Skip to main content

Protect Personal Information - Present and Future Value

Dear Mothers,

We understand you are proud of your child. You can shout to the world that you are but please do not share your child's personal information online.

Know that identity thieves used legitimate information of dead people for financial gain, identity thieves can also use legitimate names of young and living individuals.

Legitimate information of dead people is valuable. Information of a living person is much more valuable.

Your child's information will be sold in the information market not for its present value but for its future value.

DO NOT DO ANYTHING SIMILAR TO THIS REGARDLESS OF PRIVACY SETTINGS.

WE REPEAT! DO NOT DO ANYTHING SIMILAR TO THIS REGARDLESS OF PRIVACY SETTINGS.

Please share. Protecting Personal Information is everyone's responsibility.

Comments

Popular Posts

Attack Example - Phishing - SMS Based - Smishing

What exactly is Phishing? It smells fishy, sounds like fishing, and it is exactly fishing. Knowing how social Filipinos are, almost everyone doesn't like being late in knowing who's an item in the office or who likes who, or what successful neighbors are doing to be successful. And so, we non-chalantly fish for information about it. That is exactly the core function of Phishing. It is to gather Personally Identifiable Information (PII) or information which can be used to identify individuals.

Privacy Tools - Firefox

This post is part of the Privacy Tools series that we will have on this network. And this post's focus will be about the Firefox Web Browser. What allows us to have Privacy Tools in Firefox is what it calls Browser Add-ons. What exactly is an add-on?