Cyber Threats
There are many subjects that I could address each week. As I have long been in the computer business, I have chosen cybersecurity threats as my subject.
What is a cybersecurity threat?
Any technique to acquire sensitive personal information is a cybersecurity threat. Cyber Security is any act or technique you chose to use to protect those same accounts.
This gives us two areas we need to address. First what is a threat. Second, how to defend against a threat.
Here is a short list of the various types of Cyber threats:
Computer Viruses
Threat
This is the most well know of all cyber threats. A computer program written to alter the way a computer operates. These programs are loaded on to your computer without your permission or knowledge. Once on your computer, the virus replicates and executes itself. This is when the damage begins.
Protection involves a careful evaluation of free software and download from file sharing sites. Email from unknown senders are a popular method to deliver a virus to you computer.
Protection
Most modern web browser today have security settings that can be invoked to defend against online threats. One of the best ways to fend off viruses is up-to-date antivirus software. There are many vendors of anti-virus software, and some are free. I personally use 2 that are free; Sophos and AGV.
Spyware
Threat
Any program that monitors your online activities or installs programs without your consent to capture personal information is a spyware package. While this may be difficult to hear, reading the terms and condition of a software package or website is a good way to develop an understanding of how your online activity is being tracked. We are all being tracked online. Adware, while mostly benign, tracks your online activity to show you relevant product ads that you may find interesting. Google and Facebook are under investigation the last couple of years for monitoring, collecting and the selling user account personal information.
Protection
Anti-virus software with Spyware protection. Again AVG Anti-virus software is a free package.
Hackers and Predators
Threat
People, not computers, are responsible for all cyber threats. Hackers and predators are computer programmers who victimize other for their own profit and greed. The break into computer to steal, change or destroy information in form of cyber terrorism. They can compromise your credit card, bank accounts, lock you out of your computer and steal your identity. All of these things have happened to me personally. Online tools with your bank, credit card provider, and internet service provider can help protect against Identity theft.
Protection
Call you credit card provider and ask to enroll in their security program. On all of my cards that service is free. Call your bank and ask to be enrolled in their security program. These services have caught at least 5 incidents in the last year where someone was using my card information in Florida and Las Vegas.
Phishing
Threat
Posing as a trusted person or business is the trade craft of the email phishing attack. Phisher attempt to collect sensitive financial or personal information through fraudulent email or text messaging. Phishing attack are by far the most successful method to accomplish a computer security breach.
Protection
Antivirus programs with identity theft protection can be ‘taught’ to recognize phishing threats.
I look for several key elements in the email that are ‘tells’ of a phishing email.
1)Message is sent from a public email domain
Legitimate companies do not use @gmail.com. Even Google does not use @gmail.com
2) Domain name is misspelt
I bet you have seen this recently; msonlineservices@microsfrtfonline,com. The spelling error is deeply embedded in the domain name
3) Email is poorly written
Why are so many phishing email so poorly written?
Scammers aren’t very good at writing.
Many are from non-English speaking countries
Current technology for language translators programs have some issues with syntax
4) Suspicious links and attachments
“Payload” is the term used for Links and attachments delivered in phishing emails
Think of Payload as a bomb.
Do not click on suspicious links or attachments (even if it is from someone you know)
5) Message creates a sense of urgency. These are some messages I have seen in the last week.
“Your email account will be closed”
“Your computer may be infected so click here immediately”
“This deal will expire in 60 seconds”
Many of these hacks seem to come from a friend or business you know citing a reference to a link or photo they wish you to see. A good habit to adopt is to roll over the (From Name) to see if it is really from a trusted source. Many times the email address will NOT be from your friend.