Cyber Threats

There are many subjects that I could address each week. As I have long been in the computer business, I have chosen cybersecurity threats as my subject.

What is a cybersecurity threat?

Any technique to acquire sensitive personal information is a cybersecurity threat. Cyber Security is any act or technique you chose to use to protect those same accounts.

This gives us two areas we need to address. First what is a threat. Second, how to defend against a threat.

Here is a short list of the various types of Cyber threats:

Computer Viruses

Threat

This is the most well know of all cyber threats. A computer program written to alter the way a computer operates. These programs are loaded on to your computer without your permission or knowledge. Once on your computer, the virus replicates and executes itself. This is when the damage begins.

Protection involves a careful evaluation of free software and download from file sharing sites. Email from unknown senders are a popular method to deliver a virus to you computer.

Protection

Most modern web browser today have security settings that can be invoked to defend against online threats. One of the best ways to fend off viruses is up-to-date antivirus software. There are many vendors of anti-virus software, and some are free. I personally use 2 that are free; Sophos and AGV.

Spyware

Threat

Any program that monitors your online activities or installs programs without your consent to capture personal information is a spyware package. While this may be difficult to hear, reading the terms and condition of a software package or website is a good way to develop an understanding of how your online activity is being tracked. We are all being tracked online. Adware, while mostly benign, tracks your online activity to show you relevant product ads that you may find interesting. Google and Facebook are under investigation the last couple of years for monitoring, collecting and the selling user account personal information.

Protection

Anti-virus software with Spyware protection. Again AVG Anti-virus software is a free package.

Hackers and Predators

Threat

People, not computers, are responsible for all cyber threats. Hackers and predators are computer programmers who victimize other for their own profit and greed. The break into computer to steal, change or destroy information in form of cyber terrorism. They can compromise your credit card, bank accounts, lock you out of your computer and steal your identity. All of these things have happened to me personally. Online tools with your bank, credit card provider, and internet service provider can help protect against Identity theft.

Protection

Call you credit card provider and ask to enroll in their security program. On all of my cards that service is free. Call your bank and ask to be enrolled in their security program. These services have caught at least 5 incidents in the last year where someone was using my card information in Florida and Las Vegas.

Phishing

Phishing Scams

Threat

Posing as a trusted person or business is the trade craft of the email phishing attack. Phisher attempt to collect sensitive financial or personal information through fraudulent email or text messaging. Phishing attack are by far the most successful method to accomplish a computer security breach.

Protection

Antivirus programs with identity theft protection can be ‘taught’ to recognize phishing threats.

I look for several key elements in the email that are ‘tells’ of a phishing email.

1)Message is sent from a public email domain

  • Legitimate companies do not use @gmail.com. Even Google does not use @gmail.com

2) Domain name is misspelt

  • I bet you have seen this recently; msonlineservices@microsfrtfonline,com. The spelling error is deeply embedded in the domain name

3) Email is poorly written

Why are so many phishing email so poorly written?

  • Scammers aren’t very good at writing.

  • Many are from non-English speaking countries

  • Current technology for language translators programs have some issues with syntax

4) Suspicious links and attachments

  • “Payload” is the term used for Links and attachments delivered in phishing emails

  • Think of Payload as a bomb.

  • Do not click on suspicious links or attachments (even if it is from someone you know)

5) Message creates a sense of urgency. These are some messages I have seen in the last week.

  • “Your email account will be closed”

  • “Your computer may be infected so click here immediately”

  • “This deal will expire in 60 seconds”

Many of these hacks seem to come from a friend or business you know citing a reference to a link or photo they wish you to see. A good habit to adopt is to roll over the (From Name) to see if it is really from a trusted source. Many times the email address will NOT be from your friend.









Previous
Previous

December 5 Meeting Minutes