How to report ID theft, fraud, drive-by installs, hijacking and malware?
.) Some examples of private, personal areas that a computer commonly is involved in, either directly through transactions, through communications (like “chat”, Instant Messaging, email, or IRC), and/or the storage of the records/logs of these “conversations” (and of other documents and other data related to these areas), are: •Personal Identifying Information (dates of birth, Social Security numbers, addresses, phone numbers, photographs) •Employment Information •Financial information- Banking, Investments •Health and Medical Information •Insurance Information •Home and personal security routines (when home, when not home, vacations, protection systems) •Private, personal matters •Business information (if used for this purpose) – Employees – Customers – Vendors •Shopping It is possible for others to gain access to a machine and be able to “see”, and even to “do”, most everything that you can. Anything, and everything that you, your family, and other users do with the machine, could be