Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    COFFEE_KLATSCH    |    Gossip and chit-chat echo    |    2,835 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 1,650 of 2,835    |
|    Roger Nelson to All    |
|    For Your Protection    |
|    11 Jul 16 10:12:13    |
      This is a long article, but well worth the read. Some of it has been chopped       off by me using "[...]" to shorten her comments.               12 steps to safer online banking               Posted July 8, 2016 by Wendy Zamora               Gone are the days of balancing check books. The advent of online banking has       made budget-keeping and bill-paying a convenient, if not automatic,       transaction for adults managing their finances.               Which is why it's a prime target for cybercriminals.               According to a recent study by Fiserv, 80 percent of U.S. households now do       their banking online. The sheer number of customers is a likely attraction for       threat actors. But what makes online bankers irresistible prey is that a       breach results in direct access to their money-no need to bother with a       ransom. That's probably why more than 25 percent of malicious activity online       is aimed at financial institutions.               "Mobile banking has a tighter ecosystem than desktop online banking and some       technical advantages that improve security," says Seth Goldstein, a Certified       Information Systems Security Professional (CISSP) with nearly 20 years of       experience in banking IT. However, mobile banking isn't foolproof. In 2016 (so       far), Malwarebytes' Mobile Intelligence Database has flagged more than 12,000       unique Android application packages (APKs) as banker Trojans.               How cybercrooks steal your cash               From social engineering scams to spear , there's no method crooks won't try to       get to your money. The most common techniques center on fooling you into a       sense of security by pretending to be your bank. Whether that's in the form of       a spear phishing email that copies the logos of your financial institution or       spoofing your mobile banking app, criminals have become adept at pulling wool       over the eyes of online bankers, who are now accustomed to receiving digital       communication from their banks. Smishing, or sending malicious text messages,       has been a popular attack method for years, luring customers into entering       their login credentials via text.               In 2014, several thousand JP Morgan mobile customers received a text message       containing a link to this phony login screen.               In 2014, several thousand JP Morgan mobile customers received a text message       containing a link to this phony login screen.               With so many susceptibilities in both desktop and mobile online banking, it's       important to not only choose a bank that offers high level protection for your       accounts, but also take your own initiative to keep those accounts secure.       That's why we've come up with 12 steps for safer online banking.               How banks protect your accounts               The first part of our 12-step program centers on the protections that banks       have to offer for their customers. In choosing a financial institution with       which to conduct your online banking, look for these top-level security       measures. After all, banks have just as much to lose if you get breached.               1. Two-factor authentication: These days, a strong password is not enough.       The safest banks offer multiple-step login processes that require both       something you know (a password and/or security questions) and something you       have (your phone, which will receive a text message of a second code you'll       need to enter to gain access).               2. SSL secured websites: On any website where a financial transaction takes       place, secure communication is key. Look for the padlock icon to the left of       the URL. If it's there, that means the information passed between your bank's       server and your browser remains private. In addition, the URL should read       "https" and not just "http."               3. Automatic timeout sessions: Banks that close out your session after a few       minutes of inactivity protect you from prying eyes and human error. Better to       have to log back in than to have someone swipe your account numbers while       you're on a bathroom break.               4. Fraud monitoring: Any bank worth trusting with your money should have       continuous, real-time monitoring for fraudulent activity such as large       withdrawals or purchases made in new locations.               5. Mobile password protection (fingerprint scanning): A twist on two-factor       authentication right out of a spy movie, many mobile banking apps offer       fingerprint scanning as an additional method of verification. The safest       banking apps also require that phones be password protected if fingerprint       scanning is to be used.               How you can protect your accounts               The second part of our 12-step program is all about user education and action.       Once you've found a bank that can pull out all the online security stops, it's       your turn to step up the game. "The SANs Digital Forensics and Incident       Response group published a poster a couple of years ago with the catchphrase,       `Know Normal.Find Evil.' This should be the mantra for online and mobile       banking users," says Goldstein. Take these precautionary measures to       understand what's normal communication from your bank, what's suspicious, and       what you can do to ward off malware attacks.               6. Beware phishing emails and texts. Keep a sharp eye on email and text       communications from you bank. Unless absolutely certain of the email or text's       origins, avoid clicking through links, especially if they ask for login or       other personal identification information.               7. Report suspicious activity right away. "One of the most important benefits       of Internet and mobile banking is the convenience for users to check balances       frequently," says Goldstein. He recommends customers follow their account       activity in order to quickly identify and report abuse. "It's much easier for       banks to research and take action on recent transactions, and it gives you the       best leverage to recover any losses."               8. Make sure you download the official app of your bank. Whether downloading       from Google Play or the App Store, be sure to check reviews, read summaries       carefully, and double and triple check who and where the app comes from.               9. If possible, don't use a public computer and/or public wifi for banking.       If you don't have Internet access at home, make sure you sign out of your       account before closing the browser. And if you're sitting at a caf‚ working on       your blog, that's not the best time to catch up on your bill-paying. Public       wifi is much easier to breach than your own password-protected home connection.               10. Buy a computer just for bills. For those willing and able, purchasing a       laptop dedicated only to financial transactions helps limit the potential for       infection and breach. That means online banking and bill paying only. No       checking email. No surfing the web. No social media. Start up, check accounts,       and shut down.               11. Customize online banking transactions. Take a look at the admin controls       of your online banking accounts. Some banks let you limit online transaction       capabilities, like international wire transfer. The less you do online       (without completely hindering the convenience of online banking), the safer       your money is.               12. Layer your security. The more the merrier. Firewall and antivirus can       stop known threats, while anti-malware and anti-exploit cover advanced threats       like malvertising and ransomware. And to protect against those malicious       mobile banking apps, consider an anti-malware program for your phone.               For the safest online banking experience, it's best if you live by two credos.       One is to know thyself. By keeping an eye on your online accounts and credit       score, you can stay on top of abuse. The second is to know thy adversary.       "Your bank doesn't ask you to confirm account details via email or call you       for personal information," says Goldstein. "There is no urgent matter that       requires verifying your responses to `secret' questions or sharing the CVV       code on the back of the card to prove your identity." Simply put: if you are       asked to share account details in any way-don't. And if you want to pay it       forward, notify your bank's call center when you receive these suspicious       communications. You just might help to protect the next online banker, too.               May 9, 2012 - At Malwarebytes we are a bit obsessed with protecting our users,       which causes us to approach our jobs from all sorts of different angles. One       of my favorite aspects of this is how we tackle malware right at its source:       the servers that deliver it. Our team works around the clock to identify and       block [...]               Telephony Scams: Can You Help?               May 24, 2012 - Back in 2009, I wrote about a telephony based scam that had       gained momentum, and which sadly appears to have grown since then - invading       other countries and scamming more victims. Since then, various other people,       including my friends at Microsoft, have been investigating the companies       involved, to try and both raise awareness [...]               Phishing 101: Part 1               June 29, 2012 - This week, there is a lot of media hype over emails being sent       to users of the Royal Bank of Scotland and NatWest because of severe IT issues       making it impossible for users to access their accounts online. The emails       offer users the ability to log-in to their accounts and provide a link to the       [...]               Phishing 101: Part 2               July 3, 2012 - "Over the years, phishing attacks have changed, as with most       things, and have been segmented into different groups of variants." -Me If       there is one thing you can say about cybercriminals, it's that they are       adaptive. As I mentioned last week, phishing attacks have evolved from just       fake web pages and official looking emails to [...]               July 13, 2012 - Over the last few weeks I have described numerous methods of       phishing attacks and a few examples what they do or may look like. In this       final installment, I will shed some light on how phishing attacks are done and       a few real world examples of techniques used by Phishing scammers. Finally, I       will discuss [...]               ABOUT THE AUTHOR               Wendy Zamora       Content Writer               Masters in Journalism from Stanford, but don't let that fool you. Expert in       writing down what other people say and typing it up.                       Regards,               Roger              --- DB 3.99 + Windows 10        * Origin: NCS BBS - Houma, LoUiSiAna (1:3828/7)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca