{"id":59,"date":"2011-12-18T16:21:13","date_gmt":"2011-12-18T16:21:13","guid":{"rendered":"http:\/\/cybersecurity.bellevue.edu\/?p=59"},"modified":"2011-12-18T16:22:07","modified_gmt":"2011-12-18T16:22:07","slug":"congratulations-%e2%80%93-you-are-a-winner","status":"publish","type":"post","link":"https:\/\/cybersecurity.bellevue.edu\/index.php\/2011\/12\/18\/congratulations-%e2%80%93-you-are-a-winner\/","title":{"rendered":"Congratulations \u2013 You are a WINNER!"},"content":{"rendered":"<p>Everyone wants to be a winner. You may have seen the pop-up or big letters on a webpage announcing that you have won an iPad2, $1000, or some other grand prize.\u00a0 All you need to do is &#8220;Click here to win your prize!&#8221; \u00a0It seems simple and harmless, but you should know where it is taking you, what you\u2019re giving up, and what could be loaded on your computer.\u00a0<\/p>\n<p>Users are taken to these sites when they mistype well known domain names such as wikipedia.com, amazon.com, and youtube.com. \u00a0(I\u2019ll let you conduct your own research, but you can see a list here: <a href=\"http:\/\/www.bfk.de\/bfk_dnslogger.html?query=69.6.27.100#result\">http:\/\/www.bfk.de\/bfk_dnslogger.html?query=69.6.27.100#result<\/a>. They all resolve to the same IP address. I don\u2019t want anyone accidently clicking on a link to a bad site.\u00a0 Proceed at your own risk!) \u00a0\u00a0<\/p>\n<p>I\u2019ve included a screenshot as an example:<\/p>\n<div class=\"mceTemp\">\n<figure id=\"attachment_61\" aria-describedby=\"caption-attachment-61\" style=\"width: 515px\" class=\"wp-caption alignnone\"><a href=\"http:\/\/cybersecurity.bellevue.edu\/wp-content\/uploads\/2011\/12\/Winner1b.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-61\" title=\"You are a winner\" src=\"http:\/\/cybersecurity.bellevue.edu\/wp-content\/uploads\/2011\/12\/Winner1b.jpg\" alt=\"\" width=\"515\" height=\"306\" \/><\/a><figcaption id=\"caption-attachment-61\" class=\"wp-caption-text\">Example of winning page<\/figcaption><\/figure>\n<\/div>\n<p>To \u201cclaim\u201d your prize, you need to enter much of your personal information on a site whose origin is questionable.<\/p>\n<p>Some of these websites even have their own form of privacy policies stating exactly what they\u2019d do with your personal information.\u00a0 Basically, once you give it to them, they can do with it as they please.<\/p>\n<p><a href=\"http:\/\/cybersecurity.bellevue.edu\/wp-content\/uploads\/2011\/12\/Winner2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-62\" title=\"Disclaimer\" src=\"http:\/\/cybersecurity.bellevue.edu\/wp-content\/uploads\/2011\/12\/Winner2.jpg\" alt=\"\" width=\"815\" height=\"40\" srcset=\"https:\/\/cybersecurity.bellevue.edu\/wp-content\/uploads\/2011\/12\/Winner2.jpg 815w, https:\/\/cybersecurity.bellevue.edu\/wp-content\/uploads\/2011\/12\/Winner2-300x14.jpg 300w\" sizes=\"auto, (max-width: 815px) 100vw, 815px\" \/><\/a><\/p>\n<p>They can sell it, give it away, or use it without ever informing you or asking further permission.\u00a0 They can even perform further background checks on you.\u00a0 Since you agree to the policy when you click submit, there may be nothing you can do to stop them; especially if the site owners are in another country.<\/p>\n<p>To avoid this type of fraud, it\u2019s important to remember, \u201cStop. Think. Click.\u201d from staysafeonline.org. The <strong><em>Protect Yourself<\/em><\/strong> website (<a href=\"http:\/\/www.staysafeonline.org\/in-the-home\/protect-yourself\">http:\/\/www.staysafeonline.org\/in-the-home\/protect-yourself<\/a>) contains a number of great tips to help all webizens. From that website, comes this:\u00a0<\/p>\n<blockquote><p>\u201cUse your judgment about what you post about yourself on Internet sites. When any site requests information about you, ask these questions:<\/p>\n<ul>\n<li>Who is asking?<\/li>\n<li>What information are they asking for?<\/li>\n<li>Why do they need it?<\/li>\n<\/ul>\n<p>Think about the amount and detail of information being requested.\u201d<\/p><\/blockquote>\n<p>Another good website on Identity Theft protection is from the U.S. Federal Trade Commission (FTC): <a href=\"http:\/\/www.ftc.gov\/bcp\/menus\/consumer\/data\/idt.shtm\">http:\/\/www.ftc.gov\/bcp\/menus\/consumer\/data\/idt.shtm<\/a>.\u00a0 What other websites do you recommend?\u00a0<\/p>\n<p>Are there other tips you recommend to keep yourself and others safe and secure online?\u00a0 Feel free to leave comments below.\u00a0<\/p>\n<p>Be aware when you surf and remember to \u201cTrust, but verify.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Everyone wants to be a winner. You may have seen the pop-up or big letters on a webpage announcing that you have won an iPad2, $1000, or some other grand prize.\u00a0 All you need to do is &#8220;Click here to win your prize!&#8221; \u00a0It seems simple and harmless, but you should know where it is [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[11,18,8],"tags":[],"class_list":["post-59","post","type-post","status-publish","format-standard","hentry","category-human-aspects","category-online-safety-tips","category-security-education"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/59","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/comments?post=59"}],"version-history":[{"count":7,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/59\/revisions"}],"predecessor-version":[{"id":70,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/59\/revisions\/70"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/media?parent=59"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/categories?post=59"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/tags?post=59"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}