I just wanted to share some news with you. A recent survey showed that 90% of homeowners do not regret purchasing their home, while only 9 percent do. Also, more homeowners are aware of what type of mortgage they have, and fixed-rate mortgages are rising in popularity. Take a look (courtesy RisMedia):
90 Percent of Americans Do Not Regret Buying Their Current Home
RISMEDIA, July 13, 2010--A new study released by Bankrate, Inc. shows that, even with home prices sliding and mortgage rates the lowest in decades, the vast majority of Americans do not regret buying their current home.
The poll, conducted by Princeton Survey Research Associates International, can be seen in its entirety here: http://www.bankrate.com/finance/mortgages/poll-few-homeowners-regret-purchase- 1.aspx.
Among the findings:
-- Ninety percent of homeowners say they don't regret buying their home versus a mere nine percent who said they do;
-- Among those who regret buying their homes, the most common reasons cited were because they cannot sell their home and move on along with those who say they regret their purchase since they can't afford their monthly mortgage payments;
-- Only eight percent of Americans don't know what type of mortgage loan they have, down from 26 percent who didn't in a Bankrate poll commissioned two years ago;
-- Fixed-rate mortgages are rising in popularity with 79 percent of those polled saying they have a fixed-rate mortgage on their home;
-- Wealthier Americans most overwhelmingly favored fixed-rate mortgages with almost 90 percent of those polled who make over $75,000 saying that their home was paid for with a fixed-rate mortgage.
"It's surprising - and reassuring - to hear 90 percent of homeowners say they don't regret the purchase of their current homes," said Greg McBride, CFA, senior financial analyst for Bankrate.com. "And all the nasty headlines in the past two years have really moved the needle in terms of mortgage awareness, with a significant drop in the percentage of borrowers who don't know what type of mortgage they have."
This national random-digit-dialed phone study of 1,001 adults 18 or older was conducted for Bankrate by Princeton Survey Research Associates International. The sample was weighted by demographic factors including age, gender, race, education and census region to ensure reliable and accurate representation of adults in U.S. households. The overall margin of error for the survey is +/- 3.5 percentage points based on the total sample.
Dick Post, RMPost Realtors, fixed-rate mortgages, purchasing a home, mortgage rates, home prices, homeowners, mortgage payments, mortgage loans
Monday, July 19, 2010
Thursday, July 15, 2010
Do you have a SmartPhone?
If so, you might be interested in what a pair of researchers found out about how secure they may be (Courtesy RisMedia):
http://rismedia.com/lowes/8355/9166
Smartphones Easily Invaded, Researchers Find
By David Sarno
RISMEDIA, July 8, 2010--(MCT)--Security researchers Nick DePetrillo and Don Bailey have discovered a seven-digit numerical code that can unlock all kinds of secrets about you.
It's your phone number.
Using relatively simple techniques, this duo can use your cell phone number to figure out your name, where you live and work, where you travel and when you sleep. They could even listen to your voice messages and personal phone calls — if they wanted to.
"It's really interesting to watch a phone number turn into a person's life," DePetrillo said.
"Everyone's taught to keep their Social Security number a secret," Bailey said. "But the phone number seems just as dangerous, if not more so."
The world has come a long distance from old-style telephones, which were little more than a speaker, a bell and a microphone connected to a wire.
But as smart phones become more powerful and widely used, they also become busy hubs for data, packed with a user's digital Rolodex, e-mails and credit card details. Most phones are also fitted with a global positioning device that beams its location far and wide.
Taken together, this trove of personal information is valuable to both legitimate commercial companies and unwelcome intruders.
In the last several years, tens of millions of consumers have turned in their older-model cell phones in exchange for high-tech, computer-like handsets such as Apple Inc.'s iPhone, Google Inc.'s Android phones and Research in Motion Ltd.'s line of BlackBerry devices.
Used by about 21 percent of mobile phone customers, smart phones are quickly gaining ground on the previous generation of simpler flip phones, and by 2011 they are likely to become the standard for most consumers, according to Nielsen Co.
DePetrillo and Bailey are part of a busy community of security researchers — some of whom are known as "white hat" hackers — investigating and exposing the many security holes that have yet to be plugged by smart-phone makers and their wireless carriers.
And though many of those companies take a dim view when researchers and hacker groups publicize their vulnerabilities, it's the public that can benefit when those problems are uncovered.
DePetrillo and Bailey were surprised at how easily they could use widely available information and existing techniques to assemble a detailed dossier on a cell-phone user. (They stress that their demonstrations are for educational purposes and that they work better on some cell networks than others.)
Once they have a phone number — yours, for instance — they can easily determine your name by taking advantage of a vulnerability in the Caller ID system. Using special software, they can "spoof" a call — that is, make a call that appears to the phone company as though it's coming from your number. They can then call themselves using your number and watch as their Caller ID device lights up with your name.
Attackers could theoretically do this with thousands of numbers to create their own personal mobile phone book.
But it doesn't stop there: Once DePetrillo and Bailey have figured out that your name is the one associated with your number, they can query the cellular network to see where your phone is at that moment. After enough time, this bit of digital spycraft will yield a fairly clear picture of where you go and when.
"We can do a lot of cool things that we really shouldn't be able to as civilians," DePetrillo said. "It's like running your own private intelligence company."
Representatives from AT&T and T-Mobile referred questions about the issue to the CTIA, a wireless industry association, which said U.S. wireless carriers are vigilant about protecting subscriber privacy, and questioned whether DePetrillo and Bailey's tracking techniques were legal.
The vulnerabilities in the networks that track phones and connect calls are mirrored by security weaknesses in the phones themselves, one of which is the software they run.
All of the major smart-phone makers have created online markets where users can download any of tens of thousands of small programs — called apps. On the iPhone, there's the App Store; for Google Android, there's the Android Marketplace; and for BlackBerry, there's the App World.
Those stores have varying levels of policing. Apple certifies the security of every app it approves for its store — there are now 250,000 of them — but acknowledges that some malicious apps can occasionally sneak through. RIM and Google largely leave users to protect themselves from the bad guys.
Tyler Shields, a computer security researcher who specializes in mobile phones, likes to show off a nasty little application he wrote called TXSBBSPY.
The "TXS" part is his initials. "BB" is for BlackBerry. And the "SPY" is for the way his program can turn your device into a mobile surveillance station, with you as the target.
Once installed on your BlackBerry, Shields' app would let him read your text messages, listen to your voicemails and even turn on your phone's mic while it's in your pocket.
Though Shields' app is intended to be a case study on BlackBerry security, he said an attacker could easily hide similar features in an app masquerading as something else, like a program to do online banking. If a user unwittingly downloaded the phony banking app, his or her device could quickly become compromised.
Because smart phones are only a few years old, Shields said, the art of smart-phone defense is still catching up to where the PC has been for years.
"We're still in the late '90s when it comes to security on mobile devices," Shields said. "It's akin to the older days before people knew to put antivirus software or firewalls on their computers."
For their part, RIM and Google say they have built some precautions into their phones to help users determine whether an app is legitimate. BlackBerry phones offer a set of controls that allow users to prevent apps from accessing some of the device's functions — such as its messaging and telephony features.
Similarly, before a user loads an app from Google's Android store, the device will display a list of the data to which it has access. If a tic-tac-toe game is asking to access your text messages, that could be a warning sign.
Google, RIM and Apple all say they remove offending apps from their stores when they become aware of violations. Still, they say, it's up to users to be vigilant when downloading apps — and to judge whether they're coming from a trusted software maker.
Charles Miller, the principal security analyst at Independent Security Evaluators in Baltimore, stressed that common sense is often the best defense against malicious attacks.
"For 10 years, people have been told all of these things you should do to protect your computer: Don't click on links in e-mails and only go to sites you trust," he said. "People tend to forget those when you're on your phone."
(c) 2010, Los Angeles Times.
Distributed by McClatchy-Tribune Information Services.
http://rismedia.com/lowes/8355/9166
Smartphones Easily Invaded, Researchers Find
By David Sarno
RISMEDIA, July 8, 2010--(MCT)--Security researchers Nick DePetrillo and Don Bailey have discovered a seven-digit numerical code that can unlock all kinds of secrets about you.
It's your phone number.
Using relatively simple techniques, this duo can use your cell phone number to figure out your name, where you live and work, where you travel and when you sleep. They could even listen to your voice messages and personal phone calls — if they wanted to.
"It's really interesting to watch a phone number turn into a person's life," DePetrillo said.
"Everyone's taught to keep their Social Security number a secret," Bailey said. "But the phone number seems just as dangerous, if not more so."
The world has come a long distance from old-style telephones, which were little more than a speaker, a bell and a microphone connected to a wire.
But as smart phones become more powerful and widely used, they also become busy hubs for data, packed with a user's digital Rolodex, e-mails and credit card details. Most phones are also fitted with a global positioning device that beams its location far and wide.
Taken together, this trove of personal information is valuable to both legitimate commercial companies and unwelcome intruders.
In the last several years, tens of millions of consumers have turned in their older-model cell phones in exchange for high-tech, computer-like handsets such as Apple Inc.'s iPhone, Google Inc.'s Android phones and Research in Motion Ltd.'s line of BlackBerry devices.
Used by about 21 percent of mobile phone customers, smart phones are quickly gaining ground on the previous generation of simpler flip phones, and by 2011 they are likely to become the standard for most consumers, according to Nielsen Co.
DePetrillo and Bailey are part of a busy community of security researchers — some of whom are known as "white hat" hackers — investigating and exposing the many security holes that have yet to be plugged by smart-phone makers and their wireless carriers.
And though many of those companies take a dim view when researchers and hacker groups publicize their vulnerabilities, it's the public that can benefit when those problems are uncovered.
DePetrillo and Bailey were surprised at how easily they could use widely available information and existing techniques to assemble a detailed dossier on a cell-phone user. (They stress that their demonstrations are for educational purposes and that they work better on some cell networks than others.)
Once they have a phone number — yours, for instance — they can easily determine your name by taking advantage of a vulnerability in the Caller ID system. Using special software, they can "spoof" a call — that is, make a call that appears to the phone company as though it's coming from your number. They can then call themselves using your number and watch as their Caller ID device lights up with your name.
Attackers could theoretically do this with thousands of numbers to create their own personal mobile phone book.
But it doesn't stop there: Once DePetrillo and Bailey have figured out that your name is the one associated with your number, they can query the cellular network to see where your phone is at that moment. After enough time, this bit of digital spycraft will yield a fairly clear picture of where you go and when.
"We can do a lot of cool things that we really shouldn't be able to as civilians," DePetrillo said. "It's like running your own private intelligence company."
Representatives from AT&T and T-Mobile referred questions about the issue to the CTIA, a wireless industry association, which said U.S. wireless carriers are vigilant about protecting subscriber privacy, and questioned whether DePetrillo and Bailey's tracking techniques were legal.
The vulnerabilities in the networks that track phones and connect calls are mirrored by security weaknesses in the phones themselves, one of which is the software they run.
All of the major smart-phone makers have created online markets where users can download any of tens of thousands of small programs — called apps. On the iPhone, there's the App Store; for Google Android, there's the Android Marketplace; and for BlackBerry, there's the App World.
Those stores have varying levels of policing. Apple certifies the security of every app it approves for its store — there are now 250,000 of them — but acknowledges that some malicious apps can occasionally sneak through. RIM and Google largely leave users to protect themselves from the bad guys.
Tyler Shields, a computer security researcher who specializes in mobile phones, likes to show off a nasty little application he wrote called TXSBBSPY.
The "TXS" part is his initials. "BB" is for BlackBerry. And the "SPY" is for the way his program can turn your device into a mobile surveillance station, with you as the target.
Once installed on your BlackBerry, Shields' app would let him read your text messages, listen to your voicemails and even turn on your phone's mic while it's in your pocket.
Though Shields' app is intended to be a case study on BlackBerry security, he said an attacker could easily hide similar features in an app masquerading as something else, like a program to do online banking. If a user unwittingly downloaded the phony banking app, his or her device could quickly become compromised.
Because smart phones are only a few years old, Shields said, the art of smart-phone defense is still catching up to where the PC has been for years.
"We're still in the late '90s when it comes to security on mobile devices," Shields said. "It's akin to the older days before people knew to put antivirus software or firewalls on their computers."
For their part, RIM and Google say they have built some precautions into their phones to help users determine whether an app is legitimate. BlackBerry phones offer a set of controls that allow users to prevent apps from accessing some of the device's functions — such as its messaging and telephony features.
Similarly, before a user loads an app from Google's Android store, the device will display a list of the data to which it has access. If a tic-tac-toe game is asking to access your text messages, that could be a warning sign.
Google, RIM and Apple all say they remove offending apps from their stores when they become aware of violations. Still, they say, it's up to users to be vigilant when downloading apps — and to judge whether they're coming from a trusted software maker.
Charles Miller, the principal security analyst at Independent Security Evaluators in Baltimore, stressed that common sense is often the best defense against malicious attacks.
"For 10 years, people have been told all of these things you should do to protect your computer: Don't click on links in e-mails and only go to sites you trust," he said. "People tend to forget those when you're on your phone."
(c) 2010, Los Angeles Times.
Distributed by McClatchy-Tribune Information Services.
Monday, May 17, 2010
6 SHORT SALE MYTHS THAT MUST BE DEBUNKED!!!
Some of the myths surrounding Short Sales are:
1) You must be in default on your mortgage to negotiate a short sale
2) Listing a home as a short sale can be embarrassing
3) Buyers aren't interested in short sale properties.
4) There's not enough time to negotiate a short sale before foreclosure.
5) The bank would rather foreclose than complete a short sale.
6) Short sales are impossible and never get approved.
I Short Sale Inc is setting the records straight on these myths in the following article: http://rismedia.com/lowes/8355/8443
1) You must be in default on your mortgage to negotiate a short sale
2) Listing a home as a short sale can be embarrassing
3) Buyers aren't interested in short sale properties.
4) There's not enough time to negotiate a short sale before foreclosure.
5) The bank would rather foreclose than complete a short sale.
6) Short sales are impossible and never get approved.
I Short Sale Inc is setting the records straight on these myths in the following article: http://rismedia.com/lowes/8355/8443
Friday, April 30, 2010
Summary Of Despite Known Online Threats Young Adults Choose Convenience Over Security
According to a survey of 1,000 young adults between the ages of 18 and 24, done by research firm TRU, more than seven out of ten young adults are choosing convenience over safety when it comes to accessing and entering information online, even though they recognize the risk of identity theft or online fraud. This behavior can have a negative effect on things from their financial health to their career propspects. TRU’s research shows that while those surveyed understand the risks, they are not always taking steps to alter the behaviors that would make them vulnerable. Check out the article below for more (courtesy RISMedia):
http://rismedia.com/2010-04-27/despite-known-online-threats-young-adults-choose-convenience-over-security/print/
http://rismedia.com/2010-04-27/despite-known-online-threats-young-adults-choose-convenience-over-security/print/
Labels:
children security,
Dick Post,
internet,
online,
online threats,
prints,
R.M. Post Realtors,
security
Subscribe to:
Posts (Atom)