Malware
Viruses and worms can install themselves in your system without you even knowing it. Once they do, they can use your machine as a base of operations to monetize your system for their benefit. This can be done by forcing ad pop-ups on you, collecting your private data and sending it off to a central location behind the scenes, collecting corporate data and siphoning that off, and more.
Malware is a large umbrella term that encompasses many different forms of attack. The important things to remember are to always report strange events on your machine, to be very careful what you click on and what suspicious emails you open.
Always be aware of links on websites, that they go where they say they do. You can see, on the lower status bar of most modern browsers, the actual destination of the link you intend to follow.
Also, for emails, ensure they are from who they say they are and that any links or attachments within the email are expected before you follow them.
Spam
Spam is one of the oldest forms of cybersecurity risk. Though most spam is simply clutter, taking up your time, there are still large groups that use spam to spread every kind of cybersecurity risk we can imagine. Spam, unwanted email from strangers, is often filled with phishing attempts, malware, and more.
Phishing
Phishing scams actively try to fool you to gather personal and institutional information.
These emails often impersonate people you know: coworkers, school administrators and faculty, financial institutions, service desks and even your personal friends.
The goals of phishing attempts are one of two things:
- Tricking you into giving them personal information such as passwords, PIN numbers, and other confidential information.
- Installing software (often called spyware) onto your machine, and the network, that is used to gather information, and even to destroy your files on occasion.
Phishing examples
Below is an example of a phishing email. Note the following:
- The sender’s email address impersonated one that could have come from a real user (raym_82), but why would I send a school email from a personal account? Also, “formsmail.com” is not a recognizable email service provider.
- The “Microsoft Partner Silver Application Development” logo is not relevant to the topic of the email.
- The email link does not include a “.com” or “.edu” in the URL. And why would MSM’s name be used in the link?
- Not so obvious, but if the email is coming from a member of the MSM IT staff, it should be signed with their name, school contact info, help desk contact info or more distinctive information to help you reach out in case you have questions or need help. The fact that it’s a generic “End user client support” signature offers you no opportunity to reach out other than by replying to the bogus email.
For a further example, see the email below and note the following:
- A request for immediate action, i.e. “Action Required” or an alarming tone in the text (“Your computer has a virus!”).
- A “FROM” email address that appears suspicious. In this case, a legitimate Microsoft email would never be sent from a third-party domain such as no-reply@stabletransit.com.
- Hover over (do not click) any links to view the web site(s) the email wants to direct you to. In the examples below, one of the links appears to be suspicious (ver.com.ua/u) while the other appears legitimate.
- Grammatical or spelling errors are common in phishing attempts. In the example below, the past tense of “require” was used erroneously in the text of the email.
Whaling
A whaling attack, also known as whaling phishing, is a specific type of phishing attack that targets high-profile staff or faculty at institutions in order to steal sensitive information. In many whaling phishing attacks, the attacker’s goal is to manipulate the victim into authorizing high-value wire transfers to the attacker.
Pharming
Pharming is an attempt to redirect traffic from its supposed destination to one the attacker has decided on. This way they can gather information such as account numbers, passwords, and more.
Spyware
Spyware is often a small program installed on your computing device without asking via a website that a pharming attack took you to, or a spam email linked you to, or carried as an attachment, that will then sit on your computer and send your personal information to a repository. The information collected may include passwords, as well as personal and corporate documents.
Social Media
Social media sites can be a fantastic way to connect to friends and family, but they are also places users need to be extra careful. Be wary of sharing too much personal information, as this data can be used to guess at passwords and even answer security questions. Be extra critical of strangers, and remember it is easy to claim to be someone, even an expert, without needing to offer proof.
Social media is also a hotbed of bad data, news and other information that may sound good to you but that is factually false, and that can even put you at risk. Always double check sources or information and be skeptical.
Change passwords frequently and never reuse passwords; that way your security will be enhanced.