Safe Internet Use Mark Wheatley CSI Onsite
In business for over 15 years Purpose & Values driven Member in good standing with: About Us
Safe Internet Use What can we do to stay ahead? What to watch out for ◦ What is a URL? ◦ What is Phishing / Spoofing? Threat Evolution - Malware Good Practice - 5 rules (CSI Onsite Style)
What to watch out for URLs – Uniform Resource Locator URL is the address to visit a web site Domain name translates to an IP address Can be masked to appear as something different than actual address Web browser ignores symbol in address Besides the look for the first “/” Words to the left of that slash, is actual domain name
What to watch out for Hyperlinks, URLs and Redirects Easy to spoof Underlying address may be different than visible link Domain names that are close to actual ww.mircosoft.com Examples
Examples Fake Link Look for the first “/” after
What to watch out for Phishing Get you to click on link/s with malicious or fraudulent intent Potential for identity theft Fake s from company with whom you do business PayPal / EBay fraud Fake charities Urgent wording Fake links with legitimate appearance
Examples Link is the same as actual, but hoping you’ll only look at first or second line. Look for the “/”. … viewvideopatch.com/
What to watch out for Spoofing appearing to be from someone other than the actual sender Spamming technique Creates concern for recipient Could be sent from infected computer Open relays Many ISPs requiring outbound authentication to keep infected computers from relaying
Examples Spoofed Sender Link that is close to actual Clicked on link Looked identical to PayPal site All links were correct Except one
Examples Received: from blackbed by server1.0traffic.com with local (Exim 4.69) (envelope-from ) id 1S55eO-0007wH-Bd for Tue, 06 Mar :26: To: Subject: Your package is available for pickup From: "FedEx Support"
Threat Evolution What is Malware? Short for Malicious Software Disrupt computer operation, gather information or exploit system or data, without consent Hostile, intrusive or annoying software Delivered to system via: attachment Web site re-direct Infected system, flash drive, software install
Examples Virus Attachment
Threat Evolution Can look like legitimate software Hold your system ransom Lock system down so even skilled technicians may choose to reload computer operating system, or restore from backup rather than try to find or un-do changes Capture credit card information, leading to identity theft
Examples Looks legit and has feel of a Windows app Could make changes to system with AV software installed Entire window, one big “install me now” button Shield in corner looks just like Windows Update All BAD!
Threat Evolution Malicious intent – take down company web presence Organized crime Fraud Financial gain 1% of 1million s = 10,000 X $40 = a lot of money to be had….
What can we do to stay ahead Education, education, education Software can’t always protect you Be suspicious of Internet content Operate computer with lesser privileges Watch for drive-by downloads, or piggy-backing Verify the software you do install, is legitimate and has good intentions settings / spam filters Create regular backups and system restore points
5 Basic Rules Keep your antivirus software installed and definitions up to date Careful where you browse… Be careful when opening s from people you do AND don’t know Microsoft does not typically send updates or patches via and neither do most software manufacturers Check your hyperlinks and URLs before clicking
Questions Or Call: