Académique Documents
Professionnel Documents
Culture Documents
• Contacts
• GSA Privacy Act Officer View Contact Details
1. Delete or deactivate your shopping, social network, and
Web service accounts
Think about which social networks you have profiles on. Aside
from the big ones, such as Facebook, Twitter, LinkedIn and
Instagram, do you still have public accounts on sites like
Tumblr, Google+ or even MySpace? What about your Reddit
account? Which shopping sites have you registered on?
Common ones might include information stored on Amazon,
Gap.com, Macys.com and others.
To get rid of these accounts, go to your account settings and
just look for an option to either deactivate, remove or close
your account. Depending on the account, you may find it
under Security or Privacy, or something similar.
If you're having trouble with a particular account, try searching
online for "How to delete," followed by the name of the
account you wish to delete. You should be able to find some
instruction on how to delete that particular account.
If for some reason you can't delete an account, change the info in
the account to something other than your actual info. Something
fake or completely random.
2. Remove yourself from data collection sites
There are companies out there that collect your
information. They're called data brokers and they have
names like Spokeo, Whitepages.com, PeopleFinder, as
well as plenty of others. They collect data from
everything you do online and then sell that data to
interested parties, mostly in order more specifically
advertise to you and sell you more stuff.
3. Remove your info directly from websites
First, check with your phone company or cell provider to
make sure you aren't listed online and have them remove
your name if you are.
The time of expiry of a cookie can be set when the cookie is created. By default the
cookie is destroyed when the current browser window is closed, but it can be made to persist
for an arbitrary length of time after that.
Once a bank has been alerted to the fact that it is the subject of a
phishing attack, the race is on to close the target phishing site as
quickly as possible. However, professional fraudsters will take steps to
ensure that the process is as difficult and time consuming as possible:
your time is their money.
Fraudsters will often host their sites in developing countries with
limited law enforcement resources and incentivise the hosting
company to keep the site running as long as it possibly can. Indeed,
some unscrupulous hosting companies actually promote fraud hosting
as a service.
Netcraft’s countermeasures service helps banks and
other financial organisations to combat these
techniques. Once a phishing site has been detected,
Netcraft immediately responds with a set of actions
which will significantly limit access to the site, and will
ultimately cause the fraudulent content to be
eliminated.
Netcraft’s approach is distinguished from other providers of takedown
services through its ability to immediately block access to the site for
users of a wide range of technologies, and to provide information back to
the bank that will identify compromised accounts.
Countermeasures
Netcraft Toolbar Community and Phishing Feed
Netcraft’s phishing site feed is consistently recognised in third
party reviews as the most effective blocking mechanism for protecting
customers against phishing, and is licensed by leading browsers, anti-
virus and content filtering products, firewall and network appliance
vendors, mail providers, registrars, hosting companies and ISPs.
Consequently, once the phishing site has been accepted into the feed,
access to the site will be blocked for hundreds of millions of people
shortly afterwards, significantly reducing the effectiveness of the phishing
site even before it has been removed.
Additionally, Netcraft will receive notification of
some phishing attacks through its Netcraft
Toolbar community in advance of reports
received by the bank directly, and thereby can
reduce the lifetime of the phishing site.
Extensive Automation and Preparation
Netcraft’s countermeasures are extensively automated, with local
language translations available for every country that has hosted more
than five phishing sites in the last six months [September 2008] and
an extensive database of contacts at hosting companies, DNS
providers, registrars and ISPs set up such that effective
countermeasures can be started within seconds of a report being
verified.
Additionally, Netcraft continues to monitor a phishing URL after it
becomes unavailable, and if it reappears, perhaps because the host is
compromised and the fraudster is able to replace the phishing
content after the site owner removes it, then the countermeasures are
restarted.
Hosting Company and Registrar Interaction