the person who deposited the check responsible for the full amount of the check. A victim of this scam has lost the merchandise sold, the amount of money he wired to the “buyer,” and probably bank fees for the returned check.

3. Employment/Business Opportunities

A common scam in this category is when bogus foreign-based companies recruit U.S. residents on employment-search websites for work-at-home employment opportunities. These positions often involve reselling or reshipping merchandise to destinations outside the U.S.

Prospective employees are required to provide personal information as well as copies of their identification, such as a driver’s license, birth certificate, or Social Security card (which puts them at risk of being victims of identity theft). The employees that are “hired” by the bogus company are told that their salary will be paid by a U.S. company that is a creditor of their new employer because the employer does not have any banking set up in the U.S.

When the employee is paid, the amount of the check is significantly more than what is due. The employee is told to deposit the check and wire the excess payment to the employer’s bank overseas. When the check is later found to be fraudulent, the victim is in the same situation as victims of counterfeit cashier’s checks.

4. Escrow Services Fraud

Legitimate escrow services play an important role in protecting buyer and sellers in online transactions. However, scammers have been known to create phony escrow sites to which buyer victims send money and receive nothing in return or from which sellers wait for payment after shipping merchandise—payment that never comes. If you use an escrow service, be sure it’s one you know and that you can verify its legitimacy.

5. Internet Extortion

Internet extortion involves such activities as hacking into and controlling various industry databases, promising to release control back to the company in exchange for money. The perpetrator may threaten to compromise the information in the database unless a payment is made.

6. Lottery Fraud

A common lottery scheme involves sending an e-mail advising the recipient that he has won a lottery and provides instructions on how to collect the winnings. Typically the “winner” is asked to pay an initial fee ranging from $1,000 to $5,000 and often requests for additional payments follow, but the “winner” never receives the promised jackpot.

7. Nigerian Letter

This common scam involves an e-mail from individuals representing themselves as Nigerian or other foreign government officials, or as victims of foreign government political situations. They offer the recipient the “opportunity” to share in a percentage of millions of dollars in exchange for assistance in placing large sums of money in overseas bank accounts. The letters go into great detail about the situation, which may include the death of a loved one, political persecution, or other sympathy-grabbing story. The recipient is solicited for money to pay taxes, bribes, and legal fees, as well as for personal information, such as bank name and account numbers. The scammer promises to reimburse the victim for the expenses as soon as the funds are out of his or her country. Of course, the money is never repaid and the victim is also at risk of additional theft by having provided bank account information.

8. Phishing/Spoofing

Spoofing generally refers to e-mail which is forged to appear as though it was sent by someone other than the actual source. Phishing, often utilized in conjunction with a spoofed e-mail, is sending an e-mail that falsely claims to be an established legitimate business or government agency in an attempt to dupe an unsuspecting recipient into divulging personal, sensitive information such as passwords, credit card numbers, and bank account information. Phishing e-mails typically direct the user to a fake website set up for fraudulent purposes.

9. Reshipping

The reshipping scheme requires individuals in the United States, who sometimes are co-conspirators and other times are unwitting accomplices, to receive packages at their residence and repackage the merchandise for shipment, usually abroad. Typically this merchandise was purchased with fraudulent credit cards and the scam unravels when the defrauded merchants begin to contact the reshipper.

Reshippers are often recruited through employment offers and in online chat rooms. As part of the employment application process, the victim is required to divulge personal information such as Social Security number and date of birth, which is then used to obtain credit in the victim’s name.

10. Third Party Receiver of Funds

In a work-at-home scheme, a scammer in a foreign country solicits assistance from U.S. citizens. The scammer claims to be posting Internet auctions but can’t receive the payments from the auctions directly due to being outside the U.S. and recruits the victim to act as a third party receiver of funds—funds that come from still other victims who think they are making a legitimate online purchase but who never receive their merchandise. The third party receiver of funds receives the money and wires it to the scammer. The scam typically comes to light when the victims complain about not receiving their merchandise.

Many online scams are obvious, but there are plenty of very sophisticated and creative criminals working on the Internet. Your best strategy is to be suspicious—remember, it’s not paranoia if they’re really out to get you. Insist on verifying the legitimacy of every online transaction with an unfamiliar entity and never give out personal information unless you initiated the contact and are certain of the authenticity of the site or individual you’re dealing with.