Hottest 10 Items Stolen Online [cool infograph]

People at superstoresearch.com created an interesting and informative infograph discussing credit card fraud online aiming at raising awareness of the issue and educating consumers on how to protect themselves from while. While the infograph is wordier than the norm, it is well worth the time as it contains a lot of valuable information.

Over a third of consumers have been victims of online credit card fraud, or know someone that has.

Beds are also a favorite target for e-commerce crooks. Experts believe many fraudsters come to the UK from abroad and a bed is the first thing they need when they arrive.

Check it out:

Blippy: Could This Insanity Have a Purpose?

Well, privacy in the new social age is a very illusive ideal. Some people, like one Mark Zuckerberg, think that privacy is dead but even they try to reclaim their own private space! With Blippy privacy is not just dead, privacy has been dug up from its grave chopped up, processed and sold as piranha food.

So what is Blippy?

blippy2

Blippy / What are your friends buying?

Blippy is a service very similar to Twitter in its look and it’s dubbed as a “social shopping” service. Basically, what it does is that it allows its users to automatically share their purchases from iTunes, Amazon,Visa, MasterCard and others and allows them to discuss those purchases and track them. Yes; that means your entire financial transactions are going to be shared with the whole wide web, if you opt to that. The site provides you with a “Blippy Credit Card” and all the transactions on this card will be shared while your private credit cards will remain… private. So with the launch of this service privacy is dead, but are the founders of Blippy crazy to think people will be willing to share that? Or are they at the bleeding edge of social media?

HOW TO: 5 Tips & Tricks for Stronger Passwords…

Security professionals build many layer of security to protect a system from being compromised, yet the one problematic area that represents the weakest point is the users’ passwords. In this post we will focus on some tips and steps that will help with managing and strengthening passwords.

©2010 thoughtpick, copyrights reserved.