Home ]

HomeSecurity-In The Home
 

 

 

Tips and Info concerning the secure use of the internet.

 

More Than 40 Percent Of U.K. Users Say They Have Been Fraud Victims

44 percent of respondents said they have suffered from bank or credit card fraud, and 42 percent have had their identity stolen. The average amount stolen was nearly $3,000 per person, and 37 percent did not get their money back from the bank.

http://darkreading.com/shared/printableArticle.jhtml?articleID=224600470

Do you get e-mail rage?

We hold our breath while cranking out e-mails and doctors confirmed their suspicions. When we hold our breath, the brain is momentarily oxygen deprived and hits the flight or fight response, fueling a more emotional reaction to the words shooting out of our fingers. What can seem like innocent or understandable venting can cost you your job, damage your reputation and crater your chances for promotion…  26 percent of the nearly 600 companies said they'd fired an employee for e-mail misuse.

http://www.cnn.com/2010/LIVING/worklife/05/03/cb.got.email.rage/index.html?hpt=Sbin

 WORTH REPEATING

Google said that between January 2009 and the end of January 2010, its malware detection infrastructure found some 11,000 malicious or hacked Web pages that attempted to foist fake anti-virus on visitors.

http://krebsonsecurity.com/2010/04/fake-anti-virus-peddlers-outmaneuvering-legitimate-av/#more-2701

 WORTH REPEATING

If you suspect your bank account has been compromised or spot any activity you have not authorized, follow these guidelines;

- Notify your bank and credit card companies immediately

- Close all affected accounts

- Notify the major credit reporting agencies

 - File a report with the Garda Síochána

 

Security experts warns firms that lower risk flaws are higher risk

Security experts have warned businesses that hackers are moving their focus on flaws designated as high risk by software vendors to flaws normally seen as lower risks. "…they're not going for the normal high risk flaws, they're going for the medium risk ones. In the patch management cycle, the medium risk flaws [considered lower risk] are been patched later." That delay in patching is also being exacerbated by hackers combining the lower risk flaws to create so-called blended threats…  By combining two lower risk flaws, hackers can cause high risk threats to an organisation.

http://www.v3.co.uk/computing/news/2259522/security-experts-warns-firms

Password reset questions dead easy to guess

Hackers stand a one in 80 chance of guessing common security questions such as someone’s mother’s maiden name or their first school within three attempts. …Online research about a subject or a pre-existing relationship makes the chances of figuring out the answer to password reset questions still easier.

http://www.theregister.co.uk/2010/03/11/password_reset_insecurity/

Securing Wireless Networks

It is possible for attackers who are within range to hijack or intercept an unprotected connection.  … Most network devices, including wireless access points, are pre-configured with default administrator passwords to simplify setup. These default passwords are easily found online, so they don't provide any protection. Changing default passwords makes it harder for attackers to take control of the device…

http://www.us-cert.gov/cas/tips/ST05-003.html

File sharing networks open door to identity theft

Cyber thieves are targeting their newest identity victims through the use of file-sharing networks. Consumers and their family members need to be wary about with whom they share music, photos or documents online because criminals could be downloading the information stored on personal computers, including Social Security numbers, home addresses and even health information. Users of file-sharing networks can inadvertently expose the contents of entire hard drives containing personal information to others on the network.

http://www.net-security.org/secworld.php?id=9005

 WORTH REPEATING

What is worth mentioning again, and again, and again, is the importance of applying patches and updates in a timely manner, employing anti-malware security software and keeping it up to date to detect current threats, and continuing to educate users to not click on links or open attachments in messages.

http://www.pcworld.com/businesscenter/article/189772/protect_your_business_from_kneberstyle_botnets.html

Patchy Windows patching leaves users insecure

Windows users need to patch their systems an average of every five days to stay ahead of security vulnerabilities, according to a study this week. …the average home user needs an average of 75 patches from 22 different vendors to be fully secure. The complexity of patching means that most users are not even in the race, meaning that hackers hoping to exploit software vulnerabilities to infect vulnerable systems stay well ahead of the game.

http://www.theregister.co.uk/2010/03/07/windows_patching_pain/

It's official: Adobe Reader is world's most-exploited app

Adobe's ubiquitous Reader application has replaced Microsoft Word as the program that's most often targeted in malware campaigns… PowerPoint attacks dropped from almost 17 percent in 2008 to less than five percent last year. http://www.theregister.co.uk/2010/03/09/adobe_reader_attacks/

 WORTH REPEATING

According to a study by research firm Gartner Group, 43 percent of companies were immediately put out of business by a “major loss” of computer records, and another 51 percent permanently closed their doors within two years — leaving a mere six percent “survival” rate.

http://homelandsecuritynewswire.com/gartner-only-6-percent-companies-survive-longer-two-years-after-losing-data

XP and Windows 2000: Time running out on support

Businesses using Windows XP will need to upgrade to Service Pack 3 (SP3) of the operating system by July in order to continue receiving support from Microsoft.

http://www.silicon.com/technology/software/2010/02/26/xp-and-windows-2000-time-running-out-on-support-39745529/print/

Mystery/Secret Shopper Schemes

…applicants are requested to provide bank account information to have money directly deposited into their accounts. The fraudster then has acquired access to these victims' accounts and can withdraw money, which makes the applicant a victim of identity theft.  No legitimate mystery/secret shopper program will send payment in advance and ask the employee to send a portion of it back.

http://www.fbi.gov/cyberinvest/escams.htm

 WORTH REPEATING

When you search for breaking news, be aware that attackers often publish links faster than the legitimate media. Get in the habit of using Yahoo! News, Google News, or another trusted service. Only news published by trusted media sources are aggregated onto these services, unlike a regular search using your favorite search engine.

http://www.sophos.com/blogs/chetw/g/2010/02/27/tsunami-blackhat-seo-attack/

Disasters are a boon to malware...

Whenever there is a big disaster people rush to the Internet to find the latest news. But that can lead them into trouble because malware distributors will quickly put up web pages related to that disaster, but containing malicious code.

http://blogs.zdnet.com/Foremski/?p=1208&tag=content;col1

 WORTH REPEATING 

Consider the smart phone. At any given moment, it - and therefore your carrier - knows within a few feet exactly where you're standing. It knows when you're stationary or walking - and the direction you're heading. It knows who you stood next to on the transit bus, that you walked through Washington Square today when a political rally took place. It knows what time you went to the polls to vote. It can detect your conversations and background noises. It knows where and when you took every photograph. And it watches your every text and e-mail message. For better or worse, much of this information is being monitored, crunched aggregated and analyzed.

http://blogs.computerworld.com/15618/is_your_iphone_a_snitch_or_a_tool_for_social_good

How To Identify Phishing Attacks

Web browsers and security software usually offer built in phishing protection. These rely heavily on user submissions which means that they protect well against known phishing sites and attacks but often fail when new phishing attacks emerge. That is why computer users need to be able to identify phishing attacks.

http://loginhelper.com/login-security/identify-phishing-attacks/

The Phishing Flow Chart

Here is a handy phishing flow chart that can help inexperienced computer users in analyzing potentially dangerous emails.

http://loginhelper.com/email/phishing-flow-chart/

 WORTH REPEATING 

"Simply because a message appears to come from a friend doesn't mean the recipient shouldn't question its validity. Think twice, ask questions, and don't be so quick to click."

Four Signs of an Easy Victim on Social Networks

these social networks, by nature of how they work, make it possible for criminals to cyber stalk potential victims. Users at risk for this kind of attack might be a person who has access to something or somebody that the criminal wants. You might be the executive assistant to a corporate CEO, or a human resources representative who has access to all of your company's employee files. You may not think anyone notices, but this makes you a desirable target… (If you work for the government, you are a desirable target- editor)

http://www.csoonline.com/article/542913/Four_Signs_of_an_Easy_Victim_on_Social_Networks

If Your Password Is 123456, Just Make It HackMe

People favor simple passwords, despite Internet security scares like the recent attacks on Google’s e-mail service.

http://www.nytimes.com/2010/01/21/technology/21password.html?th&emc=th

 WORTH REPEATING  

Security experts say employee awareness and training are a crucial defense. Often, malware infections are a result of high-tech twists on old-fashioned cons. One scam, for example, involves small U.S.B. flash drives, left in a company parking lot, adorned with the company logo. Curious employees pick them up, put them in their computers and open what looks like an innocuous document. In fact, once run, it is software that collects passwords and other confidential information on a user’s computer and sends it to the attackers. More advanced malware can allow an outsider to completely take over the PC and, from there, explore a company’s network.

http://www.nytimes.com/2010/01/18/technology/internet/18defend.html

The Decade’s 10 Most Dastardly Cybercrimes

http://www.wired.com/threatlevel/2009/12/ye_cybercrimes/

Greatest security threats to education

http://www.net-security.org/secworld.php?id=8658

HOLIDAY SCAMS

Password Robbery

Password theft is rampant during the holidays. Thieves use low-cost tools to uncover a person’s password and send out malware to record keystrokes, called keyloggers. Once criminals have access to one or more passwords, they gain vast access to consumers’ bank and credit card details and clean out accounts within minutes. They also commonly send out spam from a user’s account to their contacts.

http://www.foxnews.com/story/0,2933,576358,00.html

Job-Related E-mail Rip-offs

Scammers are preying on desperate job-seekers, with the promise of high-paying jobs and work-from-home moneymaking opportunities. Once interested persons submit their information and pay a set-up fee, hackers steal their money instead of following through on the promised employment opportunity. 

http://www.foxnews.com/story/0,2933,576358,00.html

Online Identity Theft

As bargain hunters surf for deals using free wireless networks at the local cafe, hackers can spy on their activity and steal their personal information.

http://www.foxnews.com/story/0,2933,576358,00.html

The security nightmare formula

- Easy-to-guess passwords and password reuse

- Inconsistent patching

- Getting too personal

- Overdose of trust

- Outdated virus protection

- Not using available security products

- “It won’t happen to me” syndrome

http://www.net-security.org/secworld.php?id=8602

 WORTH REPEATING   

Beware of e-mails that appear to come from government e-mail addresses that direct you to a file hosting websites such as rapidshare.com, zeropaid.com, or sendspace.com.  Legitimate government business is not conducted on these websites, but Trojan horse viruses are.

The five most frequent Holiday scams

- Fake Holiday eCards: Don't recognize the sender? Delete it. If the email is not addressed to you specifically, delete it. If you're instructed to download an "executable program," delete it.

- Fake Holiday Products: If you don't recognize a company, don't order anything from them until you're sure they really exist.

- PayPal/eBay: Avoid following links that are provided for you in any email, especially if you are unsure of the sender. A frequent trick from spammers during the holidays is a link to a fake eBay or PayPal login page. Rather than follow links in emails, type it directly into your browser.

- Bank Phishing: Banks will never ask for your personal information, or provide your personal information, in an email. Also, keep an eye out for poor spelling and grammar. If you are not specifically addressed in the email, delete it.

- Letters from Santa: Although a nice idea for the kids, do your research. There are many fake companies out there. Check in with the Better Business Bureau to confirm existing companies.

http://www.bsminfo.com/article.mvc/Tis-the-Season-For-Cyber-Crime-0001?VNETCOOKIE=NO

 

Send mail to webmaster@aradag.ie with questions or comments about this web site.
Last modified: 16-May-2016