Tag Archives: SPAM

Are Social Networks interested in your sex life?

If there is a big topic related to SPAM that has been used for years and years, most of us would agree it’s… Viagra sales. It is really interesting to see those mails on the junk folder of our mailing service, trying to sneak in the desired inbox and capture our attention at least for a second.

The post Are Social Networks interested in your sex life? appeared first on Avira Blog.

Recent scams in my spambox

Being a marketing-communications guy, I’m not as geeky about software technology as some at Avira are – my geekiness is more aligned to any communications I see, which includes the ‘voices’ of spammers. I like to dig through my spam folder and analyze the ways that spam/scam writers communicate. Common Viagra or penis-enlargement topics aside, I’m particularly interested in the rhetoric that scammers use to trick people into clicking, thinking the email is legit (even if the email is already in the reader’s spam folder!).

The post Recent scams in my spambox appeared first on Avira Blog.

Analysis of a Spam Mail

Spamming is a big and a nasty problem in our online world, every day. Each and every one of you probably had this one mail in your inbox. The mail where you didn’t know if you could open it because it might contain a dangerous attachment, or the one where you were just really annoyed by the nonsense content. I guess that we can all agree: nobody wants that.

The post Analysis of a Spam Mail appeared first on Avira Blog.

Analysis of a Spam Mail

Spamming is a big and a nasty problem in our online world, every day. Each and every one of you probably had this one mail in your inbox. The mail where you didn’t know if you could open it because it might contain a dangerous attachment, or the one where you were just really annoyed by the nonsense content. I guess that we can all agree: nobody wants that.

The post Analysis of a Spam Mail appeared first on Avira Blog.

US blames China for massive data breach

The OPM is responsible for human resources for the federal government which means they are the collectors and holders of personal data on all federal employees.

Law enforcement sources close to the breach stated that a “foreign entity or government”  possibly Chinese was believed to be behind the attack, according to an article published in The Guardian.

It should be noted that the Chinese government stated that it was ‘not responsible’ and this conclusion was ‘counterproductive’.

The OPM carries out background checks on employees and holds data dating back to 1985. A successful attacker could gain access to records of past and present employees, with data that could even refer to retired employees and what they are doing now.

Regardless of whether you believe the continual finger pointing by one government at another, there are real people that are effected and protecting them and their identity should be the priority.

Alarmingly, an official said to Reuters that “Access to data from OPM’s computers, such as birth dates, Social Security numbers and bank information, could help hackers test potential passwords to other sites, including those with information about weapons systems”.

 

How to stay safe

While those of us who do not work for the government won’t have been affected by this breach, what can we do to protect ourselves identity theft?

  • Ensure your online accounts are not using the email address and a password that could be guessed from personal information, if you are then change the password.
  • Keep a close watch on your credit reports. This will help you identify if someone is using your identity to take a line of credit in your name. Most credit scoring agencies allow you to run a report for free at least once.
  • Spammers may send emails that look like they are coming from valid sources. Make sure to carefully scrutinize these emails – don’t click on links that look suspicious – and if in doubt contact the sending organization directly to ensure it’s an official communication.
  • Avoid using the same email address or identity across multiple online accounts. For example, have a primarily email address used for recovery of forgotten passwords and account information. Have a secondary email address for offline and online retail transactions. Have a third for financial accounts and sensitive information.
  • Avoid Cold Calls: If you don’t know the person calling then do not hand over payment or personal details. If in doubt, hang up and call the organization directly to establish you are talking to legitimate operators.
  • Set privacy Settings: Lock down access to your personal data on social media sites, these are commonly used by cybercriminals to socially engineer passwords. Try AVG PrivacyFix, it’s a great tool that will assist you with this.
  • Destroy documents: Make sure you shred documents before disposing of them as they can contain a lot of personal information.
  • Check statements and correspondence: Receipts for transactions that you don’t recognize could show up in your mail.
  • Use strong passwords and two factor authentication: See my previous blog post on this, complex passwords can be remembered simply!
  • Check that sites are secure: When you are sending personal data online, check that the site is secure – there should be a padlock in the address or status bar or the address should have a ‘https’ at the start. The ‘s’ stands for secure.
  • Updated security software: Always have updated antivirus software as it will block access to many phishing sites that will ask you for your personal data.

 

Also consider enlisting an identity monitoring service, commercial companies that have been breached often offer this reactively to the victims. Understanding where or if your identity is being abused in real time will give you the ability to manage issues as they happen.