Tag Archive for 2011

McAfee’s 12 Scams of Christmas

McAfee's 12 Scams of ChristmasBefore logging on from a PC, Mac, or mobile device for the last-minute holiday online shopping madness, consumers should look out for these 12 Scams of Christmas identified by anti-malware firm McAfee:

1. Mobile Malware—A National Retail Federation (NRF) survey found that 52.6% of U.S. consumers who own a smartphone will use it for holiday shopping. Malware targeting mobile devices is rising, and Google’s (GOOG) Android smartphones are most at risk. McAfee cites a 76% increase in Android malware in the second quarter of 2011, making it the most targeted smartphone platform.

Malicious Mobile ApplicationsNew malware has recently been found that targets QR codes, a digital bar code that consumers might scan with their smartphone to find good deals or to learn about products they want to buy.

2. Malicious Mobile Applications—These are mobile apps designed to steal information from smartphones or send expensive text messages without a user’s consent. Dangerous apps are usually offered for free and masquerade as fun applications, such as games. Last year, 4.6 million Android smartphone users downloaded a wallpaper app that collected and transmitted user data to a site in China.

Facebook3. Phony Facebook Promotions and Contests—Who doesn’t want free stuff? Unfortunately, cyber scammers know that “free” things are attractive lures, and they have sprinkled Facebook with phony promotions and contests to gather personal information. A recent scam advertised two free airline tickets but required participants to complete multiple surveys requesting personal information.

4. Scareware, or Fake Antivirus software—Scareware is fake antivirus software that tricks people into believing that their computer is at risk or already infected, so they agree to download and pay for phony software. This is one of the most common and dangerous Internet threats today, victimizing one million victims each day. In 2010, McAfee reported that scareware represented 23% of all dangerous Internet links, which has been resurgent recently.

5. Holiday Screen savers—Bringing holiday cheer to your home or work PC sounds like a fun idea to get into the holiday spirit, but be careful. A recent search for a Santa screen saver that promises to let you “fly with Santa in 3D” was malicious. Holiday-themed ringtones and e-cards have also been known to be malicious.

Mac Malware6. Mac Malware – Until recently, Mac users felt insulated from online security threats since most were targeted at PCs. However, with the growing popularity of Apple (AAPL) products, cybercriminals have designed a new wave of malware directed squarely at Mac users. According to McAfee Labs, as of late 2010, there were 5,000 pieces of malware targeting Macs, and this number is increasing by 10 percent each month.

7. Holiday Phishing Scams—Phishing is tricking consumers into revealing information or performing actions they wouldn’t normally do online using phony emails or social media posts. Cyber scammers know that most people are busy around the holidays, so they tailor their emails and social messages with holiday themes to trick recipients into revealing personal information.

  • This is a fake notice from UPS (UPS) saying you have a package and need to complete an attached form. The form asks for personal or financial details to complete the delivery, and it sends that information straight into the hands of cyber scammers.
  • Banking phishing scams continue to be popular, and the holiday season means consumers will spend more money and check bank balances more often. From July to September of this year, McAfee Labs identified about 2,700 phishing URLs per day.
  • Smishing –SMS phishing remains a concern. Scammers send fake messages via text alert to a phone, notifying an unsuspecting consumer that his bank account has been compromised. The cybercriminals then direct the consumer to call a phone number to get it reactivated and collect the user’s personal information, including his Social Security number, address, and account details.

Online Coupon Scams8. Online Coupon Scams—An estimated 63 percent of shoppers search for coupons when they buy something online. October 2011 NRF data shows that 17.3 percent of smartphone users and 21.5 percent of tablet consumers use mobile devices to redeem those coupons. But watch out because scammers know that offering an irresistible online coupon can get people to hand over some of their personal information.

9. Mystery Shopper Scams—Mystery shoppers are hired to shop in a store and report back on the customer service. Scammers use this fun job to lure people into revealing personal and financial information. There have been reports of scammers sending text messages to victims, offering to pay them $50 an hour to be mystery shoppers and instructing them to call a number if they are interested. Once the victim calls, they are asked for personal information, including credit card and bank account numbers.

Scareware10. Hotel “Wrong Transaction” Malware Emails – Many people travel over the holidays, so it is no surprise that scammers have designed travel-related scams to get users to click on dangerous emails. In one example, a scammer sent out emails that appeared to be from a hotel, claiming that a “wrong transaction” had been discovered on the recipient’s credit card. It then asked them to fill out an attached refund form. Once opened, the attachment downloads malware onto their machine.

11. “It” Gift Scams—Hot holiday gifts sell out early in the season every year. Not only do sellers mark up the price of the must-have toy, but scammers also start advertising them on rogue websites and social networks, even if they don’t have them. So, consumers could wind up paying for an item and giving away credit card details only to receive nothing in return. Once the scammers have the personal financial information, there is little recourse.

12. “I’m away from home” Scammers – Posting information about a vacation on social networking sites could be dangerous. If someone is connected with people they don’t know on Facebook or other social networking sites, they could see their post and decide it may be a good time to rob them. Furthermore, a quick online search can quickly turn up their home address.

How to Protect Yourself

  • Only download mobile apps from official app stores, such as iTunes and the Android Market, and read user reviews before downloading them.
  • Be extra vigilant when reviewing and responding to emails.
  • Watch out for too-good-to-be-true offers on social networks. Never agree to share your personal information to take part in a promotion.
  • Don’t accept requests on social networks from anyone you don’t know in real life. Wait to post pictures and comments about your vacation until you’ve already returned home.
Related articles

Mobile Threats Top Holiday Scam List (pcworld.com)

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Mobile Device Info

Mobile Device InfoIn case there was any doubt that mobile devices are the real deal, here are some stats from Digby. Globally, 80% of consumers have used computers to get access to the Web within the previous seven days. Sixty percent used their mobile devices to do so. 25% of US mobile web users only access the web from their mobile phones.

Angry Birds know where you live

Angry Birds know where you live75% of the public may be giving away their physical location when downloading smartphone applications, according to mobile security vendor AdaptiveMobile. 69% of smartphone users say such privacy breaches are unacceptable, yet Help Net Security reports that 75% fail to read the terms and conditions, which include access to data such as their physical location.

Consumers are outraged that their data may not be secure but are unwilling to protect themselves,” AdaptiveMobile VP of Handset Security, Ciaran Bradley says in the article. “We are downloading more apps than ever before, but people are unaware that their location and other information can be harvested by applications.

AdaptiveMobile research has shown that common applications including Angry Birds, Jaws, and Paper Toss have access to information including location coordinates and owner’s name, which can be shared with up to 17 different external domains including advertisers.

Consumers and the wider mobile industry need to become savvier about the information which is shared by apps,” Mike Hawkes, Chairman of The Mobile Data Association told Help Net Security. “It is becoming commonplace that personal information is shared with advertisers and developers.”

Mr. Bradley told Help Net Security that iPhone users are the most careless, with 65% completely unaware that free applications may compromise their privacy. Windows Phone users are more responsible, with 29% promising to stop downloading free applications if they had any doubt that their personal information was not safe. Windows Phone users are generally cautious, 95% of them are ‘quite’ or ‘very’ concerned about privacy infringements.

If we are to slow the rise in cybercrime, consumers need to become more aware of the need for phone security” concluded Mr. Bradley. “Not only will this frustrate hackers and other cybercriminals, but also ensure that consumers can have a safe mobile experience.”

rb-

I wrote about mobile apps stealing PII here and here.

Related articles

Cisco’s Tablets Are Doing So Well, They’re Planning At Least Two More Models For Next Year

Cisco Cius tabletThe Cisco Cius tablet for enterprises sounded like a hard sell when Cisco introduced it. But the company is apparently proving experts wrong, including me (I wrote about the Cius here and here) because Cisco‘s (CSCO) tablets are doing well enough that the company plans to release two new form factors next year, including a 10-inch version according to the BusinessInsider

Product manager Chuck Fontana told the BusinessInsider that 1,000 companies have already bought the tablet, He wouldn’t share device unit sales, but some deployments are in the hundreds, and one company plans to buy 1,500 for its mobile sales force. The tablets are sold as part of a broader communications package and include Cisco’s teleconferencing and collaboration services.

But underneath they’re straight Google (GOOG) Android tablets and can run any Android app. To prevent employees from downloading malware-infested or low-quality apps, Cisco has rolled out a custom app store called AppHQ, where every app is vetted.

The BusinessInsider says the Cius is an interesting demonstration of how the relative openness of Android versus iOS is helping it gain traction in surprising places. Cisco didn’t go to quite the lengths that Amazon (AMZN) did with the Kindle Fire, where it basically forked Android and created a custom OS. But Android is open enough that Cisco could build its own app store and ship it with its own apps front and center.

That couldn’t have worked with the iPad, where Apple (AAPL) controls the experience.

So would Cisco consider offering a Windows tablet instead once Microsoft (MSFT) Windows 8 comes out?  “No,” said Fontana, “we’re not looking to do anything from a Windows perspective. Our core approach remains on Android.

Related articles

People Are Losing Interest In The Microsoft Tablet, And It’s Not Even Out Yet

Microsoft TabletApple‘s (AAPL) iPad has already taken about 11% of the PC market, and by the time Microsoft (MSFT) and its partners get around to releasing a real competitor next year, it may be too late according to a new study from Forrester Research (FORR) in the BusinessInsider.

Near the beginning of 2011 according to the article Forrester surveyed 3,835 consumers who were considering buying a tablet. When asked which operating system they’d like on it, 48% said Windows, well ahead of iOS (16%) and Google’s (GOOG) Android (9%). The second most popular choice was “undecided” with 16%.

In September, Forrester asked the same question of a different group of 2,229 consumers. This time, iOS came in number one with 28% of the vote. Windows had only 25%, and Android was at 18%. A whole 24% were still undecided.

Overall, interest in Windows tablets dropped 21 percentage points in six months.

The BusinessInsider says the study is probably a bit skewed but says the data shows a real perception shift: consumers are thinking of tablets more like smartphones and less like PCs. That perception could carry through to the next time they’re thinking of buying a new computing device.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

U.S. Firms Set Record Hiring H-1B Visa Holders

U.S. Firms Set Record Hiring H-1B Visa HoldersCorporate America’s assault on the middle class continues. Despite the jobless epidemic, U.S. companies are tripping over themselves to fill high-paying job openings with workers from overseas. The BusinessInsider reports that tech titans led by Microsoft (MSFT) and IBM (IBM), have already maxed out their allotment of 65,000 1H-1B employees.

The article says that U.S. companies have set a three-year record in how quickly they reached the cap for H-1B workers. The applications process for 2012 opened on April 1 and on November 23, the U.S. Citizen and Immigration Services department announced that the cap had been reached.

But there are more than 65,000 jobs at stake. The USCIS also received “more than 20,000 H-1B petitions filed for persons exempt from the cap under the ‘advanced degree’ exemption,” it said. In addition, petitions for workers who already have their visas are not counted toward the cap.

The H-1B visa is a temporary work visa for those classified as “skilled workers” such as IT staff, engineers, doctors, and scientists, and the pay is good. For instance, the average salary for a worker th

 

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Santa Laid-Off in NY

Santa Laid-Off in NYThe global depression recession economic event has now effected Santa Claus. Yahoo News reports that when faced with balancing the budget in New York’s Suffolk County the politicians decided to lay off Santa Claus to balance their budget.

The Suffolk County executive said he could not justify spending $660 of his $2.7 billion budget to pay Santa according to Yahoo. David McKell, 83, a World War II veteran and former homicide detective has donned his Santa suit for the last ten years to greet children on Long Island.

Steve Levy, the Republican County Executive’s answer was to laying off Santa was typically Republican, “Let either the private sector come forward with a donation, or, better yet, let’s tap the volunteers in the community.Santa

Levy was quickly called a Grinch by his opponents. “Do we really have to hold Santa Claus hostage to balance the budget?” Bill Lindsay, a Democrat, and the presiding officer of the county legislature told Yahoo.

I mean, $600? Give me a break,” Joseph Sawicki, a Republican who as county comptroller is charged with overseeing the county government’s fiscal prudence, said in an interview. “There comes a point where you go overboard in terms of penny-pinching.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

How to Use the Last 5 Minutes of Your Work Day

How to Use the Last Five Minutes of Your Work DayPeter Bregman a strategic advisor to CEOs and their leadership teams wrote in the Harvard Business Review that most of us get smarter as we get older. But somehow, despite that, we often make the same mistakes ay home and work. On the flip side, but no less comforting, we often do many things right and then fail to repeat them. He believes it’s because we rarely take the time to pause, breathe, and think about what’s working and what’s not.

think about what's working and what's notMr. Breman says that people should look at their past behavior, figure out what worked, and repeat it while admitting honestly what didn’t and change it. He theorizes that if a person can do that well, everything else takes care of itself. That’s how people become life-long learners.

Five minutes to become a life-long learner

The article says it only takes about five minutes to become a life-long learner. Life-long learners take a brief pause at the end of the day to consider what worked and what didn’t.

before leaving the officeMr. Bregman proposes that every day, before leaving the office, save a few minutes to think about what just happened. Look at your calendar and compare what actually happened, the meetings you attended, the work you got done, the conversations you had, the people with whom you interacted, even the breaks you took, with your plan for what you wanted to have happened. Then ask yourself three sets of questions:

  • How did the day go? What success did I experience? What challenges did I endure?
  • What did I learn today? About myself? About others? What do I plan to do — differently or the same — tomorrow?
  • Who did I interact with? Anyone, I need to update? Thank? Ask a question? Share feedback?

Maintaining and growing relationships

This last set of questions is invaluable in terms of maintaining and growing relationships. It takes just a few short minutes to shoot off an email — or three — to share your appreciation for a kindness someone extended, to ask someone a question, or to keep someone in the loop on a project.

If we don’t pause to think about it, we are apt to overlook these kinds of communications. And we often do. But in a world where we depend on others to achieve anything in life, they are essential.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.