Scam Alert


Recently, some card issuers and financial institutions have noticed increased attempts by fraudsters to hack the CVV/CVC codes on compromised debit cards to commit ATM fraud.
Learn more


Do You Read GCFlash?

If not, here's what you missed the past few issues:

  • The Price of Freedom
  • War and the Economy
  • Get It Direct!
  • Sit Still, Stay Fit
  • Financial Insights

There's something for every interest! Subscribe today to have GCFlash delivered to your inbox every Tuesday.




Fast Access



CBS 3 On Your Side

GCF Earns Perfect Score of 100 for Overall Service!
Read the CBS 3 Review
Read the Checkbook.org Rating

Security Center





CAN'T PREVENT IT

GCFlash readers may have figured out by now that I take online security pretty seriously. I have to restrain myself from covering the topic too often in this newsletter. I'm afraid of the overkill factor where a subject is so over-saturated that people will overlook it. Ho-hum... another day, another data breach.

Life's day-to-day functions hold constant demand. So what do we do with information we're already familiar with? We turn a deaf ear. There are too many other issues clamoring for our attention.

But this time we're not talking about a new attack. We're talking about a massive tidal wave of attacks targeting some pretty large victims. And eventually, every single one of us.

Read more

MODERN DAY BONNIE & CLYDE

Had we published GCFlash yesterday, May 23rd, our day in history would have been the 1934 death of Bonnie and Clyde. Just reading that fact got my cyber-gears turning.

The Depression-era spurred a wave of gangster activity. The country had just lost 38 percent of its wealth. There were no jobs, foreclosures were rampant. Soup kitchens overflowed.

Capitalism and government officials took the blame. The people revolted. (Starting to sound familiar?) Many took to a life of crime.

John Dillinger, Pretty Boy Floyd, Baby Faced Nelson and Machine Gun Kelly terrorized towns with their crime sprees. But perhaps none became quite as famous as a young Texas couple called Bonnie and Clyde.

Read more

HACKERVILLE

The travel brochures display breathtaking scenery; medieval buildings nestled in a quaint valley, snowcapped peaks of the Transylvania Alps, beachgoers wading in the crystal blue waters of the Black Sea.

Romania is one of Eastern Europe's most popular tourist destinations. It's also the cybercrime capital of the world.

Until 2003, the country had no cybercrime law on its books. It became a haven for hackers. Its reputation was so bad that Romania struggled to gain acceptance into the European Union.

The law eventually passed was one of the strictest in the world. After an initial decline in criminal activity, it returned to the infamous position that gained their nickname - Hackerville.

Read more

BIGGEST HACK TO DATE

The biggest security hack to date was announced last week. It wasn't a financial services firm that was compromised, nor a provider of related products. Those charged with keeping your personal information safe have done so.

This was a marketing company that got hacked. And all they stole were email addresses of their clients. How much harm can that do?

Plenty. Particularly if your client list includes the likes of Citi, Chase, U.S. Bank, Capital One, Barclays Bank of Delaware, Verizon, Walgreens, Visa, TiVo, HSN and L.L. Bean to name just a few.

Read more

THE (TROJAN) TIDE IS STILL RISING

No, not the massive tsunami that devastated parts of Japan. While the chaos an event of this magnitude wrought on this country, we're going to talk about a bigger threat yet. This one threatens chaos on a global scale.

You may want to refer to the August 17, 2010 issue of this newsletter for background on the ZeuS Trojan before continuing here. The article was so important that we've made it readily available on our Security Articles web page as well.

The article describes a sophisticated Trojan in use by global organized crime rings. The toolkit to deploy the Trojan is readily through underground Internet sites. At the article's end, I offered this prediction:

"While no incidences have yet been reported, it's only a matter of time before SpyEye dethrones ZeuS as King of Crimeware."

That time has come.

Read more

ANATOMY OF A TROJAN

It's been quite a few years since I've written a GCFlash piece on a specific threat. Hundreds of new ones were reported daily, all with similar characteristics and methods of prevention. Early threats were merely pranks pulled by smart kids. They became routine. Little harm was done outside of having to cleanup and rebuild your hard drive, which we thought was troublesome at the time.

Until now. The ZeuS Trojan is so sophisticated and so elusive that even Internet security experts are scrambling to stop it.

Read more

DISTRIBUTION AND PREVENTION

Trojans differ from viruses in that they are not self-replicating. They will not scour your address book and send themselves to all of your contacts. They are spread manually, hiding inside websites, emails, images or downloads with the premise of offering a benefit to the intended victim.

Since ZeuS is sold as a customizable toolkit, each criminal using it will deliver the crimeware in their own fashion.

Read more

UNDERSTANDING FIREWALLS

A recent survey of U.S. and U.K. computer users revealed that 25 percent did not know whether they had any privacy protection. Over half admitted they had no idea what the privacy settings on their browsers were. Do you know what keeps your computer safe?

As the name implies, the firewall serves as a boundary to restrict information traveling between your computer and a network or the Internet. If used properly, the firewall is your defense against someone trying to hack into your system. If it's configured wrong, you're opening the door for an identity thief.

Here's how they work: An unsolicited request is generated whenever someone tries to connect to your computer. This happens when you did not initiate the contact. Your firewall will alert you to the request and ask if you want to allow access or block that particular program or Web site. If you approve the request, the site or program is added to your exception list. It will be recognized the next time it wants access and you'll get no further alerts. Block it and you've slammed the door on potential fraud.

You should have two different kinds of firewalls protecting your home computer. A software firewall protects the computer and a hardware firewall will protect your Internet connections. If you use a PC, the Windows firewall will handle the software protection quite well. The $75 routers you can buy at any electronics store usually include a great hardware firewall.

To be safe, simply set the Windows firewall to Enabled and check the "Don't allow exceptions" box. To find these properties, open Control Panel and choose Windows Firewall from the menu. You'll see the firewall properties box that display these options. You'll now be prompted if any program or Web site not on your exception list is trying to gain access to your computer.

If you misconfigure your firewall, you could inadvertently allow anyone on the Internet to access your computer and read your stored files and other personal information. That's why it's best to simply configure it to block everything.

Many security products on the market offer their own firewall, you don't have to use the Windows version. Examine what each product offers and choose the solution that's best for you. But make sure you only have one product enabled or they'll conflict with each other.

A firewall offers a degree of protection, but there are certain things that it cannot do. It can't detect or disable computer viruses and worms already present on your computer. You'll need antivirus software for that. It will ask permission before granting connection requests, but it won't stop a dangerous email attachment from opening. You'll have to use discretion in deciding what can be a threat. If you don't know the sender or the subject line doesn't make sense, don't open it. It can't block spam. Your email client may offer a spam filter that will help in this regard.

Your firewall can create a security log to record successful and unsuccessful attempts to connect to your computer. This can be helpful if you need to troubleshoot a problem. If you're using the Windows firewall, click the Advanced tab on the properties box described above. The Security Logging option appears on this screen. Choose Settings to select what type of instances you want logged and the file location to do so.

Cyber criminals are continually trying to find new ways to ply their trade. Take your protection into your own hands and stop them in their tracks.

NOT SO PRIVATE

Back in the late '90s, when we installed our first computer network at GCF, there was much debate over whether we really needed all that fancy stuff. Technology was for the big guns at the time. An institution our size didn't REALLY need such automation.

I can remember one department head that was meticulous in her job. She was a wonderful woman with a dedication and work ethic that's hard to find today. She would run numbers forward, backward and sideways if she could to validate her conclusions. That is, as long as she used a pencil and a ledger sheet. Holding that paper firmly in hand was material proof of a job well done.

I sometimes wish life was that simple once again. Sure, that piece of paper could have been compromised. It could have missed the shredder and gotten thrown directly into the trash where a cleaning person could have stumbled on it. A disgruntled employee could have intercepted it and used that valuable information to make the bank look bad. But that would have been the worst of it.

Fast forward a millennium and it's now universally accepted that data doesn't have to be in paper form to be legitimate. Electronic communications and transactions all leave a footprint that serves as their version of a paper trail. But their path extends much farther than any piece of paper ever could, for they leave a footprint that can be traced all around the world.

I never was concerned with privacy issues. While I knew my frequent visits to NASCAR.com would result in race-related display ads when I logged on to Google, who really cared? My name, address and phone number have appeared in the local telephone book for decades. What's the harm in their appearance online?

So I sat down with information security expert Mike Chapple, CISSP, whose books have helped aspiring Internet security professionals prepare for the challenging Certified Information Systems Security Professional certification. I questioned him as to how easy it is to gain access to our private information, and why we should even care. His response was frightening.

Marketing databases are widely available for sale, and can tell you all sorts of things about people. The data isn't integrated, one would have to purchase several different lists to create a complete profile. Yet one can retrieve plenty of information on your habits and interests by simply searching for your Social Security number, address, or even your 9-digit zip code. A lot can be surmised by the demographics of your community. Enough for some deranged person to stalk you or steal your identity. Someone wanting that information badly enough needs to do nothing more than hire a private investigator who can readily access the appropriate database.

Damage can be done even without the help of a private investigator. Once someone has your address and learns where you were born, they have enough information to pull a birth certificate online for $1.95 and find your mother's maiden name. What information does your bank and other institutions ask for to verify identity? Now they've got access to your accounts.

Public tax records can give someone that has your private information enough knowledge to take out a loan in your name. You can easily learn what someone paid for their home and how much they still owe. They show the name of your mortgage holder and when the mortgage was written. These questions are often used to prove the identity of someone applying online. A soft credit check is run, presenting you with questions about your credit history that presumably only you would know.

In the few minutes I sat speaking with Chapple, he was busily plugging away at his keyboard while answering my questions. He paused twice: the first time to tell me my full name, age, place of birth, address, length of residence, current and previous places of employment. The second time his fingers stopped he told me when we bought our home, how much we paid, who holds our mortgage and for what amount, the color I painted the railing on my front deck and the make and model of my neighbor's minivan. He admitted to not being able to clearly read the license plate. He also went on to describe what kind of harm could befall me if this basic, public information fell into the hands of someone not quite as honorable as himself.

The worst part is that there's absolutely nothing we can do to prevent this from happening. We could limit our risk somewhat if we purchase goods only with cash, avoid the Internet completely and become a hermit. But any electronic transaction or action can and does result in a profile.

Chapple suggests you always keep a record of what you do and where you do it. Pull your credit reports regularly to limit any damage in case you have been compromised. You are entitled to one free report per year from each of the three major reporting bureaus, and so is your spouse. If you pull a report from one bureau at a time and intermix those of your spouse, you can keep watch every two months. The only federally sponsored web site to provide your free credit report is annualcreditreport.com. Don't be misled by those with catchy jingles you see advertised in television commercials. You'll need to subscribe to their service to access the free report offered.

Remember that villainous eyes are watching... you best be, too.