Security
Security
Malicious,
Spam Infected/
Hijacked
Websites
Internet Social
Pop-up & Pop- Engineering
under Attacks
Windows
Pop Ups & Pop Unders
Bringing Malware to A
Browser Near You
Beware of urgent messages that display on
your computer in the form of pop ups, which
are windows that display with a message in
order to get you to click thereby installing
malware on your computer.
Remember an ounce of prevention is worth a
pound of cure:
Do not click on any such popups Instead,
contact your IT Department by using Sysaid or
[email protected].
Pop-unders are programs that appear under
your browser window of which you only see
part.
Closing Pop-ups
Do not click anywhere inside the pop-up itself.
Use the close command to close Pop-up
Windows: Alt-F4.
Close your entire browser window using Alt-F4.
Control, alt, delete to bring up task manager
and close out of the window by closing program
you do not recognize.
Close down your entire computer.
Reducing Your
Chances of Infection
Be wary of downloading Freeware or Shareware
as often these type of applications are used to
conceal malware.
“Do not click on unsolicited invitations to
download software of any kind”
Avoid any peer-to-peer (P2P) or file sharing
applications including those used to stream
audio and video (Mullins, 2008).
Some peer to peer networks include Napster,
Gnutella, Limewire, Morpheus (Wikipedia, n.d.)
What is Spam?
Simply put, spam is junk mail which appears
harmless but is “time-consuming to remove” and
clogs up email inboxes” (Lee, 2007, 11).
Some spam may simply be solicitation e-mail, but
now a new kind of spam is emerging which is
malicious in nature.
One off-shoot of malicious spam engages in what is
known as phishing or soliciting your private
information by pretending to be from trusted
companies such as your bank or another high-
profile company: phishing is a means of identity
theft.
Beware of the
Following Types of
E-mails:
Potential Phishing:
Emails from Ebay or Paypal about payment disputes
E-mails from your bank asking for your confidential
details
Remember reputable companies do not e-mail users asking
them to confirm passwords, account numbers, name,
correct e-mail address.
Potential Malware:
Emails about celebrity news asking you to click for
more information- Potential Malware.
E-mail greeting cards (including those from Hallmark,
Greetings.com, and 2000Greetings.com)
E-mails in which you are asking to unsubscribe to
something you never subscribed to in the first place.
Phishing E-mail Examples
Ebay Bidding Disputes-
Phishing Email
New CareerBuilder Phishing
Malcode
Takes You to Fake CareerBuilder Website shown
below
How to Spot Phishing?
(Vamosi, 2008).
New Attacks
Clickjacking Coming to A
Computer Near You?????
Just Tuesday a new threat was released in the form
of a JavaScript game which appears on a webpage
meant to distract users while in the background the
target’s Adobe Flash player settings are changed
by the user’s click ultimately allowing hackers to
take control of the web camera and microphone to
conduct malicious surveillance (Narine, Dachev, &
Odonnell, 2008).
How to protect yourself- beware of where you click
and on your personal computer you should read
and implement the Security advisory:
http://www.adobe.com/support/security/advisories/apsa
Spear Phishing Through
Linked In
Spear Phishing is a type of phishing which
“address recipients by name in the subject line
and body of the message to appear more
legitimate” (Krebs, 2008, 2).
Thousands of LinkedIn users recently received
an e-mail urging them to “open a malicious file
masquerading as a list of business contacts”
(Krebs, 2008, 1).
Once users clicked on the attached list of
contacts, malicious software was run which
“attempts to steal user names, passwords, and
other sensitive date” (Krebs, 2008, 4).
Important Message
Cyber Security (securing your computer
through both Internet and e-mail) is important:
your computer is the key to all the important
information you see daily.
Be savvy, do not click unless you are sure of
who it is from and what it is you are opening.
Remember once someone else has access to
your computer they can use it for everything
from sending e-mails to selling stolen goods.
If you have any questions, please feel free to
contact the IT Department with any questions.
We are here to help you keep your computer
Useful Websites for More on
Security
http://news.cnet.com
http://blog.washingtonpost.com/securityfix/
http://www.technewsworld.com
http://www.mcafee.com/us/threat_center/default.as
http://www.computerandinternetsecurityblog.com/
http://searchsecurity.techtarget.com
http://www.symantec.com/norton/security_respons
References
FraudGuides. (2008).How do I stop popups? Retrieved on October 8, 2008, from http://www.fraudguides.com/internet-stop-popups.asp .
Grimes, R. (2006). Password size does matter. Retrieved on October 6, 2008, from http://www.infoworld.com/article/06/07/21/30OPsecadvise_1.html.
HowStuffWorks, Inc. (2008). How phishing works. Retrieved on August 30, 2008, from http://computer.howstuffworks.com/phishing.htm.
Krebs, B. (2008). Spear phishing scam targets LinkedIn Users. Retrieved on October 8, 2008, from http://blog.washingtonpost.com/securityfix/.
LeClaire, J. (2007). Social networking sites in the crosshairs. Retrieved on October 8, 2008, from
http://www.technewsworld.com/story/54932.html?wlc=1223565016.
Lee, M. (2007). Securing your PC: A complete guide to protecting your computer.Computer Step: Warwickshire, UK.
Leyden, J. (2006). Search results lead to malicious sites. Retrieved on September 10, 2008, from
http://www.theregister.co.uk/2006/05/16/mcafee_search_risks_survey/.
Microsoft. (2004). The antivirus defense-in-depth guide. Retrieved on August 12, 2008, from
http://download.microsoft.com/download/a/d/c/adc58511-8285-465b-87fb-d19fe6d461c1/Antivirus_Defense-in-Depth_Guide.pdf
McDowell, M. (2006). National cyber alert system cyber security tip st06-001 understanding hidden threats: rootkits and botnets. Retrieved on October
6, 2008, from http://www.us-cert.gov/cas/tips/ST06-001.html.
McDowell, M., Rafail, J. & Hernan, S. (2004). National cyber alert system cyber security tip st04-002. Retrieved on October 6, 2008, from
http://www.us-cert.gov/cas/tips/ST04-002.html.
Mullins, B. (2008). XP antivirus 2008 morphs Into XP antivirus 2009-still lies! Retrieved on August 12, 2008 from,
http://billmullins.wordpress.com/2008/07/05/xp-antivirus-2008-morphs-into-xp-antivirus-2009-still-lies/.
Mullins, B. (2008). Open a greeting card e-mail get infected by malware. Retrieved on August 12, 2008, from
http://billmullins.wordpress.com/2008/06/10/open-a-greeting-card-email-get-infected-by-malware/
Mullins, B. (2008). Don’t Open To My Love-Fractalove Keylogger Worm. Retrieved on August 12, 2008, from
http://billmullins.wordpress.com/2008/07/12/dont-open-to-my-love-to_my_lovescr-fractalove-keylogger-worm/.
Narine, R., Danchev, D., & O’Donnell, A. (2008). Researchers raise alert for scary new cross-browser exploit. Retrieved on October 7, 2008, from
http://blogs.zdnet.com/security/?p=1972.
Skoudis, E. (2008). Are social networking sites an easy target for malicious hackers? Retrieved on October 8, 2008, from
http://searchsecurity.techtarget.com/expert/KnowledgebaseAnswer/0,289625,sid14_gci1320820,00.html.
Sophos. (2008). Safe and productive browsing in a dangerous web world: the challenge for business. Retrieved on October 7, 2008, from
http://i.i.com.com/cnwk.1d/html/itp/sophos_safewebbrowsing.pdf.
Steward, J.M. (). Ten ways hackers breach security. Retrieved on August 12, 2008 from,
http://images.globalknowledge.com/wwwimages/whitepaperpdf/WP_Steward_Hackers.pdf.
McDowell, M. & Householder, A. (2007). National cyber security alert. Retrieved on October 6, 2008, from
http://www.us-cert.gov/cas/tips/ST04-001.html.
Vamosi, R. (2008). Report: adware supplies one third of all malware. Retrieved on October 8, 2008, from
http://news.cnet.com/8301-1009_3-10056912-83.html. .
Wailgum, T. (2008). Angelina Jolie tops list of ‘celebrity spammers’. Retrieved on August 12, 2008 from,