Categories
Uncategorized

Internet Explorer 7 Beta 2 Preview now available

As noted on the IE Blog today and across the web, the Internet Explorer Beta 2 Preview for Windows XP SP2 is available today. There are a number of new features – I’ve already made use of the phishing filter. In addition to RSS support and tabs, I’ve found that shrink to fit for printing is helpful as it automatically resizes the page, keeping all of the text in the printed page. I also like the ability to preview a page or multiple pages in a single window.


And for my kids, beta 2 is holding up to some demanding customers. The ability to quickly zoom into a page is super helpful: they jump from site to site on the family computer, visiting a number of kid-friendly web sites with game content that looks better when you zoom in. I look forward to when in parental control settings are available as part of Windows Vista: until then, we’ll see how hard the kids can thrash beta 2.


As with all beta software, it’s a good idea to create a restore point on your computer and back up any important documents.


You can take a quick tour quick tour of IE7 on the Microsoft website.

Categories
Uncategorized

Phishers & Keyloggers: From Russia with Love (not)

All this talk of security and viruses, and what happens at home? We get stereo stomach flu (with both our kids down today with a virus).

 

So, while I take a brief break as they’re both asleep and I try to catch up on mail, here’s a quick note to say that I’ll finish off my week of posts this weekend on the different ways Microsoft is working on improving your computer experience.

 

But… I have to post this quick quote just IM’ed to me from a friend at the office, on the road way out east (‘though this was my favourite quote of the week). Turns out this friend at the office reads my blog.


“You need to check this article [on grabbing keystrokes]  out [from the Washington Post]. I saw the posts on your blog this week [about phishing, Trojan Horses and passwords] and then this morning I saw this!”

The article in the Washington Post is about how an unsuspecting web surfer who received an e-mail, alerting him that a fraudulent charge had been made to his credit card account. Little did he know that the email wasn’t from really his credit card company: when he clicked on the web link to help him get the charge off his credit card charges, the web site actually installed a Trojan horse on to his computer. Moments later, the app sent his personal info to someone that didn’t have his best interests in mind:


“(Graeme) Frost is just one of thousands of victims whose personal data has been stolen by what security experts are calling one of the more brazen and sophisticated Internet fraud rings ever uncovered. The Web-based software employed by ring members to manage large numbers of illegally commandeered computers is just as easy to use as basic commercial office programs.

 

“Frost’s data, along with information stolen from thousands of other victims, made its way to a Web site hosted by a Russian Internet service provider. The site is currently the home base of a network of sites designed to break into computers through a security hole in Microsoft’s Internet Explorer Web browser.”

As I mentioned earlier this week in my post on phishing, the Microsoft Phishing filter add-in for the MSN Search Toolbar provides offers access to a new dynamic online service, updated several times an hour, to warn you and help protect your personal information from these fraudulent Web sites. The add-in dynamically checks the web sites you visit and gives you a warning if the sites are suspicious. It blocks you from sharing personal information if a site is a known phishing web site. The online information in the add-in is regularly updated.

 

Good luck, stay healthy and wash your hands: the kids are bringing home viruses of their own.

 

Tags: , , , .

Categories
Uncategorized

Screen Scraping, Trojan Horses and passwords… oh, my

Once again, here’s today’s installment on some of the different ways Microsoft is working on improving your experience with your computer, with blog bits spent on OneCare, Windows Defender, spam, Windows Live Safety Center, and last on phishing.


Today it’s about screen scraping and Trojan horses, and how this can happen to you. 


Screen scraping attacks are becoming more common in scammer’s schemes to subvert sophisticated security systems. The Wikipedia defines screen scraping as “a technique in which a computer program extracts data from the display output of another program. The program doing the scraping is called a screen scraper.”


In plain terms, a screen scraper is a program that captures or records computer screen activity, such as key strokes, mouse clicks and movements across the screen. (In application and web development, screen scraping has a legitimate use to acquire and display information, a.k.a. presentation integration.) But there are surreptitious uses for this technique that are sometimes employed by hackers who ultimately want to gain control of your computer or your personal information.


In some cases a Trojan horse program lurks on your computer waiting for you to visit a web site (a bank, brokerage firm, retailer, epayment) and then captures your interactions with the site. This information can be sent to the bad guys controlling the Trojan horse, who can then use this information to access your accounts.


19th century etching of the Trojan Horse 


Trojan horses may enter your computer through the daily mail, attached as an innocent looking file, like “kids.exe” or some other benign name. And when file extensions are hidden, you may not know that a Trojan horse lurks in the attachment. (Here’s more information on how to view all hidden file types and file name extensions in Office, as well as a list of potentially blocked file extensions.)


Once you open or double-click on a bogus attachment, you may start a process that is hard to stop: the application may launch an application that infects your computer with a computer virus, change or add files to you computer or modify your settings to allow your computer to be used as an extension of the hacker to attack other sites or spread the infected attachment.


Now, back to screen scraping and ways to foil this trick.


When you consider that on average, most people can only remember between five and nine things of a particular kind (alphanumerical sequences, words, numbers), it’s tough to remember strong passwords. And if a screen scraper records your key strokes — and along with it, your passwords — this can be a problem. You have to change your passwords regularly (every few months or so) and be sure not to keep them in an easy-to-find place (you know, the text file on your computer named “passwords.txt”). For the most part, employing strong passwords that are changed regularly will help you foil most common security breaches.


But as attacks become more spohisticated by employing some of these methods, targeted companies (such as banks and brokerage houses) are bringing new technology online that combines the clicks and keyboard entries, user names and passwords with additional unique information. Some companies are taking steps to improve security without just adding the burdon of having to remember a laundry list of strong passwords. One such example from Bank of America:



Bank of America Corp. is deploying a program called SiteKey that uses technology from Passmark Security Inc. that requires customers to click on a preselected image in addition to entering their user name and password to log on to an account, said Betty Riess, a Bank of America spokesperson in San Francisco.


E*Trade is another firm that has implemented ways to step up their security. Through their deal with RSA Security, E*Trade makes available a SecurID key chain (RSA calls it an “authentication token”) to their retail customers to provide an additional layer of protection. I know several companies that use the SecurID system to allow employees to access their confidential and secure sites remotely, prividing an additional security layer with a random six-digit code that is generated by the SecurID token.


A few years ago, employees at Microsoft were issued smartcards to provide an additional layer of technology to access networks. Smartcards can be programmed to provide access to your personal accounts, mobile telephones, buildings and online systems.  


Then there’s the new InfoCard InfoCard technology that was shown at the RSA Conference should make it easier to provide an additional layer of security. As reported on CNET News…



Now, with Windows Vista, Gates feels he finally has the right weapons to supplant the password as a means of verifying who is who on computers and over the Internet.


The new operating system, due later this year, introduces a concept called InfoCards that gives users a better way to manage the plethora of Internet login names and passwords, as well as lets third parties help in the verification process. Vista will also make it easier to log on to PCs using something stronger than a password alone, such as a smart card.


On protecting aginast viruses: There are a number of things you can do to protect your computer against viruses (courtesy of the Security at Home page…): 



  1. Use an Internet firewall (Note: Windows XP with SP2 has a firewall already built-in and active).

  2. Visit Microsoft Update and turn on Automatic Updates.

  3. Subscribe to industry standard antivirus software and keep it current.

  4. Never open an e-mail attachment from someone you don’t know.

  5. Avoid opening an e-mail attachment from someone you know, unless you know exactly what the attachment is. The sender may be unaware that it contains a virus.

Additional resources:



Tags: , , , .

Categories
Uncategorized

I’ve been phished, but I didn’t bite

No sooner do I post about the ills of phishing this morning that I return home to find a lure in my personal email (my bold note below)…



Dear <name of large NY bank> & Co. user,

We recently have determined that different computers have logged onto your Online Banking account, and multiple password failures were present before the logons. We now need you to re-confirm your profile information to us. If this is not completed by October 16, 2005 , we will be forced to suspend your account indefinitely, as it may have been used for fraudulent purposes. We thank you for your cooperation in this manner.


To confirm your Online Profile records click here:

<official looking link that actually links to a phishing site removed>

Thank you for your patience in this matter.

<name of large NY bank> & Co. Customer Service


You would think that phishers would have some common sense, updating their old lures. Unfortunately for them, the October ’05 due date has long passed.


So it proves another point: phishers are not only bad people…


… they’re not very bright.

Categories
Uncategorized

bits: Making pictures with DNA for fun and… well, fun (for now)

Driving across campus this evening I heard a story on NPR, Fun with DNA



Imagine a yellow smiley face. Now imagine 50 billion smiley faces floating in a single drop of water. That’s what scientists have made using a new technique for building super-tiny shapes using the familiar double helix of DNA.


(from NPR’s All Things Considered)