Saturday, February 7, 2009

***How To Safeguard Our Personal and Financial Data***

Nowadays, our personal and financial data is private information. While we want to sign up to be a member of a website, we always need to fill in the application form through internet with our personal information such as name, age, gender, date of birth, email address, password and etc. Different application form requires different information that we need to fill in.

In order to avoid our data being stolen by hackers, we have to know that how to safeguard our personal and financial data.Here are some suggestions we recommend to protect our data won’t be illegally used by others:

  • Try not to use the password that easily guessed by others. As we know, people always love to use password like their date of birth, identity card number and any number easy for us to remember.
  • Don’t reveal any personal information and password to anyone.
  • Remember to log out before u close the website that u logged into. If not your personal information will be stolen. This would be happen in cybercafé if u didn’t do it. Others can access it into the website that u logged in. We don’t suggest you log in to the related websites such as bank account. It is not safety if you are at outside.
  • Install antispyware and antivirus software. For example, Kaspersky, Norton, Bit defender and 360 safe are mostly used by users nowadays.

☆Review ~ On a post on Internet Securiry from My E-Commerce blog☆

Nowadays, users of internet to dealing business or sharing own information such as blogging is fastest growing. Since the internet services bring to the public and many people or businesses rely on it, the security of internet becomes an important issue.

Most of the issue of internet security is spam mail, viruses, Trojan horse, bot-net, hacker etc. Most of the internet user have their own email account, spam mail always attack our mailbox, sometime it contains with viruses and Trojan horse. Users have to spend time to delete all spam mails. Once we open the mail, the virus will attack our computer and disturb some programme’s function. If it contains with Trojan horse, the horse will stay in our computer and will stolen some information then send it out itself. Maybe we will not feel that how serious of the problem, we only realise when the problem bring impact. Once the computer contains with viruses or Trojan, it consider as unsafe anymore, the data we key in and save will be steal out. Such as online banking service, if the data had been stole via internet, then we might have some losses. Teenagers create some virus, initially they just want to test their own skill, but it becomes disaster in IT industry.

Hacker is famous in the field of internet security. As we know from the real case, most of the hacker is teenager. Most of the young hackers are not consider as black hats; they try to hack the website because of their own training purpose. If the website is for doing business or consists of personal information, must be highly preventing the hacker.

If you have a website, you should always back up the data on the website because it will help you to recover your website soon. When surfing internet must be careful to prevent of unknown link or data receive. Most of the time we can prevent from the virus attack if we always were careful.

Thursday, February 5, 2009

The threat of online security:How safe our data?

Nowadays, people is getting more rely on Internet, without that, people can't find their important data, check information and stored their data. But sometimes the websites are not so safety for the users to use. There are some types of threat of online security that the user facing during they surf Internet such as computer viruses, distributed denial of service attacks, worms, Trojan horse and phishing.

Computer viruses is a computer program that can copy itself and infect a computer without the permission or knowledge of the user. A true virus is only can spread from one computer to another when its host is taken to the target computer, for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD or USB drive. Sometimes users will confuse viruses with computer worms and Trojan Horse but it is totally different.

Distributed denial of service attacks(DDoS Attack) is an attempt to make a computer resource unavailable to its intended users. Although a Denial of service does not usually result in the theft of information or other security loss, it can cost the target person or company a great deal of time and money. Typically, the loss of service is the inability of a particular network service is the inability of a particular network service, such as e-mail, to be available or the temporary loss of all network connectivity and services. A denial of service attack can also destroy programming and files in affected computer systems.

Worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes and it may do so without any intervention. Worm unlike virus because it does not need to attach itself to an existing program. Worm almost always cause at least some harm to the network, if only b consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

Trojan horse is a form of malware that appears to perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to he host machine. Trojan horse payloads are almost always designed to cause harm but it can also be harmless. There have many types of Trojan horse payloads such as server Trojan, downloader.

Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as user name, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.Phishing is typically carried out by e-mail or instant messaging and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.

In conclusion, users online have advantages and disadvantages . If you have prepare some anti-virus software, this will have lesser Internet threat and you can online happily.

Wednesday, February 4, 2009

Phishing: Example and its prevention methods

What is Phishing??
In the field of computer security, phishing is a fraudulent attempt to acquire confidential information such as user names, passwords and credit card details by pretending as a trustworthy entity in an electronic communication.

Websites that are frequently spoofed by phishers include popular social websites (YouTube, Facebook, MySpace, Windows Live Messenger), auction sites (eBay), online banks (Wells Fargo, Chase), online payment processors (PayPal), or IT Administrators (Yahoo, ISPs).

Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake window whose look are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to fool users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures. The best way to protect ourselves from phishing is to learn how to recognize a phish.


Phishing Examples:
Email users are being bombarded with authentic-looking messages that instruct them to provide sensitive personal information. Phishing occurs when a consumer receives a deceptively-legitimate looking email from what appear to be a reputable company.

















What to look for in a phishing email:
  1. Generic greeting- Phishing emails are usually sent in large batches. To save time,
    Internet criminals use generic names like "Chase Bank Customer Update Department" so they don't have to type all recipients' names out and send emails one-by-one. If you don't see your name, be suspicious.
  2. Forged link- Even if a link has a name you recognize somewhere in it, it doesn't mean it links to the real organization. Roll your mouse over the link and see if matches what appears in the email. If there is a discrepancy, don't click on the link. Also, websites where it is safe to enter personal information begin with "https"- the "s" stands for secure. If you don't see "https" do not proceed.
  3. Requests personal information- The point of sending phishing email is to trick you into providing your personal information. If you receive an email requesting your personal information, it is probably a phishing attempt.
  4. Sense of urgency- Internet criminals want you to provide your personal information now. They do this by making you think something has happened that requires you to act fast. They faster they get your information, the faster they can move on to another victim

PayPal Phishing Example:

PayPal is an online payment solution provider. It's like an online bank account at which you can receive funds and through which you can pay for products and services that you purchase on the web.

PayPal scam emails have the characteristic phishing attack features. The email subject is usually quite distressing and upsetting such as "Your PayPal account has been hijacked", "Your PayPal account has been blocked" etc. Some even come in milder forms such as "An email address has been added to your PayPal account" which, though, seem harmless, are bound to elicit your interest.

Also, and this is important, a legitimate email from PayPal will be addressed to you - that is, it will carry your name (first name and last name). The phishing emails will, usually, not have this information - in most cases, scam artists have access only to the email address and not the full name of an individual.

How to Prevent Phishing Attacks??
Preventing phishing attacks does not require advanced security skills. Following some basic precautions can significantly reduce this growing problem.

Keep Your Email and Instant Message Addresses Private
The best way to keep yourself from being tempted to respond to a phishing scam is to prevent them from landing in your email box in the first place. You may find it useful to have a separate email address for financial institutions, one for trusted friends and family, and one for general or public use. Many email providers will allow you to redirect emails from each of these different addresses to one account to minimize the inconvenience of checking each account. Do everything possible to keep the address you use for financial transactions as private as possible.

Immediately Report Suspected Phishing Contacts
If you do receive a message you suspect to be a phishing scam, call the customer service phone number right awayto confirm whether you've received an actual message or not. In addition, almost every bank and credit card lender has a website where you can report suspicious emails and instant messages. Typically, they will ask you to fill out a simple form that will give them enough information to trace the origin of the perpetrator.

Anti-Phishing Software
Some of the newer web browsers like Internet Explorer 7 or Firefox 3 have built-in software that can detect and warn against phishing links. Make sure the browser options are properly configured to enable these options. For more protection, an anti phishing toolbar int he browser might be considered. Some of them can check online lists of websites with known problems.

The best way to avoid becoming a phishing scam victim is to use your best judgment. No financial institution with any sense will email you and ask you to input all of your sensitive information. In fact, most institutions are informing customers that "We will never ask you for your personal information via phone or email".



Related link:
http://en.wikipedia.org/wiki/Phishing
http://www.phishtank.com/what_is_phishing.php
http://www.privacyrights.org/ar/phishing.htm
http://www.webdevelopersnotes.com/articles/paypal_phishing_scam_email_attacks.php
http://ezinearticles.com/?How-to-Prevent-Phishing-Scams&id=1147318
http://security-antivirus-software.suite101.com/article.cfm/how_to_protect_yourself_from_phishing_attacks

Posted by Moo Hui Sin~