If this phrase is familiar, put the name Cher with it and then maybe it will ring a bell. Gypsies were pushed around Europe until they were dispersed across the world. No place to call home and desperate to provide for their families .
In this desperation the tramps were 1st cousins and the thieves were part of the the family. True to each other and with strong family ties, they were not known for violent criminal acts, but sleight of hand and deeds done in darkness. Theft, fraud and lies were their profession.
They exist today and still retain a strong semblance of the old family units. They travel in the same paths and they do not respect private property nor the hard work to obtain wealth or property. In poverty and constant travel they have no respect for boundaries that most people would call a right to privacy.
The names we use today to describe these same people are hackers and thieves. (hacking is a small percentage of the online problem) With a very small investment of labor and a simple computer, they spend their days and nights fishing for anything left unattended or unguarded in the vast sea of emails and data. They want your money, your personal data, keys to your bank account, and most recently the keys to your business data.
Constantly searching for a weakness in your online security and the walls you put up to keep them at bay; they are relentless. But you can keep them at bay easily by practicing simple rules of online security. Here are a few of the lures you will find that are constantly being cast into the social media sea via Facebook, TicTock,Twitter,etc, etc, and also by your own mobil devices.
These guys ( or gals ) may not look like a hacker, but have you met one in person? Do you know who is behind these phishing attacks? Phishing attacks are the most common form of attacks to obtain your information .
They have time and resources to spend hunting for your data. The problem is , you are the one that freely gives them personal info. All the time . The street you grew up on, the name of your 1st pet, your mothers brother's name (your maiden name), your favorite color. All games that people play when they are online and bored.
Phishing Attacks. Via Email
Sent out to thousands of email addresses obtained by scraping the personal data stolen from guess who? The US Government has some of the weakest defenses and Freedom of Information laws are quite often the weapon of choice to get this information. Also city, county, and state tax records can be obtained easily. They obtain a verified email address and cast a wide net to snare the kind hearted American that in their view possessed a fortune that they could never spend in their lifetime nor do they deserve these riches. Here are some great examples of the net they cast. And, this costs them almost nothing to broadcast these emails to thousands of people.
Many times, this data is obtained from a stolen laptop. Many government employees take a laptop home and don't secure it while they travel or stop off for lunch . Millions of social security #'s and phone #'s and addresses are given to these thieves by your federal and state employees . I know mine has been . At least 2 times.
I want to thank the Veterans Administration and the Office of Personnel Management for not training nor discipling employees that left a laptop in the front seat of their government sedan while they went into a bar. What an easy target. Left in plain sight.
The names we use today to describe these same people are hackers and thieves. (hacking is a small percentage of the online problem) With a very small investment of labor and a simple computer, they spend their days and nights fishing (phishing) for anything left unattended .
Don't take the bait.
Change your password, really. Don't just think about ; really take the time and change your password. Many data breaches are done months before your ID or your back account is emptied. Normally a hacker will snoop around for 7 to 11 months and learn all they can before they make a move.
If you use one password for everything, then with a simple move; all your data and treasure can be taken in one fell swoop. The 1st line of defense is a good password.
Avoid and report phishing emails
A phishing attack happens when someone tries to trick you into sharing personal information online. What phishing is Phishing is usually done through email, ads, or by sites that look similar to sites you already use. For example, someone who is phishing might send you an email that looks like it's from your bank so that you'll give them information about your bank account. Phishing emails or sites might ask for:
Usernames and passwords, including password changes
Social Security numbers
Bank account numbers
PINs (Personal Identification Numbers)
Credit card numbers
Your mother’s maiden name
Imply KYC here (Know your Contact), and you will be safe!
FNL content including, but not limited to, articles, podcasts, videos, live streams, and websites are intended for informational purposes and should NOT be considered financial, investment, nor trading advice. Cryptocurrency, futures, foreign currency and options trading contains substantial risk and is not for every investor. An investor could potentially lose all or more than the initial investment. Risk capital is money that can be lost without jeopardizing one’s financial security or lifestyle. Only risk capital should be used for trading and only those with sufficient risk capital should consider trading. Past performance is not necessarily indicative of future results. https://futuresnetworks.live/risk_disclaimer