|
|
|
5/31/2012
Android Attacks and Malicious Tweets
05/31/12 - Cybercriminals
seeking a large pool of specific users to be targeted for malware and spam attacks have continued to make Facebook and
Twitter a launching pad for new cyber- attacks. The Android platform has continued as the attack vector of choice having
experienced a 1200 percent increase in malicious activity from the last quarter of 2011 to the first quarter of 2012
(according to McAfee). They are also using these mediums to launch attacks on newer sites like Pinterest in order to
catch victims off guard and trick them into clicking on malicious links.
Fake AV and Black-Hole Exploit Kits
These cybercriminals, distributing fake antivirus applications, tweeted a link labeled "must-see" from numerous
compromised accounts and spam-bots. Followers who clicked on the links were directed to a site infected with a fake antivirus
program. Once installed, the program constantly alerts users that their systems are infected and directs the users to
pay to clean up their systems. The next day, additional links using the Black-hole exploit kit infects the users' systems with malware before automatically sending them to a site that is hosting another scareware program called "Windows
Antivirus Patch."
Legacy Social Network
Attacks
Scammers (whose primary motivation
is financial) also tricked users into installing a fake application which promised to show them a list of people who
had viewed their profile( a popular lure used previously on Facebook and MySpace). The application did little more than
tag the victim's friends in a spam image in order to spread the fake application among their network and serve them
with surveys that generate affiliate cash for the scammer.
Twitter was also used as a platform to take advantage of users on Pinterest, a social networking site which
is rapidly gaining popularity. A spam campaign using the account "Pinterestdep" claimed to be offering Visa®
gift cards to users willing to provide their opinions about Pinterest. Instead of being directed to a user feedback form,
victims were sent to a site which required them to complete up to 11 reward offers and to refer three friends to do so
as well. Scammers also took advantage of Tumblr users who mistakenly entered "Tublr" into their web browser when attempting to access the popular micro-blogging site and redirected them to a message that claimed the victim
had been selected as a "daily winner." Like the scam on Pinterest, the victim was then asked to fill out surveys
or complete other offers in order to claim the prize.
Malicious
tweets spreading rogue AV
Twitter users
need to beware of Tweets with the '.tk' extension. These malicious Tweets harbor spammed URL's which (once clicked) lead
to a Russian web page pretending to be an official Anti-Virus page notifying its victims about malware detected on their
machines. This URL executes a drive by download of rogue anti-virus programs into a victims system. The programs distributed
are related to the parasites associated with Winwebsec and FakeVimes. Interestingly, these dangerous payloads not only
target the Android platform but also attack PC's.
Security Experts report that Twitter users have been tweeted with the URLs with the' .tk' extension. Users clicking
these links they are directed to googleapi17.ru/l(dot)php? l=os&r=5519&a=29# which appears to be an Anti-virus
Scanner . The malicious page displays messages similar to this:
- Anit-Virus ScannerCheck your phone for viruses! Maybe Your phone is infected , and someone has access
to your personal information, such as photos, messages, call history, contacts, history of sites visited, passwords to
websites and more. Immediately start scanning for viruses!
A Multiplatform Infection
Depending
on which system, PC or smartphone, a victim is on, he is encouraged to download a repair file. Computer users are prompted
to install VirusScanner.jar while smartphone users are prompted to download VirusScanner.apk. Luckily, ' .jar' files
do not function properly due to an apparent syntax error. However, ' .apk' file can easily be installed on the smartphone
and deliver the rogue anti-virus into the target system ( reported as Trojan.Android.Generic.a).
In Conclusion
Cybercriminals have shown that they will launch Trojans, offer fake prizes and will send users to malicious
URLs in order to execute their plans, so users should avoid clicking on any suspicious tweets. These attacks will keep
evolving and they will keep coming. To avoid malicious attacks, users should start using mobile anti-virus software (from
certified vendors such as AVG Mobilation, Bullguard, ESET Mobile, F-Secure, Kaspersky Mobile 9, Panda, Norton, Trend
Micro or Webroot).
3:33 am edt
5/28/2012
Removing Advanced Security Center
05/28/2012 - Fake Advanced Security Center is a feature of FakeVimes family of rogues. Typically to this group,
it tends to present itself as legitimate application from Windows and bombard its victims with misleading pop-up ads
and notifications as soon as it gets on the system. Then it displays Advanced Security Center that shows falsified scan
results. This center, although claimed to be created by Microsoft, is work of scammers and should not be trusted.
Trying to look more trustworthy, Fake Advanced Security Center offers Firewall, Automatic Updates, Antivirus Protection,
Anti-phishing, Advanced Process Control, Autorun Manager, Service Manager, All-in-one Suite, Quick Scan, Deep Scan, Custom
Scan and other features that in reality are fake. In addition, this program initiates fake scans that report about fake viruses as well.
In order to now which one is virus, pay attention to these differences: - Be sure that legal Fake Security Center won’t open by itself.
- Legal version of Fake Advanced Security Center never asks its users to purchase,
- upgrade, subscribe or renew from its own interface while fake one pushes its victims to
- purchase the license of other, specific rogue security software that is usually
installed
- earlier.
- Pay attention to grammar errors or bugs.
- Real Security
Center is not antivirus scanner. Microsoft has single antivirus scanner –
- Microsoft Security Essentials, though it might recommend other, non-Microsoft choices
- as well.
While trying to remove Fake Advanced
Security Center, you may find that your legitimate software is killed. So, use these tips to avoid any inconvenience: - Reboot infected PC to Safe Mode with Networking and scan with reputable anti-spyware,
- like AVG Antivir 2012, Spyware Doctor 2012 or Kaspersky Internet Security
2012. Of
- course,
don’t forget to scan your PC one more time when on normal mode as well!
- Download the anti-spyware program to another computer that is perfectly clean. In
- addition, rename its executable file and transfer the program with the help of a
- memory stick,
- smartphone or simple CD.

6:53 pm edt
Eradicating System Protection Tools05/28/2012 - System Protection Tools is a fake antispyware program that was designed by computer hackers in
order to steal money from random computer users. It belongs to the same family of rogues as Best Antivirus Software and
Best Virus Protection. The program gets insided the targeted
system with a help of Trojan viruses. At the very begining it dislays some fake security notifications warning that your
system is infected and uses fake scanner to imitate looking for infections. The messages that appear on the system
out of nowhere look like this:System Message
Your PC may still be infected with dangerous viruses. Malware Protection Center protection is needed to prevent
data loss and avoid theft of your personal data and credit card details. Click here to activate protection.
Warning! Virus Detected
Threat Detected: Trojan-Spy.HTML.BankFraud.ra Recommended: Please click “Remove All” button to erase all infected files and protect your PC.
Since System Protection Tools is a fake application, none of such messages should
be taken for granted. If you try to follow any other steps that the message tells you to do, you will end up being
on some payent page that will recommend you purchasing System Protection Tools. It is easy to guess that the program
will only try to get money from you, but none of the promised services will be actually fulfilled. That is the main idea
of the program.
If you get your computer scanned by the scanner of System
Protection Tools you can ignore that scan results the same way you ignore any pop up messages . The purpose of the scanner is the same. It has to create an illusion that your system is infected and later make you purchase System Protection
Tools as the program to solve your security issues. When the program gets inside it actually creates following harmless
files on your disc:
%UserProfile%\Recent\ANTIGEN.exe %UserProfile%\Recent\eb.exe %UserProfile%\Recent\exec.sys %UserProfile%\Recent\hymt.drv %UserProfile%\Recent\kernel32.exe
These files detected at %UserProfile%\Recent\ are
completely harmless. The reason why they are created and displayed is because System Protection Tool wants you to believe
your system is infected and later get money from you.
You must run a full system scan with a reputable antispyware
program, for example Spyhunter or Spyware Doctor version 2012 in order ot remove System Protection Tools as soon as you detect it on your
system. It is very likely that System Protection Tools will block your legitimate antispyware. In this case you can fake
register it with this code: 0W000-000B0 -00T00-E0020.
One should not trust generic, unbranded programs like
System Protection Tools. These programs choose names so they users have problems to read more information and thus be warned about particular scam. Even if program claims to be made by Microsoft, etc. you should investigate.

6:47 pm edt
Smartphone Development Threat
05/28/2012 - The Open Source Security Threat
Fast moving mobile phone development has made Open
Source software development a popular approach. One particular reason for the popularity of open-source in organizations
is that it has been proven to cut costs. The value of this development methodology is not just the design of the
software but the marketing opportunity it provides to organizations and individuals. Open source platforms are provided
by Google (Android), and Apple (iPhone).
The open source model allows much greater creativity
as it differs from the more corporate centralized development models that have been used to date (BlackBerry is an example).
The essence of open source is public collaboration which results with a peer production development of open source
software in particular in the mobile phone software industry.
Fast Development
The open source community is developing very
fast these days, galvanized by mobile phone developers. Open source software development however, does have potential
security risks both for corporations and individuals. Too often the open source communities that offer their software for free don't appear to be as mindful of security practices as their commercial counterparts, which charge for software
and support.
New prospects for social engineering, such as figuring
out when you are away from your home for crime purposes (sites like PleaseRobMe.com) do just this. Of the same ilk, facial recognition technology and the tagging of users in photos on social media sites blur the work- home boundaries even
more. For example, police officers have already come under attack, after their identities were breached by social media
and facial recognition technology.
Near Field Contact
NFC (Near Field Contact) technology is an interesting
example of innovative technology that aims to deliver convenience for consumers. However, it will introduce a new dimension
of challenges for security professionals making mobile devices much more interesting as a target to steal money.
There is a push to build NFC technology into mobile devices, enabling users to make payments or pass on personal information
with a simple swipe of a mobile device over a reader. This will further transform the smartphone into the single device
from which most aspects of your life are driven making it even more attractive to cybercriminals.
Third Party Applications
Mobile devices are also starting to define their
architectures based on modern working practices - BlackBerry (for example), has introduced a feature which provides two
isolated working environments on the same device (sandboxing), allowing you to separate work and play data. Even
those with a strong security reputation like BlackBerry have been victims (of exploitation and breaches) too. While malware
attacks for mobile devices are undoubtedly different, they are still entirely possible.
There are those that believe that the open source nature
of Linux (for example) provides a primary vehicle for making security vulnerabilities easier to identify and fix. The
main advantage here is that the community can review the source code and make the code more secure, which in turn
facilitates potential security best practices. Users and time will decide whether this is actually the case. The advent
of social websites such as Facebook, MySpace and Twitter have led to a surge in third party application development for
desktops, laptops, tablets and smartphones.
Facebook & Third Party
Facebook, the fastest growing of these social
websites allows publishers to develop third party applications to improve the Facebook experience. Closer inspection
of most third party applications reveal to the users that they all require your 'login and password' details. It appears that most Facebook users don't believe this is a risk to their identity. Maybe it isn't, but how do you manage the
risk of your 'login and password' details falling into the hands of a cybercriminal? The major risk is if you are paying
for third party software, the software might steal your financial login data as well as installing malicious software
on your smartphone. The final infiltration will occur (as the last security flaw) when the mobile user connects to their
PC via either Bluetooth or USB, and you receive a cross platform infection from the third party software to your
PC. There are no instances I know of where this has happened yet, but in time this attack vector will surely appear.
In Conclusion
It is the development of open source software
that may well lead to these security issues and many others to be discovered. New functionality breeds fresh opportunities
for the bad guys. New features like augmented reality, facial recognition and integrated social media could leave users open to new kinds of abuse. Augmented reality, for example, connects location information with a user's social
media "friends", enabling them to identify digital contacts nearby. We will find out in the coming years whether
open source software development has opened up a security hornets nest. Users meanwhile, need to embrace the Security
Suites offered by companies like Bullguard, Kaspersky Mobile 9, ESET, Panda, AVG, Trend Micro, Webroot, F-Secure,
Norton, etc. to lock down their systems.
6:26 pm edt
5/26/2012
The Mobile Phone Tracking Threat
05/26/2012 - Fixing A Position
The
Signals Intelligence community has a discipline which is called Radio Direction Finding. Basically, if you can determine
the strongest point of a signal from a fixed position, you have obtained what is known as a Line Of Bearing (LOB). If
you can determine the strongest point of a signal from two fixed positions resulting in an intersection, you have obtained
what is known as a cut (usually a fixed point within a couple of grids of the actual transmitter). If you can determine
the strongest point of a signal from three or more fixed positions (triangulation), you have obtained what we call a
fix (unusually a location between ten feet to a grid). A fix is generally actionable intelligence which (guided by collateral
information) can result in the deployment of ground or air assets for the capture, disabling or destruction of the target transmitter.
This battle field discipline is now being employed by
governments, intelligence, law enforcement, and mobile communications companies against organizations and individuals
within the commercial environment. The FCC, government Intelligence, commercial, and mobile companies can fix you
in a room in a particular building. Most people do not realize their communications device is also a tracking device.
There are many entities who can obtain a fix on your mobile.
Location Tracking
The
future is mobile, in fact so much more so that anyone could have imagined. There are more mobile handsets (1.05 billion
in 2008) in the world than computers (1 billion in 2008) however smartphones only account for 13% of the global market
.
Mobile phone tracking is not a new concept. In fact mobile
phones have been tracked by the mobile phone organizations using cellular triangulation, EMEI (handset identification)
and IMSI (SIM card identification) numbers and GPS since the advent of the second generation mobile cellular network.
In recent times this has also included Wi-Fi, where GSM or GPS is not available. Lets take a look at some of the deveopments
of the three primary location based tracking methods used in the US.
The Methods
There are three basic tracking methods. The first tracking method involves the network. Tracking is achieved through
either cell identification (using EMEI and/or IMSI identification) or the most accurate - triangulation. Another deciding
factor regarding network accuracy is the dependence on the concentration of cellular base stations, with urban areas
usually achieving the highest concentration.
The second tracking method is Mobile based. This involves
installation of client software on the mobile phone to determine its location. This current technique involves a number
of computations on the mobile, which include cell identification and signal strength. The mobile will also check
whether it has a GPS module installed. The location data of the mobile is then sent to a location server. This approach
more or less only works on the latest of smartphones, i.e. Symbian S60, Windows Mobile, iPhone and Google Android operating
systems.
The final tracking method is the Hybrid based approach.
This uses a combination of the network and mobile approach for location determination, referred to in mobile circles
as Assisted GPS, which means it uses both GPS and network information to calculate the cellular location. Basically,
you can see how this approach is the most accurate of the three. This approach is what is leading some marketing agencies
and Cybercriminals to believe that this may well lead to quite different but financial rewarding opportunities.
Google Latitude
Google (for obvious reasons) is one of the pioneers of
mobile triangulation, (or shall we say mobile phone tracking as can be seen with Google Maps). Google Latitude, however,
is one of their more recent innovations and looks most interesting of all (it doesn't require any GPS technology).
Simply put, Latitude works by checking Google Maps on a phone and looks for your best contact, and assuming their mobile
phone is switched on, it locates your contact at home. It doesn't use mobile triangulation, which would be a major privacy
concern for most users.
So in this event, the actual threat from eavesdroppers
, proximity marketers and crackers is minimal for now. Of course most people suspect Google will want to cooperate with
the mobile phone operators. If they decide to go down this road in the not to distant future, users are advised
to prepare to protect themselves. In which case there is a real possibility, Google will know all they need to about
the individual.
Google Search for mobile is very popular and if you have
not noticed this also comes with a My Location option. By default this is off (this is an opt-in, not double opt-in which
is a shame), but if you want to have this on, it will locate your mobile phone using triangulation. It's not overly intrusive, however, if the end-user is unaware of how or where there location data might go, it might just end up being
a privacy issue.
A good example of My Location tracking your every step
is when a mobile user is wandering around a city, just be pressing update on your phone. Google will provide with search
listing, for local businesses and other relevant venues. This is an excellent example of how tracking technology
helps you find yourself in the digital world. Google has to keep people in position to see advertising (and they are
not alone in this thinking either - for obvious financial reasons), so it needs to make sure users use its Web services
anytime, anywhere.
Third Party Software
The main threat is that many of the users of the billions
of mobiles in use today do not utilize any third party security to lock their systems down. The reality is that users
need to find and implement third party security expertise to brace their systems for the commercial intrusions and
malware attacks about to be unleashed on the community.
6:25 pm edt
Mobile Phones (an Exploit of Opportunity)
05/26/2012 - Retailers look to Location Based Tracking
Interestingly, when you walk into a Walmart,
Target, Kmart or Mall, most consumers do not notice that the layout of the retail products is constantly changing. Depending
on the season holiday or buying trends, the management seems to constantly be in a state of change when it comes
to the priorities of what their patrons are looking for and purchasing. Some may believe this is based exclusively on
experience (when it comes to the shoppers habits). The information brokers will not tell you that this is just another
battle ground for your digital lives (your bank details, work, friends, family, etc.). The handheld device you have in
your purse or wallet features connectivity and constant access to the biggest repository of mankind's knowledge, and
more computing power than the NASA control room for the first moon landing.
Their collection efforts have already allowed crackers
and criminals access to consumers credit card information based on proximity to cards that are not in a protected enclosure.
You can walk by a cracker with the requisite equipment in a common area (retail store, mall, airport) and they can
obtain all of the information they need to replicate your credit card without you presenting the card. Your mobile knows
where you are, where you are supposed to be and who you should be talking to. We can now instantly connect our real lives
to digital information - purchasing tickets, sharing business data or connecting with friends who happen to be nearby.
Tracking Service
There is a growing trend towards using location
based tracking (or what you call a mobile tracking service) within the retail sector. Customers in shopping centers are
being tracked by clever tracking solutions that listen to signals from their mobile phones. This behavior tracking is basically illegal for the federal government to employ but it is a burgeoning market for retailers. While many of us
naturally worry about traditional attacks like malware and phishing on these new devices (and without doubt these issues
do exist), new functionality breeds fresh opportunities for the bad guys.
The technology developed allows shopping center managers
and owners, airport and railway station managers, convention centers, museums and art galleries to understand the way
that customers and passengers flow through their buildings and purchase products. You see evidence of these company
capabilities all over the world. Researchers have proven through surveys that eighty (80%) percent of mobile users keep
their systems on at all times. This makes mobiles prime targets for retailers and crackers.
The monitoring system basically consists of a number
of discreet monitoring units (small boxes on walls) installed throughout a facility calculating the movement of consumers
without the shopper or patron being required to wear or carry any special equipment. The units measure signals from
consumers mobile phones (smartphones) using a unique technology that can locate a consumers position to within one to
two meters. This is a lot more accurate than the triangulation technology used by cellular providers (the government
and law enforcement). The units then feed this data (24 hours a day 7 days a week) to a processing center where the data is audited and analyzed using sophisticated statistical analysis to create continuously updated information on the
flow of shoppers in a center or passengers moving through an airport.
Push Advertising
There is also a company that uses a similar
technology that can be employed for zone based, push advertising (and family/friend finder applications). The push advertising
targets your mobile based on you being present in a particular area, but the family/friend finder application digs a
bit deeper (actually accessing a users contact listings). This information harvesting technology actually allows
mobile advertisers to dynamically define target areas or zones (such as malls or shopping centers) with a geographic
fence and then run ad campaigns by sending messages to subscribers located within the geo-zone.
There is a push to build NFC technology into mobile devices,
enabling users to make payments or pass on personal information with a simple swipe of a mobile device over a reader.
This will further transform the mobile into the single device from which most aspects of your life are driven making
it even more attractive to cyber criminals.
System Accuracy
There is of course the issue of how accurate
these systems are given that mobile phones send infrequent synchronization pulses (normally every two hours mobile phones
send out a Periodic Location Update), rather than continuous signals. Mobile phones primarily do this to save power and then there is the small matter of signal fading which isn't highlighted much these days when the subject of mobile
phone tracking arises.
Only a few years ago enterprises wanted to block social
media sites and non-standard, unmanaged devices. Now we are all consciously trying to embrace these technologies; look
at the number of organizations with teams of people entirely focused on using social media as a channel to market.
A stark contrast to years previous, these changes in technology and business expectations mean a new attitude is needed
to information security. Embrace or die. This change of attitude also impacts the future of mobile security and applications
- the default answer to new technology is becoming yes rather than no.
New Technology
(Mobile applications, the browser and fat clients).
Mobile devices too have been quite disruptive to the technology used to produce applications. Over the past few years
browser-based applications have been challenging the traditional fat client. This is primarily due to their cross platform capabilities and the fact that they can be accessed from anywhere (or any device). Local mobile applications
are now extremely numerous, spurred on by rapid application development frameworks - it's easy to write an app, which
is why you can find an app for anything. These applications can also contain vulnerabilities and there is significant
evidence that even basic legacy security best practice is often not applied, for example, passwords or user data
are often poorly encrypted (if at all). Fat clients and browser clients often provided secure APIs and services for these
functions, which, after years of pain, many are now using (although far from ubiquitous) . Mobile OS's increasingly do
too developers, as yet, are not consistently using them. Due to a lack of transparency, it is unclear how comprehensive application quality checks like Apple's actually are. The so called "walled garden" claims to keep bad applications
out - but in many cases application security seems to let the side down.
In Conclusion
If the companies who offer the Location Based
Service have access to mobile phone data through the mobile phone operators, then yes it is feasible that even with a
unique identifier (not an IMEI (unique cell id) or IMSI (sim card)) they will indeed be able to learn a lot of information about individuals. Governments and Cybercrime Organizations (who can afford the equipment) can access your system as
long as it has power provided (this is another conversation altogether). If you want to avoid the casual cracker or you
are worried about retailers tracking your mobile, your best bet is to just switch it completely off when you go shopping.
Human behavior has noted (and surveys have proven) that eighty percent of the individuals in commercial and shopping
centers have their mobile phones on always. This is what has caught the eye of retailers and managers with proximity
marketing and made it a target of potential for cybercriminals (an exploit of opportunity).
5:59 pm edt
Eradicating the Happili Redirect Virus
05/26/2012 - Happili redirect virus is a browser hijacker
which redirects searches of google.com to happili.com
and some other random pages. It’s very hard to detect the infiltration of this
malicious software, and it can come
bundled with other types of malware which comes with compromised downloads. It is almost impossible to search with google when you’re infected with this virus.
Happily redirect virus does affect Macs too. First thing you need to do is to update Java as this virus uses Java to infect Mac and PC computers. It will be a hard task to
remove this infection because it is used with
zeroaccess malware, which is one of the most serious malware infections to infiltrate a computer system. Special tools are required to remove the Happily redirect virus.
Here are removal options for PC users:
Symantec offers ZeroAccess Fix Tool. This tool can detect and remove the infection, but it might not work with Happili redirect virus and other patest variants
Kaspersky offers TDSSKiller. This utility
does find the infection and kill all malicious DLL's.
Webroot has developed its
own tool to remove special viruses like this.
After using any of tools mentioned above, you need to scan your system
with reputable anti -spyware software, like the
automatic removal tools listed below to remove this infection.
Removal instructions for
MAC users:
First, you MUST update JAVA. The Java security update removes the most common variants of the Flashback malware. Apple support provides this information.
F-secure developed flashback removal tool which can identify the Happily
redirect virus and
remove it. Please DO NOT try manual removal if you are not an advanced MAC user extremely
familiar with the system. When a computer is infected with Hapili redirect virus, the user is taken to a website which is not the link that was shown when clicking on google search results. These redirected
pages might infect your PC even more. The only way
to stop this browser hijacker is to stop it from executing and removing it from your system. Detailed information is available with an article titled "What To Do When Google/Yahoo/Bing results are redirecting". To remove it you
have to run a full system scan with a reputable
anti-spyware software (Mac versions of Kaspersky, Norton, Trend Micro, ESET and Panda are available for download). That will fix Hapily redirect virus.
5:29 pm edt
5/21/2012
Mobile Security Threat
05/21/2012 - The Mobile Threat
Modern mobile platforms tend to include capabilities
like sandboxing technology which can isolate applications. The access control and permission systems have undergone drastic changes from the typical operating systems. Rather than a permissions system which is based on access to arbitrary
items like registry keys, they instead focus on more human access permissions, such as whether an application needs to
access your location data or SMS messages.
The mobile phone features which have been at most risk
are text messaging (using social engineering), contacts lists, video and buffer overflows. GSM, GPS, Bluetooth, MMS and
SMS have indeed been the attack vectors. The Malware trend has continued to show an upward trend, but that doesn't
mean the Malware is actually a real threat to mobile phones. The important point to note here is that mobile phones are
trying to avoid the same security problems currently plaguing PCs.
Attack Vector Options
Bluetooth requires the user to accept the incoming
message, so this attack vector is less of a threat. The GSM and GPS risks are predominantly associated with tracking
your mobile movement, using triangulation. Most users currently appear to be happy or unaware of what and where
data from their mobile phones actually goes. There is also a threat that spyware might also be installed to collect stealthy
mobile phone tracking data.
The major attack vectors is therefore probably via SMS,
MMS or mobile email client. All three attack vectors involve attempting to find ways to steal mobile phone data such
as contacts and sensitive financial data by installing third party behavioral monitoring applications, malware and tracking solutions by sending the user an email with a hyperlink to a website. The user is then asked to download the
third-party application which unbeknown to them may contain malware or spyware which monitors every website they visit,
installs malicious malware and monitors which advertisements users click on.
Different Architecture For A Different Time
Mobile devices are not just a smaller version
of the traditional PC, even though they increasingly perform an identical set of tasks. The underlying operating systems,
from Symbian, Android, iOS and Windows Mobile, are built fundamentally differently to PCs and manufacturers have introduced
new concepts based on lessons learned from traditional operating systems over many years of computing.
To understand the mobile threat, you will first need
to identify the prominent mobile platform which in this case is currently Symbian. Remember that Symbian is not open
source software, so the actual threat of malware attack is relatively small. Open Source software application development
is one of the fastest mobile growth areas at the moment (thanks in part to the iPhone which galvanized the smartphone
industry). This has signified a major expansion for cyber criminals, from attacking just PCs, to attacking smartphones
and tablets, especially devices that use open-source software like the Android and Linux.
Legacy Symbian Attack
The Symbian OS has a program called Symbian
Signed which digitally signs applications that meet the approval of Symbian. The systems under attack used Symbian along
with the services of Finnish anti-virus vendor F-Secure in order to scan applications for malware. This system was abused by a cracker when Symbian actually signed programs (Sexy view and Sexy space ... both worms) after the publisher
used the express signing procedure on Symbian where most applications are (software) analyzed rather than checked by
humans to find out if malware was present.
In this particular instance the following day the signing
was revoked both for the content certificate and the publisher certificate. If Symbian mobile users had downloaded the
Sexy applications and the revocation checking was turned on then the Symbian installer would not have installed
the rogue malware application. (Of note). This clearly shows the signing process does work, but also highlights that
the Symbian signing authority does indeed have a gatekeeper with the digital signature or certificate signing process
in place as well as guarding against publisher abuse and the threat of malicious tracking and malware installation.
The signing authority not only signs the applications
but it also uses a mobile phone browser to ensure authenticity of the signature or certificate (this doesn't appear to
happen with all Symbian applications though). As with the Sexy applications incident, the certificate and signature
was revoked, showing that the signing authority did indeed appear to work.
Another company that operates a certification process
is Apple with the iTunes App store (which has billions of downloads). Apple retains control over all applications it
allows onto its platform. Users can only access the App Store and download or purchase apps using iTunes. Developers must also submit apps to Apple for review and approval before Apple publishes them. There are of course ways around
everything and Apple developers have setup a rival app store called Cydia, however iPhone users will have to jailbreak
their phone - this process involves hacking the system and circumventing controls put in place by Apple.
Malware, Cracking And Phishing
There have of course been examples of malicious
code for a variety of platforms but this is minimal (two hundred different signatures have appeared in five years, (between
2004 and 2009) compared to over 200,000 PC malware strains per month) when compared to that targeting the conventional
PC. Android, in particular, has suffered more attacks from malicious code due to its more open application market, although
even those with a strong security reputation like BlackBerry have been victims too. While malware attacks for mobile
devices are undoubtedly different )from PC attacks) they are still entirely possible.
Mobile malware seen to date includes fake internet banking
applications which steal your credentials and your money, and in some cases your authentication token code sent by a
bank via SMS.
Many assume the smartphones and tablets are eminently
secure because they have never experienced malware. The reality is that until recently most of us were not placing data
on these devices that was worth stealing. Now that these devices contain valuable assets (as increasingly we use
the device as a part-time replacement for the PC) the bad guys are paying attention. We are seeing a significant increase
in the volume of malware targeting these devices. Anti-virus are available (through companies like Bullguard, Kaspersky
Mobile 9, ESET, Panda, AVG, Trend Micro, Webroot, F-Secure, Norton, etc.) and important, though the defense technologies
work differently to the PC - focusing more on reputation and behavior rather than traditional content security.
In Conclusion
PC malware infects a PC silently and stealthily,
whereas most mobile malware requires the mobile phone user to confirm that the user wants to install it (you can refer
to this as a Trojan for example). This malware model (which is the primary one in circulation to date), assumes that
the mobile phone doesn't have any security controls. The main threat is that many of the billions of mobiles in use today
do not utilize any third party security to lock their systems down. The reality is that users need to find and implement
third party security expertise to brace their systems for the malware attacks about to be unleashed by the cybercriminal community.
10:32 pm edt
5/13/2012
Smartphone Attack Vectors
05/13/12 - The Mobile Threat
Modern mobile platforms tend to include capabilities
like sandboxing technology which can isolate applications. The access control and permission systems have undergone drastic changes from the typical operating systems. Rather than a permissions system which is based on access to arbitrary
items like registry keys, they instead focus on more human access permissions, such as whether an application needs to
access your location data or SMS messages.
The mobile phone features which have been at most risk
are text messaging (using social engineering), contacts lists, video and buffer overflows. GSM, GPS, Bluetooth, MMS and
SMS have indeed been the attack vectors. The Malware trend has continued to show an upward trend, but that doesn't
mean the Malware is actually a real threat to mobile phones. The important point to note here is that mobile phones are
trying to avoid the same security problems currently plaguing PCs.
Attack Vector Options
Bluetooth requires the user to accept the incoming message, so this attack vector is less of a threat. The GSM
and GPS risks are predominantly associated with tracking your mobile movement, using triangulation. Most users currently
appear to be happy or unaware of what and where data from their mobile phones actually goes. There is also a threat that
spyware might also be installed to collect stealthy mobile phone tracking data.
The major attack vectors is therefore probably via SMS,
MMS or mobile email client. All three attack vectors involve attempting to find ways to steal mobile phone data such
as contacts and sensitive financial data by installing third party behavioral monitoring applications, malware and tracking solutions by sending the user an email with a hyperlink to a website. The user is then asked to download the
third-party application which unbeknown to them may contain malware or spyware which monitors every website they visit,
installs malicious malware and monitors which advertisements users click on.
Different Architecture For A Different Time
Mobile devices are not just a smaller version
of the traditional PC, even though they increasingly perform an identical set of tasks. The underlying operating systems,
from Symbian, Android, iOS and Windows Mobile, are built fundamentally differently to PCs and manufacturers have introduced
new concepts based on lessons learned from traditional operating systems over many years of computing.
To understand the mobile threat, you will first need
to identify the prominent mobile platform which in this case is currently Symbian. Remember that Symbian is not open
source software, so the actual threat of malware attack is relatively small. Open Source software application development
is one of the fastest mobile growth areas at the moment (thanks in part to the iPhone which galvanized the smartphone
industry). This has signified a major expansion for cyber criminals, from attacking just PCs, to attacking smartphones
and tablets, especially devices that use open-source software like the Android and Linux.
Legacy Symbian Attack
The Symbian OS has a program called Symbian
Signed which digitally signs applications that meet the approval of Symbian. The systems under attack used Symbian along
with the services of Finnish anti-virus vendor F-Secure in order to scan applications for malware. This system was abused by a cracker when Symbian actually signed programs (Sexy view and Sexy space ... both worms) after the publisher
used the express signing procedure on Symbian where most applications are (software) analyzed rather than checked by
humans to find out if malware was present.
In this particular instance the following day the signing
was revoked both for the content certificate and the publisher certificate. If Symbian mobile users had downloaded the
Sexy applications and the revocation checking was turned on then the Symbian installer would not have installed
the rogue malware application. (Of note). This clearly shows the signing process does work, but also highlights that
the Symbian signing authority does indeed have a gatekeeper with the digital signature or certificate signing process
in place as well as guarding against publisher abuse and the threat of malicious tracking and malware installation.
The signing authority not only signs the applications
but it also uses a mobile phone browser to ensure authenticity of the signature or certificate (this doesn't appear to
happen with all Symbian applications though). As with the Sexy applications incident, the certificate and signature
was revoked, showing that the signing authority did indeed appear to work.
Another company that operates a certification process
is Apple with the iTunes App store (which has billions of downloads). Apple retains control over all applications it
allows onto its platform. Users can only access the App Store and download or purchase apps using iTunes. Developers must also submit apps to Apple for review and approval before Apple publishes them. There are of course ways around
everything and Apple developers have setup a rival app store called Cydia, however iPhone users will have to jailbreak
their phone - this process involves hacking the system and circumventing controls put in place by Apple.
Malware, Cracking And Phishing
There have of course been examples of malicious
code for a variety of platforms but this is minimal (two hundred different signatures have appeared in five years, (between
2004 and 2009) compared to over 200,000 PC malware strains per month) when compared to that targeting the conventional
PC. Android, in particular, has suffered more attacks from malicious code due to its more open application market, although
even those with a strong security reputation like BlackBerry have been victims too. While malware attacks for mobile
devices are undoubtedly different )from PC attacks) they are still entirely possible.
Mobile malware seen to date includes fake internet banking
applications which steal your credentials and your money, and in some cases your authentication token code sent by a
bank via SMS.
Many assume the smartphones and tablets are eminently
secure because they have never experienced malware. The reality is that until recently most of us were not placing data
on these devices that was worth stealing. Now that these devices contain valuable assets (as increasingly we use
the device as a part-time replacement for the PC) the bad guys are paying attention. We are seeing a significant increase
in the volume of malware targeting these devices. Anti-virus are available (through companies like Bullguard, Kaspersky
Mobile 9, ESET, Panda, AVG, Trend Micro, Webroot, F-Secure, Norton, etc.) and important, though the defense technologies
work differently to the PC - focusing more on reputation and behavior rather than traditional content security.
In Conclusion
PC malware infects a PC silently and stealthily,
whereas most mobile malware requires the mobile phone user to confirm that the user wants to install it (you can refer
to this as a Trojan for example). This malware model (which is the primary one in circulation to date), assumes that
the mobile phone doesn't have any security controls. The main threat is that many of the billions of mobiles in use today
do not utilize any third party security to lock their systems down. The reality is that users need to find and implement
third party security expertise to brace their systems for the malware attacks about to be unleashed by the cybercriminal community.

8:24 am edt
Keeping Your Children Safe Online
05/13/12 - Windows 7 Parental Controls
Computers have become essential in the daily lives of most children. School, games, and social networking sites
keep most children online constantly. Excessive amounts of time online, online activity at unusual times of the day and
chat rooms are just some examples the need for parents to learn the best approaches for management of Internet usage.
It seems difficult to control what your child sees online or to set guidelines for how often your child uses the computer,
but parental controls are available to help make your job as a parent easier.
If you want to learn how to set time limits for computer usage and control what games and programs your child can
use (Facebook, YouTube, MySpace, etc), then follow along, and I'll show you what each feature does and how to personalize
it for individual accounts.
Shutting The Illicit Activity Door
You have probably set up a user account for
your self that has administrator status, but if you haven't, do so now. Click 'Start', open the 'Control Panel', and
click 'User Accounts' and 'Family Safety'. 'User Accounts, Manage Another Account, and Create A New Account. From here,
you can create a new user account and set it to Administrator, Click 'Create Account. Moving forward, make sure
you are logged in to the Administrator account so you have the ability to customize settings for Standard accounts.
Next. Go back to the User Accounts And Family Safety
page and click Parental Controls. Click Create A New User Account and set up accounts for each child you want to be able
to monitor. Each new account will automatically appear as a Standard user and can be set up to have passwords attached
to them. Give each account a password to ensure that the accounts stay separate and so that the settings applied to each
one will fit the user that has access to it.
Each
account will allow the user to personalize the Desktop and adjust settings that aren't controlled by the administrator.
This lets the user load his account without having to change his settings each time he logs in.
Locking Out Illicit Activity
When all of the necessary accounts have been created, you'll be ready to customize the parental controls for each
one. Click the account that you want to apply settings to and then select On. Enforce Current Settings under Parental
Controls once you've activated the controls you'll be able to change the settings below Windows Setting by clicking Time
Limits, Games, or Allow And Block Specific Programs.
Start by clicking Time Limits. In the resulting chart, you can set time limits for specific days of the week by
clicking and dragging the mouse cursor over those days and times. This lets you control the time periods in which the
child will be allowed to use the computer. For instance, if you don't want your child to access the computer between
the hours of 5 pm and 8 pm on Monday through Friday, click the box that corresponds to Monday at 5 pm and drag your mouse down to Friday and over to 8pm. The time you have blocked will appear in blue. Click OK to save your changes.
After you've set time limits, you can move on to the next setting: Games. You can decide whether to allow the account
to play games and, if you allow it, select the ratings (based on the ESRB (Entertainment Software Rating Board) system)
that are suitable for the user. You can also block games that have certain types of content, such as alcohol references,
language, or violence. The final steps for this setting are to click Block or Allow specific games, fun down the list
of installed games, and block or allow them separately. If a game doesn't show up on the list, it can be added manually.
You can also adjust settings that control access to the programs on the computer by clicking Allow And Block Specific
Programs, or, as with the Games settings, select individual ones. This is a good way to make sure the child is only using
the programs that you approve of, and it's also a good safety net to ensure that the child doesn't accidentally access
and alter any sensitive files that may be on the computer, such as Quicken files.
You can adjust these settings any time, but only if you are logged in as the administrator. The settings you configure
will go into effect as soon as the user logs in to his account.
Parental Controls Add-Ons
So, you're done setting up parental controls, and you realize that there were no settings specifically for Internet
usage. Luckily, you can visit Microsoft's Web site (www.microsoft.com) and install Windows Live Family Safety free. It
is offered as a standalone program or included with an entire suite of applications called Windows Live Essentials. Windows
Live Family Safety sets you set Internet parameters for individual accounts similar to how the parental controls are set. One of the most helpful features it has to offer is the ability to monitor computer and Internet usage when you
are on a different computer or away form home. To download the Windows Live Essentials suite, go to tinyurl.com/2djztl2.
To download Windows Live Family Safety for just the parental control add-on, visit tinyurl.com/y8qs7rt.
Once downloaded and installed, you can access the program by going back to Parental Controls section of the Control
Panel. Under Additional Controls, select a provider from the drop-down menu (in this case, Windows Live Family Safety
should be selected). Now you will be ready to set up the Internet monitoring features that the program has to offer.
Start by selecting the account you want to make changes to; you will be asked to sign in using a Windows Live ID.
(if you have a Hotmail, Messenger, or Xbox LIVE account, you can sign in with that, but if not, you can easily create
a Live ID from this screen.) On the next screen, select the Monitor Account checkboxes next to the accounts you want
to monitor using Family Safety. Click Next, On the next screen, you must match the Windows accounts with the name of the Family Safety members and then click Save. Now, you can specify the settings for each account.
Select an account and click Windows Live Family Safety under More Settings you are sent to a Web site where you
can sign in and access the settings you want to customize. Click Web Filtering and add Web sites that you want to be
allowed or blocked; Activity Reports to see what Web sites the account has visited, what games have been played, and
how much time was spent on the computer; Contact Management to manage the account's contacts; or Requests to approve
or deny Web site and contact requests that the of the account has made. From this screen, you can repeat this process
for each account by selecting the account name under Family Members; you will be able to save your changes made to each
account before signing out.
Third Party Alternatives
There are many third party software applications available which are dedicated to keeping the internet safe for
families. Cyber Patrol, Net Nanny, and Safeeyes are a few such programs available (with licensing for 3 PCs) to keep
cyber bullies, online predators and scammers away from your children.
Putting It All Together
By combining the parental control settings built into Windows 7 with the optional Windows Live Family Safety settings,
you can oversee almost all of the computer activities of your children. From games to Internet usage, you can have peace
of mind knowing that your family can safely use the computer with just the right amount of freedom.

8:05 am edt
5/6/2012
Removing The Happili Redirect Virus
05/06/12 - Happili redirect virus is a browser hijacker which redirects
searches of google.com to happili.com and some other random pages. It’s very hard to notice the infiltration of
this malicious software, but it may come bundled with other types of malware which comes with insecure downloads.
It is almost impossible to search with google when you’re infected with this virus.
Happily redirect virus does affect Macs too. First thing you need to do is to update Java as this virus uses Java
to infect Mac and PC computers. It will be a hard tast to remove this infection as it is used with zeroaccess malware,
which is one of the worst malware ever made to the computer system. you will need special tool to remove Happily redirect. Here are
removal options for PC users:
Symantec offers ZeroAccess Fix Tool. This tool can detect and remove the infection, but it might not work with
Happili redirect virus and other patest variants
Kaspersky offers TDSSKiller. This utility does find the infection
and kill all malicious DLL.
Webroot has developed its own tool to remove special viruses
like this. After using any of tools mentioned above, you need
to scan your system with reputable anti -spyware software, like the automatic removal tools listed below to remove this infection.
Removal instructions for MAC users:
First, you MUST update JAVA. The Java security update removes the most common variants of the Flashback malware.
Apple support provides this information.
F-secure developed flashback removal tool which can identify the Happily redirect virus and remove it. Please DO NOT try manual
removal if you are not an advanced MAC user extremely familiar with the system.
When a computer is infected with Hapili redirect virus, the user is taken to a website which is not the link that
was shown when clickin on google search results. These redirected pages might infect your PC even more. The only
way to stop this browser hijacker is to stop it from executing and removing it from your system. Detailed information
is available with an article titled "What To Do When Google/Yahoo/Bing results are redirecting". To remove it you have to run a full system scan with a reputable anti-spyware
software (Mac versions of Kaspersky, Norton, Trrend Micro, ESET and Panda are available for download). That will fix
Hapily redirect

1:22 pm edt
Eradicating Backdoor.Winnti
05/06/12 - Backdoor.Winnti is a malicious Trojan, that opens a backdoor
on the infected PC. This Trojan exploits PDF files when they are opened with Adobe Reader. When this file is executed,
it activates and moves some files in the %System% folder to %Windir% folder. It then modifies those files by infecting
them with malicious code, and executing them. Here are some of the targets: - %System%\winmm.dll
- %System%\secur32.dll
- %System%\compres.dll
- %System%\apphelp.dll
Backdoor.Winnti connects to these domains through http or https and opens backdoors
for hackers: - lp.apanku.com
- ad.jcrsoft.com
- rh.jcrsoft.com
- bot.timewalk.me
- b0t.meibu.com
Here are the action lists of what this malicious Trojan can perform on a compromised
computer: - Create files
- Inject processes with malicious payloads
- Set up drivers
and services
- list, add, delete, and change user accounts
- Stop the Windows firewall
- Provide shell access on the compromised computer
- Create
and manage a proxy server with ZXSocs Proxy v1.2
- Uninstall
itself
- Send system information to the remote attacker,
including:
- OS
- List CD ROM, remote, fixed, and removable drives
- Current
display mode
- Number of processors
- System directory
- Uptime
- Current user
- Host name
- Organization
- Owner
- Product ID
- Amount of RAM
- CPU
Please use one of
the automatic removal tools listed below to eradicate this parasite.

1:19 pm edt
RemovingTrojan.Cleaman
05/06/12 - Trojan.Cleaman is a trojan that maliciously redirects browser traffic from specific search
engines. It is known to spread using email attachments, compromised websites or other downloadable malware. Sometimes
it uses an invalid digital certificate to trick the user into thinking that it is legitimate. In addition, it attaches
itself to all running processes. Every new process or library launches with the attached code also.
Trojan.Cleaman hides in files called “dplayx.dll”
and “dplaysvr.exe”, which include nonmalicious and legitimate files, so that it won’t be seen on an
infected machine. Also, it attaches itself to following Windows API’s: - ntdll.NtResumeThread
- ntdll.NtEnumerateValueKey
- ntdll.NtQuerySystemInformation
- ntdll.LdrLoadDll
- kernel32.FindFirstFileA
- kernel32.FindNextFileA
- kernel32.FindFirstFileW
- kernel32.FindNextFileW
- ws2_32.connect
Trojan.Cleaman checks every requested domain, and if it finds out that the domain
is a search engine from the list below, it redirects browser traffic to a different IP. - www.google.com
- www.bing.com
- search.yahoo.com
This
threat also contacts these IP’s: - 66.85.153.132
- 94.63.147.17
Please use one of the
automatic removal tools listed below to locate and eradicate this parasite as soon as possible.

1:15 pm edt
Eradicating The Backdoor.Barkiofork
1:13 pm edt
5/2/2012
The Smartphone Development Threat
05/01/12 - The Open Source Security Threat
Fast moving mobile phone development has made Open
Source software development a popular approach. One particular reason for the popularity of open-source in organizations
is that it has been proven to cut costs. The value of this development methodology is not just the design of the software
but the marketing opportunity it provides to organizations and individuals. Open source platforms are provided by Google
(Android), Palm (GNU/Linux), Nokia (Maemo) and Apple (iPhone).
The open source model allows much greater creativity as it differs from the more corporate centralized development
models that have been used to date (BlackBerry is an example). The essence of open source is public collaboration which
results with a peer production development of open source software in particular in the mobile phone software industry.
Fast Development
The open source community is developing very fast these days, galvanized by mobile phone developers. Open source
software development however, does have potential security risks both for corporations and individuals. Too often the
open source communities that offer their software for free don't appear to be as mindful of security practices as their
commercial counterparts, which charge for software and support.
New prospects for social engineering, such as figuring
out when you are away from your home for crime purposes (sites like PleaseRobMe.com) do just this. Of the same ilk, facial
recognition technology and the tagging of users in photos on social media sites blur the work-home boundaries even
more. For example, police officers have already come under attack, after their identities were breached by social media
and facial recognition technology.
Near Field Contact
NFC (Near Field Contact) technology is an interesting
example of innovative technology that aims to deliver convenience for consumers. However, it will introduce a new dimension
of challenges for security professionals making mobile devices much more interesting as a target to steal money.
There is a push to build NFC technology into mobile devices, enabling users to make payments or pass on personal information
with a simple swipe of a mobile device over a reader. This will further transform the smartphone into the single device
from which most aspects of your life are driven making it even more attractive to cybercriminals.
Third Party Applications
Mobile devices are also starting to define their
architectures based on modern working practices - BlackBerry (for example), has introduced a feature which provides two
isolated working environments on the same device (sandboxing), allowing you to separate work and play data. Even
those with a strong security reputation like BlackBerry have been victims (of exploitation and breaches) too. While malware
attacks for mobile devices are undoubtedly different, they are still entirely possible.
There are those that believe that the open source nature
of Linux (for example) provides a primary vehicle for making security vulnerabilities easier to identify and fix. The
main advantage here is that the community can review the source code and make the code more secure, which in turn facilitates potential security best practices. Users and time will decide whether this is actually the case. The advent
of social websites such as Facebook, MySpace and Twitter have led to a surge in third party application development for
desktops, laptops, tablets and smartphones.
Facebook & Third Party
Facebook, the fastest growing of these social
websites allows publishers to develop third party applications to improve the Facebook experience. Closer inspection
of most third party applications reveal to the users that they all require your 'login and password' details. It appears that most Facebook users don't believe this is a risk to their identity. Maybe it isn't, but how do you manage the
risk of your 'login and password' details falling into the hands of a cybercriminal? The major risk is if you are paying
for third party software, the software might steal your financial login data as well as installing malicious software
on your smartphone. The final infiltration will occur (as the last security flaw) when the mobile user connects to their
PC via either Bluetooth or USB, and you receive a cross platform infection from the third party software to your PC. There are no instances I know of where this has happened yet, but in time this attack vector will surely appear.
In Conclusion
It is the development of open source software
that may well lead to these security issues and many others to be discovered. New functionality breeds fresh opportunities
for the bad guys. New features like augmented reality, facial recognition and integrated social media could leave users open to new kinds of abuse. Augmented reality, for example, connects location information with a user's social
media "friends", enabling them to identify digital contacts nearby. We will find out in the coming years whether
open source software development has opened up a security hornets nest. Users meanwhile, need to embrace the Security
Suites offered by companies like Bullguard, Kaspersky Mobile 9, ESET, Panda, AVG, Trend Micro, Webroot, F- Secure,
Norton, etc. to lock down their systems.
3:40 am edt
|
|
Q. How do I avoid rogue antispyware and antivirus software? A. Make sure you 'Choose Industry Certified "Security Program"
Solutions'! If your PC is connected to
the internet, uses e-mail, has software of an unknown origin
installed and comes into contact with recordable media (jump drives, dvd's, cd's, etc) Antispyware and Antivirus protection is a requirement. They help prevent attacks through e-mail (and/or attachments sent with e-mail) and surfing the web.
They also help you eradicate infections which are the result
of security holes and bugs in software. (The e-mail, web surfing
and software holes and bugs result in the most serious internet
attacks). One
way to know you're purchasing a trustworthy application is to confirm that the program
you choose has earned certification from the leading labs.
Industry certification
from ICSA Labs, Virus Bulletin, West Coast Labs, the National Association
of Specialist Computer Retailers, and others all require antispyware/ antivirus programs to meet stringent requirements to receive certification.
Smartphone and Tablet Tips to create a safe passcode. Smartphones and tablets open the
door to your Work, friends, family, bank details, etc... No matter which device you use, follow these tips to keep your data secure.
1. Always use a passcode. If someone gets hold of your device, the person has immediate access to your apps and
data. 2. Make your passcode difficult to guess. Codes such as 1234 or 2580 can be cracked in seconds. Go for something that’s
unique but easy for you to remember. 3. Longer is stronger. The longer the passcode, the harder it is to crack. Make yours a minimum of six
digits. 4. Mix numbers and letters. If your device allows, use a passcode that combines numbers, letters and punctuation. Avoid dictionary words and
choose a memorable combination. 5. Make it unique. Don’t use the same passcode for anything else, including other devices,
bank cards or online accounts. That way, if one passcode gets hacked the rest stay secure.
6. Be discreet. Look around and make sure no one is watching you enter your passcode, just as
you would protect your PIN at the ATM machine.
Q. What steps need to be taken to secure
mobile devices (smartphones) for personal/work phones and
tablets.
A. Follow these steps to secure your mobile
devices. 1. Secure your device a.
Always lock it
b. Apply a complex passcode
c. Shield your passcode
d. Apply the latest patches
2.
Prevent Malware Infections a.
Don't click on unsolicited links
b. Think before downloading apps
c. Don't "jailbreak" or "root" your mobile
3.
Be data aware a.
Be careful what you share
b. Encrypt sensitive data
4. Stay compliant
a. Know and follow your organizations security
policies
Q. Do you have an example of an Organizational 'Mobile Device Security Policy'
A. Here is EZMobilePC's policy.
1.
Introduction Mobile devices, such as smartphones and tablet computers, are important tools for the organization and their use
is supported to achieve business goals. However, mobile devices
also represent a significant risk to information security and data security as, if the
appropriate security applications and procedures are not applied, they can be a conduit for
unauthorized access to the organization’s data and IT infrastructure.
This can subsequently lead to data leakage and system infection.
EZMoblePC has a requirement to protect its information assets in order to safeguard its customers, intellectual property and reputation. This document outlines a set of practices and requirements for the safe use of mobile devices. 2.
Scope
1. All mobile devices, whether owned by EZMoblePC or owned by employees, that have
access to corporate networks, data and systems, not including corporate IT-managed
laptops. This includes smartphones and
tablet computers. 2. Exemptions: Where there is a business need to be exempted from this
policy
(too costly, too complex, adversely impacting other business requirements) a risk assessment
must be conducted being authorized by security management.
3. Policy - Technical Requirements
1.
Devices must use the following Operating Systems: Android 2.2 or later,
iOS 4.x or later.
2. Devices must store all user-saved passwords in an encrypted password store.
3. Devices must be configured with a secure password that complies with EZMoblePC's
password policy. This password must not be the same as any other credentials used
within the organization.
4.
With the exception of those devices managed by IT, devices are not allowed to be
connected directly to the internal corporate network.
3.1 User Requirements 1.
Users must only load data essential to their role onto
their mobile device(s).
2.
Users must report all lost or stolen devices to EZMoblePC
IT immediately.
3.
If a user suspects that unauthorized access to company
data has taken place
via a mobile device, they must report the incident in alignment
with EZMoblePC’s
incident handling process.
4. Devices must not be “jailbroken”* or have any software/firmware installed
which
is designed to gain access to functionality not intended to be
exposed to the user.
5.
Users must not load pirated software or illegal content
onto their devices.
6.
Applications must only be installed from official platform-owner
approved sources.
Installation of code from un-trusted sources is forbidden.
If you are unsure if an
application is from an approved source contact EZMoblePC IT.
7. Devices must be kept up to date with manufacturer or network provided patches.
As a minimum patches should be checked for weekly
and applied at least once a month.
8.
Devices must not be connected to a PC which does not
have up to date and enabled
anti-malware protection and which does not comply with corporate
policy.
9.
Devices must be encrypted in line with EZMoblePC’s
compliance standards.
10.
Users may must be cautious about the merging of personal
and work email accounts on
their devices. They must take particular care
to ensure that company data is only sent
through the corporate email
system. If a user suspects that company data has been sent
from a personal email account, either in body text or as an attachment, they must notify
EZMoblePC IT immediately.
11.
(If applicable to your organization) Users must not
use corporate workstations to backup or synchronize device content such as media files, unless such content is required
for legitimate business purposes. *To jailbreak a mobile device is to remove the limitations imposed by the manufacturer. This gives access to the operating system, thereby unlocking all its features and enabling the installation of unauthorized software.
Q. What is the first thing I should
do when I turn on my computer.
A. Back up important files
If you follow these tips, you're more likely to be free of interference from
hackers,
viruses,
and spammers. But no system is completely secure. If you have important files stored on your computer, copy them onto a removable disc or
an external
hard
drive, and store it in a safe place.

Q. How do I protect my password? A. Protect your passwords
Keep your passwords in a secure place, and out of plain sight. Don't share them
on the Internet, over email, or on the phone. Your Internet Service Provider (ISP)
should never ask for your password. In addition, hackers
may try to figure out your passwords to gain access to your computer. To make it tougher for
them:
Use passwords that have at least eight characters and include numbers or symbols.
The longer the password,
the tougher it is to crack. A 12-character password is
stronger than one with eight characters.
Avoid common word: some hackers
use programs that can try every word in the dictionary.
Don't use your personal information, your login name, or adjacent keys on the
keyboard as passwords.
Change your passwords regularly (at a minimum, every 90 days).
Don't use the same password for each online account you access.
Q. What steps need to be taken when
setting up Wireless Home Network Security. 1) Change Default Administrator Passwords (and Usernames)
Changing the default password is important because everyone
that purchases the same Wireless access device, knows your password. 2) Turn on (Compatible) WPA / WEP Encryption
By default, your Wireless device comes
without the encryption enables. WPA / WEP are security programs that forced your computer to provide
an encrypted password before you are allowed access
to the wireless access point. 3) Change the Default SSID
SSID is the network name of your wireless network;
most people leave the default name, such as, Linksys or NetGear. By changing the name, intruders have a more difficult time identifying your system and use known vulnerabilities. (And
of course, use the unchanged default password.) One
mistake people make is naming their home network their family name and or address. When cruising a neighborhood of wireless devices, its always scary to see Bobsnet444.
4) Disable SSID Broadcast
In Wi-Fi networking, the access point or router typically broadcasts
the network name (SSID) over the air at
regular intervals. This feature was designed for businesses and mobile hotspots where Wi-Fi clients may come and go. In the home, this feature is
unnecessary, and
it increases the likelihood an unwelcome neighbor or hacker will try
to log in to your home network.
5) Assign Static IP Addresses to Devices
Most home networkers gravitate toward using dynamic IP addresses.
This means that the IP Address, (the IP
Address is needed to participate on a network.) is typically
assigned automatically. A dynamic IP address on an unsecure system can also supply a hacker with a IP Address. 6) Enable MAC Address Filtering Each piece of Wi-Fi gear possesses a unique identifier called the "physical address" or "MAC address." Access points and routers keep
track of the MAC addresses of all devices that connect to them. Many such products offer the owner an option to key in the
MAC addresses of
their home equipment that restricts the network to only allow connections from those devices. Do this, but also know that the feature is not so powerful as it may seem. Hacker software programs
can fake MAC addresses easily.
7) Turn Off the Network During Extended Periods of Non-Use
The ultimate in security measures for any wireless network
is to shut down, or turn office your wireless access point
when you are not using. You are the most vulnerable at work or asleep, and mischief minded people know it.
8) Position the Router or Access Point Safely
Wi-Fi signals normally reach to the exterior of a home. A small amount
of "leakage" outdoors is not a problem,
but the further this signal reaches, the easier it is for others to detect and exploit. Wi-Fi signals often reach across streets and through neighboring homes. When installing a wireless home network, the position
of the access point or router determines it's reach. Try to position these devices near the center of the home rather than near windows to minimize
this leakage.
Q: What are the first security steps I should take before I connect my computer to the internet?
A: Practices Before You Connect a New Computer to the Internet
We advise home users to download and install software patches as soon as possible after connecting a
new computer to the Internet. However, since the background intruder scanning activity is constant, it may not be possible for the user to complete the download and installation of software
patches before the vulner- abilities they are trying to fix are exploited. We recommend the following actions 'before' connecting computers to the Internet
so
that
users can complete the patching process without incident.
Q. Are there any references you can recommend? A. References: A. Computer Emergency Response Team (CERT) B. Microsoft Windows
C. Apple Macintosh
OSX D. Linux
Q. How do I keep my system up to date once I go online. A. Keep your operating system
and Web browser Up-to-Date, and learn about their security features.
Hackers also take advantage of Web browsers (like Firefox or Internet Explorer) and operating system software
(like Windows or Mac's OS) that don't have the latest security updates. Operating system companies issue security
patches for flaws that they find in their systems, so it's important to set
your operating system and Web browser software to download and install security patches
automatically. In addition,
you can increase your online security by changing the built-in security and privacy settings in your operating system or browser. Check
the "Tools" or "Options" menus to learn how to upgrade from the default
settings. Use your "Help" function for more information about your choices. If you're not using your computer for an extended period, disconnect
it from the Internet. When it's disconnected, the computer doesn't send or
receive information
from the Internet and isn't vulnerable to
hackers.

Q. How do I keep my security software up to date. A. Use security
software that updates automatically Keep
your security software active and current: at a minimum, your computer should have anti-virus and anti-spyware software, and a firewall.
You can buy stand-alone programs for each element or a security suite that includes these programs from a variety
of sources, including commercial vendors or from your Internet Service Provider. Security software that comes pre-installed
on a computer generally works for a short time unless you pay a subscription fee to keep it in effect. In any
case, security software protects against the newest threats only if it is up-to-date. That's why it is critical to set your
security software to update automatically.Some scam artists distribute
malware disguised as anti-spyware software. Resist buying software in response to unexpected pop-up
messages or emails, especially ads that claim to have scanned your computer and detected malware. That's a tactic
scammers have used to spread malware. OnGuardOnline.gov can connect you to a list of security tools from legitimate security
vendors selected by GetNetWise, a project of the Internet Education Foundation.Once you confirm that your security software is up-to-date, run it to scan your computer
for viruses and spyware. If the program identifies a file as a problem, delete it. Anti-Virus Software Anti-virus software protects your computer from viruses that can destroy your data, slow your computer's performance, cause
a crash, or even allow spammers to send email through your account. It works by scanning your computer and your incoming
email for viruses, and then deleting them.
Anti-Spyware
Software Installed on your computer without
your consent, spyware software monitors or controls your computer use. It may be used to send you pop-up ads, redirect your computer
to websites, monitor your Internet surfing, or record your keystrokes, which, in turn, could lead to the theft of your personal
information. A computer may be infected with spyware if
it: Slows down, malfunctions, or displays repeated error messages
Won't shut down or restart
Serves up a lot of pop-up ads, or displays them when you're not surfing the web Displays web pages or programs you didn't intend to use,
or sends emails you didn't write. Firewalls
A firewall helps keep hackers from using your computer
to send out your personal information without your permission. While anti-virus software scans incoming email and files,
a firewall is like a guard, watching for outside attempts to access your system and blocking communications to and from sources
you don't permit. Don't Let Your Computer Become Part of a "BotNet"
Some spammers search the Internet for unprotected computers they can control and
use anony- mously to send spam, turning them into a robot network, known as a "botnet." Also known as a "zombie
army," a botnet is made up of many thousands of home computers sending emails by the millions. Most spam is sent remotely
this way; millions of home computers are part of botnets.Spammers
scan the Internet to find computers that aren't protected by security software, and then install bad software – known as "malware"
– through those "open doors." That's one reason why up-to-date security software is critical.Malware may be hidden in free software applications. It can be appealing to download free software like games, file-sharing
programs, customized toolbars, and the like. But sometimes just visiting a website or down- loading files may cause
a "drive-by download," which could turn your computer into a "bot." Another way spammers take over your computer
is by sending you an email with
attachments,
links or images which, if you click on or open them, install hidden software. Be cautious about opening any attachments or downloading files from emails you receive. Don't open an email attachment —
even if it looks like it's from
a
friend or coworker — unless you are expecting it or know what it contains. If you send an email with an attached file, include a text message explaining what
it is.
Q. What do I do in an emergency?
A. Here is what to do in an e-mergency
If you suspect malware is lurking on your computer, stop shopping, banking, and
other online activities that involve user names, passwords, or other sensitive information. Malware
could be sending your personal information
to identity thieves.
- Confirm that your security software is up-to-date, then use it to
scan your computer.
- Delete everything the program identifies as a problem.
- You may have to restart your computer for the changes to take effect.
- If the problem persists after you exhaust your ability to diagnose and treat it, you
might want to call for professional help.
- If your computer is covered by a warranty that offers free tech support, contact
the manufacturer.
- Before you call, write down the model and serial number of your computer, the
name of any software you've installed, and a short description of the problem.
- Your notes will help you give an accurate description to the technician.
- If you need professional help, if your machine isn't covered by a warranty, or if
your security software isn't doing the job properly, you may need to pay for
technical support.
- Many companies — including some affiliated with retail stores — offer tech
support via the phone, online, at their store, or in your home.
- Telephone or online help generally are the least expensive ways to access
support services — especially if there's a toll-free helpline — but you may
have to do some of the work yourself. -
Taking your computer to a store usually is less expensive than hiring a technician or
repair person to come into your home.
- Once your computer is back up and running, think about how
malware could have been downloaded
to your machine, and what
you could do to avoid it in the future.
- Also, talk about safe computing with anyone else who uses the computer.
Q. Where do I report
Hacking or Malware activity?
A. Here is where to report:
Hacking or a Computer Virus
Alert the appropriate authorities by contacting: Your ISP and the hacker's ISP (if you can tell what it is). You can usually find an ISP's email
address on its website. Include information on the incident from your firewall's log file. By alerting the ISP to the
problem on its system, you can help it prevent similar problems in the future. The FBI at www.ic3.gov. To fight computer criminals, they need to hear from you.
Internet
Fraud If a scammer takes advantage of you through an
Internet auction, when you're shopping
online, or in any other way, report it to the Federal Trade Commission, at ftc.gov. The FTC enters Internet, identity theft, and other fraud-related complaints into Consumer Sentinel, a secure, online database available to hundreds of civil and criminal law enforcement agencies in the U.S. and abroad.
Deceptive
Spam If you get deceptive spam, including email phishing
for your information, forward it
to spam@uce.gov. Be sure to include the full header of the email, including all routing information. You also may report phishing email to of ISPs, security vendors, financial institutions and law enforcement agencies, uses these reports to fight phishing.
Divulged
Personal Information If you believe you have mistakenly
given your personal information to
a fraudster, file a complaint at ftc.gov, and then visit the Federal Trade
Commission's Identity Theft website at ftc.gov/idtheft to learn how to minimize your risk
of damage from a potential theft of your identity.
Parents Parents sometimes can feel outpaced by their technologically savvy kids. Technology aside, there are lessons that parents can teach to help kids stay safer as they socialize online. Most ISPs provide parental
controls, or you can buy separate
software. But no software can substitute for parental supervision. Talk to your kids about safe computing practices, as well as the things they're seeing and doing online.
Social Networking
Sites Many adults, teens, and tweens use social networking sites to exchange information about themselves, share pictures and
videos, and use blogs and private
messaging to communicate with friends, others who share interests, and sometimes even the world-at-large. Here are some tips for parents who want their kids to use these sites safely:
Use privacy settings to restrict who can access and post on your child's website. Some social networking sites have strong privacy
settings. Show your child how to
use these settings to limit who can view their online profile, and explain to them why this is important. Encourage your child to think about the language used in a blog, and to think before posting pictures and videos. Employers, college
admissions officers, team coaches,
and teachers may view your child's postings. Even a kid's screen name could make a difference. Encourage teens to think about the impression that screen names could make. Remind your kids that once they post information online, they can't take it back. Even if they delete the information from a site, older
versions may exist on other people's
computers and be circulated online.
Talk to your kids about bullying. Online bullying can take many forms, from spreading rumors online and posting or forwarding private messages
without the sender's OK, to sending
threatening messages. Tell your kids that the words they type and the images they post can have real-world consequences. They can make the target of the bullying feel bad, make the sender look bad
— and, some- times, can bring
on punishment from the authorities. Encourage your kids to talk to you if they feel targeted by a bully. Talk to your kids about avoiding sex talk online. Recent research shows that teens who don't talk about sex with strangers online
are less likely to come in contact
with a predator.
Tell your kids to trust their instincts if they have suspicions. If they feel threatened by someone or uncomfortable because of something online, encourage
them to tell you. You can then help
them report concerns to the police and to the social networking site. Most sites have links where users can immediately report abusive, suspicious, or inappropriate activity.

Q. What is the best way to keep malware
out.
A.
Try to minimize the threat.
Minimizing
the Effects of Malware on Your Computer
Malware is short for “malicious software;” it includes viruses —
programs that copy themselves without your permission — and spyware, programs installed without your consent to monitor or control your
computer activity. Criminals are hard at work thinking up creative ways to get malware on your computer. They create appealing web sites, desirable downloads, and compelling
stories to lure you to links that will download malware, especially on computers that don’t use adequate security software. Then, they use the malware to
steal personal information, send spam, and commit fraud.It doesn’t have to be that way.
So says a website with tips from the federal government and the technology industry that is helping consumers be on guard against Internet fraud, secure their
computers, and protect their personal malware can wreak, and reclaim their computers and their electronic information. Computers may be infected with malware if they:
-
slow down, malfunction, or display repeated error messages;
- wont shut down or restart; -
serve up a lot of pop-up ads, or display them when youre not surfing
the web;
or
-
display web pages or programs you didnt intend to use, or send emails
you
didnt write.
If you suspect malware
is on your computer
If you suspect malware is lurking on your computer, stop shopping, banking, and other online activities that involve user names, passwords, or other
sensitive inform- ation.
Malware on your computer could be sending your personal information to identity thieves. Then, confirm that your security software is active and current:
at a minimum, your
computer
should have anti-virus and anti-spyware software, and a firewall. You can buy stand-alone programs for each element or a security suite that
includes these programs
from a variety of sources, including commercial vendors or from your Internet Service Provider. Security software that comes pre-installed on a computer
generally works
for a short time unless you pay a subscription fee to keep it in effect. In any case, security software protects against the newest threats
only if it is up-to- date.
Thats why it is critical to set your security software and operating system (like Windows or Apples OS) to update automatically.
Some scam artists distribute malware disguised as anti-spyware software. Resist buying software in response to unexpected pop-up messages or emails,
especially ads
that claim to have scanned your computer and detected malware. Thats a tactic scammers have used to spread malware, and that has attracted the attention
of the Federal
Trade Commission, the nations consumer protection agency, as well as a security tools from legitimate security vendors selected by GetNetWise, a project
of the Internet
Education Foundation.
Once you confirm that
your security software is up-to-date, run it to scan your compu- ter for viruses and spyware. Delete everything the program identifies as a problem.
You
may have to restart your computer for the changes to take effect.If you suspect that your computer still is infected, you may want to run a second anti-spyware
or anti-virus
program. Some computer security experts recommend installing one program for real-time protection, and another for periodic scans of your machine
as a
way to stop malware that might have slipped past the first program.
Finally, if the problem persists after you exhaust your own ability to diagnose and treat it, you might want to call for professional
help. If your computer is covered by a warranty that offers free tech support, contact the manufacturer. Before you call, write down the model and serial number of
your computer, the name of any software you’ve installed, and a short description of the problem. Your notes will help you give an accurate description to the technician.If you need professional help, if your machine isn’t covered by a warranty, or if your security software isn’t
doing the job properly, you may need to pay for technical support. Many companies — including some affiliated with retail stores —
offer tech support via the phone, online, at their store, or in your home. Telephone or online help generally are the least expensive
ways
to access support services — especially if there’s a toll-free helpline — but you may have to do some of the work yourself.
Taking your computer to a store usually is less expensive than hiring a technician or repair person to come into your home.
Once your computer is back
up and running, think about how malware could have been downloaded to your machine, and what you could do to avoid it in the future. If your security software or operating system was
out-of-date, download the newest version and set it to update automatically. Use the opportunity to back up important files by copying them onto a removable disc. Other
ways to minimize the chances of a malware download in the future:
-
Don’t click on a link in an email or open an attachment unless you
know who sent it and what it is. Links in email can send you to sites
that automatically download malware to your machine. Opening
attachments — even those that appear to come from a friend or
co-worker — also can install malware on your computer.
-
Download and install software only from websites you know and trust.
Downloading free games, file-sharing programs, and customized
toolbars may sound appealing, but free software can come with
malware.
-
Talk about safe computing. Tell your kids that some online activity
can
put a computer at risk: clicking on pop-ups, downloading free games or
programs, or posting personal information.
Finally, monitor your computer
for unusual behavior. If you suspect your machine has been exposed to malware, take action immediately. Report problems with malware to your ISP so it can try to prevent similar problems and
alert other

Q. What Should Parents know about Social
Networking Sites?
A. Social Networking
Sites
"It's 10 p.m. Do you know where your
children are? "Remember that phrase from your own childhood? It's still a valid question, but now, it comes with a twist: "Do you know where your kids are — and who they're chatting with online? "Social networking sites have morphed into
a mainstream medium for teens and adults. These sites encourage and enable people to exchange information
about themselves, share pictures and videos, and
use blogs and private messaging to communicate with friends,
others who share interests, and sometimes
even the world-at-large. And that's why it's important
to be aware of the possible pitfalls that come
with networking online. Some social networking
sites attract pre-teens – even kids as young as 5 or 6. These younger-focused sites don't allow the same kinds of communication
that teens and adults have, but there are still things that parents can do to help young kids socialize
safely online. In fact, when it comes to young kids, the law provides some protections – and gives parents some control over the type of information that children can disclose online. For sites directed to children under age 13, and for general audience sites that know
they're dealing with kids younger than 13, there's the Children's Online Privacy Protection Act (COPPA). It requires
these sites to get parental consent before they collect, maintain, or use kids' Information. COPPA also allows parents to review their child's online profiles and blog pages. Parents sometimes can feel outpaced by their technologically savvy kids.
Technology aside, there are lessons that parents
can teach to help kids stay safer as they socialize online.
Help Kids Socialize Safely OnlineOnGuard Online shares these tips for safe social networking:
Help
your kids understand what information should be private. Tell them why it's important to
keep some things – about themselves, family members and friends
– to themselves.
Information like their full name, Social Security number, street address, phone number,
and
family financial information — like bank or credit card Account numbers
— is private and
should stay that way. Tell them not to choose a screen name that gives away too
much
personal information.
Use privacy settings to restrict who can access and post on your child's website. Some
social networking sites have strong privacy settings.
Show your child how to use these settings to limit who can view their online profile,
and
explain to them why this is important.
Explain that kids should post only information that you — and they — are comfortable
with others seeing. Even If privacy settings are turned on, some — or even all
— of your
child's profile may be seen by a broader audience Than you're comfortable with.
Encourage your child to think about the language used in a blog, and to think before
Posting pictures and videos. Employers, college admissions officers, team coaches,
and teachers may view your child's postings.
Even a kid's screen name could make a difference. Encourage teens to think about the
impression that screen names could make.
Remind your kids that once they post information online, they can't take it back.
Even if they delete the Information from a site, older versions may exist on other
people's computers and be circulated online.
Know how your kids are getting online. More and more, kids are accessing the Internet
through their cell phones.
Find out about what limits you can place on your child's cell phone. Some cellular
companies have plans that limit downloads, Internet access, and texting; other plans
allow kids to use those features only at certain times of day.
Talk to your kids about bullying. Online bullying can take many forms, from spreading
rumors online and posting or forwarding private messages without the sender's
OK, to
sending threatening messages. Tell your kids that the words they type and the
images
they post can have real-world consequences. They can make the target of the
bullying feel bad, make the sender look bad – and, sometimes, can bring on
punishment from the authorities.
Encourage your kids to talk to you if they feel targeted by a bully.
Talk to your kids about avoiding sex talk online. Recent research shows that teens who
don't talk about sex with strangers online are less likely to come in contact with
a
predator.If you're concerned that your child is engaging in risky online behavior,
you can
search the blog sites they visit to see whatinformation they're posting. Try searching
by their name, nickname, school, hobbies, grade, or area where you live.
Tell your kids to trust their gut if they have suspicions. If they feel threatened by someone
or uncomfortable because of something online, encourage them to tell you. You
can then
help them report concerns to the police and to the social networking site. Most
sites have
links where users can immediately report abusive, suspicious, or inappropriate
online
behavior.
Read sites'
privacy policies. Spend some time with a site's privacy policy, FAQs, and
parent sections to Understand its features and privacy controls. The site should
spell out
your rights as a parent to review and delete your child's profile if your child
is younger
than 13.
A Few More Tips to Protect Pre-TeensMany of the tips above apply for pre-teens, but
parents of younger children also can: Take
extra steps to protect younger kids. Keep the computer in an open area like the
kitchen or family room, so you can keep an eye on what your kids are doing online.
Use the Internet with them to help develop safe surfing habits.
Consider taking advantage of parental control features on some operating systems
that let you manage your kids' computer use, including what sites they can visit,
whether they can download items, or what time of day they can be online.
Go where your kids go online. Sign up for – and use – the social networking spaces
that your kids visit. Let them know that you're there, and help teach them how to act
as they socialize online.
Review your child's friends list. You may want to limit your child's online “friends” to
people your child actually knows and is friendly with in real life.
Understand sites' privacy policies. Sites should spell out your rights as a parent to
review and delete your child's profile if your child is younger than 13. For More InformationTo learn more about staying safe online, visit the websites of the following organizations:
Federal Trade Commission — www.OnGuardOnline.gov The FTC works for the consumer to prevent fraudulent, deceptive, and unfair business
practices in the marketplace and toprovide information to help consumers spot, stop, and avoid them.
To file a complaint or to get free information onconsumer issues, visit ftc.gov or call toll-free, 1-877-FTC-HELP
(1-877-382-4357); TTY: 1-866-653-4261.The FTC manages OnGuardOnline.gov, which provides practical tips
from the federal government and the technologyindustry to help you be on guard against Internet fraud,
secure your computer, and protect your personal information. ConnectSafely — www.connectsafely.org ConnectSafely is a forum for parents, teens, educators, and advocates designed
to give teens and parents a voice in thepublic discussion about youth online safety, and has tips, as
well as other resources, for safe blogging and socialnetworking. Along with NetFamilyNews.org, it is
a project of the non- profit Tech Parenting Group. Cyberbully411 — www.cyberbully411.org Cyberbully411 provides resources and opportunities for discussion and sharing
for youth - and their parents - who havequestions about or may have been targeted by online harassment.
The website was created by the non-profit Internet Solutions for Kids, Inc., with funding from the Community
Technology Foundation of California. GetNetWise — www.getnetwise.org GetNetWise is a public service sponsored by Internet industry corporations and
public interest organizations to helpensure that Internet users have safe, constructive, and educational
or entertaining online experiences. The GetNetWise coalition works to provide Internet users with the
resources they need to make informed decisions about their and theirfamily's use of the Internet. iKeepSafe.org is a coalition of 49 governors/first spouses, law enforcement,
the American Medical Association, the American Academy of Pediatrics, and other associations dedicated
to helping parents, educators, and caregivers byproviding tools and guidelines to promote safe Internet
and technology use among children. NCMEC is a private, non-profit organization that helps prevent child abduction
and sexual exploitation; helps find missingchildren; and assists victims of child abduction and sexual
exploitation, their families, and the professionals who serve them. staysafe —
www.staysafe.org staysafe.org is an educational site intended to help
consumers understand both the positive aspects of the Internet aswell as how to manage a variety of
safety and security issues that exist online. WiredSafety.org is an Internet safety and help group. WiredSafety.org provides
education, assistance, and awareness on cybercrime and abuse, privacy, security, and responsible technology
use. It is also the parent group of Teenangels.org, FBI-trained teens and preteens who promote Internet
safety. See also: Social Networking Sites: Safety Tips for Tweens and Teens What to Do if There's a ProblemTrust your gut if you have
suspicions. If you feel threatened by someone or uncomfortable because of something online,Tell an adult
you trust, and report it to the police and the social networking site.The Children's Online Privacy
Protection Act (COPPA) requires websites to obtain parental consent before collecting, using,or disclosing
personal information from children under age 13.
Q. What are
Nigerian con-men or internet scams?
A.
Phony Lotteries, Nigerian 419s, Advanced Fee Fraud, and Scams
While you're online:
Know who you're
dealing with. In any electronic transaction, independently confirm the other party's name, street
address, and telephone number. Resist the urge to enter foreign lotteries. These solicitations are phony
and illegal. Delete requests that claim to be from foreign nationals
asking you to help transfer their money through your bank account. They're fraudulent. Ignore unsolicited
emails that request your money, credit card or account numbers, or other personal information.
If you are selling something over the Internet, don't accept a potential buyer's offer to send you a check
for more than the purchase price, no matter how tempting the plea or convincing the story. End the transaction immediately
if someone insists that you wire back funds.The Internet gives buyers access to a world of goods and services, and gives sellers access to a world of customers.
Unfortunately, the Internet also gives con artists the very same access. But being on guard online can help you maximize the
global benefits of electronic commerce and minimize your chance of being defrauded. OnGuard Online wants you to know how to
spot some cross-border scams — including foreign lotteries, money offers, and check overpayment schemes — and
report them to the appropriate authorities. Foreign Lotteries For years, scam operators have used the telephone and direct mail to entice U.S. consumers into buying chances in supposedly
high-stakes foreign lotteries. Now they're using email, too — either to sell tickets or suggest that a large cash prize
has your name on it. No matter what country's name is used to promote a lottery, the pitch follows a pattern: you should send
money to pay for taxes, insurance, or processing or customs fees. The amount may seem small at first, but as long as you keep
paying, the requests for funds will keep coming — for higher and higher amounts. Some victims have lost thousands of
dollars.Most scam operators never buy the lottery tickets on your behalf. Others buy some tickets, but keep the "winnings"
for themselves. In any case, lottery hustlers generally try to get you to share your bank account or credit card numbers,
so they can make unauthorized withdrawals.If you're thinking about responding to a foreign lottery, OnGuard Online wants you to remember: Playing
a foreign lottery is against the law.
There are no secret systems for winning foreign lotteries. Your chances of getting any money back are
slim to none. If you buy even one foreign lottery ticket, you can expect many more bogus offers
for lottery or investment "opportunities." Your name will be placed on "sucker lists" that fraudsters
buy and sell. Keep your
credit card and bank account numbers to yourself. Scam artists often ask for them during an unsolicited sales pitch. Once
they get your account numbers, they may use them to commit identity theft.Resist solicitations for foreign lottery promotions. Report them to the appropriate government officials, then hit delete.View a sample fraudulent foreign lottery solicitation.
"Nigerian" Foreign Money Offers
The "Nigerian" scam got its name from emails that supposedly came
from Nigerian "officials" who needed your help getting at their money — which was tied up due to strife in
their country. Today, people claiming to be officials, businesspeople, or the surviving relatives of former government honchos
in countries around the world send countless offers via email to transfer thousands of dollars into your bank account if you
will just pay a fee or "taxes" to help them access their money. If you respond to the initial offer, you may receive
documents that look "official." But then, you will get more email asking you to send more money to cover transaction
and transfer costs, attorney's fees, blank letterhead, and your bank account numbers, among other information. Subsequent
emails will encourage you to travel to another country to complete the transaction. Some fraudsters have even produced trunks
of dyed or stamped money to verify their claims.The emails are from crooks trying to steal your money or commit identity
theft. Victims of this scam report that emergencies arise that require more money and delay the "transfer" of funds;
in the end, you lose your money, and the scam artist vanishes. According to the U.S. State Department, people who have responded
to these solicitations have been beaten, subjected to threats and extortion, and in some cases, murdered.If you receive an
email from someone claiming to need your help getting money out of another country, don't respond. After all, why would a stranger from another country pick you out at random to share thousands of
dollars? Report the solicitation to the appropriate government officials, and then hit delete.View a sample fraudulent foreign money offer.
Check Overpayment Schemes
Say
no to a check for more than your selling price, no matter how tempting the plea or convincing the story. Check overpayment
schemes generally target people who have posted an item for sale online. The con artist, posing as a potential buyer from
a foreign country (or a distant part of the U.S.), emails the seller and offers to buy the item with a cashier's check, money
order, personal check, or corporate check. Or the scammer may pretend to be a business owner from a foreign country, needing
"financial agents" to process payments for their U.S. orders; in exchange, they promise a commission.Regardless of the cover, here's what happens:
The scammer sends you a check that looks authentic — complete with watermarks — made payable for more money than
you expected. They ask you to deposit it in your bank account, and then wire-transfer some portion of the funds to a foreign
account. They provide convincing reasons why the check is for more than the necessary amount, and why the funds must be transferred
quickly. Sometimes, the counterfeit checks fool a bank teller, but be aware that the check still can bounce. The scammer vanishes
with the money you wired from your own account and you are on the hook for the entire amount of the worthless check. In addition,
a scammer who has your bank account number is likely to use it to withdraw more money from your account.
Reporting a Cross-Border Scam If you think you may have responded to a cross-border scam, file a complaint at www.econsumer.gov, a project of 20 countries of the International Consumer Protection and Enforcement
Network. Then visit the FTC's identity theft website at www.ftc.gov/idtheft. While you can't completely control whether you will become a victim
of identity theft, you can take some steps to minimize your risk.If you've responded to a "Nigerian" scheme, contact your
local Secret Service field office using contact information from the Blue Pages of your telephone directory, or from www.secretservice.gov/field_offices.shtml.In addition, report telemarketing fraud and check overpayment scams to your state
Attorney General, using contact information at www.naag.org.Report unsolicited email offers to spam@uce.gov — including offers inviting you to participate in a foreign
lottery, looking for help getting money out of a foreign country, or asking you to wire back extra funds from a check you
received.If you receive what looks like lottery material from a foreign country through the postal mail, give it to your local
postmaster.
For More InformationForeign Lottery Scams
U.S. Federal Trade Commission — The FTC works for the consumer to prevent fraudulent, deceptive,
and unfair business practices in the marketplace and to provide information to help consumers spot, stop, and avoid them.
To file a complaint or to get free information on consumer issues, visit www.ftc.gov or call toll-free, 1-877-FTC-HELP (1-877-382-4357); TTY: 1-866-653-4261.
The FTC enters Internet, telemarketing, identity theft, and other fraud-related complaints into Consumer Sentinel, a secure,
online database available to hundreds of civil and criminal law enforcement agencies in the U.S. and abroad.Competition Bureau in Canada — The Competition Bureau is an independent law enforcement agency
in Canada that investigates anti-competitive practices and promotes compliance with the
laws under its jurisdiction. To file a complaint or to get free information, visit www.competitionbureau.gc.ca or call toll-free, 1-800-348-5358. The Bureau has the ability to refer criminal matters to the Attorney General of Canada,
who then decides whether to prosecute before the courts.United Kingdom's Office of Fair Trading — The United Kingdom's
Office of Fair Trading is responsible for making markets work well for consumers. They protect and promote consumer interests
throughout the United Kingdom, while ensuring that businesses are fair and competitive. To file a complaint or to get free information,
visit www.oft.gov.uk or send an email to enquiries@oft.gsi.gov.uk.Australian Competition and Consumer Commission — The Australian Competition and Consumer Commission encourages vigorous
competition in the marketplace and enforces consumer protection and fair trading laws. To file a complaint or to get more
information, visit www.accc.gov.au. The ACCC advocates consultation and negotiation as the first and
best option to settle disputes, but once the ACCC pursues legal action any sort of mediation becomes less likely. "Nigerian" Advance-Fee Scams U.S. Secret Service — The Secret Service investigates violations of laws relating to financial
crimes, including access device fraud, financial institution fraud, identity theft, and computer fraud. To file a complaint
or to get free information, visit www.secretservice.gov or call 202-406-5708.U.S. Department of State — The Department of State's mission is to create a more secure, democratic,
and prosperous world for the benefit of the American people and the international community. As part of that mission, the
Department of State seeks to minimize the impact of international crime, including cross-border internet scams, on the United States and its citizens. To get free information, visit www.state.gov.
Q. What should I do prior to disposing of an old computer?
A. Computer Disposal Once you have a “clean” computer,
consider recycling, donating, or reselling it – and keep the environment in mind when disposing of your computer.If you want to get rid of your old computer, options include recycling,
reselling, and donating. But before
you log off for thelast time, there are important
things to do to prepare it for disposal. Computers
often hold personal and financial
information, including passwords, account numbers, license keys or registration numbers for software programs, addresses and phone numbers, medical and prescription information, tax returns, and other personal documents. Before getting rid of your old computer, it’s a good idea to use software to “wipe”the hard drive clean. If you don’t, consider your old hard drive a 21st century treasure chest for identity thieves
and information pirates. The Federal Trade Commission
(FTC), the nation’s consumer
protection agency, says you can deter identity theft and information piracy by taking a few preventive steps.
Understanding Hard Drives A computer’s hard
drive stores data, and maintains an index of files. When you save a file, especially a large one, it is scattered around the hard drive in bits and
pieces. Files also are automatically created by browsers
and operating systems. When you open a file, the hard drive checks the index, then gathers
the bits and pieces and reconstructs them. When you
delete a file, the links between the index and the file disappear, signaling to your system that the file isn’t needed any longer and that hard drive space
can be overwritten. But the bits and pieces of the deleted file stay on your computer until they’re overwritten, and they can be retrieved with a data recovery program.
To remove data from your hard drive permanently,
it needs to be wiped clean.
Cleaning Hard Dives Before you clean your hard
drive, save the files that are important to you on an external storage device – for example, a USB drive, a CDRom, or an external
hard drive – or transfer them to a new computer. Check your owner’s manual, the manufacturer’s website, or its customer support line for information on how to
save data and transfer it to a new computer. Utility programs to wipe your hard drive are available both online and in stores where computers are
sold. They’re generally inexpensive; some are available on the Internet for free. Wipe utility
programs vary in their capabilities: some
erase the entire disk, while others allow you
to select files or folders to erase. They also vary in their effectiveness: programs that overwrite
or wipe the hard drive many times are very effective; those that overwrite or wipe the drive only once may not prevent information being wiped from being recovered later.
If your old computer contains sensitive information that would be valuable to an identity
thief, consider using a program that overwrites or wipes the hard drive many times. Or, remove the hard
drive, and physically destroy it. One more thing to keep in mind: If you use your home or personal
computer for business purposes, check with your employer about how to manage information on your computer that’s business-related. The law requires businesses to follow
data security and disposal requirements for certain information that’s related to customers. Disposal
Options
Once you have a “clean”
computer, here’s how to dispose of it:
Recycle it. Many computer manufacturers have programs to recycle computers
and components. Check their
websites or call their toll-free numbers
for more information. The Environmental Protection Agency (EPA) has information on electronic product recycling
programs at
program. Check with your county or local government,
including the local landfill office for regulations.
Donate it. Many organizations collect old computers and donate them to charities.
Resell it. Some people and organizations buy old computers.
Check online. Keep
the environment in mind when disposing of your computer. Most computer equipment contains hazardous materialsthat don’t belong in a landfill. For example, many computers have heavy metals that can contaminate the earth. The EPA recommends that you check with your local health and sanitation agencies for ways to dispose of electronics safely.
www.hypersmash.com
hostgator promo
|
|