Security Information |
|
From Spyware with Love!
It's late. You've been scouring the web for that perfect present for your Aunt Bess in Idaho. You finally find it at presents4aunties.com. The site looks a little rough on the edges, weird colors and such. But they have that gift you know will make Aunt Bess add you to her will. You purchase the gift, log off and head to bed. Tired but happy. The next day, coffee in hand, you turn on your computer. That's strange you say, it's awfully slow this morning. Finally it's booted and ready to go. You open your browser to check the Cow Tipping Blog for the latest posts. What's this you say, My Homepage is now longer the Blog, but a site trying to sell me a DVD of the Smurfs vs. the Terminator! Oh well you say, not quite fully awake. You type in the URL for your Blog and wait. And wait, and wait. Finally it's up! You start to read the mornings postings. You're into the second post about the upcoming Cow Tipping Championship in Vegas when a Popup appears and says you need to go to heartburngone.com for the new revolutionary cure for heartburn. Click here now it says and receive a free gift, the secret cure for Baldness! Weird you think, you click the X to close it. You don't realize by clicking the X that a small hidden piece of code has just been downloaded to your computer. You finish the Blog postings and decide to check your Bank Account. You type in the URL and wait, and wait. Finally the Bank Logon appears. You log in, completely unaware of the code, which is actually a Keylogger, is recording your every keystroke. The Transaction is there for Aunties gift, you're so happy. You log off and remember you forgot to email that document for your Boss. That's ok you say, I can log in from here and send it! Technology is so great ! You log into your work portal and access your email program, find the document, attach it to the email form and send it. You vaguely remember it had something to do with the updated personal info list for all of the employees at your job. It includes their Addresses, email addresses and Direct Deposit Account numbers, also their Logon Names and Passwords to access the Computers at work. Darn you say as another Popup appears, what's wrong with this computer? Well at least you didn't forget the Bosses Document. Wouldn't want to get in trouble with the Boss. You've a great job, working for the Trans Global Bank after all. Offices all over the world don't you know. Well time to check your Anti-Virus program for updates. Hmmm it says no updates kneeded. You notice the miss-spelling but what the heck, those things happen. Geez the computer is really slow! You decide to reboot, hoping that will fix it. Gripes, now it won't even boot! At least there's a little extra money in the ole Bank Account to get it fixed. The above is fiction. No animals were harmed. But it's scary huh to think it could happen. Granted it's a worse case scenario, but I wonder... Be smart out there people, learn how to use your Anti-Virus and Anti-Spyware programs. Keep them updated, and it they don't work well for your surfing habits, find programs that will. Keep your computer protected, your well being may depend on it. About the Author: Doug Woodall has a website at http://www.spywarebiz.com There he provides free information and recommended products to combat Spyware. He is a member of the IWA (International Webmasters Association) Article edited for proper content by Wendy McCallum Permission to copy ok as long as about author info remains with article. Copyright 2005 SpywareBiz
MORE RESOURCES: Officials detail increased D.C. security for certification, inauguration The Washington Post Homeland Security Department to Release New A.I. Guidance The New York Times Nuclear power for military bases will increase our national security Breaking Defense U.S. ambassador bashes Mexico’s security efforts. Mexico’s president pushes back - Los Angeles Times The UN cybercrime convention threatens security research. The US should do something about it CyberScoop New 'spectral fingerprint' atlas of satellites aims to improve space security University of Arizona News Opinion | Trump’s national security wrecking crew The Washington Post ‘Never trust, always verify’: The zero trust approach to network security United States Army Brief altercation between fans mars France-Israel soccer match despite heavy security The Associated Press St. Francis Seraph hires security guards for Christmas, Nativity display visitors as crowds still plague area WCPO 9 Cincinnati Trump’s National Security Team Keeps Getting More Extreme The New Republic The Fastest Airport Security Line You Don’t Know About The Wall Street Journal Video: How The Fortinet Security Fabric Is Combatting Cybersecurity Threats And Talent Shortage Channel Insider AI’s impact on the future of web application security Help Net Security The campus will be closed to anyone who is not a student, faculty or staff member. WVTM13 Birmingham Tuskegee president releases security updates following shooting WIAT - CBS42.com Do Titans QB, Coach Have Job Security? Sports Illustrated Inside The 2024 Security Benchmark Report Security Magazine Homeland Security Department releases framework for using AI in critical infrastructure The Associated Press Your favorite security leadership podcasts Security Magazine 3rd Annual U.S.-Mexico Defense and Security Roundtable smallwarsjournal Tuskegee University Shifts Security, Facilities Leadership Tuskegee University France draws with Israel in high-security operation to reach Nations League quarterfinals with Italy The Associated Press Endpoint Security from BlackBerry BlackBerry Trump names Florida’s Rep. Mike Waltz as national security adviser Nebraska Examiner Akamai: 84% of security professionals experienced an API security incident in the past year SecurityInfoWatch Mexican Officials Arrest Top Security Official in Mayor’s Beheading The New York Times ESA opens registration for 2024 Town Hall Broadcast SecurityInfoWatch ‘We’re just a target’: Pickleball players call for more security Camas Washougal Post Record New infosec products of the week: November 15, 2024 Help Net Security After student allegedly threatens classmate with gun, Ambridge Area School District makes security changes CBS Pittsburgh Linn County’s Food for Health pilot program aims to improve food security, support local economy KEZI TV South Florida campus security officer arrested after attempting to meet minor for sex WPBF West Palm Beach Microsoft Patch Tuesday, November 2024 Edition Krebs on Security Trump Picks Kristi Noem for Homeland Security Secretary The New York Times Tom Homan, Trump’s ‘Border Czar,’ on Border Security The New York Times Silverfort Buys Rezonate to Fortify Identity Security Muscle BankInfoSecurity.com Rand Paul Will Continue His COVID-19 Investigations From Atop the Senate Homeland Security Committee Reason An Interview With the Target & Home Depot Hacker Krebs on Security NIST report on hardware security risks reveals 98 failure scenarios Help Net Security Who Is Michael Waltz, Trump’s Pick to Be National Security Adviser? The New York Times |
RELATED ARTICLES
Secure Your PC From Hackers, Viruses, and Trojans Viruses, Trojans and Spyware: Protecting yourself.No user on the internet is safe from assault. Internet Privacy Over the past few years as the internet has become more and more popular, privacy has become a major issue.Just as if you are walking down the street and can be watched, every click of your mouse every website you browse, or file you download, is traceable. Free Ways to Tackle Threats to Your Computer Protect Your PCHaving problems with your pc?Do your kids, family or friends fill it with all the stuff they find on the internet?Your computer, just like your car, needs to be serviced regularly to keep it running efficiently. You wouldn't fill your car up with petrol from an old rusty can with a layer of dirty water on the bottom, so you shouldn't allow your pc to be treated that way either. 3 Steps to Ending Scams and Virus Problems Watching how the traditional media covers the latest virus or scam would make one think we are all innocent victims and it is the "evil Internet" at work once again. News flash! Innocent? More like uninformed. SPYWARE - Whos Watching Who? I am in the midst of Oscar Wilde's The Picture of Dorian Gray. "The basis of optimism is sheer terror. Just Whos Computer is this Anyway? Well, this is an article I never thought I would have to write. Computer ownership was just not something I thought people would get confused over but, after overhearing a number of conversations last week from my co-workers, I realized that quite a few people just don't know how cut and dry this topic is. Message Board Security Problems Security leaks can be a big problem for any site using a message board. Hackers can actually use your message board to go in and change things on your site. The Attack of the Advertiser - Spy Mother Spy The menacing campaigns that drive the corporate spyware and adware market is developing way out of hand. Who are these companies and how do they get away with it? They are costing computer users millions with their sneakware system of promotional crap!We have some serious problems. Backup and Save your business! There you are busily typing away on your PC or yourLaptop, and all of a sudden the strangest thing happens.The screen goes black, extinquished like a candle in thewind. Internet Small Business and Fraud Be careful of sites that promise to send you "instant pins". These companies usually have lax credit card security and can afford customer charge backs from fraudulent transactions. 5 Simple Steps to Protect your Digital Downloads A couple of days ago, I was searching for a popular eBook online. Now I'm not going to tell you the name of this eBook for reasons you'll understand in the next few minutes. With the Rise of Internet Crimes, Users are Turning to High-Tech "PI's" for Solutions High-tech private investigators are becoming the answer for many Internet users who have been victimized online. The use of e-mail by that unethical element lurking in cyberspace rings all too common these days. Whats All This I Hear About Firewalls? At this point, if you've got the whole "turning the computer on" thing down; you are ready to learn about firewalls. Whether you use your computer for business or pleasure, it is important to have a firewall. Traditional Antivirus Programs Useless Against New Unidentified Viruses! Every now and then you can read about a new virus and the damage it causes. The millions viruses costs companies each time they strike. Lets Talk About Antivirus Software! Nowadays more and more people are using a computer. A lot of them use it at their work place, but an increasing number of computer users have also discovered the need to have a computer at home. How To Give Away Your Personal Information Identity Theft and Your Personal Information--------------------------------------------Identity theft is apparently the "in thing" these days. By media accounts, hackers and evildoers lurk everywhere trying to steal your personal information. 8 Surefire Ways to Spot an E-Mail Identity Theft Scam! The E-Mail Identity Theft Scam is running Rampant. These E-Mail Scam artists will go to great lengths to Get Your Bank Account information and Steal your Identity. How to Protect Yourself from Viruses, Spyware, Adware, and Other Nuisances Spyware/adware is a new major concern for PC users everywhere. Infecting your computer silently (usually installed with programs that seem harmless), spyware and adware can collect personal information about you, as well as cause pop up ads to come up all of the time, changing your browsers home page, sometimes even completely disabling your computer's usability. Web Browsing - Collected Information You may not realize it, but as you are surfing the web all sorts of details are being left behind about your computer and where you have been. Most of this information is used harmlessly in website statistics, but it could also be used to profile you, or identify you as a vulnerable target for an exploit. The Bad Guys Are Phishing For Your Personal Information Do you know what "phishing" is?No, it doesn't mean you grab a pole and head to the late to catchsome phish.The official Webopedia definition of "phishing" is as follows:The act of sending an e-mail to a user falsely claiming to be anestablished legitimate enterprise in an attempt to scam the userinto surrendering private information that will be used foridentity theft. |
home | site map |
© 2006 |