FIFA World Cup Tickets Scams Available Now

Author: Omid Farhang Published: December 9, 2009 Reading Time: 2 min

We recently alerted our readers to spam campaigns using the H1N1 vaccination program to prompt recipients to open the mail. And we have frequently mentioned that crooks love to take advantage of news, disasters, and other events. Now that the final draw for the FIFA World Cup in South Africa next year has taken place, it is time to remind you that sports events are no exception to the rule. I’ve already found some examples. The first is a fake lottery. In this case, the source claims the recipient has won a large sum of money from the South African Football Association. After contacting the lottery manager, the victim of the scam will be asked to pay “processing fees” or “transfer charges” so that the winnings can be distributed. Don’t expect to ever see a payment. ...

Continue Reading FIFA World Cup Tickets Scams Available Now

Critical Adobe Flash Update

Author: Omid Farhang Published: December 9, 2009 Reading Time: 1 min

It’s the second Tuesday of the month and there are important updates being released. From Microsoft, of course, but also from Adobe. There’s a critical security issue in Adobe Flash Player 10.0.32.18 and earlier. It’s important that organizations deploy these updates before the Christmas holiday reduces IT staffing. Fortunately, this patch cycle is as early as can be landing on the 8th so there’s still time to test and deploy. ...

Continue Reading Critical Adobe Flash Update

New social engineering technique: use Microsoft support to sell rogues

Author: Omid Farhang Published: December 9, 2009 Reading Time: 1 min

Sunbelt analyst Adam Thomas came across this ugly new social engineering technique when he analyzed the DefenceLab rogue security product. It does the usual scare-ware stuff: a fake scan and fake “Windows Security Center” alert: Then it directs the potential victim to a Microsoft Support page, but injects html code into the page in his or her browser to make it appear as though Microsoft is suggesting the purchase of the rogue. This is the real Microsoft page: ...

Continue Reading New social engineering technique: use Microsoft support to sell rogues

Passwords used by the Conficker worm

Author: Omid Farhang Published: January 15, 2009 Reading Time: 1 min

It’s not possible to emphasise enough the importance of using sensible passwords on your network. Not just on the areas of your network that you don’t want your users to traipse through, but also on the default network shares that are present on installations of commonly used operating systems like Windows NT/2000/XP/2003. One of the ways in which the Conficker worm (also known as Confick or Downadup) uses to spread is to try and batter its way into ADMIN$ shares using a long list of different passwords. ...

Continue Reading Passwords used by the Conficker worm

5 tips to help keep your passwords secret

Author: Omid Farhang Published: January 14, 2009 Reading Time: 1 min

Treat your passwords with as much care as you treat the information that they protect. Use strong passwords to log on to your computer and to any site where you enter your credit card number, or any financial or personal information—including social networking sites. Never provide your password over e-mail or in response to an e-mail request. Internet “phishing” scams use fraudulent e-mail messages to entice you to reveal your user names and passwords, steal your identity, and more. Learn more about phishing scams. Do not type passwords on computers that you do not control Computers such as those in Internet cafes, computer labs, kiosk systems, conferences, and airport lounges should be considered unsafe for any personal use other than anonymous Internet browsing. Cyber criminals can purchase keystroke logging devices which gather information typed on a computer, including passwords. Don’t reveal passwords to others Keep your passwords hidden from friends or family members (especially children) who could pass them on to other, less trustworthy individuals. Protect any recorded passwords Don’t store passwords on a file in your computer, because criminals will look there first. Keep your record of the passwords you use in a safe, secure place. Use more than one password Use different passwords for different Web sites and services.

Continue Reading 5 tips to help keep your passwords secret

10 tips for safe instant messaging

Author: Omid Farhang Published: January 13, 2009 Reading Time: 3 min

Communicating by using an instant messaging (IM) program has some of the same security and privacy risks as e-mail, but there are a few dangers that are unique to IM. Never open pictures, download files, or click links in messages from people you don’t know. If they come from someone you do know, confirm with the sender that the message (and its attachments) is trustworthy. If it’s not, close the instant message. ...

Continue Reading 10 tips for safe instant messaging

11 tips for social networking safety

Author: Omid Farhang Published: January 13, 2009 Reading Time: 3 min

Social networking Web sites like MySpace, Facebook, Twitter, and Windows Live Spaces are services people can use to connect with others to share information like photos, videos, and personal messages. As the popularity of these social sites grows, so do the risks of using them. Hackers, spammers, virus writers, identity thieves, and other criminals follow the traffic. Read these tips to help protect yourself when you use social networks. Use caution when you click links that you receive in messages from your friends on your social Web site. Treat links in messages on these sites as you would links in e-mail messages. ...

Continue Reading 11 tips for social networking safety

TFC

Author: Omid Farhang Published: January 13, 2009 Reading Time: 1 min

TFC (Temp File Cleaner) will clear out all temp folders for all user accounts (temp, IE temp, java, FF, Opera, Chrome, Safari), including Administrator, All Users, LocalService, NetworkService, and any other accounts in the user folder. It also cleans out the %systemroot%\temp folder and checks for .tmp files in the %systemdrive% root folder, %systemroot%, and the system32 folder (both 32bit and 64bit on 64bit OSs). It shows the amount removed for each location found (in bytes) and the total removed (in MB). Before running it will stop Explorer and all other running apps. When finished, if a reboot is required the user must reboot to finish clearing any in-use temp files. ...

Continue Reading TFC

Passwords

Author: Omid Farhang Published: January 13, 2009 Reading Time: 2 min

Strong passwords are important protections to help you have safer online transactions. Keys to password strength: length and complexity An ideal password is long and has letters, punctuation, symbols, and numbers. Whenever possible, use at least 14 characters or more. The greater the variety of characters in your password, the better. Use the entire keyboard, not just the letters and characters you use or see most often. Create a strong password you can remember There are many ways to create a long, complex password. Here is one way that may make remembering it easier: ...

Continue Reading Passwords

How to Choose a Firewall

Author: Omid Farhang Published: January 13, 2009 Reading Time: 2 min

Three basic types of firewalls are available for you to choose from: Software firewalls Hardware routers Wireless routers To determine which type of firewall is best for you, answer these questions and record your answers: How many computers will use the firewall? What operating system do you use? (This might be a version of Microsoft Windows, Apple Macintosh, or Linux.) That’s it. You are now ready to think about what type of firewall you want to use. There are several options, each with its own pros and cons. ...

Continue Reading How to Choose a Firewall