The number of Britons targeted by cybercrime is expected to overtake conventional crime for the first time this year.
Internet security experts claim that up to 19 million people will come under attack from hi-tech criminals, generally involved in identity theft.
A burglary or someone smashing your car window to grab a radio, used to be the sort of crime we were facing, but today’s Britons are facing up to the growing problem of internet crime which can be carried out from the other side of the world as well as on the next street.
These so-called “Hacktivists” are targeting big businesses, such as the VISA and MasterCard credit card companies and since the release of the WikiLeaks furore, this has highlighted concerns about cybersecurity.
UK police officers specialising in hi-tech crime conducted a survey which found that 79 per cent of people have noticed a steep increase in cybercrime activity within the past six months. Identity theft and so-called malware attacks, in which spying software is unknowingly downloaded on to a home computer, are considered among the greatest threats.
Alarmingly, recent studies have shown that many of the people using Wi-Fi at home to access the internet do not have security in place. This means it is possible for criminals to hack into their system and steal identity details. The survey, commissioned by web security experts found that almost one in two people now believe they are more likely to fall victim to cybercrime than conventional crime.
The rise of smartphones, tablet and notebook computers is making users more vulnerable.
The reality is that technological advances provide not just benefits for the legitimate users, but also present potential opportunities for criminals to exploit. Users need to ensure they think about security and protection of their devices and their data. Security experts from MYSecurityCenter say “Anyone who spends a lot of time online should commit to taking their online personal protection seriously.”
Using Twitter, the popular microblogging site, could land your computer in trouble. A rogue worm has hit the site, which directs the victim to an IP address, asking to download a fake antivirus.
MYSecurityCenter is warning you – if you are Twitter user – beware. We suggest to all Twitter users to refrain from downloading any links posted on Twitter. Exercise caution while clicking on any link in tweets inside the e-mail message, instant messages or web pages.
Twitter is a website offering a social networking and microblogging service, enabling its users to send and read messages called tweets.
Tweets are text-based posts of up to 140 characters, displayed on the user’s profile page.
The scam spreads through malicious links abusing the goo.gl URL shortening service. If an unwitting user follows the links, they are directed to a fake anti-virus page after multiple redirections.
From there, the domain redirects the user to an IP address pushing a fake antivirus. Once on the website, the victim gets a warning that his/her machine is running suspicious software.
The user is then invited to remove all the threats from their computer by downloading a fake anti-virus called Security Shield.
Del Harvey, director of Trust and Safety for Twitter, had tweeted that the company was working to remove the malicious links and reset passwords on compromised accounts.
Similar attacks on Facebook, Orkut and other sites had come to light. With their growing popularity the networking sites are a favourite with hackers.
ShareMany thanks to John from Breeze PC who got in touch with VB today with some worrying news of a phone-based virus scam.
John told us that he’s been hearing more over the last three weeks of a telephone scam hitting Island residents.
It’s an old scam, but Island residents seem to be the current target for the scammers.
He told us how it works,Someone phones up a home and says they are phoning from Microsoft and think they have a problem with their computer or their antivirus. They may say that they think the free AVG antivirus or similar they are using is not good enough.
They will then offer to log on and fix the problems on the computer and take a card payment of anything from £80-200 to ‘fix’ any problems.
They seem to be using scare tactics to trick people in to letting them log on to their computer via remote software and then picking up small details like cookies or some spyware and presenting them as ‘threats’.
Microsoft or any computer company should not phone anyone up out of the blue, if you have a computer issue it would nearly always be you that identifies the problem and contacts your local computer company to fix it.
John said that he’d heard of at least ten cases in the last couple of weeks, so if you get a call put the phone down and don’t even think of handing over your credit card details.
A white paper written by not-for-profit IT security association ISACA claims to show that smartphones and other high-end mobile devices pose a serious threat to confidential information, since they effectively allow insider access to the company IT network.
The use of wireless networks, which are typically less secure than wired networks, leaves information at greater risk for interception.
Mobile devices, says the research, can also be the targets of malware attacks as employees carry them beyond the protection of their company’s network. Lack of enterprise control of physical devices, along with the growing practice of employees using personal devices for business, has increased mobile device risk levels.
According to Christos Dimitriadis, the lead author of the ISACA report and a respected technology expert in Greece, the threats posed by smartphones are very real since the handsets are now coming under attack by a new generation of malware.
So what is the solution?
Dimitriadis says that the answer is a holistic approach to defending the company resources against smartphones, since malware and data leaking issues are problems that can be countered using a positive approach to security.
Whilst authentication and encryption clearly have their place in the mobile security arena, the ISACA professional says that a governance framework such as ISACA’s COBIT or Risk IT will help businesses to ensure that process and policy changes are implemented and understood.
The white paper goes on to say that mobile technology can offer enterprises several highly valued benefits – from increased productivity to better customer service – but it is important to recognise that these benefits can be realised only if the enterprise manages the technology effectively.
Internet criminals want your data
Your identity and your reputation are very precious. Here is our advice about how to look after them online.
Online crooks will try to trick you into giving them your information, for example by sending fake emails with links to convincing but fraudulent websites. They want to spend your money, tap your bank account and use your credit cards.
Protect yourself against this kind of phishing and spoofing:
• Block unwanted spam email – this will also block most phishing emails.
• Use a modern web browser that will warn you against known phishing websites.
• Don’t give away your password or any other personal information.
Remember that there’s no delete button on the internet. If you publish something, even if you delete it later, you have no control over how it is stored, copied or archived. Think twice about publishing something you might later regret.
Choose strong passwords – using a mix of several words, letters, numbers and punctuation. Use different passwords for different sites to make it harder for identity thieves.
You also need to be careful about the information you give away about yourself online. For example, be careful about giving away too much information on blogs and social networking sites like FaceBook, Twitter or MYSpace. Identity thieves can piece together your identity from public information piece by piece like putting together a jigsaw.
It arrives in an e-mail with “here you have” in the subject. ABC News reported that among others NASA, Comcast, and ABC’s parent Disney were hit hard. This threat isn’t a worm. It can’t attack your computer by itself. In fact, it can’t do anything at all unless you click on the wrong link, once you do that it can infect connected computers and USB drives. The fact that it managed to spread widely through various multinational businesses doesn’t say a lot for the security savvy of the workers.
People! DO NOT click links in e-mail messages from unknown people. DO NOT even click links in e-mail messages from your friend, since the real source of the message might be a virus. DO keep your computer protected with an antivirus. That way if you click the wrong link in a fit of weakness, you’ll still be protected from whatever new threat replaces “here you have”.
Malware is a malicious term for viruses and is well-known that it can wreak havoc with your computer. Malware is from time to time known as a virus, Trojan horse, and certain kinds of hijacking spyware. These forms of spyware are programmed to gather private information like online transaction passwords, internet banking passwords, email passwords, credit card information, and social security numbers for internet fraud. A large amount of the malware can alter default program settings to provide an attacker access to your computer operating system or network. It can also track an internet user’s regular websurfing activity to obtain data. This information is then sent off to the criminal with the help of an email without the users knowledge or intercession. People who install peer to peer programs online have a good probability of their computer being contaminated with malware.
To prevent getting ripped off, do not download any software program that pops up saying; “Warning Adware Detected within Your Computer”. This is fake software and the spyware that infects your PC will be the fake anti spyware software package that you have just installed.
– And make sure that your PC is protected by Antivirus software.
The SMS-Trojan for Android which has been released on the Russian market is a fact, it is evil and steals money from the infected user. Luckily it seems it is only doing harm within the Russian territory. But, this is not the first Malware released for Android, and it is definitely not the last. Continue reading →
Den 27. november er foreløbig datoen for Brian Nielsens store kamp mod Evander Holyfield. Brian er startet den hårde trænning og træner i øjeblikket to gange om dagen, i næste uge går turen til Tyskland hvor den intensive boksetræning skal foregå. Inden da stiller Brian op til et online video interview, hvor alle har mulighed for at stille spørgsmål til den folkekære bokser.
Hvorfor gør han det?
Kan han komme i god nok form?
Er Holyfield ikke lidt for farlig?
Tror han selv han kan vinde?
Osv, osv Continue reading →
Customer Support/Service & Sales for Norwegian, Swedish and Finnish clients.
The ideal candidate should speak one or more of the above languages together with a high level of English. Other languages are an advantage.
You will be required to give customer support for which full training will be given. This role also includes text translations and ideally you also have some sales background as you will be required to up-sell to existing clients. Excellent basic and commission for the right person.
Please send us your application letter and your cv to firstname.lastname@example.org