COMPUTER SECURITY

HACK ATTACKS

Some of the latest ploys being used by hackers:

  • Phishing: Official-looking e-mails and web sites try to dupe people into volunteering passwords and financial information.

  • Pharming: Web addresses actually are hijacked. In other words, you type a legitimate address into your browser but get diverted to a hacker's site.

  • Drive-by downloads: Malicious code is planted on a legitimate (or shady) web site. When you visit the site, this code can exploit weaknesses in your web browser to quietly infect your machine.

  • Evil twin attacks: Hackers impersonate a Wi-Fi hot spot, jamming the legitimate signal with their own. You think you are logging onto a genuine service, but instead are linked to hackers who can snag personal data you transmit.

  • Search engine poisoning: You do a search, say, for anti-spyware software. But hackers rig the search results to include an authentic-looking site that may infect your machine.

  • Spyware: Confusing pop-up ads trick people into downloading software they don't want. Running in the background, these programs gum up computer performance, deliver more pop-ups, and may monitor your online travels.

  • Keyloggers: Spyware that forwards your keystrokes to marketers or criminals so they know your passwords and web destinations.

Password Security

STAYING SAFE
SOME TIPS TO SECURE YOUR DIGITAL DEVICES:

  • Windows users should install the latest Service Pack, and enable automatic security updates.

  • Avoid wireless (Wi-Fi) hotspots in busy places such as airports and hotels where many others could be connected.

  • Install Internet firewall software to block intruders.

  • Avoid using instant messaging via Wi-Fi networks.• Run anti-virus and anti-spyware software from trusted vendors, and keep these programs updated.

  • If your mobile phone has Bluetooth technology, de-activate it until you need it.

  • Set your e-mail program to automatically delete attachments containing "executable" (.exe) files.

  • Be wary of file-sharing programs; they can bundle lots of spyware.

  • Steer clear of questionable Web sites.

  • Consider switching to the Firefox browser or Apple computers; though not ironclad, they are targeted less often by virus writers than Microsoft applications.

  • Be wary of online offers for free games and toolbars.

  • Don't click any links in pop-up ads; close them by clicking the X icon in the title bar.

  • Activate security features of your home wireless network.

  • Ignore spam offers for anti-spy-ware tools; such offers may install spyware.

  • Turn off your laptop's wireless card until you need it.

DID YOU KNOW?

  • One in 10 e-mails contains a virus, is spam or a phishing attempt.

  • Malicious code was found embedded in JPEG and BMP digital photo files.

  • You are most likely to get hacked on a Saturday; Tuesday is the lightest day for the bad stuff.

  • About 46 percent of phishing sites are hosted in the U.S. China is next at 28 percent, followed by Korea at 11 percent.

  • There were 1,017,208 known viruses in the first half of 2010, up 50 percent from the previous year.

  • Microsoft Windows users are still the number one target (99.4%) of all the new malware.

THE STAR-LEDGER
SOURCES: Richard Smith; Ben Edelman; F-Secure; Federal Trade Commission;
IBM Global Business Security Index Report, The Anti-Phishing Working Group

Block