The internet is full of opportunities which essentially changed the way we do business, educate, communicate, socialize and entertain ourselves. With all the opportunities, however, come a lot of risks. Hackers, scammers and spammers are constantly working hard to compromise your personal information and privacy. WCCCD IT department monitors any potential risks, but it is everyone’s business to practice caution when connected to the internet, and make sure your computer is protected whether you are at work, home or at a coffee shop.
The people with malicious intent look for opportunities to do harm using the internet finding unprotected computers and installing Malwares on your computer without your knowledge.
What is a Malware anyway?
, short for malicious software, is software that get installed without your consent or knowledge and is used to disrupt computer operation, gather sensitive information, or gain access to private information. Criminals from anywhere in the world use malware to steal your personal information, send spam, and commit fraud.
How is this possible?
There are many ways a Malware gets installed to an unprotected computer.
Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit cards information by impersonating as a trustworthy entity in an email communication.
The following are actual phishing scam emails sent to our users at the District. The recipients’ address is masked
Pretending IT Department: Email Upgrade
From: |
Mary.Labib@stmu.ca |
Time: |
2014-08-20 19:12:15 |
To: |
XXXXX@wcccd.edu |
|
|
Your two incoming mails were placed on pending status due to the recent upgrade in our database, In order to receive the messages kindly click: HERE
Login with your correct Webmail information's and wait for responds from our data base service.
We apologize for any inconvenience and do appreciate your understanding.
Regards,
Thank you.
Copyright © 2014 Webmail .Inc . All rights reserved. |
|
Pretending IT Department: Mailbox full
From: |
web@noreply.com |
Time: |
2014-09-14 20:52:52 |
To: |
XXXXX1@wcccd.edu |
|
|
Subject: |
Email Quota Limit |
|
|
|
|
|
|
You have exceeded the storage limit on your mailbox.You will not be able to send or receive new mail until you upgrade your email.
Click the below link and fill the form to upgrade your account.
Webmail Account Administrator |
Impersonating Bank
From: |
test@codiatech.com |
Time: |
2014-09-15 14:27:17 |
To: |
******@wcccd.edu |
|
|
Subject: |
YOUR FIDELITY ONLINE BANKING ACCOUNT HAS BEEN BLOCK |
|
|
Dear Customer.
Please will kindly inform you that your online banking service has been suspended due to the urgent report will receive from the fraud agency that your account has been recently used to carry out illegal online transaction.
Inorder for us to reactivated your account, You will need to Identify your Identity by Clicking on the Link Below,
http://ghan.5gbfree.com/Log/hre/hgfr/fidelity/index.php
Note: Failure to keep to this above instruction and fill all the requested Information within 3days, Your account will be close and Terminated.
THANK YOU
FIDELITY BANK |
There are many more phishing scam emails that appear to come from a known source such as Facebook, LinkedIn, PayPal, EBay and other messages with links to seemingly innocent e-card, an instant message promising a movie star photo, a pop-up window offering a free game or an attachment.
But any of these temptations could hide malware, which may damage your computer, destroy your information, or enlist your PC in an Internet criminal’s spam-sending army of computers. Or open a back door to your PC, making it easier to attack later.
Even if the email appears to be coming from a familiar source or your friends, think before you click. Attackers can spoof or compromise email accounts of your friends, and send you a scam email.
DO NOT reply or forward these phishing attempts to anyone.
DO NOT click on any links that may be in the message content.
DO NOT provide your user ID and/or password to anyone via email or phone.
DO NOT click on pop-up windows
DO NOT click on cancel, OK, or accept to get rid of a pop-up ad or an unexpected warning – even an offer to remove spyware. Instead, click the Close box (X) or press ALT + F4 on your keyboard.
DO delete phishing scam messages and notify the helpdesk by calling ext. 2666
You wouldn’t leave your house unlocked, so why take that chance with your computer? A firewall puts a protective barrier between your PC and the Internet.
• It’s a kind of security checkpoint that information must pass through before it’s allowed to enter your computer.
• And a firewall also helps make your computer “invisible” to online attackers, viruses and worms.
- Keep your Operating System up-to-date
Because your operating system, such as Microsoft Windows, is the computer’s brain, check and make sure it’s up to date. And don’t stop there.
• Take advantage of the ability to update PC’s automatically.
- Keep other software up-to-date
• Hackers work very hard to exploit weaknesses in other software programs you may have installed such Adobe acrobat reader, Microsoft Office products, and other proprietary software. That’s why software companies release security updates and you should make sure they are all updated.
- Install Antivirus software
Computer viruses, worms and Trojan horses are programs designed to damage your computer, corrupt data, or control your PC.
• Antivirus programs scan everything that goes into your computer – email, attachments – for thousands of known viruses and try to clean up any they find.
• The anti-virus software must be updated on a daily basis to protect your PC properly from new threats that are developed. Make sure to follow the anti-virus maker’s configuration steps to downloads the latest updates.
- Install Antimalware software
• Antimalware programs monitor your computer, looking for known spyware and watching for programs that are trying to install themselves. When they find something, they warn you and help you remove the spyware.
• Keep your antimalware current.
• Backing up your data will save you a lot of headaches. A regular backup schedule will mitigate any damage done by a virus, and will allow you to get up and running much quicker.
Monitor your computer for unusual behavior. Your computer may be infected with malware if you encounter some of the following:
- Unexpected pop-up windows. For instance a fake virus alert telling you that you have security threats on your computer
- Slows down or crashes
- Won't shut down or restart
- Other people receive email you did not send
- Random connections to unknown websites
- You see toolbars you did not install
If you experience some of the above unusual behavior with your work computer, please call the service desk/Helpdesk. If the computer is your PC at home, take the following steps:
- Stop any online activities that require personal information such as banking, filling out forms or surveys, shopping etc.
- Update your security software, and then run it to scan your computer for viruses and spyware
- Save your files to an external drive. The best way to clean an infected computer is to format the hard drive wiping everything, and installing a new Operating System.
|