10 March 2008

How to protect against Internet fraudsters


With the development of Internet commerce has increased and the number of frauds related to the Internet and computers. Often, in order to achieve their goals fraudsters do not have to use sophisticated technology - all the same every day, their victims are the thousands. We will describe the simplest and most popular ways of fraud and how to protect against theft and not lose money.



Typically, this is done is not difficult, you need to be guided only by common sense and use some protection.

Fraud on the Internet auctions

In the past few years to use auctions have become very popular among Internet users. Many through such auctions are not just selling unnecessary things, but also provide a stable income. With Sales on Internet auctions conducted numerous cash transactions, usually between people from different countries. Many online auctions entirely built on trust, and this is their main weakness.

Tips are simple. If the deal that you offer too good - likely to deceive you. Swindlers usually do so: placed at the auction proposal for the sale of goods at a price much lower than the real, and they leave your e-mail. Anyone who communicates with them, have become a victim of fraud.

Moshenniki asked to translate them appointed by half the cost of goods and the other half are asked to send after receiving the goods. Morning - money, in the evening - chairs. It is clear that the money has already been sent back to you, no one will return.

There are slightly more complex version of the auction fraud. There are services that will act as an intermediary in transactions between the two is not trusted each other parties. Such services undertake to acknowledge receipt of money or goods from each side. If one of the parties has failed to meet its terms of the transaction, the goods and the money returned to sender.

For fraudsters is not a front to organize labor service, and to propose to conduct transactions through it.

Another famous trick used by fraudsters - cheque for a large sum than the proposed value of the goods (sometimes amount to two or three times as much value). For you, "pieces" of history that the cheque you opravit imaginary debtor fraudsters. Check will be drawn in the amount of the debt. "The extra money you will be asked to send back, for example, using Western Union.

Check with the bank, usually obnalichivayut, but after a thorough check found that he was fake. Ends that you should bank of the amount of money sent back con (if you do not spend money on the cheques issued).

Here are some tips to help avoid becoming a victim of fraud in the online-auctions:

-- do not use is not known to you mediation service;
-- not khefutso transactions with residents of countries in west Africa, Romania - they "specialize" in the auction frauds;
-- use well-known online-auction - the auction site with the power to make even the beginner fraudsters;
-- never let us on their credit card online merchants, and if you want to pay the card, you should insist on the use of the payment system like paypal.com;
-- do not accept bank cheques totalling more than you requested for the product; everyone who insists on payment via cheque, saying that the bank cheque will be checked for 6 weeks;
-- Do not leave feedback on dealers before the deal was made final, try to focus on dealers with a good reputation, although the good reviews may well be specially trained.

Fraud with banking systems

Banking systems operating through the Internet, it is very convenient. For the convenience of users pay this increased risk losing money.

Afuera called phishing - a relatively new phenomenon.

The whole scheme works like this: as a rule, by e-mail you send a letter, allegedly from the bank staff, which says that "to verify your password," you need to follow the link, a link leads to the site, which as two drops of water like a page to enter personal data on your bank.

Typed page on false data usually written to a file and sent to a hacker in the mail. This kind of scam is used not only with passwords to banking systems.

Upon receipt of your data to access the account through a bank site, hackers will begin to transfer small amounts of money from your account on its own. They know that transfers of large sums are always suspect. Hackers who earn their bread on these crafts are usually transferred money from hundreds and thousands of accounts (for which data are available) every week, usually this process automated using scripts.

Another way to get your confidential data - "Trojans" (a kind of malicious software, in this case, they are responsible for data transmission hacker) and to record key strokes on the keyboard. The only way to protect against this kind of threat - a good antivirus and firewall.

Here's how to protect themselves from hackers who want to be able to access your data in the banking system:

-- read the news regularly on the site of your bank, it reported fraud;
-- Bank will never ask for a password by e-mail;
-- keep anti-virus databases;
-- good firewall (firewall, firewall) blocks the transmission of data hacker, even if the antivirus can not find malicious software;
-- Most browsers are built into a tool to combat this type of fraud;
-- Keep an eye on small transactions from your account if you are not sure of a transaction - better communicate and deal with the bank.

Fraud with identity theft

Phishing fraud-are not only used to steal information on access to the banking system, but also for identity theft victims.

Hackers can steal personal data through a very complex programs that use the "hole" in the operating system, browser or mail client or through gross receptions.

Sample text of a letter in which the swindler quite blatantly trying to redirect the user to the front site to gather personal data is shown in the left vreze (letter gamblers, case 1). This example relates to the payment system paypal, but with the same success can be used in any other system.

In the address resource, which is a reference in the letter scam, not even the word paypal, instead, is ip address of a site unrelated to the system. Surprisingly, even at such grave placeholders many receptions.

Slightly more complex example with the same system results in vreze left - RECENT letter, sample 2. The letter used language HTML, in a previous letter was simple text. In this example, the user does not see the address of the resource, as in the previous example, instead it is a hyperlink. Where it is not clicking on it, you can see the actions it cursor or by reviewing the original text of the message (extract from it for the convenience of the results in the same vreze). In different mail clients to the other. Has a link to a site does not paypal, but on fabrication, similar to that site.

At such a letter "fall" far more users, because the majority does not have the look where the hyperlink.

To analyze the text of the letter useful knowledge of html, but without it you can find addresses, which leads to a reference in the letter: they are viewing the HTML code in the mail clients typically are displayed in different colors.

Another way to identity theft - malicious programs. Previously they were writing just for fun. Today, the authors of such programs (notably the "Troyanov) soon realized that their new creations (which are not intended for mass mailings and do not fall within the framework antivirus) will demand. Such programs often used equally for corporate espionage and theft of personal data of individual users.

One of the biggest frauds of this kind took place in Israel in June 2005.

Then the attackers used "Trojans" to get a wide range of information about several companies - their marketing plans, business plans, information on new products, and so on. Companies victims of the fraud have suffered great losses.

Malware hackers "tseplyali" to the CD-presentations, which were distributed to the offices of the victims. Anti-virus programs are not able to detect new malicious software, and network screens at this time have not helped.

Similar approaches are being used to steal users' personal data - credit card data, scanned images of passports and other important passwords. Gathering enough data on the victim, con artists can be your name to the transactions, or use the data to create false documents, and more. This is much more money than it appears at first glance.

Never store the scanned pages of passports, etc. on your hard drive or shifruyte them through special programmes (including free).

The defeat of the computer user in order to steal personal data is the usual way - with the help of exploiting vulnerabilities in programs. The most complex of "Troyanov allow fraudsters to obtain full control of the user's computer.

Protect themselves from identity theft can be so:

-- Never store personal data encrypted on the hard drive;
-- Use a reliable anti-virus program and firewall;
-- do not open the annex to the letters you unfamiliar senders and check before starting the letters attached to the files of your friends;
-- regularly install updates to the operating system, email client and the browser.

This will allow the system to protect against many malicious programs. Hackers are learning to use the new "hole" short time later, after the update, and sometimes use the vulnerability to correct that the upgrade has not yet emerged.

No comments: