Cyber Criminals targeting New Year's celebrations

Clicking on the New Year e-card or shopping online for New Year gift might be a trap setup up by cyber criminals to steal your money. Cyber criminals are armed with new set of web threats, including viruses, spam and cyber-scams to trap even the most cautious internet users.

"Spam and phishing attacks usually see a surge during this time of the year as an increasing number of people use the internet to shop, send e-cards, greetings or even simply surf. Cyber criminals take advantage of increased traffic online to send spam and manipulate search engines in order to draw victims to their websites," Roger Thompson, Chief Research Officer of Security Software maker AVG Technologies told PTI. In the run-up to New Year, shoppers often fail to check the authenticity of websites which claim to offer gifts at throwaway prices before simply vanishing a few weeks later, he says.



According to a recent report by online market research company Juxtconsult, the burgeoning online landscape has a population of 49 million internet users in India; out of which 44 million use emails and close to 25 million browse the internet every day.

With the advent of holiday season, the density of online shopping and internet usage goes up manifold and so does online security threats, a spokesman for software giant Microsoft said. "Before a consumer enters his credit card number, he should make sure that the company website requires only personal information like card number, address and telephone number to complete the purchase. They should be wary if the site asks for other information such as bank account numbers, or their mother's maiden name," he advises.

Cyber Criminals have also found a way to insert malicious codes in New Year e-greeting cards. "When you load that e-card, a malicious code enters your computer compromising your security. They might hijack your computer and install a key-logger into it, through which whatever you type into your computer would be seen by the attacker. So you lose all your privacy and even passwords," said Rakshit Tandon, a Cyber Security Consultant with Internet and Mobile Association of India.

AVG estimates that around eight to 14 million unique users worldwide are exposed to social engineering scams. "More troubling is the speed with which these threats take place. Our research shows that an average of 60 percent of poisoned websites disappears in less than 24 hours. Users cannot assume that the pages they know and visit every day are safe from threats to their personal and financial well-being. Increasingly, it is legitimate web sites, compromised by criminals that pose threats," said Thompson.

Many netizens have already started getting counterfeit mails from popular brands like Hallmark, Coca-Cola and McDonald's. Hackers are also sending out fake mails saying that the person's bank is doing a security upgrade during New Year and request him to update his personal information through a false web link. "And as soon as the user clicks, a fake page of the bank appears on the computer, which looks exactly the original one," Thompson says while cautioning people to be skeptical about messages like 'this New Year you have won a five-million dollar online lottery' or a free shopping voucher.

Social networking websites like Facebook, Orkut and Twitter would also be on the target list of cyber criminals. "As attacks have shifted to moneymaking criminal activities, there is more incentive for perpetrators to establish complex, clever, and highly undetectable methods for distributing malware and poisoning web pages," the AVG official says. The best way to keep safe is to firstly develop a healthy dose of skepticism, and then to back that up with a security software that includes a dedicated web-scanning layer and behavior-blocking technology, he advises.

Source :- siliconindia

Replies

You are reading an archived discussion.

Related Posts

Bangalore: A 21-year-old engineering student Neha M, has developed a mechanism by which a cellphone can double up as a counterfeit note detector, and for this project, she won the...
I am using L293D motor driver for line follower which has the following pin configuration- In this at Pin no. 8 we have to apply the voltage at which we...
When I joined ce I had not introduce myself so here is my brief introduction Myself manish goyal from shaheed Bhagat singh college of engineering..currently pursuing Btech in cse This...
I want to know ,, what is operating systems' real job in mobiles ?? and how much we need them in mobiles? Also what we'll miss if the current mobiles...
Today i Listened this...absolutely great "Earth Song" What about sunrise What about rain What about all the things That you said we were to gain... What about killing fields Is...