Dell Partner Carbonite Authorized Reseller Mozy Online Backup
Award Technologies

Must Read:

Phishing and Pharming 101: Protect your Identity

Phishing and Pharming 101: Protect your Identity

Using a variety of nefarious methods, phishing and pharming are a consistent problem that threatens everyone with identity theft. If you recognize what these methods are and how malicious users employ them, you can keep yourself from becoming a victim.

A quick review
Phishing involves sending an e-mail that claims to be a legitimate business in an attempt to scam the user into surrendering private information. Pharming involves the same goals with a different method; malicious users employ spyware, keyloggers, domain spoofing, domain hijacking, or domain cache poisoning to obtain personal or private (usually financial) information.
To put it bluntly, criminals try to steal your identity by getting you to divulge financial data such as credit card numbers, account usernames, passwords, and social security numbers. They sell this information, and it then becomes an identity theft crime.

Recognize the methods
The primary method for this crime is to send e-mails that look like valid correspondence coming from a bank asking users to click the link provided and log into their account for some type of important information. But your bank and other institutions where you do business don’t work this way. They may send you an e-mail and ask you to review or verify information. However, they don’t send links to a Web site. You already do business with them, and they know you don’t need the link to the Web site.
If you click that link, one of two things is going to occur. It could download spyware onto your computer, which will then capture your personal information and send it to the criminals. Or, the link will direct you to a Web site that looks and feels like the site you expected — but it’s actually just a front to collect your login information to help the criminals harvest your personal information.

Fight back
To protect yourself and your users against phishing and pharming schemes, here are four rules to live by:
* Rule 1: Stop clicking links in e-mails that direct you to your bank or a financial institution. Stop filling out forms sent to you by your bank or financial institution. If you want to visit the site to see if you need to confirm/update/verify your account, open up a browser and type the link or retrieve it from your favorites.
* Rule 2: If you suspect an e-mail is part of a phishing scheme, report it. Report it to the financial institution, the FTC, and the Internet Crime Complaint Center.
* Rule 3: Update your browser, your antivirus software, and any other security software. The latest versions of such software have phishing filters that detect attempts and warn you if it suspects you’ve surfed to a site that isn’t legitimate.
* Rule 4: Stop using public computers to access private information. Internet kiosks at hotels and other business are convenient but often have Trojans and keyloggers installed that collect and transmit your information to the criminals. Access personal and financial information only from a computer you trust to be free from these evils.

Final thoughts
Criminals have learned that they don’t need to pull a gun on you to get your wallet or purse. They’re using the Internet to steal everything in your accounts — and your good credit too. Take a few simple steps to stop them, and don’t become an identity theft statistic.

Mike Mullins has served as an assistant network administrator and a network security administrator for the U.S. Secret Service and the Defense Information Systems Agency. He is currently the director of operations for the Southern Theater Network Operations and Security Center.