{"id":180,"date":"2015-10-22T17:52:20","date_gmt":"2015-10-22T17:52:20","guid":{"rendered":"https:\/\/usersearch.org\/blog\/?p=180"},"modified":"2021-11-07T22:24:25","modified_gmt":"2021-11-07T22:24:25","slug":"180","status":"publish","type":"post","link":"https:\/\/usersearch.org\/blog\/index.php\/2015\/10\/22\/180\/","title":{"rendered":"Cyber Crime: Dont be a victim"},"content":{"rendered":"<h2 class=\"western\" style=\"text-align: center;\" align=\"CENTER\"><span style=\"color: #000000;\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: small;\"><b>Cyber Crime: Dont be a victim<\/b><\/span><\/span><\/span><\/h2>\n<p class=\"western\" style=\"text-align: justify;\"><span style=\"color: #000000;\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: small;\">Identity thieves, hackers and other cyber criminals are lurking in every corner of the Internet. Reports on cyber crime give an alarming and intimidating picture. No one is safe; you are watched 24\/7 by some unscrupulous characters who are either out to defraud you by using your personal information or looking for the first opportunity to take your hard earned money. In this world it is not good to have a na\u00efve attitude to when it comes to cyber security. If you are forewarned you should take the necessary precautions to make sure that your information is protected. The following points should be given the utmost importance if you are to keep yourself safe in the crime ridden world wide web.<\/span><\/span><\/span><\/p>\n<p class=\"western\" style=\"text-align: justify;\"><span style=\"color: #000000;\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: small;\">Cyber crime is an unfortunate reality that can affect anyone at anytime. However, if you take steps to protect your information and utilize the latest Internet security technology available, you should be able to protect your information. The key is to be aware of the dangers and the most effective methods to protect yourself, your information and your money. It is worthwhile to look at the options that are available to enhance cyber security as if you leave it all to chance, you could easily fall victim to cyber crime.<\/span><\/span><\/span><\/p>\n<p class=\"western\" style=\"text-align: justify;\"><span style=\"color: #000000;\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: small;\">Believe it or not, these criminals do their homework. I\u2019m not talking about the broadly spread, fake bank e-mails you receive daily. These cyber-terrorists actually research your Web site, search for executive\u2019s names, look at your press release page, identify events and refer to them in their messaging. A surprising number of executives click on the attachments or links \u2026 and the damage is done. The compromised system looks for other local machines, and because your system is behind your corporate firewall, which is now of no value, it attempts to exploit them through well-known vulnerabilities.<\/span><\/span><\/span><\/p>\n<p class=\"western\" style=\"text-align: justify;\"><span style=\"color: #000000;\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: small;\">Eventually, the criminals end up infecting the controller\u2019s or accountant\u2019s computer. Once that occurs, they monitor traffic, log connections to your bank and capture your log-in credentials. At that point, you\u2019re done for. Just before your bank\u2019s closing time, the criminals log in to your account and set up a series of wire transfers.<\/span><\/span><\/span><\/p>\n<p class=\"western\" style=\"text-align: justify;\"><span style=\"color: #000000;\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: small;\">By the time you get to work the next morning, your account is empty. Now you\u2019re left struggling to figure out what happened, and how to get your funds back. Sometimes you catch a lucky break, but more often than not you lose everything.<\/span><\/span><\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li>\n<p class=\"western\" style=\"text-align: left;\"><span style=\"color: #000000;\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: small;\"><b>Protect Your Devices\u00a0<\/b><\/span><\/span><\/span><br \/>\n<span style=\"color: #000000;\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: small;\"><b><a href=\"https:\/\/usersearch.org\/blog\/wp-content\/uploads\/2015\/10\/mobile-phone-security-e1344445493979.jpg\"><img class=\"wp-image-174 alignleft\" src=\"https:\/\/usersearch.org\/blog\/wp-content\/uploads\/2015\/10\/mobile-phone-security-e1344445493979-150x150.jpg\" alt=\"mobile-phone-security-e1344445493979\" width=\"88\" height=\"88\" \/><\/a><\/b><\/span><\/span><\/span><\/p>\n<\/li>\n<\/ul>\n<p class=\"western\" style=\"text-align: justify;\"><span style=\"color: #000000;\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: small;\">The safety of the devices that you use to go online should not be underestimated. Devices commonly used today include computers, mobile phones and tablets. These are all vulnerable to cyber crime. There is always the risk of your device being lost or stolen. Be careful where you keep them and how you carry the devices that are portable. If a thief gets their hands on any of your devices they can easily access your information in most cases, even if you have a password. Computers in particular are vulnerable to hackers and viruses that can break in and access your information without having any physical contact with your device. Make sure that you have powerful antivirus software installed on your computer\/laptop and keep a back up of your important files. <\/span><\/span><\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li>\n<p class=\"western\"><span style=\"color: #000000;\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: small;\"><b>High Quality Passwords<\/b><\/span><\/span><\/span><\/p>\n<\/li>\n<\/ul>\n<p class=\"western\" style=\"text-align: justify;\"><span style=\"color: #000000;\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: small;\">Studies show that many people choose their passwords carelessly. Your password should be strong enough to prevent other people guessing it but simple enough so that you can remember it. You should ideally use a password that is alphanumeric and it\u2019s a good idea to also use a symbol. Too many people choose their password bearing in mind only their personal convenience. If you use your date of birth, place of birth or wedding anniversary as your password &#8211; you are heading for trouble. That is like keeping the doors to your house open at night, with all your valuable things just lying around in the front room of the house. Do you know that there are clever cyber criminals who can create password cracking programs designed to analyze thousands of password possibilities and guess them with reasonable accuracy? You always want to use a password that would be near impossible for someone (or some computer) to guess and never write it down or send it to anyone online.<\/span><\/span><\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li>\n<p class=\"western\"><span style=\"color: #000000;\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: small;\"><b>Scam emails<\/b><\/span><\/span><\/span><span style=\"color: #000000;\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: small;\"><a href=\"https:\/\/usersearch.org\/blog\/wp-content\/uploads\/2015\/10\/email_scam_containing_virus_5.jpg\"><img class=\"size-thumbnail wp-image-175 alignright\" src=\"https:\/\/usersearch.org\/blog\/wp-content\/uploads\/2015\/10\/email_scam_containing_virus_5-150x150.jpg\" alt=\"email_scam_containing_virus_5\" width=\"150\" height=\"150\" \/><\/a><\/span><\/span><\/span><\/p>\n<\/li>\n<\/ul>\n<p class=\"western\" style=\"text-align: justify;\"><span style=\"color: #000000;\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: small;\">Cyber criminals are wonderful creative artists. The only problem is that they use their creativity to take money from other people\u2019s pocket. Be wary of unsolicited emails and phone calls. The emails are usually drafted so skillfully, that people will easily fall victim to their tricks. Authentic looking testimonials, real letter heads and true logos are used so that even the cleverest of guys will believe in them, but let\u2019s be honest, how could you win the lottery when you didn\u2019t even buy a ticket? You may not believe it but people who fall victim to cyber criminal\u2019s tricks include even police officers and doctors who were relieved of thousands of dollars by these criminals. When it comes to emails that sound too good to be true \u2013 they usually are.<\/span><\/span><\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li>\n<p class=\"western\"><span style=\"color: #000000;\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: small;\"><b>Check online identities for duplicates <\/b><\/span><\/span><\/span><\/p>\n<\/li>\n<\/ul>\n<p class=\"western\" style=\"text-align: justify;\"><span style=\"color: #000000;\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: small;\">Use a website like <a href=\"https:\/\/usersearch.org\" target=\"_blank\" rel=\"noopener\">Usersearch.org<\/a> to check if your username or other information is being used online without your permission. This is a good way to catch cyber criminals in the act. If your <a href=\"https:\/\/usersearch.org\/blog\/wp-content\/uploads\/2015\/10\/cropped-logo.png\"><img class=\"size-thumbnail wp-image-176 alignleft\" src=\"https:\/\/usersearch.org\/blog\/wp-content\/uploads\/2015\/10\/cropped-logo-150x150.png\" alt=\"cropped-logo\" width=\"150\" height=\"150\" srcset=\"https:\/\/usersearch.org\/blog\/wp-content\/uploads\/2015\/10\/cropped-logo-150x150.png 150w, https:\/\/usersearch.org\/blog\/wp-content\/uploads\/2015\/10\/cropped-logo-300x300.png 300w, https:\/\/usersearch.org\/blog\/wp-content\/uploads\/2015\/10\/cropped-logo.png 512w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a>username, mobile number or even your email is being used online by someone else, a simple search on Usersearch.org can quickly bring this to your attention so that you can take the necessary steps to correct the situation. You should do this type of check regularly as you never know when someone is out to defraud you of your hard earned money. <\/span><\/span><\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li>\n<p class=\"western\"><b><span style=\"color: #000000;\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: small;\">Separate banking tasks. <\/span><\/span><\/span><\/b><\/p>\n<\/li>\n<\/ul>\n<p class=\"western\" style=\"text-align: justify;\"><span style=\"color: #000000;\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: small;\">Buy a cheap laptop and dedicate it to banking alone. Don\u2019t use it for e-mail, and never browse the internet. Log on to your bank, do your banking, log off, disconnect it from the internet and power it off.<\/span><\/span><\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li>\n<p class=\"western\"><b><span style=\"color: #000000;\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: small;\">Establish secure confirmations.<\/span><\/span><\/span><\/b><\/p>\n<\/li>\n<\/ul>\n<p class=\"western\" style=\"text-align: justify;\"><span style=\"color: #000000;\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: small;\">Ask your bank to implement a positive mechanism, which ensures that unless a wire transfer is pre-notified to them, they must call you for voice confirmation. In the US, this is known as \u201cpositive pay.<\/span><\/span><\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li>\n<p class=\"western\"><b><span style=\"color: #000000;\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: small;\">Safeguard the internet. <\/span><\/span><\/span><\/b><\/p>\n<\/li>\n<\/ul>\n<p class=\"western\" style=\"text-align: justify;\"><span style=\"color: #000000;\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: small;\">Establish strict rules for employees regarding their use of the internet. Show them some of the real-world stories about cyber-terrorism and how it can affect their employment.<\/span><\/span><\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li>\n<p class=\"western\"><b><span style=\"color: #000000;\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: small;\">Keep your information safe. <\/span><\/span><\/span><\/b><\/p>\n<\/li>\n<\/ul>\n<p class=\"western\" style=\"text-align: justify;\"><span style=\"color: #000000;\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: small;\">Internet hygiene goes a long way in keeping your information safe. Keep anti-virus programs and patches up to date, and never click on attachments or links in e-mails you don\u2019t absolutely trust.<\/span><\/span><\/span><\/p>\n<p class=\"western\" style=\"text-align: justify;\"><span style=\"color: #000000;\"><span style=\"font-family: Times New Roman,serif;\"><span style=\"font-size: small;\">Keeping your finances in check and your company\u2019s important information under lock and key isn\u2019t as hard as it seems. A few simple steps like those listed above can go a long way in ensuring you never experience the heartbreak of bankruptcy as a result of online vulnerabilities. In the end, the best way to stave off cyber- terrorism is to be armed with the right information and put in place processes that keep you and your company safe.<\/span><\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Crime: Dont be a victim Identity thieves, hackers and other cyber criminals are lurking in every corner of the Internet. Reports on cyber crime give an alarming and intimidating picture. No one is safe; you are watched 24\/7 by some unscrupulous&hellip;<\/p>\n","protected":false},"author":1,"featured_media":177,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v16.8 (Yoast SEO v18.4.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Crime: Dont be a victim -<\/title>\n<meta name=\"description\" content=\"We teach you how to avoid common scam techniques and how you can use our website to secure your online profiles and email accounts.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/usersearch.org\/blog\/index.php\/2015\/10\/22\/180\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Crime: Dont be a victim\" \/>\n<meta property=\"og:description\" content=\"We teach you how to avoid common scam techniques and how you can use our website to secure your online profiles and email accounts.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/usersearch.org\/blog\/index.php\/2015\/10\/22\/180\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-10-22T17:52:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-07T22:24:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/usersearch.org\/blog\/wp-content\/uploads\/2015\/10\/cyber-crime.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"623\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jamie\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/usersearch.org\/blog\/#organization\",\"name\":\"UserSearch\",\"url\":\"https:\/\/usersearch.org\/blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/usersearch.org\/blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/usersearch.org\/blog\/wp-content\/uploads\/2021\/08\/find-users-online-user-lookup-tool-reverse-user-search.jpg.webp\",\"contentUrl\":\"https:\/\/usersearch.org\/blog\/wp-content\/uploads\/2021\/08\/find-users-online-user-lookup-tool-reverse-user-search.jpg.webp\",\"width\":285,\"height\":179,\"caption\":\"UserSearch\"},\"image\":{\"@id\":\"https:\/\/usersearch.org\/blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/usersearch.org\/blog\/#website\",\"url\":\"https:\/\/usersearch.org\/blog\/\",\"name\":\"\",\"description\":\"Usersearch Blog - Helping you stay safe online\",\"publisher\":{\"@id\":\"https:\/\/usersearch.org\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/usersearch.org\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/usersearch.org\/blog\/index.php\/2015\/10\/22\/180\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/usersearch.org\/blog\/wp-content\/uploads\/2015\/10\/cyber-crime.jpg\",\"contentUrl\":\"https:\/\/usersearch.org\/blog\/wp-content\/uploads\/2015\/10\/cyber-crime.jpg\",\"width\":623,\"height\":350},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/usersearch.org\/blog\/index.php\/2015\/10\/22\/180\/#webpage\",\"url\":\"https:\/\/usersearch.org\/blog\/index.php\/2015\/10\/22\/180\/\",\"name\":\"Cyber Crime: Dont be a victim -\",\"isPartOf\":{\"@id\":\"https:\/\/usersearch.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/usersearch.org\/blog\/index.php\/2015\/10\/22\/180\/#primaryimage\"},\"datePublished\":\"2015-10-22T17:52:20+00:00\",\"dateModified\":\"2021-11-07T22:24:25+00:00\",\"description\":\"We teach you how to avoid common scam techniques and how you can use our website to secure your online profiles and email accounts.\",\"breadcrumb\":{\"@id\":\"https:\/\/usersearch.org\/blog\/index.php\/2015\/10\/22\/180\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/usersearch.org\/blog\/index.php\/2015\/10\/22\/180\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/usersearch.org\/blog\/index.php\/2015\/10\/22\/180\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/usersearch.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Crime: Dont be a victim\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/usersearch.org\/blog\/index.php\/2015\/10\/22\/180\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/usersearch.org\/blog\/index.php\/2015\/10\/22\/180\/#webpage\"},\"author\":{\"@id\":\"https:\/\/usersearch.org\/blog\/#\/schema\/person\/7e34b69a5ae2693e33082d4d643a37e5\"},\"headline\":\"Cyber Crime: Dont be a victim\",\"datePublished\":\"2015-10-22T17:52:20+00:00\",\"dateModified\":\"2021-11-07T22:24:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/usersearch.org\/blog\/index.php\/2015\/10\/22\/180\/#webpage\"},\"wordCount\":1199,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/usersearch.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/usersearch.org\/blog\/index.php\/2015\/10\/22\/180\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/usersearch.org\/blog\/wp-content\/uploads\/2015\/10\/cyber-crime.jpg\",\"articleSection\":[\"Open Source Data\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/usersearch.org\/blog\/index.php\/2015\/10\/22\/180\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/usersearch.org\/blog\/#\/schema\/person\/7e34b69a5ae2693e33082d4d643a37e5\",\"name\":\"Jamie\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/usersearch.org\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/db798ccc802968f420608212f5301ca1?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/db798ccc802968f420608212f5301ca1?s=96&r=g\",\"caption\":\"Jamie\"},\"sameAs\":[\"https:\/\/www.usersearch.org\"],\"url\":\"https:\/\/usersearch.org\/blog\/index.php\/author\/jamie\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Crime: Dont be a victim -","description":"We teach you how to avoid common scam techniques and how you can use our website to secure your online profiles and email accounts.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/usersearch.org\/blog\/index.php\/2015\/10\/22\/180\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Crime: Dont be a victim","og_description":"We teach you how to avoid common scam techniques and how you can use our website to secure your online profiles and email accounts.","og_url":"https:\/\/usersearch.org\/blog\/index.php\/2015\/10\/22\/180\/","article_published_time":"2015-10-22T17:52:20+00:00","article_modified_time":"2021-11-07T22:24:25+00:00","og_image":[{"width":623,"height":350,"url":"https:\/\/usersearch.org\/blog\/wp-content\/uploads\/2015\/10\/cyber-crime.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jamie","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/usersearch.org\/blog\/#organization","name":"UserSearch","url":"https:\/\/usersearch.org\/blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/usersearch.org\/blog\/#logo","inLanguage":"en-US","url":"https:\/\/usersearch.org\/blog\/wp-content\/uploads\/2021\/08\/find-users-online-user-lookup-tool-reverse-user-search.jpg.webp","contentUrl":"https:\/\/usersearch.org\/blog\/wp-content\/uploads\/2021\/08\/find-users-online-user-lookup-tool-reverse-user-search.jpg.webp","width":285,"height":179,"caption":"UserSearch"},"image":{"@id":"https:\/\/usersearch.org\/blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/usersearch.org\/blog\/#website","url":"https:\/\/usersearch.org\/blog\/","name":"","description":"Usersearch Blog - Helping you stay safe online","publisher":{"@id":"https:\/\/usersearch.org\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/usersearch.org\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/usersearch.org\/blog\/index.php\/2015\/10\/22\/180\/#primaryimage","inLanguage":"en-US","url":"https:\/\/usersearch.org\/blog\/wp-content\/uploads\/2015\/10\/cyber-crime.jpg","contentUrl":"https:\/\/usersearch.org\/blog\/wp-content\/uploads\/2015\/10\/cyber-crime.jpg","width":623,"height":350},{"@type":"WebPage","@id":"https:\/\/usersearch.org\/blog\/index.php\/2015\/10\/22\/180\/#webpage","url":"https:\/\/usersearch.org\/blog\/index.php\/2015\/10\/22\/180\/","name":"Cyber Crime: Dont be a victim -","isPartOf":{"@id":"https:\/\/usersearch.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/usersearch.org\/blog\/index.php\/2015\/10\/22\/180\/#primaryimage"},"datePublished":"2015-10-22T17:52:20+00:00","dateModified":"2021-11-07T22:24:25+00:00","description":"We teach you how to avoid common scam techniques and how you can use our website to secure your online profiles and email accounts.","breadcrumb":{"@id":"https:\/\/usersearch.org\/blog\/index.php\/2015\/10\/22\/180\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/usersearch.org\/blog\/index.php\/2015\/10\/22\/180\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/usersearch.org\/blog\/index.php\/2015\/10\/22\/180\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/usersearch.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cyber Crime: Dont be a victim"}]},{"@type":"Article","@id":"https:\/\/usersearch.org\/blog\/index.php\/2015\/10\/22\/180\/#article","isPartOf":{"@id":"https:\/\/usersearch.org\/blog\/index.php\/2015\/10\/22\/180\/#webpage"},"author":{"@id":"https:\/\/usersearch.org\/blog\/#\/schema\/person\/7e34b69a5ae2693e33082d4d643a37e5"},"headline":"Cyber Crime: Dont be a victim","datePublished":"2015-10-22T17:52:20+00:00","dateModified":"2021-11-07T22:24:25+00:00","mainEntityOfPage":{"@id":"https:\/\/usersearch.org\/blog\/index.php\/2015\/10\/22\/180\/#webpage"},"wordCount":1199,"commentCount":0,"publisher":{"@id":"https:\/\/usersearch.org\/blog\/#organization"},"image":{"@id":"https:\/\/usersearch.org\/blog\/index.php\/2015\/10\/22\/180\/#primaryimage"},"thumbnailUrl":"https:\/\/usersearch.org\/blog\/wp-content\/uploads\/2015\/10\/cyber-crime.jpg","articleSection":["Open Source Data"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/usersearch.org\/blog\/index.php\/2015\/10\/22\/180\/#respond"]}]},{"@type":"Person","@id":"https:\/\/usersearch.org\/blog\/#\/schema\/person\/7e34b69a5ae2693e33082d4d643a37e5","name":"Jamie","image":{"@type":"ImageObject","@id":"https:\/\/usersearch.org\/blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/db798ccc802968f420608212f5301ca1?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/db798ccc802968f420608212f5301ca1?s=96&r=g","caption":"Jamie"},"sameAs":["https:\/\/www.usersearch.org"],"url":"https:\/\/usersearch.org\/blog\/index.php\/author\/jamie\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/usersearch.org\/blog\/index.php\/wp-json\/wp\/v2\/posts\/180"}],"collection":[{"href":"https:\/\/usersearch.org\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/usersearch.org\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/usersearch.org\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/usersearch.org\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=180"}],"version-history":[{"count":12,"href":"https:\/\/usersearch.org\/blog\/index.php\/wp-json\/wp\/v2\/posts\/180\/revisions"}],"predecessor-version":[{"id":334,"href":"https:\/\/usersearch.org\/blog\/index.php\/wp-json\/wp\/v2\/posts\/180\/revisions\/334"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/usersearch.org\/blog\/index.php\/wp-json\/wp\/v2\/media\/177"}],"wp:attachment":[{"href":"https:\/\/usersearch.org\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=180"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/usersearch.org\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=180"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/usersearch.org\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=180"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}