Skip to main content

Protect Personal Information - Present and Future Value

Dear Mothers,

We understand you are proud of your child. You can shout to the world that you are but please do not share your child's personal information online.

Know that identity thieves used legitimate information of dead people for financial gain, identity thieves can also use legitimate names of young and living individuals.

Legitimate information of dead people is valuable. Information of a living person is much more valuable.

Your child's information will be sold in the information market not for its present value but for its future value.

DO NOT DO ANYTHING SIMILAR TO THIS REGARDLESS OF PRIVACY SETTINGS.

WE REPEAT! DO NOT DO ANYTHING SIMILAR TO THIS REGARDLESS OF PRIVACY SETTINGS.

Please share. Protecting Personal Information is everyone's responsibility.

Comments

Popular Posts

Attack Example - ClickJacking+Spoofing - UI Redress - Trusted User Interface

ClickJacking and Spoofing Attack Example - Trusted User Interface attack. It used to be that the most common operating system and browser being targeted for this kind of attack is Windows and IE. The underlying reason was that Windows has more users and Internet Explorer was basically File Explorer having a different user interface. Today, the attack surface is wider and much more complicated to notice. The screenshot posted here is a combination of a User Interface (UI) spoofing from a ClickJack.