Kim Komando shares 3 major Holiday Scams currently circulating as reported by FBI
1, Fake Gift cards (graphics seem real in email and malware/scam can occur when attempting to cash in during online purchase)
2. Child Identity Theft (criminals are increasingly targeting kids and teens for ID theft)
3. Holiday charity scams (scammers take advantage of holiday goodwill by setting up charity scams)
Kim Komando also shares 3 safety tips for email, Facebook, and website visitation:
1. Scammers use phishing schemes to steal your information – and your money. Click here to avoid losing your identity to a phishing scam.
2. Hackers can steal your personal information right from your Internet connection. Click here for one simple step to keep hackers from snooping on you.
3. Something you post on Facebook can end up in the hands of identity thieves. Click here for 3 big Facebook privacy changes you need to know about.
An open letter recommending improved balances between national security and privacy concerns was recently promoted by major companies in computer industry
QUOTE: In an open letter to Washington, eight major technology companies are calling for sweeping changes in the way the U.S. government collects information on citizens. The letter was signed by AOL Inc., Apple Inc., Facebook Inc., Google Inc., LinkedIn Corp., Microsoft Corp., Twitter Inc. and Yahoo! Inc. In documents leaked by former defense contractor Edward Snowden, most of these companies have been listed as being among the targets where the U.S. government is extracting digital information as part of a massive surveillance effort.
“We understand that governments have a duty to protect their citizens. But this summer’s revelations highlighted the urgent need to reform government surveillance practices worldwide,” the companies say in the letter to President Obama and members of Congress. “The balance in many countries has tipped too far in favor of the state and away from the rights of the individual rights that are enshrined in our Constitution. This undermines the freedoms we all cherish. It’s time for change.”
Earlier this year, the Australian dating service “Cupid Media” was compromised and recent articles document this, along with importance of using differing passwords, as same password could lead to compromises in email, banking, ecommerce and other websites
QUOTE: An intrusion at online dating service Cupid Media earlier this year exposed more than 42 million consumer records, including names, email addresses, unencrypted passwords and birthdays, according to information obtained by KrebsOnSecurity. The data stolen from Southport, Australia-based niche dating service Cupid Media was found on the same server where hackers had amassed tens of millions of records stolen from Adobe, PR Newswire and the National White Collar Crime Center (NW3C), among others. The danger with such a large breach is that far too many people reuse the same passwords at multiple sites, meaning a compromise like this can give thieves instant access to tens of thousands of email inboxes and other sensitive sites tied to a user’s email address.
Cupid Media actions – “In January we detected suspicious activity on our network and based upon the information that we had available at the time, we took what we believed to be appropriate actions to notify affected customers and reset passwords for a particular group of user accounts,” Bolton said. “We are currently in the process of double-checking that all affected accounts have had their passwords reset and have received an email notification.”
Corporate and business users should track this important change and it’s availability in early 2014:
QUOTE: Microsoft is planning to deliver Service Pack (SP) 1 for Office 2013, SharePoint 2013 and Exchange 2013 in early 2014, company officials said on November 20. Microsoft shared a partial list of some of the updates that will be part of the SP1 via blog posts on the Office and Exchange Team blogs. On that list:
* Improved compatibility with Windows 8.1
* Support for Windows Server 2012 R2 for Exchange and SharePoint
* Support for S/MIME in OWA will be brought back in SP1. With SP1 customers will have S/MIME support across Outlook, Exchange ActiveSync clients, and OWA
* Inclusion of the Edge Transport server role for Exchange Server 2013
* General performance enhancements and feature updates for all the Office 2013 products
McAfee’s Q3 Threats report focuses on Digital Trust concerns:
QUOTE: Most important was the issue of whether we question the validity of our digital trust mechanisms upon which our software-driven Digital Age has relied for years. Every organization on the face of the earth relies on security controls, be they on the endpoint or the perimeter, to accept downloaded binaries if they are digitally signed. These digital signatures signify that code originated from a given manufacturer and should be allowed… Security industry leaders have long predicted that it would only be a matter of time before cybercriminals would use compromised certificates at scale to camouflage large numbers of malware. McAfee Labs’ third quarter report suggests that we could, in fact, be approaching that state of “at scale” signed malware.
While the leading code signing certificate authorities (CAs) have worked hard to validate the legitimacy of the customers to whom they sell their certificates, the evolution and commoditization of the certificate authority market has spawned an ecosystem of CAs who are decidedly unconcerned with such reputation measures, as well as a web of retailer relationships that make verification and validation difficult for the top root certificate authorities.
Symantec documents several fake AV update email or website messages
QUOTE: A new clever way of social engineering spam is going around today that attempts to trick users into running malware on their computers. The methods malware authors are using include emails pretending to be from various antivirus software companies with an important system update required to be installed by the end user, along with attaching a fake hotfix patch file for their antivirus software. The email plays on end user concern over the lack of detection, especially in the face of the latest threats showcased in the media recently, such as the Cryptolocker Trojan. This type of social engineering entices users to open and install the hotfix without using much discretion as to what they may be actually installing.
Symantec shares safety awareness tips for Cyber Monday …
QUOTE: December 2, 2013 marks Cyber Monday, the day when Internet retailers expect to experience a major surge in traffic thanks to people shopping online for the holiday season. The concept of Cyber Monday, or Mega Monday as it’s known in Europe, was introduced back in 2005. It takes place after the Thanksgiving holiday weekend, when people return to the office and buy Christmas presents from their work computers, according to retailers. Some dismissed Cyber Monday as marketing hype but over time, the day has grown in significance, thanks to competitive deals on offer from many major retailers. In 2012, the 500 biggest retailers in the US took more than US$206.8 million on Cyber Monday while in Europe, approximately €565 million was spent on this day. This year, experts believe that Cyber Monday sales will grow by 13.1 percent as consumers increasingly move from buying presents in bricks-and-mortar stores to shopping online.
However, considering the hype surrounding Cyber Monday and the expected traffic on ecommerce sites on this date, there could be a chance that attackers will take advantage of the day to target both consumers and retailers
. According to a recent study from RSA Security and the Ponemon Institute
, 64 percent of retail-focused IT professionals have seen an increase in attacks and fraud attempts during high traffic days such as Cyber Monday
. But just one third of these IT professionals take special precautions to ensure high availability and integrity of websites on these days. Worse still, the estimated direct cost of a cyberattack around the holiday season is believed to be US$8,000 a minute.
F-Secure shares an informative article related to cybercrime attacks against digital currency
QUOTE: Bitcoin, and other digital currencies such as Litecoin and Peercoin, will change the way we exchange money. But they come with a major flaw: they can also be used to turn infected computers into devices that “print” money. The beauty of the algorithm behind Bitcoin is that it solves two main challenges for cryptocurrencies – confirming transactions and generating money without causing inflation – by joining them together. Confirmations are given by other members of the peer-to-peer network, who in return are given new Bitcoins for their labour. The whole process is known as “mining”.
When Bitcoin was young, mining was easy. You could earn Bitcoins by mining on a home computer. However, as the currency’s value grew (from $8 to $1000 during 2013) – more people applied to do it, and, in response, mining became (mathematically) harder and required more powerful computers. Unfortunately, those computers don’t have to be your own. Some of the largest botnets run by online criminals today are monetized by mining. Any infected home computer could be mining Bitcoins for a cybercrime gang.
Trend Labs share an informative article that this holiday season is most dangerous times of year, due to heavy e-commerce and gift giving. Cybercriminals see as “prime opportunity to steal“
QUOTE: For many, the holiday season is a season for shopping and spending. But cybercriminals see it in a different light—they see it as a prime opportunity to steal. Take, for example, online shopping. Malicious websites to try and trick online shoppers into giving them their money instead of the legitimate shopping websites. These sites are often made to look exactly like the website they’re mimicking, and feature a login screen that asks the user to enter their personal information. They are interested in any and all kinds of login information – for example, we recently saw phishing sites that stole the Apple IDs of users. We have kept track of the number phishing sites created since 2008. We pay particular attention to those that target Christmas shoppers and/or have holiday themes. There are plenty of these, and they persist all year. Unsurprisingly, they rise towards the end of the year
Trend shares awareness of new targeted attacks circulating in Asia-Pacific region
QUOTE: We recently came across some malware of the SOGOMOT and MIRYAGO families that update themselves in an unusual way: they download JPEG files that contain encrypted configuration files/binaries. Not only that, we believe that this activity has been ongoing since at least the middle of 2010. A notable detail of the malware we came across is that these malware hide their configuration files. These JPEGs are located on sites hosted in the Asia-Pacific region, and we believe that these malware families are used in targeted attacks in the region as well.