Thursday, September 17, 2009

How European Cyber-Gangs Target Small and Mid-Sized Businesses

Brian Krebs, a Washington Post writer, reports that The Financial Services Information Sharing and Analysis Center, an industry group created to share data about threats to the financial sector, received alerts that European Cyber-Gangs set off a multi-million dollar crime wave by stealing from small and mid-sized U.S. companies. Until six months ago, cyber-gangs weren't noticed because the businesses were small and mid-sized.

Significant increases in funds transfers involved the exploitation of valid banking credentials belonging to these businesses. Cyber-gangs sent emails to controller or treasurers with a message that contained malicious software designed to steal passwords. They then used the passwords to send wire transfers in increments of less than $10,000 to avoid banks' anti-money-laundering reporting requirements. More than 100 billion spam messages are sent out each day by zombie computers.

Cyber-gangs are cashing in because of the economic downturn. Americans are turning to the Internet to look for jobs. The cybercriminals advertise jobs on the internet. Unsuspecting people accept these job. However, their real job is being a "money-mule" who launders stolen funds. They steal customer account information, set up fraudulent bank accounts, make unauthorized, and wire the money to the crooks.

Mules are a necessary part of cybercrime operations as monies transferred to a criminal's account is easily traced by banks and law enforcement. Since it is the mules who are laundering the monies, they get caught and convicted, not the cyber-kingpins as there is a significant lack of training and understanding in digital forensics, evidence collection as well as in the law courts.

The FBI is working on the problem. Shawn Henry of the FBI Cyber Crime Unit calls cybercrime "the most critical threat to our way of life other than weapons of mass destruction." The greatest challenge in the battle for winning the war on cybercrime is keeping up with the sheer volume of attacks. Hackers find new ways of getting around safeguards put in place. Therefore, it is very important to have multiple layers of defense to protect yourself from cybercriminals.

Check List to Survive on the Internet:
  1. Professional Grade Software that bypasses the Windows Operating System.
  2. Daily scans that detect and remove malware before it harms your computer.
  3. A combination of anti-virus+anti-spyware.
  4. Anti-rootkit technology that keeps hackers out of the back of your computer.
  5. A monitored firewall.
  6. A team of techs to keep your computer clean and running well.
Computer security is essential to survive on the Internet. Search for the best, but having a team of techs along with great software is the best protection from cyber-gangs.

Monday, September 14, 2009

Who Caused the Twitter Attack?

On 8/6/09 the an alarm rang that Twitter had been hit by a large attack and was not working for several hours,followed by a period of slowness and sporadic time-outs. It was so large that Twitter didn't even know it was under attack until it crashed. This was called a Distributed Denial-of-Service Attack (DDoS). It came from infected computers from all over the world. They were zombie computers and were used by hackers and cybercriminals to cause trouble.

Graham Cluley, a technology consultant at Sophos, explained in an article by C. McCarthy in CNET News, that DDoS attacks come from millions of compromised computers. Some of these computers belonged to people with Twitter accounts. Because they either did not install or update their security software, visited risque sites, or downloaded music and movies from unsecure sites, their computers had become zombie computers.

During the DDoS attack, zombie computers were used to inundate Twitter servers with communication requests. It was difficult for Twitter to deal with the attack because it was hard to distinguish legitimate Twitter communications from communications that were part of the attack. They did not want to block access from IP addresses as many of the zombie computers that was sending traffic to Twitter belonged to law abiding people.

The question is "Who Caused the Twitter Attack?" There are several possibilities:

  1. Paul Henry, a security analyst, explained that it happened at the same time as the Hacker Convention where a new version of malware, that was found on Twitter messages, was introduced.
  2. A European Blogger believes that a foreign country was behind the attack because such a large attack could only be organized by somewith huge resources.
  3. According to a spokeswoman at Facebook, the attack might have been directed at an individual who had a presence on a number of sites, rather than the sites themselves.
  4. So many Twitters did not have adequate security on their computers and were zombie computers that they made it easy for a hacker to attack Twitter
We can all learn from the Twitter attack how important it is to install security software on our computers and continuously undate and upgrade them. This will keep them safe and secure and not put Twitter or any other site at risk of being attacked.

I can identify with those who had no security on their computers. I once was like you, but then my computer started to slow down. I met someone who told me he could help. I took a test and found out that 7,500 malicious codes were on my computer. I immediately enrolled for personal computer services. A team of techs cleaned up my computer and installed professional grade software on it. I now occasionally call them if I have any computer related issues.

Check List for a Safe and Secure Computer With the Following:
  • Alerts of unexpected events that could harm your computer.
  • Daily scans that detect and remove malware before it harms your computer.
  • The latest security updates.
  • A protected computer with a combination of antivirus+antispyware.
  • Have the holes in back of your computer closed up so hackers can't get in.
  • Critical data and sensitive information protected from being compromised or modified.
  • Your organization's computing assets protected from loss and/or damage from network attacks.
  • A firewall that is monitored.
  • Fully protected emails and attachments.
  • Improved performance of your computer.
Was your computer one of the zombie computers that contributed to the attack? Even if it wasn't, are you sure it won't be in the future? Click on the Twitter icon to learn how to protect your computer from cybercriminals.

How Social Networking Websites Have Become A New Battlegroud for Cybercrime

Originally, social networking websites such as Twitter, Face Book, My Space, and Linked in were considered to be one of the most remarkable technological phenomena of the 21st century and a great tool to allow like-minded people to interact with each other.

However, the European Commission has singled out social networking websites as potentially dangerous. It was recently predicted that social networking websites will soon become the most dangerous places on the Internet, where users are most likely to face cyber attacks and digital annoyances. They will become the main battleground for cybercriminals and identity thieves.

Twitter. a social networking site with 44 million people, has had several attacks. In April 2009 a phishing campaign sent you to a website that stole your user name and password. Staff from Twitter said it was due to a basic vulnerability. Holes like these were found on Face Book and My Space in the past.

On August 6, 2009, Twitter was shut down for hours by cybercriminals. It was described as a Denial of Service Attack, affecting millions of Tweeters. Zombie computers from all over the world had attacked Twitter. It was a complete blackout and was due to SABOTAGE.

A man with a Face Book account was recently hacked. A message was placed on his site stating that he was away from home, had lost his wallet, and requesting money. When he realized that he had been hacked, he contacted Face Book. It took them 5 hours to close his account. During that time, his friends sent $3,000 to the cybercriminal.

Another way that hackers steal your identity is by building fake YouTube Pages with an error message claiming the video you want won't play without your installing new software. When you click on the error message, a virus is put on your computer. Once infected, the hacker then redirects you to a real YouTube page to see the videos you wanted to see - and hides the crime.

Always be on Guard to Protect Yourself on Social Networking Sites and Win the War on Cybercrime. Make sure the URL for the sign up page is correct. If the URL doesn't look right leave the web site and contact the social network. Forward phishing emails to space@uce.gov. If you believe you have been scammed by cybercriminals, file a complaint at www.ftc.gov.

Install a combination of antivirus, antispyware, anti-rootkit, anti-malware and other security technologies along with a bi-directional firewall for superior PC and email protection.

Educate others. Make sure they understand how serious the situation is and how to protect themselves from cybercrime. Tell them they need a managed internet security system with a personal team of techs that takes care of their computer and security problems by phone or remote internet access.
Identity theft, the cybercrime of this century, has become the fastest growing white collar crime in the world and affects us all. It doesn't matter where you live, how much you protect your personal or business information, or how careful you are. Identity theft is an equal opportunity crime with the ability to hurt everyone.

Thursday, September 10, 2009

Cybercrime - A Worldwide Epidemic

The chilling reality is that cybercrime has become an epidemic that is moving so fast that law enforcement cannot catch up with it. The Department of Treasury has reported that the profits of cybercrime are greater than the profits from the sale of illegal drugs.

According to President Obama, Cybercrime has cost Americans more than $8 billion in the past two years and the cost of computers repairs has risen to $11 billion a year.

You ask, "How can my computer get hacked?" There are many ways:

A hacker or cybercriminal installs a piece of software called a rootkit into a hole in the back of your computer, slows down your computer, steals your personal information, and uses your computer to commit criminal activities.

Botnets are used to hack many computers at the same time by infecting them with viruses, spyware, malware, and trojans and preventing you from having access to your email, websites, and online accounts.

Emails are sent out that appear to be coming from a legitimate organization or someone you know. You enter your username and password. However, these "phishing" emails take you to the cybercriminal's web site and they use your information to commit crimes.

Viruses are put into attachments and when someone opens the attachment, the computer become infected with viruses and is hacked.

With rootkits, botnets, phishing emails, and infected attachments, your computer slows down. Cybercriminals gain control of it, make it into a zombie computer, and commit crimes using your computer and your personal information and you are responsible for their crimes. You become aware that there is a Cyber War going on, but you don't know who the enemy is.

So What Can You to Protect Yourself and Win the War on Cybercrime?

Click on the Image above and Learn About a Managed Internet Security Service that has a whole new computer security product to protect you from cybercrime. This new product:
  • Combines anti-spyware and antivirus and other technologies to detect all types of malware.
  • Works inside the core of the Windows Operating System, watching for malware and stopping it before it has a chance to effect the user's system.
  • Has new anti-rootkit technology that finds and disables malicious hidden threats, files, or registry keys on a user's system.
  • Bypasses the Window's Operating System to directly scan certain locations of the hard drive for malware and removes infections where found.
  • Protects against email viruses with direct support for all email programs that use POP3 and SMTP.
  • Has a bi-directional firewall.
However, you don't just get this wonderful software that scans your computer daily. You get a team of certified technicians that spend hours remotely removing the malicious codes that are on your computer that your previous security software did not remove. Afterwards, if you have a problem, they will work on your computer to keep it running well, no matter how long it takes.

Sunday, September 6, 2009

Identity Theft - The Cybercrime of the 21st Century













Identity thieves can be people you know or they can be cybercriminals. People who know you can steal your mail, send your mail to another address, rummage through your trash or steal your wallet or purse. Your personal information can be taken from records at your job, at your doctor's office, at voter registration places, and insurance companies. Cybercriminals commit cybercrime by hacking into your computer, sending you fake emails to get you to give them your personal information, and by infecting attachments.

Identity Thieves are looking for credit card numbers, bank accounts, driver's licenses, dates of birth, social security numbers, and medical data. They run up charges on your credit cards, take out loans, establish phone services, and open up new bank accounts all in your name. They write bad checks, drain your retirement account, and file for bankruptcy in your name. They apply for medical and social security benefits in your name, get a driver's license with your name and their picture, get a job and file taxes in your name, and give your name to the police when they are arrested.

A good example of someone who has had their identity stolen is Ben Bernanke, the head of the Federal Reserve, the main bank in America. According to Newsweek, his wife's purse was stolen in August 2008 with all her personal information. Someone soon began cashing checks on the Bernanke family bank accounts. It turned out that they were one of 500 whose identities were stolen by a crime ring. It took a year for law enforcement to solve the case.

If you become a victim of identity theft, it is a living nightmare. You can end up with a wrongful criminal record, spend up to 500 hours over two years, and it will cost $3,000 or more to restore your identity, and it can happen again.

You ask, "How can I protect myself from being a victim of identity theft and cybercrime?" Shredding your personal information or requesting free credit reports is not enough. Monitoring your credit does not keep you safe. Credit fraud alerts do not work. Up to 50% of the time the creditor does not check the thief's credit and just issues him credit. You also don't need to lock your life away.

While you can't completely prevent identity theft, you can protect yourself against its harmful effects. There is a new form of protection, Identity Risk Protection for Your Whole Identity.
When you subscribe to a Comprehensive Identity Protection Service, your credit, medical information, social security number, insurance records, and driver's license are monitored daily. Should your identity be stolen, experts work together with law enforcement to help restore it to pre-theft status.

Thursday, September 3, 2009

A Business that Protects Against Cybercrime and Identity Theft

We live in the Information Age where most people have and depend on computers at home and for their business. Everyone needs their computer to work, but it is always slowing down due to hackers putting malicious codes, i.e. viruses, spyware, malware, and trojans in the computer to steal our personal information and engage in criminal activities. Consequently, everyone is frequently having their computer repaired and spending a lot of money. Everyone wants a better way to manage their computer.

A business has been created to protect the public from cybercrime and identity theft. It is on the ground floor of a Multi-Trillion Dollar Computer Industry, the next big money making trend in the 21st century.

Software does not keep the cybercriminals away. Big businesses like IBM and Raytheon and Universities like Stanford and John Hopkins have used a Managed Internet Security Service for many years. However, it was too expensive for the individual, family, or small business owner to have. Now this business provides a Managed Internet Security Service which is available and affordable for everyone. Computers are scanned daily and malicious codes are kept away so information cannot be stolen. Everyone has a Team of Techs who take care of the computer by phone and remote connection to the computer. They keep the computers safe, reliable, and running like new. Internet safely alerts, unlimited access to security check-ups, and virus and spyware cleanups are provided. Computer hassles and frustrations are gone with this Managed Internet Security Service.

Another service that is available and affordable is a Whole Identity Protection Service which monitors credit and non credit information daily. Should an identity be stolen, the person is notified immediately, not a month later when the credit bureaus and banks find out about it. A team of professionals work to restore identities to Pre-Identity Theft Status. A $10,000 Expense Reimbursement Insurance Policy which helps defray costs and reimbursement for lost wages is part of the service. Help is given with prior occurrences of identity theft and prevention of repeat identity theft.

This business is truly a first in providing affordable services to protect people from cybercrime and identity theft. Imagine having your own business where corporate grade internet security is affordable as a "monthly service" and unlimited PC support for a hassle free computer is part of that "monthly service." Add to that a full identity monitoring service with a $10,000 expense reimbursement insurance policy also as a "monthly service." Customers have the choice of either one or both of the services. No other company combines protection for both the computer and identity theft.

There is another unique part to this company. Besides combining Personal Computer and Whole Identity Protection Services, it also has a program that is offered to small businesses, insurance companies, non profits, schools, radio stations, internet marketing companies, and the list goes on and on. And if that is not enough, there is a Tech Network which allows thousands of local computer repair shops to market these services to their customers.

The epidemic problems of cybercrime and identity theft will never go away. Anyone who has a computer, is on the internet, and has an identity needs these services. Anyone who can solve these problems and bring peace of mind to others will reap big monetary rewards.

To Join the Tech Team, you'll need my Account#: Bobroff 3767.