Categories
Uncategorized

FYI: new scams featuring the IRS logo to get your PII

That e-mail from the IRS? It’s not from the IRS… so says local reporter Herb Weisbaum, an MSNBC contributor, on MSNBC (and the IRS warns taxpayers of the scams in a press release here)….

“The Internal Revenue Service is trying to be more customer-friendly, but it’s not going to pay you for your feedback. The latest phishing scam starts with an e-mail masquerading as a request from the IRS to take an online customer satisfaction survey.

“Like all phishing schemes, this one is designed to steal your personal information. In this case, the bad guys are after your credit card number.

“Click the link embedded in the e-mail and you’ll wind up at a bogus website that asks you to rate the IRS — on everything from courtesy and friendliness to speed of service — and supply your contact information.

“Hit the submit button and you’ll land on a page that asks for your credit card information. The $80 “reward” for taking the survey will supposedly be credited to your account within the next 3 business days.”

As they say, just because the logo looks right doesn’t mean the site is all it reports to be.

Protect yourself: there’s good information out there on how to recognize legitimate websites, particularly the site on the Microsoft Secutity Site page on Recognizing Spoofed Websites & Phishing Scams, with this tidbit on how to verify a site certificate…

Always verify the security certificate issued to a site before submitting any personal information. Before you submit any personal information, ensure that you are indeed on the website you intend to be on.

In Internet Explorer, you can do this by checking the yellow lock icon on the status bar.

This symbol signifies that the website uses encryption to help protect any sensitive personal information—credit card number, Social Security number, payment details—that you enter.

Screen shot of yellow lock icon in Internet Explorer

Secure site lock icon. If the lock is closed, then the site uses encryption. Double-click the lock icon to display the security certificate for the site. This certificate is proof of the identity for the site.

More info…

 

Bookmark this on Delicious Bookmark and Share

Also available via http://bit.ly/yG6CfS

Categories
Uncategorized

More greeting ecard spam and what to do about it

More bogus electronic greeting cards in my mailboxes, but luckily Hotmail and Outlook catch most if not all of the offending mail… supposedly from “a friend.” 

image

Some friend. I’ve never heard of the sender.

My ISP catches many bogus mails as well in their own spam filter before it every touches my Outlook In box.

According to the Wikipedia wiki on Email spam, most spammers get e-mail addresses of their victims through the purchase of direct marketing email address databases and lists, from newsgroups, company staff directories, though the use of spambots, and through the WHOIS listing available through most domain name registrars (which is where I believe most get my email addresses).

To combat spammers from getting my regular email addresses, I use a separate, unique email address for the technical contact listing on my personal Internet domains and – and the majority of spam targets those addresses.

I also route email from my personal Internet web addresses to Hotmail, using the MSN postmaster to block most if not all spam and attack mails.

For more, see my previous post on spam and what to do about it here… which last year would have weighed more than 750 pounds if converted into regular snail mail junk mail. (See the post for more on the weight of spam. 😉 

More info:

Tags: spam, antispyware, security.

Categories
Uncategorized

Brian Krebs reports on the rise in bogus electronic greeting cards

In his post on Not-So-Friendly Greeting Cards, Brian Krebs of the Washington Post calls out the rise of fake online greeting cards that can install keystroke loggers on to your computer, rather than delivering what you thought to be an innocent e-card from a long lost aunt.



“You might want to think twice before opening that e-greeting card sent to you via e-mail. Cyber crooks have recently been blasting out millions of fake online greeting cards in the hope that recipients will click on the included links and infect their computers with password-stealing viruses.

“Previous e-greeting card scams harbored their viral payload in an infected e-mail attachment, but fraudsters now are simply embedding links in the fake card messages. Anyone who clicks on such a link without the benefit of the most recent security updates for their Web browser is likely to have their PC silently whacked with an invasive keystroke-logging program.


“… It is sad that the state of e-mail security has come to this, but Microsoft Windows users would be well-advised to simply delete any e-greeting cards that land in their inboxes.”


For more info, see the Wiki link on the Storm Worm, and here on Symantec’s site.


Also, here’s the link if the embedded links above don’t work: http://blog.washingtonpost.com/securityfix/2007/07/notsofriendly_greeting_cards_1.html


And see my past note on how there’s no immunity from security vulnerabilities.


More info:



Tags: , , , , .

Categories
Uncategorized

News on the MPack Trojan Attack, and how not to be a victim

Joe Wilcox writes on Microsoft Watch today about the the MPack Trojan, which is impacting customers, primarily in Italy, Germany, Brazil and Japan. 



“This Trojan is particularly insidious, because what people might consider to be safe Websites can infect their computers. Victims aren’t necessarily visiting bad Internet.


“Compromised sites must do more than clean up their code, as the iframe tool can automatically make changes later on. The site administrator’s credentials must be changed to prevent further compromise.

“While waiting for Microsoft’s response, Website designers might want to consider doing away with inline frames.”


eWeek reports that “Researchers at Trend Micro are reporting that as many as 10,000 Web sites have been infected with malicious code that redirects unsuspecting users to a server booby-trapped with drive-by exploits—part of a wave of attacks originating in Italy and now spreading through Europe.


What can you do?


Microsoft continues to encourage customers to follow all of the steps of the ‘Protect Your PC‘ guidance of enabling a firewall, applying all software updates and installing anti-virus and anti-spyware software.

North American customers suspecting infection can obtain free, Microsoft security support by call 1-866-PCSAFETY.


And see my past note on how there’s no immunity from security vulnerabilities.


More info:



Tags: , , , , .

Categories
Uncategorized

Annoyed by Vista’s User Account Control? Gartner’s advice on deploying UAC

In the mailbag this morning was this eweek article on how Vista’s User Account Control (UAC) Will Reform Developers, where a Gartner analyst says that developers should ship software apps that (in some cases) don’t require administrator rights. Speaking at Gartner’s IT Security Summit this week, analyst Neil MacDonald said UAC “has plenty of people confused regarding what, exactly, it is.”


In case you missed it, here’s a technet article on UAC that explains how “Windows Vista makes it possible for organizations to deploy a more manageable and secure desktop in which administrators can run as standard users (formerly users) and still perform administrative tasks.”


Although gizmodo noted that UAC was “pretty much the most annoying OS feature I’ve ever dealt with” it does have benefits. As Peter Watson notes (Microsoft Australia’s chief security advisor)…



“There has been a lot of misunderstanding in the market around User Account Control (UAC). If you look at it from an architectural direction User Account Control is a great idea and strategically a direction that all operating systems and all technologies should be heading down.”


Of interest: this article on how to make User Account Control (UAC) less annoying.



“[Gartner’s] MacDonald had additional advice on deploying UAC:


  • Use the migration to Windows Vista as a catalyst to have more users run as “standard user.” This may not be appropriate for all users, but can be for many.

  • For administrators, require approval when an administrative task is attempted.

  • When critical vulnerabilities are announced by Microsoft, see if the malicious code is restricted to running in the context of the user.

  • Note that if the organization’s goal is to “lock down” the computing environment, UAC won’t be enough, and third-party tools will be required.”

Of interest…



Tags: , , , .