Friday, January 1, 2010

The Cybercrime Trend Newsletter

Welcome to the January 2010 Cybercrime Trend Newsletter!

Welcome to our December "Cybercrime Trend Newsletter." We will take a look at the future of cybercrime and its close friend identity theft in this January 2010 Cybercrime Trend Newsletter. Our January 15 Identity Theft Trend Newsletter will go into even more detail on that subject.

2009 was a year full of online threats as cyber criminals refined their skills and methods becoming more sophisticated. It was a year that saw social networks become more vulnerable. We saw enhanced versions of spam, and phishing. There were new and more powerful botnets developed including, Conficker, the biggest one of them all.

What are the experts predicting for cybercrime in 2010? This newsletter will go a long way in answering that question. I have included several predictions from some of the top experts in the industry. Many of these experts are from my competitors, however, I believe knowledge is all-powerful. The more you know, the more likely you are to truly understand how serious cybercrime has become.

Online Threats Get Smarter and Nastier

The year 2009 saw unprecedented growth of spyware, malware and other cyber attacks that posed significant risks for everyone. Symantec vice-president (Asia South region) Eric Hoh warns of more threats as the new year dawns.

BitDefender Highlights Top Security Predictions for 2010

Botnets, malicious applications and social networking malware are all threats to look out for in 2010, according to BitDefender. BitDefender predicts that in 2010 cybercriminals will target operating systems, mobile devices and enterprise technologies such as cloud computing.

Security Heavyweights predict 2010 Threats

Upcoming security threats for 2010, as predicted by CA, Cisco, Symantec, Websense and a group of experts at Independent Security Evaluators. Plus, Info-Tech on security trends.
Social networks are going to become a prime target for cybercriminals in 2010, according to security predictions from annual security reports released this month by CA Inc., Cisco Systems Inc. and Symantec Corp.

10 Predictions for 2010: Kaminsky and Weatherford

As 2009 draws to a close and a new decade dawns, CSOonline has reached out to some of the industry's best known security pros in search of insight on what the next 12 months and beyond have in store for our IT and cyber infrastructure. Each participant was asked to make five predictions.

Next Year in the Threat Webscape -- Websense Security Labs Predictions for 2010

Websense, Inc. released its list of security predictions and trends anticipated for 2010. Researchers in the Websense Security Labs have identified emerging security exploits and trends anticipated to increase during the next 12 months. The emerging trends and predictions show an overall blending of security threats across multiple attack vectors for the purpose of roping computers into bot networks and stealing valuable confidential information. Researchers believe that hackers will look to compromise new platforms such as smartphones and take advantage of the popularity of Windows 7. They are also expected to compromise the integrity of search engine results and use legitimate advertisements to spread their malicious content..

What are our customers saying?

Staying ahead of the cybercriminal is almost impossible. That's why, when it comes to computer protection, you need the most proactive protection available. Here's what customers are saying about the mananged computer security service I offer:

You guys ROCK!

Just wanted to say that Chad did an AWESOME job cleaning up our computer! He was friendly and provided excellent service! Good Job, Chad! I recommend your service to everyone I talk to. You guys ROCK! Thanks Again!
Jody S -
New Ulm, MN

Hats off!

Hats off to Clint!! He did a marvelous job in cleaning up my computer. I am so thankful for having the access to the trained professionals at Invisus! It alleviates any worries I may have about my computer to know that I have someone to fall back on when problems arise!
Dennis B -
Mustang, OK

Your service just rocks

Tell Russell thanks for saving my bacon on recovering that email. When you "lose" your first email on an internship program, how competent do you look? Special thanks to Russell. Also, Chance deserves kudos for working on my 95 year old aunt's new computer where the printer wouldn't work. She's now a believer too that your company rocks. :)
Nancy D -
Sarasota, FL

Keep an eye out for the Identity Theft Trend Newsletter January 15th...
Until then be safe out there,

Kathleen Fulgham

What Online Criminals Are Up To And How To Avoid Their Traps

Cybercrime by the Numbers
23,500

Number of newly infected web pages every day. That's one every four seconds. It is four times worse that it was in 2008.

97

Percent of business e-mail that is spam.

5


There were five times more malicious e-mail attachments at the end of 2008 than at the beginning

1

Number of new spam related webpages every 15 seconds

17.5

Percent of spam relayed from the U.S.

Source: Sophos Labs

Kathleen Fulgham
Computer Security Specialist
661 256-6642

Sunday, December 20, 2009

The Cybercrime Trend Newsletter

Welcome to the December 2009 Cybercrime Trend Newsletter!
Welcome to our December "Cybercrime Trend Newsletter." This month we focus on the holidays and how cybercrime can ruin the end of the year and make 2010 a nightmare as you try to recover from the effects of the crime.

Cybercriminals know how to trick unsuspecting individuals and steal their money, personal information and/or use their computers for their own wiley ways.

This month we feature news articles about holiday cybercrime and identity theft protection. You are welcome to forward this newsletter to anyone you feel can use this information.

Online holiday shoppers should beware of scams

Amarillo, Texas - Scams and identity theft are dangers for online shoppers as the holiday shopping season gets underway.
Believe it or not more than half of consumers are expected to shop online for holiday gifts.
But there are some simple rules to follow if you do.

How to Lose Your Identity This Holiday Season

Looking to expose your personal data to online thieves? Follow these five easy steps -- or better yet, use them as a cautionary tale.

Experts warn of risks when using debit cards

NEW YORK -- Your new frugal lifestyle is about to get tested by the biggest consumer challenge of the year -- holiday shopping.
Even if you're among the thriftiest who have pared back spending and paid off debt this year, it's likely you'll open your wallet to decorate a bit and buy a few gifts in the weeks ahead. The National Retail Federation expects people to spend an average $683 on the festivities this season. That's down 3 percent from last year's $705, but it's still a substantial sum.
For many, part of the strategy for keeping on budget includes a plan to leave the credit cards at home and use a debit card at the checkout.
But before heading out to the stores with debit card in hand, make sure you understand the risks

Cyber crime bigger than drug industry

There is a warning cyber criminals will be making an increasingly sophisticated attempt to break in or infect computers in the new year.

No Let-up in Cybercrime in 2009

Each year, the day job overat PRI's The World sends me on the hunt of a "the-year-that-was" round-up of global cybercrime. I generally make it a point to check in with some smart people to get a read on this. One person I always get on the line is Graham Cluley, technology consultant at the British anti-virus firm Sophos. As time goes by, the sheer numbers of viruses, worms and trojan horses that are spewed out on a yearly basis never ceases to astound me.

You Need More Than Over-the-Counter or Freeware Products to Protect Your Personal Information

The computer problems we face today go well beyond just being careful. Individuals and small business must be proactive in their defense looking for the best kinds of computer protection. Safe guards must be in place for families and in the case of business, employees too.

All computer users (home and business) should seriously consider subscribing to a helpful new kind of computer support service known as "Personal Computer Services." The main benefit of this type of monthly service is that instead of you trying to keep your protection current and manage everything yourself, you get access to a team of trained professionals who personally handle everything for you. Your personal computer service should include industrial grade security software for your computer as well as security checkups, system cleanups, and online repair at no additional cost. This type of service is not available through freeware and traditional over-the-counter computer protection products.

The security software and services that come with a personal computer service will help block hackers from your computer and make your experience on the computer fun, productive and hassle-free. With this new personal computer service, you'll also eliminate most of the common hassles and headaches with your computer, allowing you to focus more on your home and business activities.

Keep an eye out for the Identity Theft Trend Newsletter December 15th...

Until then be safe out there,

Kathleen Fulgham

PC Security and Identity Theft
Protection
661 256-6642

What Online Criminals Are Up To And How To Avoid Their Traps

Add Us To Your Address Book
To help ensure that you receive all email messages consistently in your inbox with images displayed, please add this address to your address book or contacts list: safepcsolutions@gmail.com

Cybercrime by the Numbers
$62.2 Billion

FBI estimate of what U.S. businesses lose annually because of computer related crimes

$8 Billion

Consumer Reports estimate of what U.S. consumers lost the past two years because of viruses, spyware, and Internet scams.

93.8 Million

Privacy Rights Clearinghouse's count of personal records reported lost or stolen since February 2005

26,150

The Anti-phishing Working Group's count of unique variations of phishing scams reported in August 2006

Your Questions Answered
Clean Up Startup Programs.

Nearly every new piece of software will install itself into your computers' start-up tray unless you explicitly tell the installer not to. The more programs in the start-up group, the longer it takes your computer to load up.
Find programs running in start-up tray:
Click the "Start" button. Choose "Run" or "Start search" enter "msconfig" click "OK" button. Click the "Startup" tab to see a list of applications in your start-up tray. If unsure about what they do leave them checked. Only uncheck applications you don't want to load when your machine starts up. You will need to restart for changes to take effect. Your computer should start up quicker now.



http://www.cybercrimecomputersecuriy.com

Tuesday, November 10, 2009

Cybercrime Trend Newsletter

  What Online Criminals Are Up To And How To Avoid Their Traps.

Welcome to the October 2009 Cybercrime Trend Newsletter!


Every month we continue to be amazed at how rapidly cybercrime continues to grow. This month our articles focus on the many ways cybercriminals use to steal personal information, take over computers and and cause harm to society. It should be obvious to all of us that cybercrime isn't going away any time soon. It is up to each of us to protect our computers and our personal information.

Organized Cybercrime Revealed
As if CSOs don't have enough on their plates, they now need to beat back made men, capos and the other elements of the Mafia. Yes, the Mafia is formally involved in cybercrime, or so alleges the U.S. attorney for Florida, who filed charges against associates of the Bonanno crime family that included pilfering data from Lexis-Nexis.


http://www.networkworld.com/news/2009/092809-organized-cybercrime.html

Cybercriminals Use Trojans and Money Mules to Loot Online Bank Accounts
San Jose, CA, USA - September 30, 2009 - Finjan Inc., a developer in secure web gateway products and the provider of a unified web security solution for the enterprise market, today unveiled new research from its Malicious Code Research Center (MCRC), which uncovered new techniques used by cybercriminals to rob online bank accounts


http://www.contactcenterworld.com/view/contact-center-news/Cybercriminals-use-Trojans-and-Money-Mules-to-Loot-Online-Bank-Accounts.asp

Next-gen Trojan Rewrites Bank Statements
Black hat hackers have created a new strain of Trojan that rewrites online bank statements to disguise fraud.


Victims of the URLZone Trojan would only realise their bank account has been looted after they check their balance with a bank branch or via an ATM

http://www.theregister.co.uk/2009/10/01/next_gen_bank_trojan/
Security Expert Warns That Banking Trojans Could Be Silent Killer for Small Business

Sophisticated Cyber Attack Can be Financially Devastating For Unprotected Small Firms
Walnut Creek, CA (PRWEB) September 23, 2009 -- Think Security First, the national awareness and education program created to protect
America's small businesses from cybercrime and identity theft, today warned all small businesses to be alert to a growing and sophisticated cyber threat that could jeopardize the financial viability of businesses that fall victim.


http://news.yahoo.com/s/prweb/20090923/bs_prweb/prweb2917744_1

8 Steps to Better Online Security
Have you taken the necessary steps to protect yourself online or are you one of those people that think it won't happen to me? Securing your computer online takes a little work but it is well worth the investment of your time and money. Below I have listed some of the most important ways you can make sure that you will be protected.


1. Email is still one of the favorite ways for crooks to hack into your computer. Many Internet Providers today provide a spam blocking feature and it cost nothing to use. Turn it on and it will monitor your system and block many of the junk emails that you may receive from even getting to your Inbox.

2. Live by the rule that if it sounds too good to be true, it probably is. Cyber criminals use phony sweepstakes, foreign lotteries, and other similar methods trying to get you to give them your personal info or send them money.

3. Monitor the online activities of your children. Parental control software is recommended and the computer they use should be checked regularly for browser and email activity.

4. Always be cautious if you are on a website that you know very little about. Be especially careful if that website ask you for any personal information such as your mailing address, social security number or your bank account number.

5. Use encryption software if you are entering data that you do not want others to see. This will garble the data to make it unreadable to anyone who might try to hack into your computer.

6. If you do any online shopping, make sure that you do it only on a secure website. If the website you go to is truly a secure website, the address will start with "https" or it will have a VeriSign or TRUSTe seal on it. If you don't see any of these, you may be at risk.

7. Make sure you have a Top Notch Firewall installed on your computer.

8. Use Corporate Grade Security Anti-Virus & Anti-Spyware


If you are serious about protecting your computer and yourself online, then you should call the person who sent this newsletter to you and ask them how they can help you acquire the kind of protection you need.


Keep an eye out for the Identity Theft Trend Newsletter October 15th...

Until then be safe out there,

Tuesday, September 22, 2009

September Security Newsletter

September Security Newsletter



Identity Theft NewsletterLatest News On The #1 Crime In America & Tips On How To Keep Your ID Your Own!

Welcome to the September 2009 Identity Theft Newsletter!

Id Theft is the number one fastest growing crime in America yet most people people believe it will never happen to them.

It is my sincere hope that by helping to get the word out through these newsletters that some may be saved from the personal nightmare of having there identity stolen.Identity Theft Victim Meets Her Identity Thief Back in January, Michelle McCambridge found herself staring into the face of the woman who stole her identity.

Only a week earlier, she learned that someone had taken out credit cards in her name and racked up thousands in charges. A federal agent had shown her a surveillance photo. But the image didn't ring a bell.

Now the woman in thick-rimmed glasses was standing there at McCambridge's women's-casual counter at J.C. Penney at Southcenter, asking to open a credit account.McCambridge's heart lept.

She excused herself and secretly got the store's security crew to train their cameras on the woman.And in those few minutes, the 23-year-old retail clerk and college student set in motion a federal investigation that has brought down what authorities say is a prolific ring of ID thieves responsible for victimizing at least 39 people.http://www.ethiopianreview.com/articles/30514Identity theft growing, getting harder to stopMIAMI -

With a few keystrokes, computer security expert Esteban Farao can find all the wireless networks in use in a half-block radius from a Starbucks.One of them, it appears, is intended for guests at the Marriott.

Others are private networks for individual businesses.Farao, of Coral Gables-based Enterprise Risk Management, said the security of any of those networks could be compromised - a la Albert Gonzalez."It's a matter of time," Farao said, even for networks that are encrypted and password protected.Gonzalez, of Miami, pleaded guilty last month to 19 felony charges in a Massachusetts indictment for tapping into the computer networks of T.J. Maxx, OfficeMax and other stores, stealing customers' data and selling it overseas.

Federal prosecutors say he stole 40 million credit card numbers as a part of that scheme. He faces charges that he stole millions more from other companies.http://www.philly.com/philly/business/technology/091409_id_theft.htmlTJX hacker pleads guilty in major ID theft caseThe hacker involved in a massive data breach at TJX

Companies has pleaded guilty to identity theft and fraud for the theft of more than 40 million credit and debit card numbers from TJX and other retailers.Albert Gonzalez, 28, of Miami, pleaded guilty in Massachusetts to 19 charges related to the hacking of computer systems at TJX and retailers including Barnes & Noble.

He also pleaded guilty to a charge brought in the Eastern District of New York for hacking into the systems of the Dave & Buster's restaurant chain.http://www.mxlogic.com/securitynews/identity-theft/tjx-hacker-pleads-guilty-in-major-id-theft-case602.cfmIdentity Theft Facts:

The FBI receives close to 300,000 complaints of suspicious activity per month and only investigates around 6,000.73% of Identity Theft victims suffered due to the misappropriation of their credit card info.Identity Theives Targeting Small BusinessesBusinesses lose an estimated 57 billion dollars a year to identity theft.Small businesses are even more vulnerable for two reasons:1.)

They rely on local law enforcement to investigate but most local law enforcement agencies are not prepared to handle business identity theft.2.) As larger companies have taken on more sophisticated computer network protections, cyber criminals have adapted and gone after smaller businesses who do not have high-level security.

In other words, to identity thieves, small businesses are the low hanging fruit just ripe for the picking!Business Owners, are you complying with the Red Flags Rule?

The Red Flags Rule requires many businesses and organizations to implement a written Identity Theft Prevention Program designed to detect the warning signs - or "red flags" - of identity theft in their day-to-day operations.

The deadline is November 1, 2009.Are you covered by the Red Flags Rule?http://www.ftc.gov/redflagsruleOnline Red Flag TrainingRed Flag Rules training, is designed to familiarize public sector employees with terms, definitions, and requirements related to FTC

Government Red Flag Rules.It teaches the participants to detect, address, and respond appropriately to Red Flags.http://www.governmentresource.com/pages/online-red-flag-rules_home

http://www.kathy1313.com/
http://www.DesktopLightning.com/fulghamkathleen
http://www.leadsleap.com/?referid=fulghamkathleen

Saturday, August 8, 2009

Social Networks New Cyber Crime Arena

Social networking websites such as Facebook, Twitter and MySpace will soon become the most insidious places on the Internet, where users are most likely to face cyber attacks and digital annoyances, according to Web security firm Sophos

Web 2.0 websites will become the main battleground for malware authors, identity thieves and spammers," warns the report , published by Sophos in July.

The security firm recommends companies and households to develop a proper understanding of how social networking websites work and to set up privacy protection when they use Facebook, MySpace, LinkedIn or Twitter.

Risks emanating from these websites top the list of electronic dangers outlined by Sophos. Traditional phishing, email threats and attacks on new devices, such as BlackBerries and iPhones, come next in the ranking of annoyances for digital consumers.

Problems associated with the use of social networking are becoming widespread and, as a consequence, better known. Research conducted by Sophos reveals that 63% of employers worry that their employees share too much personal information via social networking sites.

Although a significant number of system administrators do not control access to such websites in the workplace (between 40% and 50%), another important percentage does apply restrictions, and it is expected to increase.

Data leakage via networking websites has been reported in many high-profile cases widely covered by the press. One of the most famous is the case of the incoming head of the British secret service, MI6, who was exposed by his wife on Facebook, and was thus forced to quit before assuming his post. Is Facebook Identity Theft Possible?



http://www.kathy1313.com/
http://www.leadsleap.com/?referid=fulghamkathleen
http://www.DesktopLightning.com/fulghamkathleen
http://perfecttrafficstorm.com/aff/4163

Wednesday, June 17, 2009

US cybersecurity chief warns of 'market' in malware


For the first time since taking up the post in March, Philip Reitinger told AFP the spred of malware like botnets-software now constitutes an underground market economy.


More must be done to combat the lucrative trade in malicious software, which threatens sensitive government networks and personal data, the head of the US National Cybersecurity Center warned Tuesday.


Hackers now not only assemble botnets, they sell botnets. The underground market economy is behind that. That includes organized crime groups.


There have been risks to government capabilities from botnet attacks. They are threatening government networks and personal data, the head of the US National Cybersecurity Center says.


There are reports that the US electricity grid and F-35 fighter jet programs had been the target of attacks, amid murmurings about backing from foreign governments. "Everyone recognizes that we are in a national security moment."


The threats have been rising for some time and although our capabilities as a government and in fact internationally have been going up, it's I think clear that the status quo is no longer sufficient.



"Everyone thought of hackers as sort of curious kids that sat in their room and banged on the computer late into the night with their pizza boxes and, you know, they were just out there to make a name for themselves.
"Cracking is very different now, the threats have become much more sophisticated," he said.


Cyber attacks are thought to cost the US economy around eight billion dollars a year, although estimates including intellectual property theft put the figure at closer to one trillion dollars.

Friday, June 12, 2009

Government Acknowledges Cyber Crime




To All of My Fellow Computer Owners:

Now is the most important time to do something for yourself and your family. Computer security and Identity theft is more important than ever.

none of these 21st century challenges can be fully met, without America's digital infrastructure -- the backbone that underpins a prosperous economy and a strong military and an open and efficient government. Without that foundation we can't get the job done.
So cyberspace is real. And so are the risks that come with it.

It's the great irony of our Information Age -- the very technologies that empower us to create and to build also empower those who would disrupt and destroy. And this paradox -- seen and unseen -- is something that we experience every day.

It's about the privacy and the economic security of American families. We rely on the Internet to pay our bills, to bank, to shop, to file our taxes. But we've had to learn a whole new vocabulary just to stay ahead of the cyber criminals who would do us harm -- spyware and malware and spoofing and phishing and botnets.

Millions of Americans have been victimized, their privacy violated, their identities stolen, their lives upended, and their wallets emptied. According to one survey, in the past two years alone cyber crime has cost Americans more than $8 billion.

But every day we see waves of cyber thieves trolling for sensitive information -- the disgruntled employee on the inside, the lone hacker a thousand miles away, organized crime, the industrial spy and, increasingly, foreign intelligence services.

In one brazen act last year, thieves used stolen credit card information to steal millions of dollars from 130 ATM machines in 49 cities around the world -- and they did it in just 30 minutes. A single employee of an American company was convicted of stealing intellectual property reportedly worth $400 million. It's been estimated that last year alone cyber criminals stole intellectual property from businesses worldwide worth up to $1 trillion.

In short, America's economic prosperity in the 21st century will depend on cybersecurity.
And this is also a matter of public safety and national security. We count on computer networks to deliver our oil and gas, our power and our water. We rely on them for public transportation and air traffic control. Yet we know that cyber intruders have probed our electrical grid and that in other countries cyber attacks have plunged entire cities into darkness.

The Federal Government is putting computer security and Identity Theft on high priority, Don’t you think it is time for you to take the responsibility to get the best computer security for your computer and the best Identity Theft protection for you and your family?

Check out the best of both worlds in one place, click the link below and your on your way to getting computer security and identity theft protection.

Followers