Category Archives: Online Safety

Why Do Users Keep Falling for Scams?

This guest post is contributed by my Aussie mate, Jim Hillier. Jim is the resident freeware aficionado at Dave’s Computer Tips. A computer veteran with 30+ years experience who first started writing about computers and tech back in the days when freeware was actually free. His first computer was a TRS-80 in the 1980s, he progressed through the Commodore series of computers before moving to PCs in the 1990s. Now retired (aka an old geezer), Jim retains his passion for all things tech and still enjoys building and repairing computers for a select clientele… as well as writing for DCT, of course.


*Social engineering: refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access — Wikipedia

wps_clip_image-25719

It’s unfathomable to me why so many people still get caught out by social engineering techniques, being tricked into clicking that link or opening that attachment.

Social engineering is one of the most prevalent methods used by cybercriminals to infect a system and/or gain a user’s sensitive information. Ransomware, phishing emails, scams, all generally involve an element of social engineering. Why? Because it’s simple, effective, and lucrative. It stands to reason then that the most potent method for eradicating these types of threats would be to make them less effective and less lucrative. The question is; how to achieve that?

You’ve no doubt come across the saying “education is key” – and, when it comes to social engineering, nothing could be truer. Because of the changing nature of socially engineered exploits, security software cannot always protect users from themselves. That’s why Tech blogs are repeatedly issuing the same advice/warnings – don’t click on links in emails from unknown senders, don’t open email attachments from unknown senders, etc., etc., etc. In fact, I recently published yet another list of do’s and don’ts  “10 Golden Rules to Defeat Scammers” . Yet, despite all this, so many people are still falling victim to social engineering.

A large part of the problem I suppose is that the users who need this type of advice the most are generally not the sort of people who tend to visit and read Tech blogs.

I was recently perusing a well-known freeware site and came across a comment from someone complaining that, despite being protected by a commercial grade antivirus, his company’s computers had been infected by ransomware… twice. On both occasions the infection was initiated by an employee clicking on something he or she shouldn’t have clicked on. I suggested to him that perhaps his company needed to review and strengthen its staff training program. Education is key.

My own clientele consists largely of elderly folk and, in my experience, many are highly susceptible to phishing and scams in general. I have a theory about this; I’m sure it’s because they were brought up in an era when trust was inherent; leaving the front door to the house open, leaving the car unlocked and keys in the ignition. Do you know what I mean? It’s not so much that they are gullible, more overly trusting.

These people also tend to be not so computer/security savvy, so rather than hit them with a long list of do’s and don’ts, which might be difficult to follow, I condense it all down to just three rules for them to remember:

1. Treat each and every unsolicited phone call and/or email as highly suspicious.

2. Always be very wary about giving out sensitive personal information over the internet.

3. If it sounds too good to be true, it almost certainly is.

If the more savvy among us would only take the time to pass this type of advice around their own particular circles of family, friends, and acquaintances, I believe that we, collectively, might just make a difference.

image

10 Comments

Filed under cybercrime, Don't Get Hacked, Education, Internet Safety for Seniors, Online Safety, Safe Surfing, System Security, trojans, Viruses, worms

Tech Thoughts Net News – Wednesday Edition – July 8, 2015

How to use Google to sync all your passwords;  Top 10 senior citizen scams that affect the whole family;  Google needs to fix what ails Chrome;  Windows 10 on an old PC: When it comes to specs, how low can you go?  How to use your smartphone less and be happier;  Android tablets, Chromebooks, and convertibles: Which setup makes sense for you?  Android malware masquerades as Nintendo game emulator;  Inflatable anti-drowning device sits on your wrist like a mini life raft;  Stop the inbox insanity!  Hacking Team leak releases potent Flash 0day into the wild;  Xbox Ultimate Game Sale kicks off;   Triple your laptop display space with Sliden’Joy;  You can now subscribe to Showtime online;  CrowdSuit Wants To Help You Get Even With Your Phone Company;  Rdio launches new curated stations;  This is the tiny computer the BBC is giving to a million kids;  PaperScan Free.

Tech Thoughts Daily Tech News 2

How to use Google to sync all your passwords – Securely store your passwords with Google and forget about the need to pay for a password manager.

Top 10 senior citizen scams that affect the whole family – Users over the age of 50 have an especially difficult time keeping their identities and bank accounts safe, as they may find that all of the practical sense they have developed over the years to spot scams in real life just don’t translate on the internet. Scammers know how vulnerable older generations can be on the web, and they take advantage of unsuspecting victims everyday. This can cause stress not just for seniors, but also for their entire family unit. Younger generations may also be fearful of how vulnerable their parents or grandparents are to internet fraud.

Android tablets, Chromebooks, and convertibles: Which setup makes sense for you? – Android tablets and Chromebooks are taking on all sorts of overlapping forms. Here’s a practical guide to help you navigate the ever-expanding maze of options.

Say goodbye to the keyboard: Tablets are now the only work device for four in ten workers – Who needs a keyboard, anyway? Nearly half of workers are doing all their work on a tablet, a proportion that’s set to rise rapidly. According to research from analyst firm IDC, tablets are now 40 percent of business users’ only enterprise device, a figure that rises further when two-in-one hybrid devices are added into the mix. While the majority of tablet users in enterprises currently still have at least one other work device, such as a desktop PC or notebook, according to Marta Fiorentini, IDC senior research analyst, standalone tablets’ share is set to increase.

How to use your smartphone less and be happier – Nine hours. That’s how much time college students spend on their phones each day, according to a recent study published in the Journal of Behavioral Addictions. It’s not entirely surprising. Whether you’re waiting in line for coffee or out “watching” fireworks overhead, it seems like everyone has their phone out in some capacity. It’s as if we prefer the confines of a pocketable screen with the world only in peripheral. So let’s learn to be healthier about our smartphone habits — here are 10 tricks to help with that.

Windows 10 on an old PC: When it comes to specs, how low can you go? – The days of Windows being a system hog are gone. So modest are the requirements for Windows 10, you may be able to run it on machines that shipped with Windows Vista eight years ago. But just how low can Windows 10 go when it comes to PC specs? Since Microsoft released the OS for testing last year people have been loading Windows 10 onto hardware dating back to 2003 – eons ago on the PC refresh timescale. Here are the low-end and long-in-the-tooth machines that proved capable of running Windows 10.

Stop the inbox insanity! These 4 email managers can sort, organize, and delete for you – Email managers let you weed out junk mail, triage messages, and turn them into tasks.

Triple your laptop display space with Sliden’Joy – Jumping from a multi-display desktop setup to a laptop can be a bit of a letdown, particularly if you’re rocking more than two displays. Fortunately, someone’s working on a way to double or triple your mobile screen space. The product is called Sliden’Joy, and it can clip a second and third display onto your laptop’s existing display. Or third and fourth, if you happen to be one of the select few who plunked down big bucks for a dual-screen laptop. Their pixel-packing panels come in three different sizes: 13, 15, and 17 inches. Sliden’Joy will come in several different finishes, too, so there ought to be one that’s a good fit for your notebook of choice. A single display (presumably the 13-incher) will run €199 (about $220), while dual-display packs start at €299 (about $330).

wps_clip_image-18652

Hooks, The App That Lets You Get A Notification For Almost Anything, Lands On Android And Apple Watch – Hooks, the app that sends you push notifications triggered by things that are important to you, has a new version for Android, as well as the now almost obligatory Apple Watch app. Previously, the latest version of Hooks was iOS only. Apple’s smartwatch platform seems particularly suited to a service that lets you pick from 100 or so ‘channels’, consisting of 1 million-plus user created alerts, to keep you updated on anything from the latest tweet, news article or sports score, or something more specific such as a change in stock price or the current bitcoin exchange rate.

Rdio launches new curated stations, brings them to more countries – Rdio has already offered curated stations in the United States, Canada, and UK, but now users can listen in from Australia, Brazil, Hong Kong, India, Indonesia, Malaysia, Mexico, Philippines, Singapore, and Thailand. A major perk of Apple’s Beats 1 station is its widespread availability, and this seems to be Rdio’s answer to that.

wps_clip_image-17361

Two tools that help you stop over-using words in your documents – I go through phases with my writing. Sometimes I feel like every second sentence needs to start with “but,” then I start using “however,” which becomes “nevertheless,” and on and on it goes until the bad habit stops. For times like those, it’s handy to use a word frequency tool to understand how often I’m using problem words. Here are two ways to get that done. One is easy and the other is a little advanced.

Tinder clone for Apple Watch uses heartbeat to determine matches – Imagine an alternate way of using dating app Tinder, where instead of looking at profiles on your smartphone and swiping right or left, you simply glance at your Apple Watch and the app know if you’re attracted to someone based on your heart-rate changes. That’s the idea behind design agency T3’s concept “Hands-free Tinder.” T3 built its app with the use of Apple’s recently released Watch SDK for detecting a user’s heartbeat. They claim to be releasing the app “soon,” but unless it’s really a cooperation with Tinder, a name change seems likely.

wps_clip_image-3400

Google needs to fix what ails Chrome – Google Chrome has been (and still is) the single most popular browser on the planet. But recent issues with memory usage and stability have caused trust in Google’s go-to tool to wane.

Security:

Hacking Team leak releases potent Flash 0day into the wild – Researchers sifting through the confidential material stolen from spyware developer Hacking Team have already uncovered a weaponized exploit for a currently unpatched vulnerability in Adobe Flash, and they also may have uncovered attack code targeting Microsoft Windows and a hardened Linux module known as SELinux. The exploits can be used to surreptitiously install Hacking Team surveillance software, or other types of malware, on vulnerable computers with little or no indication anything is amiss. If the exploits leaked from the colossal Hacking Team breach are limited to two or three unpatched vulnerabilities in Flash, Windows, and SELinux, the resulting damage will be much less severe than it might have been. Still, with 400 gigabytes of data to digest, there may yet be other surprises to find.

Hacking Team used shockingly bad passwords – One of the biggest hacks of the year — not just in scope and size, but impact — is over. As reporters and interested parties sift through the debris of the attack that left Hacking Team crippled, a big question remains. How was someone able to walk in and swipe what appears to be the company’s entire cache of corporate data? The company used weak passwords.

Android malware masquerades as Nintendo game emulator – Palo Alto Networks found three variants of the malware, which it calls Gunpoder, masquerading as emulator applications used to play Nintendo games. Gunpoder apps can do a variety of invasive actions, including collecting bookmarks and browser histories, sending itself to other people over SMS, showing fraudulent advertisements and executing other code. And users get to pay for that data-stealing capability. When a Gunpoder app is launched, it asks users to buy a lifelong license for the emulator for US$0.20 or $0.49, payable through PayPal or Skrill.

Antivirus maker Avira is building a secure web browser – From the department of straightforward naming comes Avira Browser. Like most of the new custom browsers you’ve seen pop up, it’s based on Google’s open source Chromium code. That means it looks and functions very much like Chrome (for better or worse). Want to see what Avira Browser is all about? It’s currently a beta app, and unfortunately it’s not as easy to try as clicking a download link. You’ve got to create an account on Avira’s beta site, verify your email, and then apply to the Avira Browser beta. If you’re thought to be a worthy test pilot, they’ll send a link your way in a few days.

wps_clip_image-6289

Lizard Squad hacker draws suspended sentence for online attacks – A teenager who is apparently a member of the Lizard Squad hacker group has received a two-year suspended sentence in Finland in connection with various cybercrimes including attacks against U.S. university servers. The seventeen-year-old, known as “Zeekill” and “Ryan,” was charged with 50,700 counts of hacking and other offenses including credit card fraud, according to a Lizard Squad Twitter account and Finnish news reports. In a Twitter post, Lizard Squad gloated that “Zeekill got a suspended sentence for 2 years. 0 time spent in prison.”

Company News:

Samsung Electronic’s Earnings Guidance Points To Another Disappointing Quarter – Another quarter, another lackluster earnings guidance from Samsung Electronics. Heralded as Apple’s arch rival in “The Great Smartphone War” just two years ago, Samsung’s performance has declined as competition from a bevy of other Android makers cuts into its market share. The company said today that its Q2 2015 earnings will likely miss expectations. Its operating profit is expected to be 6.9 trillion won (about $6.13 billion), a four percent decline from a year ago, and below analysts’ expectations for 7.2 trillion won. Consolidated sales slipped eight percent to 48 trillion won, below forecasts for 53 trillion won.

Gartner: No help for the PC biz from Windows 10 – Windows 10 won’t help the struggling PC business out of its multi-year slump in 2015, researcher Gartner said today. But it might next year. “The release of Windows 10 on 29 July will contribute to a slowing professional demand for mobile PCs and premium ultra-mobiles in 2015, as lifetimes extend by three months,” said Gartner analyst Ranjit Atwal in a statement Tuesday. “However, as suppliers and buyers adjust to new prices, Windows 10 could boost replacements during 2016.” From Gartner’s perspective, the mere appearance of Windows 10 will result in delayed replacement PC purchases as enterprises and other large organizations put plans on hold as they begin evaluating the OS.

Jolla splits business, refocuses efforts on software – Its been a little over two years since the birth of Jolla. The company was created shortly after then-CEO of Nokia, Stephen Elop, dismantled the Meego team and decided to pioneer Nokia’s future with Windows Phone. While things didn’t fair so well for Nokia, the ex-Nokia staff that formed Jolla has slowly and steadily solidified its small place in the mobile world. Today, Jolla has announced that they will refocus their efforts on their Sailfish OS licensing and development business and create a new company dedicated to hardware.

AMD preannounces lower revenue due to poor demand for its APUs – AMD warned Monday that its second-quarter revenues would fall by 8%, due to a lower demand for PCs than it had previously expected. AMD said previously that revenue could fall by as much as 3%. AMD specifically blamed weaker-than-expected demand for its APUs, which combine a CPU and a graphics chip and make up its A-series product line. The company had already slashed A-series APU prices in late 2014 to help move product. In the second quarter, AMD said, it expects channel sales and channel inventory reduction efforts to be in line with the company’s plans.

Uber wants to buy Tesla’s entire first batch of self-driving cars – It’s no secret Uber is excited about our future of self-driving cars. The company’s business model revolves around drivers using their own vehicles to transport goods and people, but for Uber those drivers represent a significant expense. Self-driving cars, assuming the legislation will reach a point where drivers are no longer required, will eliminate that expense. Uber made partnerships in recent times to work on autonomous driving technologies, and more recently the ridesharing service’s CEO has expressed a lot of interest in Tesla’s future self-driving vehicles.

Sony not looking to exit mobile market, says CEO – Sony Mobile has been struggling to compete in the smartphone market, but the company’s CEO has revealed that it is in the process of turning things around with a long term strategy and won’t be exiting the space. Ever since inexpensive, feature-packed smartphones started making their way to the market, traditional high-quality device makers such as HTC and Sony have found it hard to sell their own devices, especially in emerging markets which are responsible for high volume sales.

Games and Entertainment:

You can now subscribe to Showtime online – Showtime is now offering an online subscription, allowing customers to watch its shows and movies without also getting cable. The subscription is being offered through a few different apps and sites, including Showtime’s iPhone and iPad apps, the Apple TV, Roku, Hulu, and PlayStation Vue. The subscription costs $10.99 — although some services, like Hulu, are offering it for less — and grants access to Showtime’s back catalog, its currently screening films, and even some of its live feeds.

wps_clip_image-15260

Sony just rolled out a big UI update to its PS Now game streaming service – PlayStation Now, Sony’s “Netflix for gaming” service that rolled out last year, hasn’t changed dramatically since it launched. The company added a much-needed subscription option earlier this year to help fix the otherwise crazy pricing structure PS Now had for game rentals, but there otherwise hasn’t been much in the way of updates to speak of. That changes today — a major user interface update has just been pushed out to PlayStation Now on the PS4. The update was included in last week’s PS4 software update, but Sony is just now turning it on.

wps_clip_image-20473

Australian online video subscriptions jump sixfold in six months – The arrival of Netflix, Stan, and Presto has seen the number of Australians subscribing to video-streaming services jump from 315,000 at the end of 2014 to 2 million by the end of June, according to Telsyte.

Xbox Ultimate Game Sale kicks off; here are all the best deals – Dozens of games are marked down for the duration of the event, which begins today and ends July 13, including Battlefield Hardline, Dragon Age: Inquisition, Halo: The Master Chief Collection, and more. Check out a breakdown of this week’s Deals With Gold and Ultimate Game Sale offers below. All deals are good through July 13 and require an Xbox Live Gold subscription except where otherwise noted.

Excellent! Harry Shearer returning to ‘The Simpsons’ – The voice of Mr. Burns, Smithers and a ton of other Springfield regulars signs a new deal that will keep him on the show for at least four more seasons.

Off Topic (Sort of):

CrowdSuit Wants To Help You Get Even With Your Phone Company – We all know telecoms are evil. But as an individual, there’s rarely a way to fight back. Enter CrowdSuit, a new company that aims to help phone customers seek legal redress against phone companies even when they cannot file class action suits. Telecoms increasingly are including a contract provision that prevents customers from filing class action lawsuits against them. Because the cost of an individual lawsuit is often greater than the damages a customer would receive if they won a suit on an issue like throttling, it’s not worth it for them to sue alone. As a result, no one sues, and the telecoms get a free ride. In some states just filing a lawsuit would cost $70, and the amount customers could win by filing would be far less than that.

This is the tiny computer the BBC is giving to a million kids – Earlier this year the BBC announced that it planned to give one million students across the UK a programmable microcomputer, called the BBC Micro Bit, to help them learn the basics of coding. Now four months later, the design of the device has been finalized, ahead of its scheduled rollout date in October. The Micro Bit features two buttons, an array of programmable LED lights, and an in-built motion sensor. Users can connect their microcomputer to bigger devices by Bluetooth or USB, or to the similarly tiny Raspberry Pi through it’s input-output rings.

wps_clip_image-18655

This Is Apple and Google’s Next Big Battleground – For most of my 35-year technology career, fights over operating systems have dominated the landscape. First, it was MS-DOS againt the original Apple II OS. Then it shifted to Microsoft’s Windows vs. the Mac OS. Today it’s between Windows, Mac OS X, iOS, Google’s Android and Chrome OS. These wars have become ideological, with fanboys and devout followers in each camp. But there’s another fight brewing, too — the battle over artificial intelligence, or AI.

Russian government issues guide to avoiding hazardous selfies – Technically Incorrect: It may seem like common sense not to stray too near an approaching train while taking a selfie. Sadly, this doesn’t appear to be the case.

wps_clip_image-28109

Inflatable anti-drowning device sits on your wrist like a mini life raft – Life vests are effective, but bulky. They’re not the sort of thing you haul around with you wherever you go. The Kingii on Indiegogo wants to save your life by being attached to your body at all times when you’re enjoying a day at the ocean or the pool. The 4.9-ounce Kingii (pronounced “kin-gee”) is worn on the wrist. A lever triggers a carbon dioxide cartridge to inflate an orange, balloon-like float. The float pulls you back up to the surface of the water, whether you’re out surfing or taking a dip in a pool. Cartridges can be swapped out to make the wristband reusable. The Kingii appears to be going gangbusters on Indiegogo. The initial $65,000 funding goal has been engulfed by over $445,000 in pledges with 23 days left to run. However, $400,000 of that comes from one anonymous backer.

wps_clip_image-21264

10 Spectacular Building Demolitions – In this roundup, we pay tribute to the bold men and women who bring down buildings for a living by sharing incredible footage of them at work. These are some of the most ambitious, technically difficult, or just plain cool to look at building demolitions ever caught on tape.

wps_clip_image-30352

Study hints kids are future cord-cutters – The television industry has been scrambling to stave off the pressure it feels from services like Netflix and the subscribers it is losing to them. Its efforts may prove to be in vain, however, at least according to a recent study. Miner & Co. Studio conducted research and has found that 57-percent of kids prefer watching videos on their tablet or smartphone rather than on a television. In addition, a common parental discipline might be driving kids further away from television, causing them to associate it with punishment.

Something to think about:

“Friendship… is not something you learn in school. But if you haven’t learned the meaning of friendship, you really haven’t learned anything.”

–      Muhammad Ali

Today’s Free Downloads:

160WiFi – 160WiFi provides a free WiFi hotspot. No hidden cost, no function limit, and never waste your money on those expensive ones that won’t work.

Enjoy Wi-Fi anywhere. 160WiFi offers the greatest choice of available Wi-Fi hotspots anywhere like home, office, airport and so on.

Secure. 160WiFi is safe to use. With strong password security, It allows no one to connect to your wireless hotspot without your permission.

Save money. 160WiFi can turn your computer into a wireless router, allowing your phone or other portable devices to connect the hotspot to surf the internet for free. This cut the data usage of your phone and save much money.

Easy to use. Download, install and connect – only a few clicks.

Features:

Totally free and secure, fully used; No advertising, no annoying pop-ups

Turn laptop/desktop (with a working wireless adapter) into WiFi hotspot in seconds

Easily Manage your computer on the connected Android, iOS and other portable devices

Save cellular data & avoid overcharges

Handy network speed detection

Easy to use, no need of advanced configuration

PaperScan Free – PaperScan is a powerful scanning software with an OCR engine centered on one idea : making document acquisition an unparalleled easy task for anyone.

You have many different scanners or plan to buy new scanner? PaperScan is simply universal while most of the scanning applications are dedicated to one scanner or one protocol.

With PaperScan you can control any scanner ( TWAINor WIA)

In Pursuit of Freedom – The Pushback Continues:

Senate advances secret plan forcing Internet services to report terror activity – The Senate Intelligence Committee secretly voted on June 24 in favor of legislation requiring e-mail providers and social media sites to report suspected terrorist activities.

The legislation, approved 15-0 in a closed-door hearing, remains “classified.” The relevant text is contained in the 2016 intelligence authorization, a committee aide told Ars by telephone early Monday. Its veil of secrecy would be lifted in the coming days as the package heads to the Senate floor, the aide added.

The proposal comes as the Islamic State and other terror groups have taken to the Internet to gain converts across the globe, including in the United States. The FBI issued a public warning in March about American teens being susceptible to the Islamic State’s online recruitment tactics. And the Brookings Institute estimated in March that there were as many as 70,000 pro-Islamic State Twitter accounts. Twitter has removed tens of thousands of these terror propaganda accounts, which violate its terms of service.

FBI chief: Strong encryption lets bad guys ‘communicate with impunity’ – The director of the FBI has called for a “robust” debate over the use of encryption, but has admitted there may be no easy way to protect both security and privacy.

FBI chief James Comey warned that the increasing use of strong encryption will make it harder for law enforcement to access email or other digital conversations.

“There is simply no doubt that bad people can communicate with impunity in a world of universal strong encryption,” he said in a post for the Lawfare blog, and warned this will have an impact on public safety.

Apple’s and Google’s encryption plans have not gone down well with US law enforcement, and the agency’s director says the companies are leading us down a dark path.

He wrote: “That tension is vividly illustrated by the current ISIL threat, which involves ISIL operators in Syria recruiting and tasking dozens of troubled Americans to kill people, a process that increasingly takes part through mobile messaging apps that are end-to-end encrypted, communications that may not be intercepted, despite judicial orders under the Fourth Amendment.”

Thanks to the Edward Snowden revelations about pervasive internet snooping by US and UK intelligence agencies, tech companies have been turning to encryption to protect their customers’ conversations. This has led to claims from law enforcement that important sources of intelligence are ‘going dark’.

Top Security Experts Say Government Limits On Encryption Present Risks –  A group of top cybersecurity experts reported today that giving law enforcement special access to encrypted data for investigations would pose “major security risks.”

The Massachusetts Institute of Technology’s Computer Science and Artificial Intelligence Lab report included input from cryptography expert Bruce Schneier and researchers from MIT, Stanford University, Columbia University, Cambridge University, Johns Hopkins University, Microsoft Research, SRI International and Worcester Polytechnic Institute.

Since October, U.S. law enforcement officials have called for a special door that would allow government agencies to access encrypted data that could help them in investigations. The report tells us that a backdoor for the government and law enforcement also provides an opening that could be exploited by hackers.

The experts argue such special access points “pose far more grave security risks, imperil innovation on which the world’s economies depend, and raise more thorny policy issues than we could have imagined when the Internet was in its infancy.”

Former A.G. Eric Holder says Snowden deal is possible – The “possibility exists” for the U.S. Department of Justice to cut a deal that would allow surveillance leaker Edward Snowden to return to the U.S., a former attorney general said in a media interview.

Snowden, who leaked information about the National Security Agency’s surveillance programs, “spurred a necessary debate” about the collection of U.S. telephone records, former Attorney General Eric Holder told Yahoo News.

The DOJ, however, hasn’t changed its official position on Snowden, a spokesman said. The DOJ wants Snowden to return to the U.S. from Russia and face criminal charges, the spokesman said by email.

Holder, who left the DOJ earlier this year, filed espionage charges against Snowden in 2013.

Holder declined to give Yahoo News details about what a possible deal with Snowden would look like.

NSA officials have reportedly considered a plea deal for Snowden, including some jail time. But Ben Wizner, one of Snowden’s lawyers, rejected the possibility of pleading guilty to a felony.

Comments Off on Tech Thoughts Net News – Wednesday Edition – July 8, 2015

Filed under downloads, Free Software Downloads, Freeware, Internet Security Alerts, Latest Tech News, Online Safety, Tech Net News

What to Do When You Find Yourself a Victim of Identity Theft

Guest writer Marcia Cleighbourne lays out a step-by-step recovery process should you fall victim to identity theft.

imageBeing a victim of identity theft can be an intensely painful experience. Not only does it cost the victim financially, but they also have a lot of work to do to fix the situation.

Identities can be stolen because of bad luck, or because of carelessness. Typically when someone’s identity is stolen, the thief will open up credit cards and other accounts in their name. Even with the most careful planning, one’s identity can be stolen with ease. Here, are 5 things you need to do when you find yourself a victim of identity theft.

Credit Report

The first thing that should be done is to get a credit report. This can show the victim what damage has been done so far. They then should immediately put a fraud report on all of their credit reports. This will prevent more accounts from being opened. By calling one the credit agencies, by law are required to contact the other two. By placing an alert on one’s credit report, it becomes virtually impossible to open an account in their name.

Contact FTC

Though it is unlikely that a case will be prosecuted, the FTC should be contacted. They do pursue cases when they have the ability to do so. At the very least, by contacting the FTC, they will be able to identify trends, and possibly catch larger rings. There is a convenient online complaint form that can be used.

Closures

Now that, the updated credit report has been obtained, it is time to close accounts. This would entail calling each company individually and explaining the situation. Large credit card companies have departments for just this purpose. Fill out fraud dispute reports for the fraudulent transactions. A police report can also be filed to help the process along as well as protecting the victim. Once the issue is resolved, get confirmation in writing.

Follow-Up

After 3-6 months of fixing the situation, follow up and get a copy of all three credit reports. Sometimes they are slow to remove items, or new accounts may have appeared. If the credit agencies did their job correctly, it should be free of any fraudulent accounts. This is so crucial because a credit score can suffer tremendously when contains incorrect information. One should also leave the fraud alerts on their account open for a few more months. The inconvenience when opening an account, will be well worth it.

Prevent Again

Once an identity has been stolen, the damage has been done. It is vital to take steps to ensure this does not happen again. Make sure that all paperwork is shredded, and the computer is not vulnerable. Update all anti- virus software on the computer. In addition, passwords to bank accounts and credit card accounts should be changed. A shredder should be purchased so all sensitive information can be destroyed safely.

Identity theft is more of a pain than anything. Though, it can have serious implications if not taken care of thoroughly. It is necessary to keep notes of every phone call, and to send all mail via certified mail. There are a lot of resources online that can help anyone who has had their identity stolen. Do remember that taking a few steps to prevent identity theft will go a long way.

Marcia Cleighbourne writes about law, personal finance & more at www.dentalinsurance.net.

Comments Off on What to Do When You Find Yourself a Victim of Identity Theft

Filed under Cyber Crime, Guest Writers, Online Safety

Think BEFORE You Click! – How Hard Is That?

imageHARD, apparently.

I recently repeated a small experiment (for the third year in a row), with a group of “average computer user” friends, (12 this time around), and I was disappointed to see (once again), that the conditioned response issue to “just click” while surfing the web, was still there.

Still, I’m always hopeful that reinforcing the point that clicking haphazardly, without considering the consequences – the installation of malicious code that can cause identity theft and the theft of passwords, bank account numbers, and other personal information – would have had some impact. Apparently not.

But, I haven’t given up. I’m prepared to hammer them repeatedly until such time as I can make some progress. In the meantime, I expect that curiously browsing the web blissfully unaware of the considerable malware dangers, will continue to be the modus operandi for my friends.

They’re not alone in their “clicking haphazardly” bad habits. Many of us have learned to satisfy our curiosity simply by a mouse click here, and a mouse click there. Arguable, we have developed a conditioned response (without involving conscious thought), to – “just click”.

It can be argued, that our “just click” mindset poses the biggest risk to our online safety and security. In fact, security experts argue, that a significant number of malware infections could be avoided if users stopped “just clicking haphazardly”, or opening the types of files that are clearly dangerous. However, this type of dangerous behavior continues despite the warnings.

Most visitors to this site are above average users (I’m assuming that you are too), so, I have a challenge for you.

Take every appropriate opportunity to inform your friends, your relatives, and associates, that “just clicking haphazardly” without considering the consequences, can lead to the installation of malicious code that can cause identity theft and the theft of passwords, bank account numbers, and other personal information.

Help them realize that “just clicking”, can expose them to:

  • Trojan horse programs
  • Back door and remote administration programs
  • Denial of service attacks
  • Being an intermediary for another attack
  • Mobile code (Java, JavaScript, and ActiveX)
  • Cross-site scripting
  • Email spoofing
  • Email-borne viruses
  • Packet sniffing

They’ll be glad that you took an interest in their online safety. And, best of all, by doing this, you will have helped raise the level of security for all of us.

A point to ponder:

Since it’s proven to be difficult to get “buy-in” on this – “think before you click safety strategy” – I generally ask the question – do you buy lottery tickets? Not surprisingly, the answer is often – yes. The obvious next question is – why?

The answers generally run along these lines – I could win; somebody has to win;……. It doesn’t take much effort to point out that the odds of a malware infection caused by poor Internet surfing habits are ENORMOUSLY higher than winning the lottery and, that there’s a virtual certainty that poor habits will lead to a malware infection.

The last question I ask before I walk away shaking my head is – if you believe you have a chance of winning the lottery – despite the odds – why do you have a problem believing that you’re in danger on the Internet because of your behavior, despite the available stats that prove otherwise?

18 Comments

Filed under cybercrime, Don't Get Scammed, Don't Get Hacked, Online Safety, Spyware - Adware Protection

Pssst – Let’s Talk About, Uh…. Porn

imageI’ll talk to you about porn. Your friends probably won’t – other than to deny that they watch it – or, perhaps to decry its prevalence on the Internet. If you want to see your friends scramble for cover –  if you want to see some terrific open field running  – ask them specifically, if they watch porn on the Internet.

Yes, I know, they don’t. But, someone’s watching. Run a Google search for “porn” and you might be surprised to see that there are considerably more than One Billion search results.

image

Click graphic to expand.

Despite its popularity and huge profitability – the pornography industry has revenues larger than the revenues of the top technology companies combined – that’s right, the combined revenues of Microsoft, Google, Amazon, eBay, Yahoo!, Apple, Netflix …. – it’s still seen, by many (at least publicly), as a back room activity.

Although porn has almost reached a level of respectability (I’ll focus on the almost), or perhaps because of it there are those who would rather see porn back in the gutter, and dark alleys, where they think it belongs.

But not Kyle Richards. Richards is a 21 year old Michigan jail inmate who believes he’s being subjected to cruel and unusual punishment because he can’t access pornography. Alleging that denying his request for erotic material subjects him to a “poor standard of living” and “sexual and sensory deprivation”, he’s suing.

image

Macomb County Jail; Getty

Rather than referring to Kyle as an idiot, which he undoubtedly is – I’ll give him the benefit of the doubt (at least I’ll pretend I am). Could it be that he’s a porn expert – that he knows pornography has always been a force to be reckoned with. From prehistoric rock paintings depicting sex, through to the Greeks, Romans, the Renaissance period ( in which it flourished), and on to the mass production of pornography in the early 20th century. Yeah, sure!

Purveyors of pornography have always been quick to adapt to new technologies – especially mass production opportunities. No surprise then, to see the distributers of sexually explicit material almost immediately adopted the Internet as the preferred method of  mass distribution –  a technology which allows uncontrolled (by moralists, governments, and others), and anonymous access to explicit sexual content. Not a bad business model!

As an Internet security blogger, I have a certain level of concern with respect to pornographic Websites. Just to be clear – I’m not a member of the Morality Police, and I hold no religious, or political views, on the availability of pornography on the Internet; except of course, pornography which is clearly illegal, or morally reprehensible.

Instead, my main concern is focused on the primary/secondary use, that many of these sites are designed for – as a vehicle for the distribution of potentially harmful malware applications that can be surreptitiously dropped onto unwitting visitors computers.

With that in mind, over the years I’ve written a number of articles dealing with this issue  including – Dangerous Porn Sites – Tips on How to Avoid Them, Porn Surfing – Put a Software Condom on Your Computer!, Kate Middleton Nude – As If!, and Nude Pics Of Your Wife/Girlfriend Attached – Click Here.

I’ve no idea why precisely, but lately (the last 2/3 months), these articles have been getting an unusually high number of hits – generally from search engine referrals. Whatever the reason, it’s a good thing. Hopefully, it’s an indication that surfers are beginning to recognize at least one of the many potentially unsafe activities on the Internet. Hopefully!

A selection of  those search engine referrals  – most are multiples of 30/40 or more (sex, porn, nude, dangerous, safe ….), to this site on a typical day. Some of them are just a little strange – I think. But then, who am I to judge what’s strange?  

porn eskimo, safe porn sites, dangerous porn, dangerous porn sites, most dangerous porn sites, dangers of porn surfing, safe sites for porn, safe porn sites, are pornography websites safe, how can i protect my computer from porn, safest porn sites, porn sites safe, how many porn sites are dangerous, safe porn sites to visit, sex in malware, porn sites without malware, what is a safe porn site, visiting porn sites, pornsites, you porno, how common is illegal pornography, safe porn site recommendation, how to avoid seeing porn, what porn website are safe, porn eskimo (have to admit this one made me LMAO), cam 4 porno gratissurfing (no idea what this one means), 18 teens sex, upskirts webcams, sex with horse by girls, girls sex with horse, the free earlybird wake up local free sex web on one on one cam, nude photo revealing kate middleton, kate middletonnud, kate middletonnude, wife nude pics, share your wife nude pics, i saw your wife nude

I’ll admit that this post rambles a bit – but, I just had to reference the Kyle Richards (I need my porn) story, somehow. More and more often, I find myself shaking my head at just how eerily crazy this world really is.  Smile

This article was originally posted July 5, 2011.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

8 Comments

Filed under Don't Get Hacked, Malware Advisories, Online Safety, Point of View, Tech Net News

Cyber Crooks Taking Another Crack At Yahoo Instant Messenger

imageI’ve been known to  stare at my monitor, humming a few bars of  – “IM malware go away, and come back another day”, from time to time. Doesn’t seem to work though.  🙂 IM malware never goes away – it just fades into the malware background chatter.

Despite the fact that Instant Messenger malware (which has been with us since 2005, or so), doesn’t create much of a fuss, and seems to prefer to stay just below the horizon, it’s as dangerous as it’s ever been.

In business, when something works, why bother to reinvent the wheel. A little nip here; a little tuck there and hey – you’re still in business! No surprise then, when we see that cybercriminals subscribe to this business philosophy.

–   Yahoo Instant Messenger Under Attack Again or Still? (May 4, 2010)

It’s easy to forget about the risks associated with Instant Messaging precisely because of this lack of profile. Until, that is, IM malware comes knocking – hard – like now!

BitDefender’s, Bogdan Botezatu, reports in a recent Blog post, that Yahoo Messenger is currently under attack – and, taking a hard knocking.

From the Blog:

New Yahoo Messenger 0-Day Exploit Hijacks User’s Status Update…and spreads malware, of course!

A newly discovered exploit in version 11.x of the Messenger client (including the freshly-released 11.5.0.152-us) allows a remote attacker to arbitrarily change the status message of virtually any Yahoo Messenger user that runs the vulnerable version.

Since you’re an astute and educated user, none of this comes as a surprise, I’m sure. But, what about a typical user – would he/she be surprised, do you suppose?

Let’s take a look –

In a recent Symantec survey, which questioned computer users on the most likely routes cybercriminals use to drop malware on unsuspecting users – just 3.9% of survey participants believed that Instant Messenger applications had a role in malware distribution.

Unfortunately, the only surprise here is – this is not a surprise.

The harsh reality is, from a security perspective, Instant Messaging applications can present considerable security risks. So naturally, cyber-criminals use Instant Messaging as a primary channel to distribute malware and scams.

We’ve talked about IM security a number of times here, but with this ongoing attack, a quick refresher might be in order.

As with any other application you use on the Internet, having the knowledge that allows you to use it safely, and being aware of current threats, will make for a more positive experience when using these wildly popular applications.

The following is a series of sensible tips for users to get the most out of these programs, securely and responsibly.

Don’t click on links, or download files from unknown sources. You need to be alert to the dangers in clicking on links, or downloading files from sources that are not known to you. Even if the files or links apparently come from someone you know, you have to be positive that it really was this person who has sent the message.

Check with your contact to be sure the files, or links are genuine. Remember, if you click on those links, or run those attachments without confirmation, you run the risk of letting malware into your computer.

Use only secure passwords, and be sure to change them regularly. The longer and more varied they are – using a variety of different characters and numbers – the more secure they will be.

Protect personal and confidential information when using IM. Revealing confidential or personal information in these types of conversations, can make you an easy target for Internet predators.

For added protection when using a public computer, ensure that you disable any features that retain login information to prevent other users from gaining access to your instant messaging once you leave.

It’s virtually impossible to avoid publishing your email address on the Internet, however do so only when absolutely necessary. Cyber criminals are always on the lookout for accounts to target.

Instant Messanger changed Above all, if you are a parent, take exceptional care with the access that your children have to these programs.

The risk here goes beyond malware, as sadly, they could come into contact with undesirable individuals. The risk is low of course, but……..

Elsewhere in this Blog, you can read an article on protecting your children on the Internet and download free software, Parental Control Bar,  to help you do just that.

BTW, you can hum “IM malware go away, and come back another day”, to the new version of that old familiar tune – Rain Rain Go Away.    Smile

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

Comments Off on Cyber Crooks Taking Another Crack At Yahoo Instant Messenger

Filed under Cyber Crime, Instant Messenger Safety Tips, Interconnectivity, Malware Advisories, Online Safety, Yahoo

The Best “Stay Safe On The Internet” App? – Your BRAIN!

image Yes, it’s true! There’s an application designed to help keep you safe on the Internet. And here’s the best part – you don’t have to buy, or download and install this application.

Most Internet users, in my experience, already have this app (some don’t – more about that later), and it works surprisingly well with a computer’s Firewall, Security Applications, and Browser security add-ons.

The Brain is a very efficient Internet safety device, and using it will provide a user with the best protection available while surfing the Internet. There’s a small problem with the Brain though – which might explain its frequent unreliability.

Just as a Firewall needs to be “trained”, to reach the best state of efficiency and protection capabilities, similarly, the Brain app requires “training’”; so that it too, can perform to its maximum potential as an Internet safety device.

Failure to train a software Firewall application, for example, can lead, in many cases, to an erratic and uncertain experience. The untrained Brain app as well, can exhibit parallel behavior.

Sadly, a significant number of Brain apps lack this training and as a result, many computer users fail to recognize the dangers, and threats, the Internet poses to their computers, and to their personal privacy.

The following is a current example of the dangers an untrained Brain can be exposed to:

Last week Naked Security warned of a Facebook worm that was spreading on the social network, tricking users into believing that they were clicking on a link to an image.

Although an unsuspecting user may believe that they are clicking on a link to a JPG image, the truth is that they are downloading an executable file that attempts to download further code (another piece of malware) from the net and drops a .BAT batch file onto infected computers.

The ultimate aim of all this malicious activity is to install the Dorkbot malware onto your Windows computer.

Clearly it’s time, if you haven’t already learnt the lesson, to realize that you should always be wary of links shared by friends on social networks – after all, how can you tell it was a friend who sent it or a piece of malware on their computer?

Times have changed; cybercriminals are increasingly more knowledgeable, quicker to respond to opportunities, and more relentless than ever in their attempts to separate surfers from their money.

Train that Brain – so that you are aware of the shape of the Internet landscape, and the changes that are occurring, or may occur in that landscape. Now, more than ever, Brain training is a necessity – a prerequisite to protecting yourself, and your computer, from cybercriminal attack.

Shameless self promotion: Subscribe to Tech Thoughts Daily Net News and stay in the loop. We’ll keep you on top of changing security conditions so that you’re better prepared to make proactive adjustments to your Internet security strategy. Just click on “Follow” – bottom right hand on this page – and you’ll never miss another Tech Thoughts article.

10 Comments

Filed under Cyber Crime, Cyber Criminals, Internet Safety, Malware Protection, Online Safety, Opinion

Search Engine Malware – The Same Old, Same Old

In the News within the past 3 days

Web security firm Armorize – over 6 million e-commerce web pages have been compromised in order to serve malware to users.

Ed Bott Report – criminal gangs that specialize in malware love search engines, because they represent an ideal vector for getting Windows users to click on links that lead to potentially dangerous Trojans. The latest attack targets ads, and the social engineering is frighteningly good.

Not in the News

The specifics may be news but, this particular malware attack vector is so old I’m surprised that more Internet users aren’t aware of it. No, I take that back – based on a conversation I had just last night.

Me: “So, what antimalware applications are you currently running?”

She: “Well, I can cut and paste and I can get on the Internet, but I don’t worry about all that other stuff. I don’t understand it anyway.”

I’m well past the point where I allow myself to show surprise when I hear this type of response – it’s just so typical. Given that level of knowledge, it’s hardly surprising then, that consumer confidence in the reliability of search engine results, including relevant ads, is taken for granted.

I’ve yet to meet a typical user who would consider questioning a search engine’s output as to its relevant safety.  It’s been my experience, that typical Internet users blindly assume all search engine results are malware free.

This, despite the reality that the manipulation of search engine results, exploiting legitimate pages, and the seeding of malicious websites among the top results returned by search engines in order to infect users with malware, is a continuing threat to system security.

Here’s how the cyber crooks do it:

When a potential victim visits one of these infected sites the likelihood of the downloading of malicious code onto the computer by exploiting existing vulnerabilities is high.

Let’s take, as an example, a typical user running a search for “great vacation spots” on one of the popular search engines.

Unknown to the user, the search engine returns a malicious or compromised web page as one of the most popular sites. Users with less than complete Internet security who visit this page will have an extremely high chance of becoming infected.

There are a number of ways that this can occur. Cyber-crooks can exploit vulnerabilities on the server hosting the web page to insert an iFrame, (an HTML element which makes it possible to embed another HTML document inside the main document). The iFrame can then activate the download of malicious code by exploiting additional vulnerabilities on the visiting machine.

Alternatively, a new web page can be built, with iFrames inserted, that can lead to malware downloads. This new web page appears to be legitimate. In the example mentioned earlier, the web page would appear to be a typical page offering great vacation spots.

Be proactive when it comes to your computer’s security; make sure you have adequate software based protection to reduce the chances that your machine will become infected.

Install an Internet Browser add-on such as WOT (my personal favorite), which provides detailed test results on a site’s safety; protecting you from security threats including spyware, adware, spam, viruses, browser exploits, and online scams

Don’t open unknown email attachments

Don’t run programs of unknown origin

Disable hidden filename extensions

Keep all applications (including your operating system) patched

Turn off your computer or disconnect from the network when not in use

Disable Java, JavaScript, and ActiveX if possible

Disable scripting features in email programs

Make regular backups of critical data

Make a boot disk in case your computer is damaged or compromised

Turn off file and printer sharing on the computer

Install a personal firewall on the computer

Install anti-virus and anti-spyware software and ensure it is configured to automatically update when you are connected to the Internet

Ensure the anti-virus software scans all e-mail attachments

Be proactive when it comes to your computer’s security; make sure you have adequate software based protection to reduce the chances that your machine will become infected.

The following comment (posted here March 15, 2011), illustrates perfectly the issues discussed in this article.

Funny you write about this today. I was reading about the spider issue Mazda was having and wanted to know what the spider looked like so I Googled it, went to images and there it was. There was also a US map that had areas highlighted, assuming where the spiders exist, and before I clicked on the map I made sure there was the green “O” for WOT for security reasons.

I clicked on the map and BAM I was redirected instantly and hit w/ the “You have a virus” scan malware. I turned off my modem then shut my computer off. I restarted it and scanned my computer w/ MS Security Essentials and Super Anti Spyware. MS Essentials found Exploit:Java/CVE-2010-0094.AF, and Trojan:Java/Mesdeh and removed them. I use WOT all the time, but now I’m going to be super cautious.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

6 Comments

Filed under Application Vulnerabilities, Browser add-ons, Cyber Crime, Cyber Criminals, Don't Get Scammed, Don't Get Hacked, downloads, Interconnectivity, Internet Safety, Internet Security Alerts, Malware Protection, Online Safety, Search Engines, Software, trojans, Windows Tips and Tools

Scareware Video Codecs – Another Money Maker For The Bad Guys

imageScareware and Rogue applications (essentially one and the same), once installed, are usually in the victim’s face with an immediate demand for money. Pay me nownot later, is a common theme encountered by those unlucky enough to be trapped.

The ever creative malware clan though, which seems to be always tinkering with delivery methods, has just released a combo threat in an effort to enhance what is already a mature and lucrative business model.

This time around, the bad guys have combined the ever popular missing codec scam (see – Video Codecs – Gateways to Malware Infection – March 2010), with the more usual “Hey, you’re infected” scareware shakedown.

Initially, the unlucky victim gets the usual blunt, and very convincing warning – much like the one below.

image

Courtesy – GFI.

You’ll notice, that unlike the usual “click here to buy” or similar come-on, the potential victim is simply instructed to “Remove all” Trojans. Sounds pretty upfront don’t you think? OK, maybe not to you as an experienced user but, what about your friends/relatives who aren’t as aware as you are? The sad reality is – the victims continue to pile up.

Unfortunately, clicking on “Remove all”, will install a series of malware infected files. The (innocent?) victim will not notice that he’s just been bamboozled – not yet. The victim won’t get the “but wait, there’s more” message, until the time comes to play a Web video.

image

Courtesy – GFI.

And then – booom. Time to pay – as shown in the following screen shot.

image

Courtesy – GFI.

Worth repeating:

If you are attempting to view a site’s video content, and you get a popup advising you that you need to download a new codec to enable viewing – DON’T.

Common sense should tell you, if a website does not recognize a standard codec, there is something wrong. Ask yourself this question; how long would a website stay in business if a visitor is required to download a specific codec to view content? The answer is clearly – not very long.

There is an epidemic of rogue software on the Internet, with much of it being delivered by the constantly evolving Zlob.Trojan, or the  Zlob.Video Access Trojan, which are often hidden in fake, and malicious, codec downloads.

Some good advice from popular guest writer Mark Schneider – “My general rule of thumb for video is: If VLC won’t play it don’t bother.”

So that you can avoid the “missing codec scam”, and to ensure that you have a full set of codecs on your computer, consider downloading one of the following free codec packs. With a full set of codes installed on your computer, any request to download a site specific codec, should be viewed with suspicion.

Windows Essentials Codec Pack – Windows Essentials Media Codec Pack provides a set of software codecs for viewing and listening to many forms of media in Windows Media Player. While this program merely enhances a media player, it does a fine job of accommodating many different and unusual types of videos and music.

Download at: Download.com

The K-Lite Codec Pack – There are several different variants of the K-Lite Codec Pack. Ranging from a very small bundle that contains only the most essential decoders, to a larger and more comprehensive bundle.

Download at: Codec Guide.com

Media Player Codec Pack – The Media Player Codec Pack is a simple to install package of codecs/filters/splitters used for playing back music and movie files. After installation, you will be able to play 99.9% of files through your media player, along with XCD’s, VCD’s, SVCD’s and DVD’s.

Download at: Download.com

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

6 Comments

Filed under Codecs, Cyber Crime, Cyber Criminals, Don't Get Scammed, Don't Get Hacked, downloads, Freeware, Internet Security Alerts, Online Safety, Rogue Software, scareware, Software, trojans, Windows Tips and Tools