Financial Literacy - Protecting your identity
A cartoon woman in a football uniform and helmet with her left hand out in a stop motion and carrying a large social security card with a green background
smart spending
10 tips to computer security

7. Attachments and downloads

If you've ever looked at spam and wondered how anyone could be fooled by the atrocious grammar and ridiculous promises, perhaps next time the joke will be on you. The messages are getting more polished and more targeted.

MessageLabs has seen a sharp increase over the last four years of targeted Trojans. These programs lurk inside something that appears innocuous, such as a Word document or spreadsheet. When that document is activated, the Trojan gets to work, perhaps shipping information out of the My Documents file. "These usually get sent to a single individual, so they rarely get on the radar of the broader security community," Sunner says.

"Never open or execute any e-mail attachment if you don't know the person," suggests Miner. "Consumers think that they can recognize a spam attack, but the attacks are becoming very regionalized and they look just like something you might expect to get from somebody. You shouldn't view, open, or even execute e-mail attachments unless you know the source, it's expected and you know the purpose of it."

Sometimes your friends are the unwitting messengers of malicious code. Even forwarded messages that legitimately come from friends might shuttle recipients to a dangerous URL where, as Miner illustrates, there's a list of "20 ways to take your 30-year marriage and make it go to 60" and, while you're reading it, in the background a piece of code is slipped on your computer that will start taking information.

Tip: If you enjoy sharing jokes or feel-good messages that are sent to you, copy the information into the body of a new e-mail message rather than forwarding the attachment. Learn more about surfing safely online.

8. Avoid going public

Public cafes are great for surfing, but you really need to recognize the risk of inputting confidential information. There's not much you can do to improve information safety at a public computer. You're at greater risk because you're dependent upon on a third party for security.

"Someone else who came in before me might have put in a flash stick that is gathering information," says Miner.

"I would seriously consider if you want to use a shared computer that remotely relates to confidential or identity information," Marcus says, "simply because you don't know if it's got a keyword logger or if all the tracking is turned on on that machine.

advertisement

"It's a large risk that people really need to weigh. If there's no other access available and there's no other way of getting it done, you take the risk. But if it can wait until you can get home, it might behoove you to wait."

Show Bankrate's community sharing policy
          Connect with us
MORTGAGE HOME EQUITY AUTO CDs CREDIT CARDS
Product Rate Change Last week
30 year fixed 4.22%  0.06 4.16%
15 year fixed 3.32%  0.08 3.24%
5/1 ARM 3.52%  0.17 3.35%
 
View Rates in your area Next
Product Rate Change Last week
30K FICO-based HELOC 4.29% --0.00 4.29%
50K FICO-based HELOC 4.04% --0.00 4.04%
100K FICO-based HELOC 3.89% --0.00 3.89%
 
View Rates in your area Next
Product Rate Change Last week
60 month used car loan 2.79% --0.00 2.79%
48 month used car loan 2.99%  0.01 2.98%
60 month new car loan 3.24% --0.00 3.24%
 
View Rates in your area Next
Product Rate Change Last week
1 Year CD 0.95% --0.00 0.95%
2 Year CD 1.16%  0.01 1.15%
5 Year CD 1.71%  0.04 1.75%
 
View Rates in your area Next
Product Rate Change Last week
Balance Transfer Cards 15.75%  0.02 15.77%
Cash Back Cards 16.45%  0.03 16.48%
Low Interest Cards 10.96% --0.00 10.96%
 
Next
advertisement
FRUGAL NEWSLETTER

Discover new ways to cut costs and save more every day. Reduce your spending, not life’s pleasures. Delivered weekly.

advertisement
Partner Center
advertisement

Connect with us