CyberheistNews vol2, #49



CyberheistNews Vol 2, #49







Editor's Corner



KnowBe4


[caption id="attachment_1367" align="alignleft" width="150" caption="Stu"]cybercrime[/caption]



The 2012 Top 10 Holiday Scams











We recommend you send this to your employees as the bad guys are coming out

in full force this holiday season and will try to trick and scam users both

at the office and at their house.







Number 10


'The Charity Tricksters'. The holidays are traditionally the time for giving.

It's also the time that cyber criminals try to pry money out of people that mean well.

But making donations to the wrong site could mean you are funding cybercrime or even

terrorism. So, watch out for any communications from charities that ask for your contribution,

(phone, email, text, tweets, snail mail and even people ringing your door bell) and make sure

they are legit and show their ID. It is safest to only donate to charities you already know,

and refuse all the rest.







Number 9
'The Grinch E-Card Greetings'. Happy Holidays! Your email has an attachment that looks

like an e-greeting card, pretty pictures and all. You think that this must be from a friend.

Nope, not so. Malicious e-cards are sent by the millions, and especially at the office, never

open these things as they might infect your workstation.







Number 8
'The Fake Gift Card Trick'. Internet crooks promote a fake gift card through social media

but what they really are after is your information, which they then sell to other cyber

criminals who use it for identity theft. Here is an example: A recent Facebook scam offered a

“free $1,000 Best Buy gift card” to the first 20,000 people who signed up for a Best Buy fan page,

which was a malicious copy of the original.







Number 7
'The Copied Site'. Bad guys build complete copies of well-known sites, send you emails

promoting great deals, sell products, take the credit card, but never deliver the goods.

These sites live only a few days and the money usually goes abroad. Your credit card company

will refund the purchase, but apart from not getting your gift(s) your card number is now

compromised and will be sold and used by cyber criminals. Always check for the

https:// rather than just http:// .







Number 6
'The DM-Scam'. You tweet about a holiday gift you are trying to find, and you get a direct

message (DM) from another twitter user offering to sell you one. Stop - Look - Think, because

this could very well be a sophisticated scam. If you do not know that person, be -very- careful

before you continue and never pay up front.







Number 5
'The Extra Holiday-money Fraud'. You always need some extra money during this season,

so cyber fraudsters are offering work-from-home scams. The most innocent of these make you

fill out a form where you give out confidential information like your Social Security number

which will get your identity stolen. The worst of them offer you work where you unwittingly launder money

from a cyberheist which can get you into major trouble.







Number 4
'The Fake Recession Relief'. Internet swindlers target people that are vulnerable due to

the recession with pay-in-advance scams and credit offers. Spam emails advertise "prequalified,

super low-interest" credit cards and loans if you pay a processing fee, which goes straight

into the scammer’s pocket.







Number 3
'The Search Term Trap'. Bad guys do their research and find out what people want. They

then build a site that professes to have the item. They push that site high onto the search

engines and you might click on that link. But the site contains malware and will infect your

PC. Make sure that your web-browser is fully updated, and will warn you if it sees that the

site is unsafe.







Number 2
'The Evil Wi-Fi Twin'. You bring your laptop and go to the mall to scout for gifts. Then you

check if you get it cheaper somewhere online. But the bad guys are there too, shopping for your

credit card number! They put out a Wi-Fi signal that looks just like a free one you always use.

Choose the wrong Wi-Fi and the hacker now sits in the middle and steals your credit card data

while you buy online. When you use a Wi-Fi connection in a public place, it is better not to

use your credit card.







Number 1
'The Black Friday Racket'. Black Friday is the start of great holiday shopping deals, unless

they are too good to be true and you get tricked into buying an iPad for a 90% discount. Be extra

careful with online buying starting the day after Thanksgiving!







This Top 10 is also available as a post at the KnowBe4 Blog:

http://blog.knowbe4.com/the-2012-top-10-holiday-scams/







Happy and Safe holidays !







KnowBe4






Quotes of the Week









"All the world is made of faith, and trust, and pixie dust." - J.M. Barrie, Peter Pan







"Trust starts with truth and ends with truth." - Santosh Kalwar







"Only the individual can think, and thereby create new values for

society—nay, even set up new moral standards to which the life of

the community conforms."
- Albert Einstein









Please tell your friends about CyberheistNews! They can subscribe here:


http://www.knowbe4.com/cyberheist-news/



KnowBe4






Prevent Email Phishing





Want to stop Phishing Security Breaches? Did you know that many of the

email addresses of your organization are exposed on the Internet and

easy to find for cybercriminals? With these addresses they can launch

spear-phishing attacks on your organization. This type of attack is

very hard to defend against, unless your users are highly ‘security

awareness’ trained. IT Security specialists call it your ‘phishing

attack surface‘. The more of your email addresses that are floating out

there, the bigger your attack footprint is, and the higher the risk is.

Find out now which of your email addresses are exposed with the free

Email Exposure Check (EEC). An example would be the email address and

password of one of your users on a crime site. Fill out the form and

we will email you back with the list of exposed addresses. The number

is usually higher than you think.





Sign Up For Your Free Email Exposure Check Now:


http://www.knowbe4.com/email-exposure-check/







KnowBe4






IT Briefcase Exclusive Interview: Security Awareness Training

– A Modern Necessity, with Stu Sjouwerman, KnowBe4







The editors of IT Briefcase interviewed me and had several very good

questions about security awareness training. You can read the full

interview here, will take just a minute and has some good ammo if you

need security budget:


http://www.itbriefcase.net/it-briefcase-interview-security-awareness-training







KnowBe4








A New Term: QRishing





From the GFI Blog: "QRishing may probably be a new term to our ears,

but concerns of this threat have been expressed by individuals some

years before. It is a term we can associate with a phishing tactic

initiated with Quality Response (QR) codes.





A few days ago, experts from the Carnegie Mellon University released

a whitepaper entitled “QRishing: The Susceptibility of Smartphone

Users to QR Code Phishing Attacks“. In there, they have detailed

the outcome of two experiments they conducted that aimed to prove

the viability of QRishing. From the Abstract: “In one experiment

we visually monitored user interactions with QR codes; primarily to

observe the proportion of users who scan a QR code but elect not to

visit the associated website. In a second experiment, we distributed

posters containing QR codes across 139 different locations to observe

the broader application of QR codes for phishing.”. More:


http://www.gfi.com/blog/qrishing/





KnowBe4








Many Gadgets, Many Risks







Monday Nov 12th the Wall Street Journal came out with an article that

illustrates the risks of BYOD: "Small companies are giving their employees

a lot of leeway with gadgets. And that could mean major security risks.

All told, about half of companies with fewer than 500 employees allow

personally owned devices, compared with 35% of larger enterprises,

according to the Ponemon Institute LLC." Forwarding this research to

management might help you create more understanding about the risks of BYOD:


http://online.wsj.com/article/SB10001424052970204840504578087311857039762.html





KnowBe4






Ransomware Crooks Make Millions From Porn-Shaming Scams







Symantec put out a report last week that focused on the increase of

a particularly nasty type of ransomware scam. It started 6 years ago

in Eastern Europe. The code has been perfected over that time, with

more reliable payment mechanism and stronger encryption that

completely locks up the PC and shames the victim with on-screen porn.





It's a real extortion racket, Symantec said in their white paper.

Computerworld has a lot more detail here that you should know about

in case a user gets one of these and gets tricked into clicking on

the link:


http://www.computerworld.com/s/article/9233421/Ransomware_crooks_make_millions_from_porn_shaming_scams?





KnowBe4








Cyberheist 'FAVE' LINKS:







* This Week's Links We Like. Tips, Hints And Fun Stuff.





280 YouTube videos edited into a 5-minute masterpiece by Luc Bergeron.

This is a really good one that you can watch twice and see new things:


http://www.flixxy.com/best-of-web-3-life-is-amazing.htm?utm_source=4





Check out this guy's cyber hand. We are getting very good at this:


http://youtu.be/RFBro6ou96o





Ultra light autogyro and a Triumph motorcycle take a ride together. Fun!


http://www.flixxy.com/air-command-autogyro-vs-triumph-motorcycle.htm





TechJect’s Dragonfly micro UAV flies like a bird and hovers like an insect,

this is pretty cool technology! Scroll down the page for the video:


http://www.gizmag.com/techject-dragonfly-microuav/24900/





Charles Jennings, CEO of a security company talks at TED about Rule #1

of IT Security. Find out what it is, LOL:


http://swanisland.net/news/62-swan-island-ceo-charles-jennings-speaks-at-ted-x-bend-conference





A tribute to the joy of dance:


http://www.flixxy.com/lets-dance.htm





People go to haunted houses, get scared $#!Tless and their picture is taken:


http://www.wired.com/rawfile/2012/10/nightmares/?pid=4104&viewall;=true


Topics: Cybercrime



Subscribe to Our Blog


Comprehensive Anti-Phishing Guide




Get the latest about social engineering

Subscribe to CyberheistNews