Shopping online is a normal routine for many people.
Trying to steal your info is also normal routine for criminal mind.
Read how you can stay safe when shopping online.
Article provided courtesy of https://www.securingthehuman.org/
When you get it returned to you marked “Undeliverable”, it will have a long set of details from the “postmaster” on the server. You will need to check the address or wait for the person to make some space in their mailbox.
The images here are of an email I received that I supposedly sent and has been returned.
DON’T DO IT.
Delete the message. Then remove it from your deleted folder if possible.
Check out these links regarding safe and secure email practices.
View the full text version of the email I received: Undeliverable text version
You might be one of the 1.3 billion users of Adobe Flash Player. If so are you up to date?
Another Flash Player update was just released, the 20th in the past year. This one fixes a flaw that is already being exploited, and you could be next.
So if you have Adobe Flash Player you need to keep it up to date.
Likely you do. Here’s how to check. Open your browser and go to https://helpx.adobe.com/flash-player.html
As you can see Flash Player is installed in Google Chrome (by default). As of this writing the Flash Version is up to date, 126.96.36.1995.
If it is not up to date you can go to Customize and Control Google Chrome in the upper right hand corner, and click About Google Chrome. As it opens it will check for updates and let you know if you need to update.
Learn more about updating Google Chrome here.
Although you can’t remove Flash Player from Google Chrome, you can disable it.
Simply enter chrome://plugins/ in the address bar and scroll down to Adobe Flash Player and disable it.
This makes it easy to reverse if you need to use it later.
For Internet Explorer in Windows 8/8.1 go to the settings gear in the upper right hand corner and click Manage Addons.
Click on Show >All Addons.
Find Shockwave Flash Object and disable.
In Windows 7 and earlier you can disable Flash Player as above or remove it completely. The best way is to use the uninstaller. It and instructions can be found here.
If you don’t need it at least disable it and if you do need it make sure it is up to date. Either set it up for automatic updates, or at least heed the prompt when it tells you of a new version.
Read this story about another, although poorly done, browser hijacker attempt that may appear in your browser.
There is a lesson here. Be sure you can trust a site before you click on it.
This site was apparently compromised and the malicious link added. You can receive the same sort of malware in an email.
As noted in the article, you may be able to clear the problem by rebooting, or repeatedly clicking “Leave this page”.
Be especially careful if there seems to be no real connection to the website and the information you are looking for. Be smart. Stay safe!
A common misconception many people have is that they are not a target for cyber crime: that they or their computers do not have any value. Nothing could be further from the truth. If you have a computer, mobile, device, an online account, email address, credit card or engage in other type of online activity, you are worth money to cyber criminals.
Read the April Newsletter from SANS Securing the Human for tips on protecting yourself.
Visit Sans Securing the Human
for monthly newsletters.
We now must worry about being targeted by our household appliances, as well.
An Internet-security firm has discovered what they are calling a global cyber attack launched from more than 100,000 everyday consumer gadgets such as home-networking routers, televisions and at least one “smart” refrigerator.
If you have internet connected appliances, do you like them? Have you had any problems? Any words of advice for others?
If you don’t have internet connected appliances, tell us why not in the comments section below.
Read the article here
These can appear in your mailbox disguised as a legitimate fax from a reputable company, in this case Xerox. . In fact, the link to Xerox is valid and will send you to their website. However, the same cannot be said about the attachment. Although innocent looking, it may contain dangerous zip files. A zip file can be used to get past email filters that will not allow an executable file to be delivered. This can properly be used to send a legitimate file to someone.
What are the clues that indicate that this email may contain dangerous zip files? Continue reading Don’t Unzip Dangerous Zip Files
This is an example of a phishing email. It came with an attached ZIP file which as you see below claims to contain a key change to your credit report, but will no doubt contain malicious code. The usual purpose of this a phishing email is to either get your personal information or install a rogue program on your computer.
A warning from Experian is here. Also note that the attachment may not be picked up by malware or anti-virus scanners, but that doesn’t mean it is safe,SO DON’T OPEN IT!
A phishing email can be very well disguised. The corporate logos can be found and copied and email links can appear to be from the company, but lead to the phishing site.
Always be cautious and realize that legitimate companies will not ask for personal information, nor will they supply a link in an email, but rather ask you to log into their site directly from your browser and check your account.
If you receive an unexpected email with an attachment be very suspicious.
|This email was sent because it contains important information about your account. Please note that if you have previously unsubscribed from Experian.com, you will no longer receive newsletters or special offers. However, you will continue to receive email notifications regarding your account. To ensure that you’ll receive emails from us, please add email@example.com to your address book.|
|*If it has been less than thirty days since you joined Experian.com, your monthly credit statement includes your information for the period of time you have been enrolled.|
Social Networking is a right of passage for many. It is part of everyday life. But there are concerns and cautions that should be part of your social networking activity. Read the March Ouch! newsletter to find out how to stay safe.
If there is a choice, use HTTPS. Many sites like google and Facebook either use it by default or give you the choice. To learn why that’s important, read about HTTP vs. HTTPS here.
Facebook has a number of settings that govern what will be seen by others and what is private.
On the privacy tab, you can change who can see your “stuff”, like your posts. They can be public, Friends, only Me, Close Friends, Family or a custom setting.
You can also choose who can see your email address or phone number, to contact you. You can choose Friends, Friends of friends, or everyone.
You can also choose whether search engines can link to your timeline.
The same is true with other social networking. You need to consider carefully what you put on the site, and who you allow to see it.
And remember, a secret may only be a secret until you tell ONE person, then you may lose control over who else gets to know. So be careful what you post. The whole world might be looking.
Similar setting choices are available on Twitter, Linkedin, Pinterest, MySpace, Google Plus+, deviantART and many other sites.
Be sure you know how to protect your privacy and have fun with your Social Networking.
Here is a list of security software and other great programs that I use both for daily operation of my computer and for troubleshooting problems.
Keep checking this post as it will be expanded over time.