![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Dialing Up a Scam: Avoiding the Auto-Dialer Virus
For many, the daily walk to the mailbox evokes mixed feelings: The glee that your favorite monthly magazine - or a friend's hand-written letter (quite a surprise in the e-mail age) may be waiting is countered by anxiety of how many bills the postman left you. Now, imagine coming across your phone bill, thicker and heavier than normal. When you open it, instead of "statementstuffers" from the phone company's marketing department, the bill is dozens of pages long ending in a one-month total of almost $5,400. A quick glance at the details reveals hundreds of calls to the same 1-900 number. "A mistake," you insist. After all, you'rethe only person in the house and you have never called a 900 number before. Actually, this is no mistake. In this true story, the homeowner had fallen victim to one of the oldest computer scams around: the "Auto-Dialer" virus. How Did This Computer Security Nightmare Begin How Did An Auto-Dialer Get Installed Behind the scene, the auto-dialer installed itself, checked for the presence of a modem and dial tone, and then proceeded to dial an overseas 900 number over and over again. Even though the person surfed using an always-on broadband Internet connection, the modem remained so he could send and receive faxes. One problem: When he wasn't using the modem, it remained plugged into the phone jack. Why should he have unplugged it? It's not like it could hurt anything, right? Wrong. How To Protect Yourself 1) If you no longer need a modem in your computer, remove it. Or at least disconnect the phone line from the modem; 2) Install anti-virus software such as Trend Micro or Symantec's Norton Anti-Virus. Many are designed to prevent this kind of malicious software, or "Malware." More importantly, make sure your subscription for new virus patterns is current and configured to automatically download and install updates; 3) Install and regularly run Adware protection solutions such as LavaSoft's Ad-Aware or SpyBot Search & Destroy; 4) And do not, under any circumstances, blindly hit "OK" to pop-ups or similar annoyances without first making sure what you are agreeing to. This tale is not fiction; in fact, it happens frequently, to businesses and consumers, kids and adults. But even the least savvy among us can thwart such an attack. A neighborhood teenager recently avoided potentially thousands in fees when an auto-dialer was downloaded and installed. How? She had unplugged the modem.
MORE RESOURCES: The forgotten Black woman who invented the video home security system The Washington Post I-Team: State Police end security post outside former Gov. Charlie Baker's Swampscott home CBS Boston Air Force sees national security threat in Chinese-owned corn mill Successful Farming TikTok's Transparency Campaign Echoes Effort by Huawei to Ease Security Concerns The Wall Street Journal CBP proposes efforts to strengthen aviation security | U.S Customs and Border Protection Burlington police: Mayor condemns police's private security contract Burlington Free Press Security Principles: Addressing underlying causes of risk in complex ... Federal Trade Commission News Memphis Police Chief Trained With Israel Security Forces The Intercept DHS Expands Abraham Accords to Cybersecurity Homeland Security US. Department of Homeland Security and Finnish Ministry of the ... Homeland Security FTC approves order requiring Chegg to tighten data security Higher Ed Dive Statement of Homeland Security Secretary Mayorkas on the Family ... Homeland Security AI, Processor Advances Will Improve Application Security Security Boulevard Gem Security emerges from stealth and raises $11 million Help Net Security Automating security for Linux servers and applications Security Boulevard Top Web Application Security Testing Companies Security Boulevard Radiant Logic acquires Brainwave GRC to strengthen security ... Help Net Security ZURIK: Mayor Cantrell's security officers clocked time while nowhere ... FOX 8 Local First Coldwater utility board to upgrade security after vandalism, threats Coldwater Daily Reporter Enforcement of Fisheries Rules Will Enhance Maritime Governance ... The Pew Charitable Trusts Hospital Security from the Front Door to the Bedside Campus Safety Magazine How to Implement an Effective API Security Strategy Security Boulevard Keep Your Home Safe and Secure Consumer Reports Hong Kong's largest national security trial to begin with 47 in dock FRANCE 24 English Facilities and security prepare for dangerously low temperatures ... The Bowdoin Orient Texas Republicans spar over border security differences Spectrum News NY1 Dallas Zoo making 'significant changes' to security FOX 4 News Dallas-Fort Worth Omaha Target reopens after Tuesday shooting, with security KMTV 3 News Now Omaha Week In Review: Auto, Security, Pervasive Computing SemiEngineering Lack of Natural Gas Storage Seen as 'National Security Issue' in ... Natural Gas Intelligence Ride-hailing company, inDrive, uses new platform to prevent fraud Security Magazine Security exercise scheduled Peninsula Daily News Gigamon Appoints Chaim Mazal Chief Security Officer Business Wire Trezor vs Ledger in 2023: Comparing the Features, Security and ... Crypto News Flash A look inside Columbus City Schools security and safety efforts ABC6OnYourSide.com ‘Disturbing’ force used at Fresno homeless shelters by private security. Here’s what happened Fresno Bee Suspects sought after security guard interrupts smash-and-grab robbery at Dior pop-up on Melrose KABC-TV ChatGPT and API Security Security Boulevard Tracking weapons found at metro Richmond schools; how expert says schools can improve security CBS 6 News Richmond WTVR Unlawful Southwest Border Crossings Plummet Under New Border ... Homeland Security Biden Administration Announces Additional Security Assistance for ... Department of Defense DHS Announces Process Enhancements for Supporting Labor ... Homeland Security DHS Continues to Prepare for End of Title 42; Announces New ... Homeland Security QNAP Fixes Critical Vulnerability in NAS Devices with Latest ... The Hacker News |
![]() |
![]() |
![]() |
RELATED ARTICLES
How to Protect Yourself from Viruses, Spyware, Adware, and Other Nuisances Spyware/adware is a new major concern for PC users everywhere. Infecting your computer silently (usually installed with programs that seem harmless), spyware and adware can collect personal information about you, as well as cause pop up ads to come up all of the time, changing your browsers home page, sometimes even completely disabling your computer's usability. Ransom Trojan Uses Cryptography for Malicious Purpose Every day millions of people go online to find information, to do business, to have a good time. Alas, some people go there to commit crimes as well. How to Protect Yourself Against Online Criminals Credit card fraud is a growing problem for online businesses and can hurt your business in many ways.Fraudulent credit card transactions are costing e-commerce businesses many millions of dollars annually. Criminals are Fishing For Your Identity What is Phishing? In a typical Phishing attack, a criminal will send you an email which appears to be from a well known company, bank or government agency. The email will direct you to click on a link which directs you to a Website or pop-up box that looks like the company's or organization's legitimate site. HackAttack P C. owners are constantly at risk from attacks by hackers. IPv6 - Next Step In IP Security IPv6, IntroductionThe high rate at wich the internet continualy evolves forced the Internet Engineering Task Force(IETF) to find IP solutions to handle the grouth. Designed to handle the fast paced growth of the Internet, the IPv6 (Internet Protocol version 6) is the new version that will replace the widely used IPv4(Internet Protocol version 4) which is already obsolete. 7 Ways to Spot a PayPal Scam E-Mail Paypal is a great site and is used by many to send and receive money. Unfortunately some dishonest people are using the Popularity of Paypal to line their own pockets with gold at the expense of unsuspecting Pay Pal members. Is Your Email Private? Part 1 of 3 In a word, no - an email message has always been nothing more than a simple text message sent unencrypted to a recipient we choose. So all the email that we so blithely send all over the Internet everyday is neither private nor secure. Viruses and Worms, Protection from Disaster Virus damage estimated at $55 billion in 2003. "SINGAPORE - Trend Micro Inc, the world's third-largest anti-virus software maker, said Friday that computer virus attacks cost global businesses an estimated $55 billion in damages in 2003, a sum that would rise this year. SPYWARE - Whos Watching Who? I am in the midst of Oscar Wilde's The Picture of Dorian Gray. "The basis of optimism is sheer terror. Money Mule Email Scam Hits U.S. Imagine this - you open up your email box and an international company is offering you a dream job - you can be an agent for them - a financial intermediary - receiving payments for them and transferring money to them, and, naturally, keeping a commission on each transaction.There's no investment, no money required. Be Aware of Phishing Scams! If you use emails actively in your communication, you must have received various messages claiming to be from Ebay, Paypal and a number of banks. A recent email as if from U. Is Your Music Player Spying On You? In today's times spyware is a very serious issue and all computer users should be aware of the possible damage it can cause. It is estimated by well known industry insiders that nearly 90% of all computers are infected with some kind of spyware. The Saga of the Annoying Adware When we think of adware, what comes to mind are those annoying and pesky ads that pop up out of nowhere whenever we are surfing the net. Anybody who has surfed through the net has encountered those irritating pop-up adwares advertising everything from computer software down to Viagra. Behavior to Stay Safer Online 1. Importance of a Virus Scanner: A Antivirus program can help to prevent you from becoming infected with a Virus or Trojan. Remove Rogue Desktop Icons Created By Spyware If you have used a Windows machine for a while, whether it's Windows XP, Windows 2000, or Windows 98, you're sure to have noticed desktop icons appearing from out of nowhere. How can icons mysteriously emerge on your Windows desktop?1. Reducing Fraudulent Transations - 5 Simple Ways To Protect Yourself The money being spent online is steadily growing. With billions of dollars being spent each year online, the opportunity to make money on the internet has never been bigger. A Personal Experience with Identity Theft Some months ago, before there was much publicity regarding phishing and identity theft, I became a victim.My first inkling that I'd been scammed came from a telephone call from my bank asking if I had been to Italy or Roumania. Top Five Online Scams The top five online scams on the Internet hit nearly ten million people last year according to an FBI report in December 2004. That figure doubled from 2003 to 2004 and people are continuing to fall for these email and identity theft scams. Avoiding Scams: If It Sounds Too Good to Be True, It Probably Is A week or so ago, I received an inquiry from a man in Indonesia about buying multiple copies of certain items on my website. I immediately suspected fraud, so I explained that I only had one piece of each. ![]() |
home | site map |
© 2006 |