When it comes to online usage they say that the average computer user will choose dancing pigs over internet security every time.
As technology advances, so do the ways to lure unsuspecting users into scams – our hope is to make our Integris computer users more aware of the different scams and offer some tips on how to avoid them.
One of the more frequent scams out there is the celebrity gossip scam. Imagine seeing the following headlines:
- Orlando Bloom punches Justin Bieber in the face,
- Robin Williams last moments on video,
- Hundreds of celebrity hacked phones reveal naked pictures.
All of these video headlines have surfaced in the last few months, all with the potential for scammers to take advantage of users through bogus links, videos, posts, quizzes and more.
How do they do it?
Scammers post a fake video of ‘Robin William’s last moments’ and once users ‘like’, share or click on the video, their computer becomes infected. From here there are many different things that could happen, such as:
- A user’s personal information could be stolen from their profile,
- An online quiz could ask for credit card information,
- A keylogging or screen capturing virus could infect your computer, recording your banking information for a future scam.
It is always a good idea to verify content to ensure it is not a scam. The easiest way to do this – go to google, enter in the title of the article/video/post you want to read, and add the word scam. Other users will have been ‘burned’ and most likely will have posted this information. For more information on how you can protect yourself from fraud, visit the following websites:
How are we helping Integris members protect themselves? Integris Internet Security Software…
Integris has recently released Trusteer Rapport, a financial banking security software, free to Integris members, that protects your online banking communication from being stolen by criminals.
Who Is Trusteer Rapport?
Trusteer is the leading provider of cybercrime prevention solutions that protects organizations against financial fraud and data breeches. Trusteer’s Cybercrime Prevention Architecture combines multi-layer security software and real-time threat intelligence to defeat zero-day malware and phishing attacks.
What is Trusteer Rapport Security Software?
Trusteer Rapport is advanced security software that protects member online banking communication from being stolen by criminals. It is an additional layer of security to any antivirus or security software that you already have installed on your computer.
Can I use Trusteer without anti-virus software and is it a substitute for anti-virus?
Trusteer Rapport security software is available for all members and will work on your computer whether you have anti-virus software or not. However, we highly recommend having anti-virus and internet security programs installed on your computer and mobile devices.
Why is Trusteer necessary?
Anti-virus software detects only about 25% of the most popular malware. Virus creators move to quickly so that by the time anti-virus products are able to block new viruses, it is often too late. Trusteer is necessary because it detects and blocks any attempt by the malware to compromise the browser and your online banking session. It is optimized to stop financial malware and prevent financial fraud.
Do I have to pay for Trusteer Rapport Security software?
Trusteer Rapport is free for all Integris members!
How Trusteer Helps You:
- Removes existing financial malware from your computer immediately
- Prevents future malware infections
- Protects your credentials and personal information from key-logging and screen capturing attempts
- Stops phishing attacks from stealing your data and credentials
- Notifies Integris of threat activity to further drive fraud prevention
Benefits of Trusteer Rapport
- Easy to install
- Compact – it doesn’t take up much room on your hard drive
- Automatic – all updates are done in the background, so you do not have to manually perform updates
- Effective – In a recent study Trusteer Rapport stopped 100% of all financial malware testers used to try and infect a protected machine
- Proven – Trusteer Rapport was developed by the online security experts at Trusteer and currently protects over 30 million user worldwide
- Free – yes, it’s FREE! For member of Integris Trusteer Rapport has been provided at no cost.
If you have any questions about Trusteer Rapport, please contact an in-branch representative; if you need trouble shooting or support assistance please visit www.trusteer.com/support/
Tips for keeping your personal information secure:
- Never respond to unsolicited emails or text messages claiming to be from Integris that request your account information or personal details
- Use a password for your online banking that is different than what you use for accessing other online services such as email.
- Keep your computer operating system and browser up to date with the latest versions and patches.
- Do not open attachments or install free software from unknown sources. This may expose your computer and the information on it to unauthorized sources.
- Review your banking and credit card activity at least once a month to ensure there is no fraudulent activity on your accounts.
- Notify us immediately if you see suspicious activity.
Frequent Internet Scam Vocabulary
Keylogging – A keylogger is malicious software that resides unnoticed inside your computer. The keylogger records keystrokes (each time you type something on the keyboard) and then sends this information to the attacker. By grabbing your sign-in credentials and other sensitive information and sending them to the attacker, keyloggers enable the attacker to sign into your account.
Malicious Browser Add-ons – Browser add-ons (toolbars, plug-ins, etc.) control everything that happens inside your browser. A malicious add-on is capable of reading sensitive information such as your sign-in credentials and passing them to the attacker. It can also generate transactions on your behalf, such as sending money from your account to the attacker’s account.
Malicious Programs – A malicious program can connect to your browser and control everything that happens inside your browser. Such a program is capable of reading sensitive information and passing them to the attacker. It can also generate transactions on your behalf.
Screen Capturing – This malware takes screenshots and sends them to the attacker. Screenshots can include your account details, balance, and even credentials.
Session Hijacking – This malware steals your session parameters with a specific website and sends this information to the attacker. These session parameters can then be used by the attacker to take over your session with the website and to bypass the authentication process that is required to log into the website.
Phishing – A phishing attack is when the attacker builds a website that looks exactly like a website you know and trust. The attacker then convinces you to visit the website (possibly by sending you a fraudulent email). When you arrive at the fraudulent website you mistakenly believe that this is the real website. As soon as you try to sign into this fraudulent website the attacker grabs your sign-in credentials and can now use them to sign into the genuine website on your behalf.
Pharming or DNS Spoofing – A pharming or DNS (Domain Name System) spoofing attack is when the attacker causes your computer to go to a fraudulent website each time you type a real website’s address in the browser’s address bar. Once you arrive at the fraudulent website and try to sign in, the attacker grabs your sign-in credentials and can now sign in to the genuine website on your behalf.
|Written by Cori Ramsay, BA – Communications Officer|