Category Archives: Phishing

Chrome Can Now Warn Users Who Type Gmail Passwords in Dumb Places

Chrome Can Now Warn Users Who Type Gmail Passwords in Dumb Places

On Wednesday, Google released a new extension for Chrome it calls Password Alert.

The post Chrome Can Now Warn Users Who Type Gmail Passwords in Dumb Places appeared first on WIRED.

The post Chrome Can Now Warn Users Who Type Gmail Passwords in Dumb Places appeared first on Proactive Computing. #PCH3lp

Ransomware decryptor | Kaspersky Lab

RANSOMWARE DECRYPTOR

Are you a ransomware victim? The National High Tech Crime Unit (NHTCU) of the Netherlands’ police, the Netherlands’ National Prosecutors Office and Kaspersky Lab have been working together to fight the CoinVault ransomware campaign. During our joint investigation we have been able to obtain data that can help you to decrypt the files being held hostage on your PC. We provide both decryption keys and the decryption application. For more information please see this how-to. Please note that this is an ongoing investigation and new keys will be added in the future.

logo_green

via Ransomware decryptor | Kaspersky Lab.

Hacker Lexicon: What Are Phishing and Spear Phishing?

Hacker Lexicon: What Are Phishing and Spear Phishing?

Your I.T. department has probably warned you not to click on suspicious links in e-mails. If the link looks suspect: Do. Not. Click.

The post Hacker Lexicon: What Are Phishing and Spear Phishing? appeared first on WIRED.

Email Spoofing: Explained (and How to Protect Yourself)

Jason P. Stadtlander Headshot, Huffington Post

Recently a co-worker asked me “Why do people even bother to spoof my email address?”

First, for those of you joining me that have no idea what the term spoofing means – let us examine that.

Spoofing is defined as:

/spo͞of/
verb
1. imitate (something) while exaggerating its characteristic features for comic effect.
2. hoax or trick (someone).

Origin: late 19th century English comedian Arthur Roberts.

In the context of computers, to spoof one’s email address means that the sender is acting as if the email is coming from someone it is not.

How someone (or something) sends an email made to look like it comes from somewhere or somewhere it does not, is a little more technical to explain. So, if you don’t like tech talk, then skip to the next section “Why is my email address being spoofed?”

How are they spoofing me?

Spoofing email addresses is rather easy. All a person needs to spoof an email address is an SMTP (Simple Mail Transfer Protocol) server (a server that can send email) and the appropriate email software. Most website hosting services will even provide an SMTP server in their hosting package. It is also possible to send email from your own computer if you load an SMTP server on it, however most ISPs will block port 25 (which is required to send out email).

Many of the available free SMTP servers will allow you to show a different “from” address than the actual registered domain that the email is transmitting from. However, to the recipient of said message, they will see that it actually came from the address you specified.

Now, there are special checks in place (and more being put into place) to prevent exactly this problem. One is called SPF or “Sender Policy Framework” which was developed by Meng Weng Wong in 2003. Basically, each time an email is sent, the receiving server compares the IP of the origin with the IP listed in the SPF record with the appropriate domain.

EXAMPLE 1: So, for example, let’s say someone tried to spoof Bill Gates (billgates@microsoft.com):
They would send an email on his behalf > the recipient server would then talk back to microsoft.com and say “Hey, I have an email that is coming from 123.123.123.123 stating that it was sent from billgates@microsoft.com.” > microsoft.com would then tell the recipient server, “No, sorry, it should be coming from 111.111.111.111.” and the message would never get delivered.

Why is my email address being spoofed?

Two basic reasons people (and machines) spoof:

1. Malicious: To cause useless internet traffic – ultimately hoping to bog down servers or bring them to a halt.

2. Because you were unlucky enough to have clicked the wrong thing at the wrong time.

Continue reading Email Spoofing: Explained on Huffington Post The Blog

Email Spoofing: Explained (and How to Protect Yourself) | Jason P. Stadtlander

The post Email Spoofing: Explained (and How to Protect Yourself) appeared first on Proactive Computing. #PCH3lp

SCAM ALERT 888-441-9257 Reverse Phone Lookup

rp_help_350.jpg

SCAM ALERT

If you get a call from this number 888-441-9257, they are NOT from Microsoft and there is NOTHING WRONG with your computer.  Hang up. Report them to the BBB. This is a SCAM.

They will try to get you to install a program to “fix” a problem which doesn’t exist…so, it’s not a stretch to think that thier “diagnostic program” could actually contain malware, spyware or viruses. They will also try to nick you for $25…to fix a problem that doesn’t exist.

#ScamAlert

888-441-9257 / 8884419257 Reverse Phone Lookup.

M. Wms Jul 9 2:31PM told me my computer was infected and he would fix it if I downloaded some programs. said he worked for MS Windows and was doing this as a service from MS. when i asked how much, he said for $25.

Read more at http://checkwhocalled.com/phone-number/1-888-441-9257

The post SCAM ALERT 888-441-9257 Reverse Phone Lookup appeared first on Proactive Computing. #PCH3lp