Practical tips for a. Safe Christmas



Similar documents
Practical guide for secure Christmas shopping. Navid

Don t Fall Victim to Cybercrime:

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

THE CYBER-CRIME BLACK MARKET: UNCOVERED

Top tips for improved network security

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

100% Malware-Free A Guaranteed Approach

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Network Security and the Small Business

Mifflinburg Bank & Trust. Corporate Account Takeover & Information Security Awareness

The Increasing Threat of Malware for Android Devices. 6 Ways Hackers Are Stealing Your Private Data and How to Stop Them

WEB ATTACKS AND COUNTERMEASURES

Recognizing Spam. IT Computer Technical Support Newsletter

How To Protect Your Online Banking From Fraud

F-Secure Anti-Virus for Mac 2015

Corporate Account Takeover & Information Security Awareness

Malware & Botnets. Botnets

OIG Fraud Alert Phishing

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

THE HOME LOAN SAVINGS BANK. Corporate Account Takeover & Information Security Awareness

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Online Security Tips

Remote Deposit Quick Start Guide

Computer Security Maintenance Information and Self-Check Activities

Cyber Security Awareness. Internet Safety Intro.

Protecting your business from fraud

Corporate Account Takeover & Information Security Awareness

GlobalSign Malware Monitoring

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

The information contained in this session may contain privileged and confidential information. This presentation is for information purposes only.

Phishing Activity Trends Report for the Month of December, 2007

Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)

National Cyber Security Month 2015: Daily Security Awareness Tips

STOP. THINK. CONNECT. Online Safety Quiz

Introduction: 1. Daily 360 Website Scanning for Malware

Phishing Activity Trends Report. 1 st Half Committed to Wiping Out Internet Scams and Fraud

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

Corporate Account Takeover & Information Security Awareness. Customer Training

Your Guide to Security

Statistical Analysis of Internet Security Threats. Daniel G. James

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

TRAINING FOR AMERICAN MOMENTUM BANK CLIENTS. Corporate Account Takeover & Information Security Awareness

Laura Royer, Extension Faculty, University of Florida/IFAS Osceola County Extension Services

DON T BE FOOLED BY SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam FREE GUIDE. December 2014 Oliver James Enterprise

Cyber Security. Maintaining Your Identity on the Net

Identity Theft Protection

What you need to know to keep your computer safe on the Internet

white paper Malware Security and the Bottom Line

Spear Phishing Attacks Why They are Successful and How to Stop Them

Smartphone Hacks and Attacks: A Demonstration of Current Threats to Mobile Devices

Countermeasures against Bots

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

F-Secure Mobile Security. Android

4/20/2015. Fraud Watch Campaign. AARP is Fighting for You. AARP is Fighting for You. Campaign Tactics. AARP can help you Spot & Report Fraud

Network Security. Demo: Web browser

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal

Phishing Activity Trends

Threat Management. Focus on Malicious URLs. Web Threats. A Trend Micro White Paper I October 2008

STOP THINK CLICK Seven Practices for Safer Computing

Information Security Awareness

Kaspersky Internet Security 2014: Reviewer s Guide

Top Cyber Threats Of 2009

Almost 400 million people 1 fall victim to cybercrime every year.

CSC Essay 5: Outline

What you can do prevent virus infections on your computer

Security A to Z the most important terms

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

INFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure!

Internet Security. For Home Users

March 2010 Report #39

Guideline for Prevention of Spyware and other Potentially Unwanted Software

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms

Protect your personal data while engaging in IT related activities

NATIONAL CYBER SECURITY AWARENESS MONTH

guide to staying safe online How to shop, bank, socialise and protect your identity online.

Learn to protect yourself from Identity Theft. First National Bank can help.

Phishing Activity Trends Report June, 2006

National Cybersecurity Awareness Campaign. Kids Presentation

F-Secure Anti-Virus for Mac. User's Guide

Top 10 Tips to Keep Your Small Business Safe

Primer TROUBLE IN YOUR INBOX 5 FACTS EVERY SMALL BUSINESS SHOULD KNOW ABOUT -BASED THREATS

Expanded Header: Viewing in Microsoft Outlook

Dealing with spam mail


7 PRACTICES FOR SAFER COMPUTING

Trust the Innovator to Simplify Cloud Security

The Underground Economy of the Pay-Per-Install (PPI) Business

Cyber Security Awareness

Emerging risks for internet users

Computer Security Literacy

ONLINE IDENTITY THEFT KEEP YOURSELF SAFE FROM BESTPRACTICES WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR


OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

Win the Internet Security War. Keep Internet Criminals Out of Your Network and Protect Your Business

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

THE THREE Es OF MODERN SECURITY FOR PHISHING

Transcription:

Practical tips for a Safe Christmas

CONTENTS 1. Online shopping 2 2. Online games 4 3. Instant messaging and mail 5 4. Practical tips for a safe digital Christmas 6

The Christmas holidays normally see an increase in the activity of cybercrooks. The reasons are simple: with more spare time on their hands, more people connect to the Internet. Consequently, the possibility of people falling victim to online crime is statistically higher. Here we will take a look at the main risks to watch out for over the holiday period, and how to prevent them. 1. ONLINE SHOPPING With many people now shopping on the Web, the number of online transactions increases over Christmas. For example, the Monday immediately after Thanksgiving this year a day known as Cyber Monday since it has become the start of the online Christmas shopping season- the number of Americans who made an online purchase increased by 38 percent with respect to 2006 1. Last year, 13.5 million2 Americans did their Christmas shopping online. Cyber-crooks are obviously aware of this increase in online trade over Christmas and therefore step up their attacks. Consumers can be attacked on several fronts. One of the main strategies is phishing, which consists of spoof emails that purport to come from an online bank or shop. Users are asked to click on a link and enter their bank details. If they do, any data they enter could end up in the hands of cyber-crooks. Last year, the number of phishing attacks launched in December rose to 23,000 3, 56% more than the previous year. Trojans are another risk that consumers face. Banker Trojans, in particular, are designed to steal users bank details (passwords, account numbers ).They count 18,59% out of total samples of malware created in 2007 4. They can capture keystrokes and even redirect users to spoof banking sites. It is vital therefore, that online consumers make sure their computers are malware-free before carrying out online transactions. 1- http://www.cnnexpansion.com/economia/2007/11/28/eu-logra-record-de-compras-on-line 2- http://www.bnd.com/business/story/193659.html. 3- Data from the Anti-Phishing working Group. 4- Data from PandaLabs, the malware analysis and detection laboratory at Panda Security.

How do Trojans reach PCs? Trojans do not spread on their own, they require user collaboration. They disguise themselves as files or links that contain photos, movie trailers and so on, to entice users into opening them or clicking them. If users open the file or click on the link, they could actually be dropping a Trojan onto the system. Online consumers should take great care, since according to 2006 estimates, each victim lost on average 6,383 5 through these techniques. An easy way of checking a website s reliability is to make sure the connection is made through the SSL protocol. This protocol allows the data between the PC and the server to be transferred securely and privately, so the information doesn t end up in the hands of third-parties. Another simple way is to type the name of the page in a search engine and read other consumers opinions. If there are numerous complaints about defective products, or products that do not reach the recipient, you should think again before purchasing an item from that website. Spoof auction pages or online stores are also a serious risk for online buyers. Many fake sites offer products at unbelievable prices, so unbelievable in fact, that users should think twice before believing them. Users who purchase items on those sites, probably won t receive the product and are unlikely to see their money again. It is always a good idea to check out the reliability of the page before purchasing anything. 5- Data from the Anti-Phishing working Group..

2. ONLINE GAMES At Christmas most people have more spare time on their hands, much of which is spent playing online games with other remote users. In the last few months, numerous malware variants designed to steal online game credentials have been detected. Cyber-crooks steal credentials to sell them on the Internet black market, where they can fetch incredibly high prices. The reason is that many objects, functions, etc. in these online games are accumulated through the skill and experience of players. There are many who are unable to reach this level and are prepared to pay significant sums to obtain these virtual assets. Cyber-crooks take advantage of this to sell them to the highest bidder on forums, auction pages, etc. Another problem with online games is that many of them allow users to create profiles. The profiles often include players email addresses so they can share tricks and experiences. Cyber-crooks use this information to customize emails claiming to contain game or image plugins to entice users into opening attached files or click on a link. If they do, they may actually introduce malware onto their system. The sending of files claiming to contain the game itself or the distribution of these files through P2P networks, etc. are other methods used by cyber-crooks to exploit users interest in these games and distribute their creations.

3. INSTANT MESSAGING AND MAIL The use of instant messaging as a means of communication is increasingly widespread. Tools such as MSN Messenger, Yahoo!Messenger, etc. are some of the most widely-used, especially by young people. They have consequently become one of cyber-crooks favorite channels for distributing their creations. They usually send links or files that appear to come from a known contact, but it is really a worm that attempts to spread to other users. If users click the link or download the file, they will be infected. commonly-used methods at this time of year are free Christmas cards, which offer users fun greeting cards to send their family and friends. To obtain them, users are told to click a link or download a file. Either way, users are infected with malware. On other occasions, malicious codes take the form of movie trailers or codecs, taking advantage of the numerous movies released during Christmas. Once again, it is bait to entice users into carrying out an action that will lead to infection. A similar technique is used to distribute malware through email. One of the most

4. PRACTICAL TIPS FOR A SAFE DIGITAL CHRISTMAS 1. Make sure there are no active viruses on your PC before you shop or bank online. To do this, add proactive technologies to your traditional antivirus. These technologies can detect threats without requiring updates and use second opinion antivirus tools to make sure your PC is malware-free. 2. Take no notice of spam (advertising) messages or those that claim to come from financial entities and request confidential data 3. Check out the seller s reputation before shopping online. 4. Keep the operating system and the applications on your system up-todate. System vulnerabilities can be an entry point for malware, and can allow cyber-crooks to take control of your PC. 5. Do not run files or click on links from suspicious sources. Additionally, if you receive a file through instant messaging, make sure it is sent by one of your contacts and that it is not malware. 6. Never pay for anything online unless you can completely trust the seller. If you are bidding for an item in an online auction, do not trust the offers you receive, unless they come from the auctions own portal. You could end up empty-handed, with no product or money. 7. Do not send confidential data via email, instant messaging, chats or similar channels. IN SHORT As Christmas provides cyber-crooks with an ideal environment, due to the increase of online transactions and users spare time, it is one of the most dangerous seasons for Internet users. Unless users want their money to end up in cyber-crooks hands, they should stay on the alert and take adequate security measures.

www.pandasecurity.com