Home > Internet & Fraud

Internet & Fraud...

Below are our articles on the subject of Internet & Fraud. If you can't see what you are looking for our other categories are displayed on the left under 'Our Quick Links'...
Buying Goods Online and Identity Theft
Buying Goods Online and Identity Theft
This article looks at purchasing goods or services online and how best to do it...
Computer Hackers and Identity Theft
Computer Hackers and Identity Theft
This article looks at hacking, what it is and how it can affect the safety of your identity and details...
Don't Fall for the iPad Tester Scam
Don't Fall for the iPad Tester Scam
The iPad tester scam sounds like such an obvious scam it’s hard to believe that anyone could ever fall for it. But the sad thing is that people do fall for it, again…...
Firewalls and Anti-Virus Protection
Firewalls and Anti-Virus Protection
This article looks at the uses of firewalls and anti-virus software in order to reduce the risk of viruses and data loss...
How to Avoid Email Scams
How to Avoid Email Scams
This article looks at Email Scams and how to avoid them...
How to Avoid Online Fraud
How to Avoid Online Fraud
This article looks at online fraud and how best to protect yourself from it...
Identity Theft and Online Banking
Identity Theft and Online Banking
Online banking is very convenient, but can it guarantee data security and be free of identity theft?...
Intercepting Emails and Your Security
Intercepting Emails and Your Security
This article looks at why emails are intercepted and how they can be intercepted by individuals who have no reason to intercept them...
Internet Histories and Cookies
Internet Histories and Cookies
Internet histories and cookies can be useful to hackers who gain access to your computer; here we explain what they are and how to delete them...
Paying Bills Online: Is it Safe?
Paying Bills Online: Is it Safe?
Is paying your bills online as safe as you think it is? And what can you do to make sure that your details and personal information don't fall into the wrong hands in…...
Phishing: Emails that Appear to be from Genuine Institutions
Phishing: Emails that Appear to be from Genuine Institutions
This article looks at Phishing, what is it and how it is used to find out information about you...
Protecting Your Mobile Phone From Identity Theft
Protecting Your Mobile Phone From Identity Theft
This article looks at mobile phone fraud, what it is and how it can be avoided...
Security Risks of Peer to Peer File Sharing
Security Risks of Peer to Peer File Sharing
Peer to Peer file sharing is commonplace, but can pose a danger to your computer, letting spyware in that can take control of your machine....
Social Networking Sites and Chat Rooms
Social Networking Sites and Chat Rooms
This article looks at social networking sites and how they can be used by identity fraudsters...
Spyware: Downloaded Programs or Viruses
Spyware: Downloaded Programs or Viruses
This article looks at spyware and discusses how it can be used to access information stored on your computer...
Tick 'NO' to Third Party Advertising
Tick 'NO' to Third Party Advertising
We examine why ticking the box on company paperwork is important if you want to avoid having your details passed on, as well as what you can do yourself to reduce the…...
Trojans and the Risk to Your Personal Details
Trojans and the Risk to Your Personal Details
This article looks at trojans, what they are and how their appearance on your computer can be combatted...
What are Dialler Scams?
What are Dialler Scams?
This article looks at diallers and the damage they can cause as well as their ability to allow access to your computer from a location some distance away...
Who Can See What You Look at on the Internet?
Who Can See What You Look at on the Internet?
We examine the risks inherent with using the Internet for business and personal use and also who may be monitoring the websites we surf whilst online...
Wireless Internet Connections and Security
Wireless Internet Connections and Security
This article looks at wireless internet connections and how they can be used by others if not protected...
Your Consumer Rights Online
Your Consumer Rights Online
This article looks at consumer's rights online...
Your Website and ID Fraud
Your Website and ID Fraud
This article looks at how to build your own website whilst keeping the amount of information that can be used by an identity thief down to a minimum...
Topics
Add to my Yahoo!
Add to Google
Stumble this
Add to Twitter
Add To Facebook
RSS feed
You should seek independent professional advice before acting upon any information on the AboutIdentityTheft website. Please read our Disclaimer.