Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Phishing, Fraudulent, and Malicious Websites > NetSparsh - Viral Content you Love & Share

Phishing, Fraudulent, and Malicious Websites

Whether we like it or not, we are all living in the Information Age. We have nothing left but adapt to rapidly developing information technology, no matter who we are and what we do for living.

The Internet, in particular, means for us boundless opportunities in life and business ? but also lots of dangers unheard of just a decade ago. We should be aware of these dangers if we want to use the huge potential of the Internet and to avoid the hazards it brings us.

Warning: There are Websites You'd Better Not Visit

Phishing websites

Thanks to authors of numerous articles on this topic, "classic" phishing technique is relatively well known. This scam involves setting bogus websites and luring people to visit them, as a rule, by links in emails. Phishing website is disguised to look like a legitimate one -- of a bank or a credit card company, and users are invited to provide their identifying information. Sites of this kind are used solely to steal users' passwords, PIN numbers, SSNs and other confidential information.

At first phishing consisted only of a social engineering scam in which phishers spammed consumer e-mail accounts with letters ostensibly from banks. The more people got aware of the scam, the less spelling mistakes these messages contained, and the more these fraudulent websites resembled legitimate ones. Phishers are getting smarter. They eagerly learn; there is enough money involved here to turn criminals into earnest students.

Keyloggers and Trojans

Since about November 2004 there has been a lot of publications of a scheme which at first was seen as a new kind of phishing. This technique includes contaminating a PC with a Trojan horse program. The problem is that this Trojan contains a keylogger which lurks at the background until the user of the infected PC visits one of the specified websites. Then the keylogger comes to life to do what it was created for -- to steal information.

It seems that this technique is actually a separate scam aimed at stealing personal information and such attacks are on the rise. Security vendor Symantec warns about commercialisation of malware -- cybercriminals prefer cash to fun, so various kinds of information-stealing software are used more actively.

Fraudulent websites are on the rise

Websense Security Labs -- a well-known authority in information security -- noticed a dramatic rise in the number of fraudulent websites as far back as in the second half of 2004. These sites pose as ones for e-commerce; they encourage users to apply for a reward or purchase something, of course never delivering the product or paying money. The most popular areas for such fraud are online pharmacies, lottery scams, and loan / mortgage sites. Experts predict there will be more fake merchants in future and their scams will become more sophisticated.

A Hybrid Scam

In April Panda Software warned Internet users of a new particularly brazen scam aimed at stealing confidential information. The technique used here looks like a hybrid between phishing and a fraudulent website.

Panda Software identified several websites offering cheap airline tickets which in fact weren't selling anything; the aim was to cheat users out of credit card details.

This scam is very simple; the thieves simply wait until some unsuspecting user who is searching for, say, airline ticket offers, finds their site offering dirt-cheap airline tickets. Really pleased with himself and looking forward to the trip, the user fills in the form, entering his credit card number, expiry date and verification value (CVV).

As soon as these details have been entered, an error page appears; it tells the user that the transaction has been unsuccessful, and offers instructions on how to pay for the ticket by postal money order. So the user may well be fooled twice. He loses his credit card details, putting them right into the hands of cyber-crooks, and then loses money, if decides to buy the ticket by money order.

Of course, these sites have already been disabled, but who knows whether (or better to say when) other ones will appear again, this time offering all kinds of products.

Malicious websites are especially dangerous. Cybercriminals create them exclusively to execute malicious code on the visitors' computers. Sometimes hackers infect legitimate sites with malicious code.

Bad news for blog readers: blogs can be contaminated, too. Since January, Websense Security Labs has discovered hundreds of these "toxic" blogs set by hackers.

When unsuspecting users visit malicious sites, various nasty applications are downloaded and executed on their computers. Unfortunately, more and more often these applications contain keyloggers--software programs for intercepting data.

Keyloggers, as it is clear from the name of the program, log keystrokes --but that's not all. They capture everything the user is doing -- keystrokes, mouse clicks, files opened and closed, sites visited. A little more sophisticated programs of this kind also capture text from windows and make screenshots (record everything displayed on the screen) ? so the information is captured even if the user doesn't type anything, just opens the views the file.

In February and March 2005, Websense Security Labs researched and identified about 8-10 new keylogger variants and more than 100 malicious websites which are hosting these keyloggers EACH WEEK. From November of 2004 through December 2004 these figures were much smaller: 1-2 new keylogger variants and 10-15 new malicious websites per week. There is by all means a disturbing tendency--the number of brand-new keyloggers and malicious website is growing, and growing rapidly.

What a user can do to avoid these sites?

As for phishing, the best advice is not to click any links in any email, especially if it claims to be from a bank.

Opening an attachment of a spam message can also trigger the execution of malicious program, for example a keylogger or a keylogger-containing Trojan horse.

As for fraudulent websites, maybe buying goods only from trusted vendors will help -- even if it is a bit more expensive.

As for malicious websites? "Malicious websites that host adult entertainment and shopping content can exploit Internet Explorer vulnerabilities to run code remotely without user interaction."(a quote from the Websense's report). What can a user do about it? Not much, but avoiding adult sites and buying only from known and trusted online stores will reduce the risk.

Hackers also attract traffic to malicious websites by sending a link through spam or spim (the analog of spam for instant messaging (IM). So a good advice never follow links in spam is worth remembering once more.

Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company. The company's R&D department created an innovative technology, which disables the very processes of information capturing -- keylogging, screenshoting, etc. It makes the company's anti-keylogging software truly unique: it doesn't detect keyloggers or information-stealing Trojans one by one -- they all simply can't work.

Learn more -- visit the company's website http://www.anti-keyloggers.com

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

SB Nation

The Dolphins' dangerous stadium just caused a security guard to get hurt
SB Nation
The inexplicably close walls behind the end zones at Hard Rock Stadium have created dangerous situations in the past. On Sunday, it caused an injury to a security guard who got destroyed by Miami Dolphins wide receiver Kenny Stills. Stills caught a 5 ...
Kenny Stills cuts TD celebration short to check on security guard he ran overFor The Win
VIDEO: Dolphins Security Woman Gets Destroyed by Kenny Stills After TD Grab12up

all 18 news articles »

KOB

New Mexico districts to share funding for security upgrades
The State
More than 220 school campuses around New Mexico will be sharing state funding for security upgrades that will range from new doors and locks to fencing and security cameras. Forty-seven school districts applied for security improvements at 288 campuses.
Hundreds of New Mexico schools to get security upgradesKOB

all 4 news articles »

WIRED

The Tiny Chip That Powers Up Pixel 3 Security
WIRED
Having a secure, mobile hardware element isn't especially novel; the ARM chips that power most higher-end Android smartphones have something called TrustZone, a secure enclave within the main processor that sits apart from the operating system.


Fox News

5 security settings to turn on your router before it's too late
Fox News
Suppose your house has a top-notch security system. There are locks on all the doors. Security cameras monitor from every angle. No one could get in – except for an open door that you completely forgot about and therefore leads to every room in the house.
Home Network Security in the Internet AgeTechSpective

all 2 news articles »

Fox News

Here's why Hillary Clinton losing her security clearance matters for the rest of us
Fox News
Hillary Clinton no longer has a security clearance. A letter released from the Department of State to Senator Chuck Grassley, a Republican from Iowa, says she lost her clearance on August 30 at her request. The State Department also withdrew security ...

and more »

Engadget

Amazon fixes security flaws allowing smart home hijacks
Engadget
Some smart home device owners may have dodged a bullet. Amazon recently patched 13 security flaws in an operating system for the Internet of Things, FreeRTOS, as well as Amazon Web Services connection modules. The holes let intruders crash devices, ...


WWBT NBC12 News

WANTED: Man breaks into home, accidentally takes selfie on security camera
WWBT NBC12 News
BATON ROUGE, LA (WAFB) - Say Cheese! Police are asking for the public's assistance identifying and locating a burglary suspect. The East Baton Rouge Parish Sheriff's Office says on Oct. 8, they were called about a residential burglary in the 1000 block ...

and more »

Military Times

US commander confident in ability of Afghan security forces
Military Times
WASHINGTON — The assassination of Afghan leaders in Kandahar province won't lessen U.S. support for the war in Afghanistan or deter local security forces in the fight against the Taliban, the top U.S. military commander in the Middle East said Saturday.

and more »

Arizona Sports

Kenny Stills rewards security guard after sending her into endzone wall
Arizona Sports
Miami Dolphins wide receiver Kenny Stills (10) gives a football to a security woman he pushes to the ground after scoring a touchdown, during the first half of an NFL football game against the Detroit Lions, Sunday, Oct. 21, 2018, in Miami Gardens, Fla.
Kenny Stills hammers security guard after touchdown247Sports
Kenny Stills runs over security guard, gives her TD ballYahoo Sports
Video: Dolphins Security Guard Takes Hardest Hit Of The NFL's SeasonThe Spun (blog)

all 822 news articles »

New York Post

Dolphins receiver accidentally blindsides security woman in brutal hit
New York Post
Miami Dolphins receiver Kenny Stills was shaken up when he ran into a female security officer as he caught a 5-yard touchdown pass in the corner of the end zone during the second quarter against Detroit. The woman was blindsided, tumbled to the ground ...

and more »
Google News

A Painless Plagiarism Solution

A crowded marketplace can lead to unethical webmasters using underhand... Read More

Secrets On Security: A Gentle Introduction To Cryptography

Let us take the example of scrambling an egg. First,... Read More

SCAMS ? Be Aware ? And Report When Necessary

The Internet is a vast International Network of people and... Read More

Protect Your Little Black Book

The movie Little Black Book features a young woman, Stacy,... Read More

Phishing and Pharming: Dangerous Scams

As soon as almost all computer users already got used... Read More

Avoid Internet Theft, Fraud and Phishing

Since its birth, the Internet has grown and expanded to... Read More

Instant Messaging ? Expressway for Identity Theft, Trojan Horses, Viruses, and Worms

Never before with Instant Messaging (IM) has a more vital... Read More

Don?t Become An Identity Fraud Statistic!

"You've just won a fabulous vacation or prize package! Now,... Read More

What to Look for before You Purchase Spyware Software

Huge number of spyware software applications are available in the... Read More

Crack The Code - Thats A Direct Challenge

I Challenge You To Crack The Code ------------------------------------- I had... Read More

Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk

The trash folder in my main inbox hit 4000 today.... Read More

Free Antivirus Security Software: Download Now to Eliminate Spyware, Pop Up Ads, etc.

Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More

How to Thwart the Barbarian Spyware!

Today,on most internet user's computers, we have the ability to... Read More

Types Of Computer Infections

Computer infections can be broken up into 4 main categories... Read More

Password Security and Safety

There is nothing more important that password security in world... Read More

Hacking Threats and Protective Security

The 1998 Data Protection Act was not an extension to,... Read More

Spyware ? Your Web Browser is the Culprit!

My first experience with a spyware BHO based infection was... Read More

What Every Internet Marketer Should Know About Spyware

If you run any type of Internet business, Adware and... Read More

Web Browsing - Collected Information

You may not realize it, but as you are surfing... Read More

The Truth About Hiding Your Tracks on the Internet

Ok, ok, I know you've seen them. All those pop... Read More

If You Sell Anything Online Your ePockets Are Being Picked

You and I are a lot alike. We are both... Read More

What is Hacking? Are You a Hacker?

WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More

Website Security - Creating a Bulletproof Site in 5 Easy Steps

When it comes to a secure website and passwords it... Read More

Corporate Security for Your Home Business

The words Corporate Security may conjure up images of a... Read More

Ransom Trojan Uses Cryptography for Malicious Purpose

Every day millions of people go online to find information,... Read More