spam - Blog - Global Risk Community2024-03-28T11:49:12Zhttps://globalriskcommunity.com/profiles/blogs/feed/tag/spamDoes Your Mobile Have Spyware on It?https://globalriskcommunity.com/profiles/blogs/does-your-mobile-have-spyware-on-it2018-10-19T12:19:36.000Z2018-10-19T12:19:36.000ZRobert Sicilianohttps://globalriskcommunity.com/members/RobertSiciliano<div><p>You have a mobile phone, you might think it’s pretty safe, but what you might not realize is that these devices can have spyware on them. Keep in mind, many of the “signs” listed below are everyday normal phone behaviors. But combined, might mean spyware. Here are some of the signs:</p><p><img src="https://activerain.com/image_store/uploads/agents/robertsiciliano/files/Social-Media-Security.jpg" alt="" width="300" height="219" align="right" /></p><p><strong>Unusual Background Noise</strong></p><p>While common, humming, static, or other weird noises could be a sign that someone is tapping your line. Though all phones might have strange noises from time to time, you should check if there are other signs if you notice them. This is especially the case if you hear them when your phone is not in use.</p><p><strong>Short Battery Life</strong></p><p>Also common, another sign of a hacked phone is a short battery life. If you notice that your battery is suddenly losing power, it’s possible that there is malicious software running in the background. But don’t panic….yet.</p><p><strong>Try Shutting it Down</strong></p><p>If something seems weird with your mobile phone, try shutting it down. Watch how it reacts when you shut it down. Phones that have been hacked often won’t shut down correctly or never shut down, even though you tell it to. Still, a common issues with mobiles.</p><p><strong>Look for Suspicious Activity</strong></p><p>If you notice something suspicious, like your phone turning on or off by itself or apps getting installed or deleted, someone might have hacked it. Other suspicious signs that someone has hacked your phone include strange text messages that contain random letters or numbers. You might see pop-up ads or other issues, too.</p><p><strong>Check for any Electronic Interferences</strong></p><p>Though it might not be uncommon to get interference from other electronics, such as a computer, another phone, or even a television, it shouldn’t happen if you are not on a call. If it does, it could be a sign of something malicious, for instance, someone listening in on your phone calls.</p><p><strong>Look at Your Phone Bill</strong></p><p>If your phone bill shows more text or data usage than you typically use, it might be a sign that your mobile phone is hacked. Things like spyware can cause your data to rise, and this could definitely cause your bill to rise. However, keep in mind, if you just downloaded a new app, this could be the cause of your data usage. Also, make sure that no one in your home is using the data, such as your kids, who are notorious for this.</p><p><strong>Use Caution when Downloading New Apps</strong></p><p>Finally, when you download a new app, make sure they are safe. Most apps from the App Store or Google Play are safe, but occasionally, a malicious app will sneak in. If an app asks for access to your contact list, call history, or address book, use caution.</p><p>If you ever suspect spyware, back up your apps and reset the device back to factory then reinstall everything. Keep in mind, unless an iPhone is “jailbroken” spyware is unlikely. But with Androids, spyware is serious. Install antivirus on Androids.</p><p><a style="color:#f30e0e;" href="https://safr.me/meet-robert/" target="_blank">Robert Siciliano</a> personal security and <a style="color:#f30e0e;" href="https://safr.me/blog/2018/03/16/identity-theft-advice/" target="_blank">identity theft expert</a> and speaker is the author of <a style="color:#f30e0e;" href="https://www.amazon.com/Identity-Theft-Privacy-Protection-Prevention-ebook/dp/B07FT67BMC/ref=sr_1_3?s=digital-text&ie=UTF8&qid=1535732363&sr=1-3&keywords=Robert+Siciliano&dpID=51hWnD29JtL&preST=_SY445_QL70_&dpSrc=srch" target="_blank">Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud</a>. See him knock’em dead in this <a style="color:#f30e0e;" href="https://youtu.be/2m3Ra6ROPeA" target="_blank">Security Awareness Training</a> video.</p></div>I want a Cell Phone Jammerhttps://globalriskcommunity.com/profiles/blogs/i-want-a-cell-phone-jammer2016-04-14T14:09:13.000Z2016-04-14T14:09:13.000ZRobert Sicilianohttps://globalriskcommunity.com/members/RobertSiciliano<div><p>Well, we certainly can’t blame Dennis Nicholl for breaking the law. Frankly, had I been nearby him when he did it, I would have kept silent and let him continue breaking the law—unless, of course, I was engaged in some loud, planet-moving discussion with a world leader.</p><p><img src="http://robertsiciliano.com/wp-content/uploads/2013/11/5W1-245x300.jpg" alt="" width="250" height="300" align="right" /></p><p>Nicholl, 63, was recently on a Chicago subway train. He brought with him a cell phone jammer. Unfortunately for Nicholl that day, Keegan Goudie was on the same train. Goudie is a blogger, noticed the infraction and began blogging about it. One thing led to another and Nicholl ended up being charged with the unlawful interference with a public utility.</p><p>Someone called 911 on him. Though Nicholl was breaking the law, arguably, he wasn’t committing any act that was putting anyone else’s life or limb in immediate danger. Or was he? I’m sure we can all get creative here.</p><p>Anyways, Nicholl’s lawyer says his client meant no life or limb danger. Like most of us, Nicholl only wanted some peace. Cell phone users tend to talk a lot louder into their phones than to people sitting right next to them. Sometimes, they’re outright obnoxious. They should be glad the infraction is only a cell phone jammer and not someone’s angry hands.</p><p>If making calls becomes allowed on airplanes in flight, it won’t be pretty. It’s bad enough when some fool talks loud while waiting for the boarding door to close. Nobody wants to hear how big the deal you are closing is or that Timmy scored a goal in soccer. Stop being a jerk.</p><p>So why is interference with a conversation via electronic device illegal, yet it’s not illegal to “jam” riders’ cell phone yakking with loud whistling, singing, loudly yakking to <em>oneself</em> or playing a harmonica?</p><p>Because these non-techy interference techniques can’t jam up someone’s legitimate call to 911. Nicholl’s jammer could have prevented another rider from getting through to 911 to report sudden difficulty breathing. So if you’re hell bent on using a cell phone jammer, maybe make sure first that everyone looks healthy?</p><p>The punishment is heavy. A Florida man had to cough up $48,000. Also in Florida, a teacher was suspended after jamming his students’ phones. A priest was even busted for using one in church. Ahh, technology.</p><p>Robert Siciliano is an identity theft expert to <a style="color:#bb0000;" href="http://thebestcompanys.com/antivirus/">TheBestCompanys.com</a> discussing <a style="color:#bb0000;" href="http://www.youtube.com/watch?v=p_ikx0_erfU">identity theft prevention</a>.</p></div>Twitters ups its Security Gamehttps://globalriskcommunity.com/profiles/blogs/twitters-ups-its-security-game2015-09-29T14:25:46.000Z2015-09-29T14:25:46.000ZRobert Sicilianohttps://globalriskcommunity.com/members/RobertSiciliano<div><p>Twitter recently announced its new tool to help with management and monitoring of its users’ accounts: the Twitter data dashboard.</p><p><img src="http://activerain.com/image_store/uploads/agents/robertsiciliano/files/7W.jpg" alt="" width="320" height="195" align="right" /></p><p>An article on lifehacker.com details what this new tool will offer. For instance, you will not need to use your real name on Twitter—and I have to admit, this is an odd way to promote the tool, because I’m sure that scads of Twitter users haven’t been using their real name for years. It’s not as though Twitter can tell that “Emily White” is really Sashea Fiopwieei.</p><p>Anyways, users will be happy that their privacy settings will let them control whether or not their tweets are kept public. You will be able to enable login verification to increase your account’s security.</p><p>The Twitter data dashboard can be accessed from the settings menu that users can find on twitter.com. It shows the user’s account activation details and recent login history. It also reveals any devices that have accessed the account.</p><p>This setup allows the user to review account activity in an expedient way and make sure that everything looks right.</p><p>Now suppose you notice login activity from an unfamiliar app. You can go to your settings and look for the apps tab and revoke the application’s access to your account.</p><p>The lifehacker.com article also points out that if you notice logins from unfamiliar locations, you can immediately change your password.</p><p>You also have the option for setting up login verification to add an extra layer of security to your account. Twitter’s new dashboard will let you manage your Twitter archive and control your address book contacts, among other items that you will have more jurisdiction over.</p><p>Robert Siciliano is an identity theft expert to <a href="http://bestidtheftcompanys.com/companies">BestIDTheftCompanys.com</a> discussing <a href="http://www.youtube.com/watch?v=p_ikx0_erfU">identity theft prevention</a>.</p></div>Big Bad Hackers taken downhttps://globalriskcommunity.com/profiles/blogs/big-bad-hackers-taken-down2015-09-11T14:18:05.000Z2015-09-11T14:18:05.000ZRobert Sicilianohttps://globalriskcommunity.com/members/RobertSiciliano<div><p>Darkode anyone? Not anymore. This underground bad hackers’ forum was recently demolished by the FBI, says a report on <a href="http://www.justice.gov">www.justice.gov</a>. The dozen hackers associated with Darkode are facing criminal charges.</p><p><img src="http://activerain.com/image_store/uploads/agents/robertsiciliano/files/4D.jpg" alt="" align="right" height="213" width="320" /></p><p>Though there are about 800 of such forums, Darkode was among the worst (or shall I say “best”?), presenting a serious threat to worldwide computers. Gone is Darkode’s ventures of buying, selling and trading malware, and exchanging hacking strategies—to actually carry out crimes, not just fun brainstorming.</p><p>The dismantling of Darkode comes as a result of infiltration also by the efforts of law enforcement representing 20 countries including Australia, Colombia, Canada, Germany, Latvia, Denmark, Finland, Romania, Nigeria, Sweden and the UK. This is the biggest bust of a black hat forum to date.</p><p><strong>Here is the cyber smut list from the <a href="http://www.justice.gov">www.justice.gov</a> article:</strong></p><ul><li>J. Gudmunds, 27. He created a botnet that stole data on 200 million occasions.</li><li>M. Culbertson, 20. He’s the brains behind Dendroid, malware for sale on Darkode that was supposed to steal and control data from Google Android. Clever name, too: “Dend” refers to branching out (as in neuronal <strong>dend</strong>rites).</li><li>E. Crocker, 29. He’s the mastermind behind a Facebook spreader that infected the computers of FB users, converting them to bots.</li><li>N. Ahmed, P. Fleitz and D. Watts, 27, 31 and 28, respectively. They’re behind the spam that sent out millions of e-mails intended to bypass spam filters of cell phones.</li><li>M. Saifuddin, 29. He tried to transfer credit card numbers to other Darkode members.</li><li>D. Placek, 27. He allegedly created Darkode and sold malware on it.</li><li>M. Skorjanc, F. Ruiz and M. Leniqi, 28, 36 and 34, respectively. They’ve been charged with conspiracy to commit wire and bank fraud, racketeering conspiracy and conspiracy to commit computer fraud and extortion.</li><li>Rory Stephen Guidry. He reportedly sold botnets on Darkode.</li></ul><p>The article points out that all of these wrongdoings are accusations at this point, and that these defendants are presumed innocent until proven guilty.</p><p>Robert Siciliano is an identity theft expert to <a href="http://thebestcompanys.com/antivirus/">TheBestCompanys.com</a> discussing <a href="http://www.youtube.com/watch?v=p_ikx0_erfU">identity theft prevention</a>.</p></div>What is Spam?https://globalriskcommunity.com/profiles/blogs/what-is-spam2015-05-01T13:54:12.000Z2015-05-01T13:54:12.000ZRobert Sicilianohttps://globalriskcommunity.com/members/RobertSiciliano<div><p>Everyone’s heard of spam as it pertains to emails. Spam isn’t necessarily a malicious message designed to trick you into revealing your credit card number or PayPal login information.</p><p><img src="http://activerain.trulia.com/image_store/uploads/agents/robertsiciliano/files/email.PNG" alt="" align="right" height="348" width="350" /></p><p>But spam <em>is</em> an unsolicited message, sometimes referred to as junk mail. Spam can be very annoying and relentless in nature, often attempting to convince you to buy something. Sometimes these messages are untruthful, such as those advertising human growth hormone pills (when they actually contain nothing of the sort). Spam also includes <a href="https://blogs.mcafee.com/consumer/phishing">phishing</a> which are messages designed to trick you into giving up personal information. Other messages can be legitimate advertisements—nevertheless, you did NOT ask for these solicitations.</p><p>Spam arrives in the form of emails, instant messages, and text messages—and it can also affect smartphones.</p><p>Spammers buy lists from brokers that continuously harvest email addresses from the web. They also run dictionary attacks, throwing billions of combinations of words and numbers at an email database to find valid address combinations.</p><p>Though some emails are obvious spam, such as ones with particular keywords like <em>Viagra</em>, <em>sex life</em>, <em>prescription drug discounts</em> and <em>fast weight loss</em>, other spammy messages are not so obvious; they may appear legitimate or show a sender address of a family member, friend or business associate.</p><p>For instance, the sender may appear to be from your bank), with a subject line warning you to urgently update your account information. Similarly, the subject line may not be threatening, such as one referencing “your recent order from Amazon” or “your shipment from DHL,” yet it is not legitimate.</p><p>Spammers have found that if enough of these go out all at once, they’ll reach a statistically significant percentage of recipients who will have placed an order from Amazons within the previous 48 hours, or are expecting a delivery from DHL any day.</p><p>Here are some tips on how you can fight spam:</p><ul><li><strong>Be careful with your email address. </strong>Don’t supply your email address to sites you’re not sure about, and never post it in a public place.</li><li><strong>Verify. </strong>If you’re not sure if an email is valid, even though it appears to be from your bank, medical carrier, employer, etc., don’t respond to the email. Contact the company or business by phone to verify the email’s validity.</li><li><strong>Think before you click. </strong>Don’t click blindly. Never click on links in unsolicited emails. If you think the email is real, check the link URL to make sure you are being directed to a legitimate site.</li><li><strong>Open with care. </strong>Think twice open attachments that you’re not expecting or from someone who normally wouldn’t send you an attachment.</li><li><strong>Be cautious. </strong>Don’t be fooled by sensational subject lines. Another type of fraud is a subject line claiming you won a prize or are owed money.</li><li><strong>Ignore it. </strong>If the email shows up in your spam or junk folder, chances are it’s spam, so LEAVE IT ALONE!</li></ul><p>It’s simple: Never reply to spam.</p><p><a href="http://robertsiciliano.com/">Robert Siciliano</a> is an Online Safety Expert to <a href="http://blogs.mcafee.com/author/robert-siciliano">Intel Security</a>. He is the author of<em> </em><a href="http://www.amazon.com/Things-Wish-Before-Identity-Stolen/dp/1941308996/ref=as_sl_pc_qf_sp_asin_til?tag=httprobertc02-20&linkCode=w00&linkId=JAZ7MOSJYUIXZMJ3&creativeASIN=1941308996"><em>99 Things You Wish You Knew Before Your Mobile was Hacked!</em></a> <a href="http://robertsiciliano.com/blog/2010/01/01/disclosures-term-conditions/">Disclosures.</a></p></div>Don't Believe These 6 Mobile Security Mythshttps://globalriskcommunity.com/profiles/blogs/don-t-believe-these-6-mobile-security-myths2015-01-24T14:14:41.000Z2015-01-24T14:14:41.000ZRobert Sicilianohttps://globalriskcommunity.com/members/RobertSiciliano<div><p>Smartphones are picking up popularity. You can now access email, social media, and other things from a device that fits in your pocket (most of the time). And, although we hear about breaches and security flaws in the news, it seems like a lot of us don’t think it applies to our mobile device. Here are some of the most common mobile security myths.</p><p><img src="https://31.media.tumblr.com/9b05a30a929944f32368528c75407509/tumblr_inline_niomokY2oh1qa344h.jpg" align="right" alt="tumblr_inline_niomokY2oh1qa344h.jpg" /></p><ol><li>“Antivirus protection isn’t worth it for a smartphone.” Just because this device fits in the palm of your hand doesn’t mean it’s not worthy of as much protection as your computer. It should have comprehensive security that includes, antivirus, anti-<a href="http://blogs.mcafee.com/consumer/malware">malware</a> and anti-<a href="https://blogs.mcafee.com/consumer/family-safety/spyware-a-major-identity-theft-threat">spyware</a>. Think of how often and indiscriminately you use that little thing, even while you’re in between bench press sets or stuck in line somewhere. The more you use it, the more important protecting the information on it becomes.</li><li>“If I lose my phone I’ll just call it to find it.” A better way to locate it is to use an app with global positioning system (GPS), like McAfee® Mobile Security. With GPS, you can see the location of your device on a map, much easier than trying to hear your ringtone.</li><li>“Smartphones don’t get phishing scams.” Actually, <a href="https://blogs.mcafee.com/consumer/phishing">phishing</a> scams can occur via text (also known as <a href="http://blogs.mcafee.com/consumer/protect-yourself-from-smishing">SMiShing</a> ) and social media apps. Plus, the mobile device’s smaller screen makes it harder to detect suspicious links.</li><li>“Apps for my phone are safe if they’re from trusted brands.” Fraudsters can easily make a malicious app look safe, and can even find its way into a reputable app store. <a href="http://blogs.mcafee.com/consumer/mobile-world-congress-2014">McAfee Labs™</a> found that over 80% of Android apps track you and collect your personal information. Apps are also the main way that malware can be downloaded to your smartphone or tablet.</li><li>“As long as my phone has PIN protection, it’s fine to have apps automatically log into my accounts.” A PIN is incomplete protection because hackers may guess the PIN code or use software to nail the four-digit sequence. You’d be surprised how many people’s PINs are 1234 or 2222. Even if you have a longer PIN or passcode on your device, it’s good practice to not have your apps automatically log you in, even though this may be convenient. You don’t want something to be able to easily access your bank accounts or post random messages on your social accounts.</li><li>“SMS” adds protection. The short message service does not provide protection or monitoring of any kind. This means that text messaging is not secure and in fact, it’s often subject to spam.</li></ol><p>Keep your mobile device safe with McAfee® Mobile Security, available on both <a href="http://home.mcafee.com/root/campaign.aspx?cid=141397">Android</a> and<a href="http://home.mcafee.com/root/campaign.aspx?cid=141398">Apple</a> devices. The Android version includes antivirus and anti-malware software, an app manager, anti-theft features, and web protection. The Apple version includes Secure Vault to protect your pictures and videos from prying eyes.</p><p><a href="https://blogs.mcafee.com/author/robert-siciliano" title="Robert Siciliano" target="_blank"><em>Robert Siciliano</em></a><em> is an Online Security Expert to </em><a href="http://home.mcafee.com/" title="McAfee" target="_blank"><em>McAfee</em></a><em>. He is the author of </em><a href="http://www.amazon.com/Robert-L.-Siciliano/e/B0035CH602/ref=ntt_athr_dp_pel_1" target="_blank"><em>99 Things You Wish You Knew Before Your Mobile was Hacked!</em></a><em> </em><a href="http://robertsiciliano.com/blog/2010/01/01/disclosures-term-conditions/" target="_blank"><em>Disclosures.</em></a></p></div>