Latest news Abney Associates technology, for scams, it’s the most wonderful time of year

For scams, it’s the most wonderful time of year

You’ve no doubt heard about “The Twelve Days of Christmas.” Well, how about the “12 Scams of Christmas”?

That’s what McAfee, the Internet security company, headlined a recent news release aimed at warning consumers to be extremely vigilant this holiday-shopping season against Scrooge-inspired fraudsters.

“The potential for identity theft increases as consumers share personal information across multiple devices that are often underprotected,” Michelle Dennedy, vice president and chief privacy officer for McAfee, said in a statement.

“Understanding criminals’ mind-sets and being aware of how they try to take advantage of consumers can help ensure that we use our devices the way they were intended – to enhance our lives, not jeopardize them.”

McAfee, which has assembled such a list for years, certainly isn’t the only business or consumer organization offering advice to shoppers this season. The Federal Trade Commission, Better Business Bureau, AARP, online sites such as Scambook and Scambusters, and even the FBI have posted tips on their websites.

Connie Quillen, executive assistant at the Albuquerque-based Better Business Bureau Serving New Mexico and Southern Colorado, says her office hasn’t received many holiday-related complaints or inquiries – yet.

But given ’tis the season for such scams, Quillen says consumers should be on the lookout for two in particular: purchasing goods from a website that doesn’t have any products – or at least has no intention of shipping them – and buying gift cards that already have been compromised.








Microsoft uncovers Sefnit Trojan return after Groupon click-fraud scam

The authors of the notorious Sefnit Trojan have resurfaced using advanced infection and click-fraud techniques to earn vast sums of money through bogus advertising, according to Microsoft.

Microsoft antivirus researcher Geoff McDonald reported discovering an evolved version of the Sefnit Trojan, which takes money by targeting popular websites, such as Groupon.

In a blog post on the company’s Malware Protection Centre, McDonald wrote: “The Sefnit click-fraud component is now structured as a proxy service based on the open-source 3proxy project. The botnet of Sefnit-hosted proxies are used to relay HTTP traffic to pretend to click on advertisements. In this way, the new version of Sefnit exhibits no clear visible user symptoms to bring attention to the botnet. This allowed them to evade attention from anti-malware researchers for a couple years.

“The Sefnit botnet uses the hosted 3proxy servers to redirect internet traffic and perform fake advertisement clicks. A recorded example of this click-fraud path is shown below by using the legitimate affiliate search engine to simulate a search for ‘cat’ and fake a click on an advertisement provided by Google to defraud the advertiser Groupon.”

He said the technique allowed the criminals behind the malware to increase the revenue they made using the scam. “The end result is Groupon paying a small amount of money for this fake advertisement ‘click’ to Google. Google takes a portion of the money and pays the rest out to the website hosting the advertisement – Mywebsearch. The Sefnit authors likely signed up as an affiliate for Mywebsearch, resulting in the Sefnit criminals then receiving a commission on the click.”

A Groupon spokesperson told V3 the company actively monitors its network for any illicit activity. “We actively monitor our thousands of global affiliate marketers, and those who violate the rules are removed from the programme.”

McDonald said Microsoft uncovered evidence linking Sefnit to the Mevade malware used in the world’s first large-scale Tor botnet.

“​Recently Trojan:Win32/Mevade made news for being the first large botnet to use Tor to anonymise and hide its network traffic. Within a few weeks, starting mid-August, the number of directly connecting Tor users increased by almost 600 percent – from about 500,000 users per day to more than three million,” he wrote.

“Last week we concluded, after further review, that Mevade and Sefnit are the same family and our detections for Mevade have now been moved to join the Sefnit family.”

As well as its links to Mevade, McDonald said the attack is also using a host of new custom-built components to improve its infection rate. “This latest version of Sefnit shows they are using multiple attack vectors, even going as far as writing their own bundler installers to achieve the maximum number of infections that make this type of click fraud a financially viable exercise,” he wrote.

“The authors have adapted their click-fraud mechanisms in a way that takes user interaction out of the picture while maintaining the effectiveness. This removal of the user-interaction reliance in the click-fraud methodology was a large factor in the Sefnit authors being able to stay out of the security researchers’ radars over the last couple of years.”

Sefnit is one of many variations of malware to receive technical upgrades in recent months. Earlier this month FireEye researchers reported discovering a reworked version of the Darkleech campaign targeting Java and Adobe vulnerabilities to spread the Reveton ransomware.

Secure Your Computer In Seven Steps | Abney and Associates News Review: Good Is


While handheld devices such as smartphones and tablets provide new ways for us to leverage technology, computers are often still the primary tool we use for our professional and personal lives. As a result, your computer, whether at work or at home, still remains a primary target for cyber criminals. By following these simple steps, you can help secure your computer and protect it against most known attacks.


The first step to a secure computer is starting with a computer you can trust. If you purchased a new computer directly from a well-known vendor, then you should be able trust it and the pre-installed software. If you have purchased a used computer, then do not trust it. The used computer may have been accidentally (or intentionally) infected by the previous owner. Trying to secure a computer that is already infected does no good. The first step you should take after acquiring a used computer is reformat the hard drive and reinstall the operating system (be sure to ask someone you trust for help if you are not sure how to do this).


The next step is updating your computer. Cyber attackers are always identifying new weaknesses in computers and their applications. When computer and software vendors learn about these new vulnerabilities, they develop and release fixes, called updates or patches, to fix the problem. When you purchase a new computer or reinstall the operating system, your computer is most likely already out of date. As such, the first step you want to take is connect to the Internet and update your computer’s operating system. Be sure that when you do connect to the Internet, your new computer is protected behind a firewall or home Wi-Fi access point. In addition, most computer operating systems, including Windows and OS X (and even many applications), have an automatic updating feature builtin. Enable automated updating to check for updates at least once a day; this helps ensure your computer will remain updated and secure. If a vendor releases a patch that you have to manually install, be sure to install it as soon as possible.


Once your computer is updated you want to ensure you have security software installed and enabled. The two most common types of security software are anti-virus and firewalls. Anti-virus helps identify infected files you may have downloaded or shared with others and stops these malicious files from harming your computer. Firewalls act like a virtual policeman; they determine who can and cannot talk to your computer. Many security vendors now offer entire security software suites that include firewall, anti-virus and other software options. You may want to consider purchasing an entire security package.


Every person that has authorized access to your computer should have their own separate account protected by a unique, strong password. Never share accounts. If this is a personal computer for home use, create a separate account for each member of your own family, especially children. This way you can apply different controls to each user (such as parental controls for your children) and track who did what. In addition, grant each user the minimum privileges they need to use the computer. Never give someone administrative access unless they absolutely need it, including yourself. Only use administrative privileges when you need them, such as to install software or changing a system configuration.


If your computer is portable, such as a laptop, you may want to consider full disk encryption (FDE). Encryption helps ensure that the data on your computer is protected even if you lose it. You may also want to ensure the computer screen is password locked, so people cannot access the system when you are away from it. Finally, some laptops now support remote location and/or wiping to help you locate a missing laptop or permanently erase sensitive data if it cannot be recovered.


No amount of technology can protect your computer against every threat. While everything we have covered so far will help secure your computer, the last element we have to secure is you, the computer user. Know and understand that bad guys are always trying to trick you. If you receive a message that seems odd or suspicious, don’t click on any links or attachments. If someone calls you telling your computer is infected and you need to install software, this is most likely a scam. In many ways you are the best defense for your computer, not technology.


Finally, even if you take all the steps we have covered, there is always a chance your computer can get hacked, have a hard drive failure or some other catastrophe. Your last defense is backups. We highly recommend you regularly backup any important information (documents, pictures, videos, etc) to either an external hard drive or use a backup Cloud service, or perhaps even both.

Abney Associates Cyber Warning


Abney Associates Cyber Warning

Hvor mange svindel i Storbritannia treffer en rekordhøy i 2012, med identitet-relaterte forbrytelser langt de fleste vanlig type, ifølge en rapport.

Identitet svindel består av to tredjedeler av de totale 248,325 hendelsene registrert av Cifas, svindel forebygging tjenesten. Fire femtedeler av disse ble begått online, sin årsrapport med Fraudscape funnet, inkludert bruk av teknikker som phishing, malware og hacking.


“Data har blitt svindlers valgte ruten til økonomisk gevinst,” sa Sandra Peaston, stedfortredende leder av økonomisk kriminalitet og strategisk intelligens på Cifas. Dreining mot gjør forretninger på Internett har skapt nye muligheter for svindlere, sa hun.

Fremveksten av Lønning långivere har drevet låne svindel, som nye og innovative finansielle produkter ofte tiltrekke svindlere, sa hun.


“De siste par årene har sett en eksplosjon i ulike typer lån som er nå tilgjengelig,” sier hun. “Noen av disse produktene er designet for å være lett tilgjengelig, men dette gjør dem mer utsatt for identitet forsøk på svindel.”

Bank, kredittkort og postordre regnskapet var de mest hyppige mål, ifølge rapporten. Svindel på butikk-kort og kredittkort økt 44 prosent fra år til år.

Mest sannsynlig ofre for svindlere var menn i deres 40s.


Abney Associates Cyber Warning

Read more:,Authorised=false.html#axzz2MoCz7GHx



Hong Kong Cyber War Abney and Associates Internet Technology Review



Hong Kong Cyber War Abney and Associates Internet Technology Review

Mit der Nachricht, dass das chinesische Militär mehr als 140 Cyber-Angriffe auf US-Regierungsbehörden und Unternehmen durchgeführt ist es jetzt klar, dass China, den USA und anderen Ländern auf der ganzen Welt in einer Schwarzarbeit und weitgehend unsichtbar Cyber-Krieg befinden.

Ein Bericht von Mandiant, ein Cyber-Security-Unternehmen mit Sitz in Alexandria, festgestellt, dass eine Gruppe von chinesischen Hackern, die Teil des chinesischen Militärs haben Angriffe auf die amerikanischen Interessen in den letzten sieben Jahren führt. Der Bericht behauptet, dass die wiederholten Dementis von hacking Aktivitäten von den chinesischen Behörden Lügen sind.


Die Angriffe von Mandiant skizziert sind die jüngste in einer Reihe offenbarten global Cyber-Angriffe. Berichten zufolge verkrüppelt ein Angriff durch die USA und Israel eine Atomanlage im Iran. Die New York Times, Google und das Wall Street Journal wurden vor kurzem Ziele der Verdacht, dass chinesische Hacker. Langjährige Feinde Indien und Pakistan sind auch aktiv in der Cyber-Kriegsführung gegen einander, während Frankreich das tunesische Militär für den Angriff auf seinen Netzen vorgeworfen hat. Russland benutzt Cyber-Kriegsführung gegen Georgien während ihres Krieges im Jahr 2008. Aber es war der Angriff auf Estland 2007, die weltweit Aufmerksamkeit bekam.


Jaak Aavisksoo, Estlands Minister für Verteidigung, wusste, dass es Ärger wenn er Fehlermeldungen immer gehalten, jedes Mal, wenn er versucht, eine Zeitung eines Morgens zugreifen. Er sagte Wired Magazine: “Angriffe zielten auf die wesentlichen elektronische Infrastruktur der Republik Estland. Alle großen Geschäftsbanken, Telekommunikationsunternehmen, Medien und Name-Server — die Telefonbücher des Internets —, spürte die Auswirkungen und die Mehrheit der estnischen Bevölkerung betroffen. Dies war das erste Mal, dass eine Botnet die nationale Sicherheit einer ganzen Nation bedroht.” Verkabelte nannte es Web War One.


Es ist nicht nur Rivalen, die in diesem Krieg beteiligt sind: Verbündete greifen Verbündete. Die Vereinigten Staaten hackte sich angeblich in ehemaligen des französischen Präsidenten Nicolas Sarkozys Computer während seiner letzten Monate im Amt, eine Gebühr die Vereinigten Staaten verweigert hat.


Und diese Instanzen sind nur diejenigen, die öffentlich geworden sind, wie die erfolgreichsten Cyber-Angriffe sind diejenigen, die unentdeckt bleiben. Laut Richard Bejtlich, chief Security Officer bei Mandiant, sind Firmen, die Opfer von Cyber-Attacken häufig zögerlich vortreten und zugeben Schwachstelle.

“Unternehmen würde nicht einzeln aufstehen so Mandiant beschlossen, etwas zu sagen” über chinesische Hacker-Aktivitäten. “Ich hoffe zu diesem Zeitpunkt [Bericht] die Konversation ändert.”


Hong Kong Cyber War Abney and Associates Internet Technology Review


Read more:


An Abney Associates Technology – Unterricht in der wirtschaftlichen Entwicklung ignoriert | wattpad


an abney associates technology

In was eine Neujahrs-Nachricht auf seinem offiziellen Blog sein sollte warnte Financial Secretary John Tsang Chun-Wah “blinde” Verfolgung neuer Industrien wie immer mehr Ökonomen gefordert auf die sozialen Missstände, die aus einem unausgewogenen Wirtschaftswachstum, die hauptsächlich von Finanz-und-Eigenschaft gesteuert wird.

Ablehnung weitverbreitete Kritik, dass die Regierung die langfristige Vision fehlt, Tsang schrieb: “Wir müssen verstehen, dass eine neue Industrie eine lange Zeit dauert zu fördern und zu entwickeln, und der Erfolg ist nicht garantiert.” Er klingt clever in Berufung auf einen Dialog in der neuesten James-Bond-Film: “Manchmal die alten Wege sind am besten.”

Aber dies ist nicht die Zeit. Die “alten Methoden”, die Wirtschaftswachstum durch Inflation der Vermögenswerte vorangetrieben haben zerstören die Mittelschicht, was zu einer Kluft wird Reichtum, die die Hauptquelle der öffentlichen Unzufriedenheit geworden ist.

Einige Kommentatoren haben verspottet die häufigen öffentlichen Demonstrationen gegen die Errichtung und heftigen Widerstand gegen fast jede Regierung politischer Vorschlag nichts anderes als eine Angabe, die Menschen in Hongkong zu lieben, zu beklagen. Ihre Show der Ignoranz in dieser Angelegenheit wird offenbar von vielen politischen Entscheidungsträgern geteilt.


an abney associates technology




Read more: