eFraud and how to prevent it

  • -

eFraud and how to prevent it

Category : Hints and Tips , security

Types of eFraud

Phishing

  • emails look like official communications from a bank, retailer or government department.
  •  they ask the victim to “confirm” some of their confidential data.
  •  often on the pretext of some sort of security measure being implemented or response to some possibly fraudulent use of the account
  • scam can be made to look real by use of images taken from the real organisation.

Spear Phishing

  • more complicated and effective attack
  •  involving online identity theft
  •  criminal has some prior knowledge of the company’s data or victim’s private data.
  •  so email bait can be personalized with information that appears truly genuine from the target individual
  • addition of a cleverly constructed use of social information makes these attacks so much more effective.

Advanced Fee Fraud

  • Represented in large part by Nigerian Scams
  •  typically take the form of emails purporting to be from someone having large funds available overseas that, if not moved out of country soon, would be lost.
  •  fraudster pleads with the victim for their help in moving these funds to the victim’s country, in return for which the fraudster generously gives a portion of the funds.
  •  once baited the victim’s interest, the victim needs to outlay some funds of his or her own in order to initiate the process.
  •  Similar scams exist for Lottery winners who need to send a fee in order to receive their winnings, and also emails pretending to be from friends abroad who “need money” urgently.

Identity Fraud

  • the process of stealing another person’s identity order to profit financially at the victims expense
  •  Usually done by first stealing their personal details
  • Any subsequent activity on the part of the attacker would be traced back to the victim. Disassociating themselves from the activities of their attacker is a long, tedious and not always successful task.

Credit card Fraud

  • Whether obtained via phishing or key-logging (malware that reads the keys on your computer as you type), credit card information is actively traded publicly
  • information is then used to buy goods or services, using techniques to make it difficult to trace the recipient.
  •  The transactions are done on sites (called ”cardable”) that do not restrict shipment of goods to the same address or region as the billing address of the card owner.

Some Security Measures to put in place

  • Be vigilant, keep your wits about you; be aware that not all sites on the Internet or emails you receive are the genuine article! The Golden Rule is if in doubt dump it.
  • Protect your computer with a firewall, spam filters, anti-virus and anti-spyware software. Ask us for our leaflet on the best low or no cost solutions to this.
  • Don’t type any confidential data into sites unless they display “https:” rather than “http:” in the address bar (the s stands for secure). Unfortunately not all sites use this level of security. The best do.
  • Do not click on links, download files or open attachments in emails from unknown senders. It is best to open attachments only when you are expecting them and know what they contain, even if you know the sender (you can always reply to their email to check it’s legitimate).
  • Never give out your passwords for any reason! Any company that asks you to disclose your password is unreliable.
  • Make sure you secure your social web sites and don’t make everything about you and what you do public. There are a lot of people out there looking to use your information from Facebook, Twitter etc. to set you and your employer up.
  • Keep who you are and where you are private.
  • Be very careful when disposing of old computers and hard disks. Recycled computers have been found to retain confidential information pertaining to personal information and Internet banking. If you are a private individual we will wipe your hard drive to US Department of Defence level 7 standard for £10. For Businesses we charge £50

For free software for private use we recommend you visit www.avast.com www.malwarebytes.com and www.zonealarm.com

For companies we recommend either Sophos Anti-Virus or Avast and of course we would like you to buy them from us!

GiaKonda IT Ltd can be contacted on 01792422616 or visited at 3 Humphrey St, Swansea SA1 6BG

It's only fair to share...Share on FacebookShare on Google+Tweet about this on TwitterShare on LinkedIn

Call us

01792 422616

Read our Blog

Donate to Siavonga Project

Contact Us