This presentation is intended to increase awareness of Extension Agents to the threats of scams and malware on the Internet. In addition it covers some ways to stay protected from such threats.
2. Who This is For… Use a State computer Work at home on their own computer This presentation is intended for Extension faculty and staff who… It is not intended for faculty and staff who… Use a county computer Work behind a county firewall
3. Part 1 – The Threats Virus Worms Scams Trojans Backdoor Bots Malware Hackers Phishing Rootkit Spyware
4. The threats most people are not aware of. The threats many of us are aware of.
5. The Global Scope of the Problem Estonia, a tiny but highly wired country on the Baltic Sea, was essentially shut down for 3 weeks during April and May of 2007 by organized cyber attacks.
6. The Global Scope of the Problem 2 dozen South Korean & U.S. Government agencies & others were attacked in July 2009. Targets included the DoD, FAA, Homeland Security, NYSE, NASDAQ, etc.
7. The National Scope of the Problem Database breach by hackers personal information on 160,00 current and former students and alumni stolen. 530,000 medical records stolen including social security numbers. Sensitive information on 65,000 current and former employees stolen. A few of the many major security breaches that became public in the 2 nd Quarter of 2009.
8. The Personal Scope of the Problem E-mail scams Identity theft Damage, repairs & replacements Productivity loss
9. Malware Headlines You Might Have Missed 10-11-09 - Spam dominates e-mail traffic (86%) 10-11-09 - Malware threats in search engine results 10-08-09 - FBI nets 100 people in phishing ring 10-07-09 - Fox Sports site hacked to serve malware 10-06-09 - Malware flea market pays hackers to hijack PC 10-06-09 - Weak passwords dominate Hotmail phishing leak
10. Malware Headlines You Might Have Missed 10-05-09 - Phony Facebook profiles spreading malware 09-30-09 - Malware re-writes online bank statements cover fraud 09-30-09 – Earthquake / tsunami searchers targeted by malware 09-15-09 - Malware ads hit NY Times 09-15-09 - Operating systems not the key security risk anymore 08-20-09 - Malware designed to steal IDs increased 600%
11. Malware – malicious software Intent is to damage, disrupt, steal, or otherwise inflict problems on data, hosts, or networks.
12. The Scope of the Problem The number of NEW malware threats is increasing New malicious code signatures - Symantec 2007 2008
13. What are the Threats? Tracking Cookies Flash Cookies Adware Hoaxes Scams Phishing Vishing Not malware Backdoor Keyloggers Viruses & Worms Worms Trojans Spyware Rootkits Bots Malware
14. Tracking Cookies Not malware Tag containing info, sometimes useful to you No personal info unless offered Cookie storage can be limited May expire Easy to remove
15. Flash Cookies Largely unknown, widely used Installed by a Flash plugin Never expire More cumbersome to remove Can send info w/o user permission Adobe Flash logo
17. Adware Free software that plays, displays or downloads advertising May be toolbars, search boxes, games, utilities Mostly safe but some is spyware Read privacy policies
19. Phishing Aim is to steal valuable information such as credit cards, social security numbers, user IDs and passwords Usually done by e-mail Social engineering
20. Phishing Often masquerades as legitimate person or business, even government Often contains a threat or consequence E-mail may look genuine, trustworthy Always points to different website than it appears to come from. Legitimate organizations never ask for sensitive information through e-mail
21. Pharming Intent is to redirect a legitimate website's traffic to another, nearly identical but bogus website for the purpose of stealing sensitive information.
22. Scams Based on social engineering Often appeal to compassion or greed Disasters typically generate large numbers of scams Appear legitimate
23. Scams Don’t click on links in these e-mails Typically offer something of value, ask for money in advance Nearly impossible to track the monetary transactions Scammers are accomplished social engineers
24. Scams Nigerian money fraud scams began in 1997 or before – by fax! These scams have spread to 80 countries or more. U.S. and U.K. are major targets
25. Scam Targets Dating sites - exploit the victims’ desire for a companionship Religious sites - seek donations from their victims for “worthy cause” Social websites - exploit personal info
26. Scams US - $1-$2 billion UK – 150 million pounds Australia - $36 million AUD Estimated annual losses
27. Trojans Programs that masquerade as “good” programs Can spy, steal information, log keystrokes, download other malware Open backdoors, over write data
29. Virus Can create files, move files, erase files Can consume memory and cause computer problems Can replicate Can attach to other programs Can travel across networks
30. Worms A special type of virus Can replicate itself and use memory Reproduce so fast they overload and shut down entire systems Cannot attach itself to other programs. Spreads mostly by e-mail
31. Backdoor Malware that allows access to a computer without knowledge of the user’s password and user name. Allows attackers easy remote access
32. Spyware Purpose is to capture information Email, usernames, passwords, credit card info, etc. Can transmit this information
33. Rootkit Help intruders gain access to systems Avoid detection Subversion & evasion May avoid anti-virus or anti-spyware scan
34. Bots or Zombies A computer infected with malware, controlled remotely without the knowledge of the user Combined into networks called botnets Rented or sold to criminal interests
35. Bots or Zombies Can be used to propagate malware or for cyber attacks Botnets may consist of thousands of machines worldwide Used to send about 80% of all spam and to attack commercial websites and other systems
37. Intermission When we return… how do we protect our computers and our data?
38. Part 2 – The Protection We’ve covered the threats, but how do we protect ourselves?
39. Use Best Practices Data Router w/ hardware firewall ZoneAlarm software firewall Spybot w/ tea timer Super Anti Spyware Anti virus software Backup Data
40. Best Practices Physical computer security Legal agreements - read the fine print Use good passwords Keep passwords safe Use a flash drive capable of “read-only” Update your operating system (OS) Update your applications
41. Best Practices Use a hardware firewall Use a software firewall Use and update security products ie: anti-spyware, anti-virus, etc. Clean the system regularly Backup system regularly (after cleaning) Suggest using FireFox w/ security plugins
43. Physical Computer Security All users should be required to log in, even at home A PC with no log-in password is like a car with the keys in the ignition.
44. Legal Agreements A software license agreement is a legal contract between a producer and a purchaser of computer software. Called End User Licensing Agreements (EULA) or Terms of Use (TOU) Privacy Agreements
45. Read the Fine Print Agreeing to these electronic documents means you are signing a legal contract. Read them before agreeing Suggest you keep a copy (paper or digital)
46. Use Good Passwords Great Internet security means nothing if the bad guys can guess your passwords
47. Keep Passwords Safe Need a “system” of choosing and using good passwords or… Password management software Examples: Roboform, KeePass, others KeePass RoboForm
49. USB Malware Flash drives banned by US Army in 2008 due to malware and security concerns. An estimated 10% of malware was written to move on a flash drive.
50. USB Flash Drive w/ Read-Only May be difficult to find Have a physical switch that prevents writing (and spreading malware) to the flash drive useful on unknown / unfamiliar computers
51. Upgrade vs Update An upgrade – from v2.5 to v2.6 for example is simply a major update “ Upgrading is taking your vitamins; fixing a hack is open-heart surgery.” Matt Mullenweg, founding developer of WordPress
52. Update Your Operating System Install all security patches Go to Windows Update website
53. Update Your Operating System Set auto updates to download but not install unless you approve
54. Update/ Upgrade Your Applications Hackers are finding ways to embed malware in everyday programs In July 2009 it happened to Adobe PDF files. Adobe issued a patch. Unless you install the patch, you’re vulnerable when viewing PDFs
55. Update Your Applications Average computer holds 80+ programs How to keep them all updated? If offered, turn the auto-update on Update often-used programs manually Helper programs for the rest - Secunia Free, checks your programs, notifies you when updates are needed
57. Data Router w/ hardware firewall ZoneAlarm software firewall Spybot w/ tea timer Super Anti Spyware Anti virus software Use Best Practices Backup Data
58. Hardware Router w/Firewall First line of defense Available in wired or wireless versions Wired is more secure Protects against incoming attacks $100 - $150
59. Software Firewall Protects against intrusion – scanning or attacks Protects against outbound communication by malware Outbound Communication
60. Software Firewall Use the pre-installed Windows firewall only if you have no other options. Turn it off before installing a better product. If you have the XP operating system you MUST obtain a software firewall DO NOT use XP’s firewall.
61. Install firewall first, then install other security software – antivirus, antispy Do not install multiple software firewalls ZoneAlarm Pro is adequate - $40 Does require system resources Software Firewall
62. Data Wireless Router w/ hardware firewall ZoneAlarm software firewall Spybot w/ tea timer Super Anti Spyware Anti virus software Use Best Practices Backup Data
64. Spybot Search & Destroy Malware often changes the registry Spybot warns of potential registry changes with “Tea-timer” Legitimate software installations also change the registry and may cause false alarms
65. Spybot Search and Destroy Will “immunize” the system Like a “Do Not Call” list of websites for your browser
66. Super AntiSpyware Removes spyware, Adware Trojans, Dialers, Worms, HiJackers, KeyLoggers, Parasites, Rootkits - Free - Real-time protection - Can be scheduled
68. Antivirus Software Many software options Many are free, or free trial UF faculty has access to McAfee for free
69. Data Wireless Router w/ hardware firewall ZoneAlarm software firewall Spybot w/ tea timer Super Anti Spyware Anti virus software Use Best Practices Backup Data
70. How to Use These Tools Effectively Pick one day of the week (Sunday AM?) Use the tools in this order: Spybot, SuperAntispyware, Antivirus Start one tool, go read the paper When one tool has finished, start the next, go read the paper When all tools are done, do a complete backup and label it w/ date & “clean”
71. Backup Your Data Why backup? Data loss or corruption Human error, fire, flood, malware Backing up is cheaper, easier than re-creating the data
72. Backup Your Data Many ways to backup Data only, whole system, online, local Compressed, uncompressed, automated
73. Data-Only Backup Dozens of software choices for every budget & free Backs up selected files Typically uses proprietary compression SyncToy – Free MS program – no compression Back2Zip free software
74. Whole-System Backup Takes an “image” of the whole system not each file individually Several choices including Acronis, Norton Ghost, others Backup in 15-20 min, restore - 30 min to 1 hr
75. Online Backup Service Advantages Inexpensive Some operate in the background Disadvantages Monthly fee Depends on Internet access
76. Local External Backup Advantages Low one-time cost Multi-purpose Easily accessible Disadvantage Risks similar to original data Note – keep unit unplugged unless in use External Hard Drive
77. FireFox with Security Plugins A plugin is an additional component or feature that can be added to a larger program NoScript – to stop web scripts from running Better Privacy – to control Flash cookies
78. Virtual PC Products These programs create a “virtual PC” within your real PC. When programs run in the virtual PC, they can’t make changes to the real PC Requires some technical knowledge Requires extra processing power Extremely safe – if the Virtual PC gets infected, simply delete it and create a new one.
79. Virtual PC Software Microsoft Windows Virtual PC VMware Connectix Virtual PC Sun VirtualBox
80. Creates a small “virtual space” inside your computer called a “sandbox.” Can run a program or browser inside the sandbox. Smaller learning curve than a Virtual PC Less processing power needed than a Virtual PC Sandboxie
81. You Commercial Repair Local PC Users Groups Friends & family CompUSA Geek Squad Local repair shop Etc. When you need help…
82. When You Need Help You are a key component Become knowledgeable about basic computer problems – what’s serious, what’s not Understand who your resources are, who can deal with which problems Ask around about commercial repair options – who’s recommended?
83. 50+ organized groups around the state. Dues avg $25-$35/yr FACUG – Fla Assn of Computer User Groups is the umbrella organization - list is at http://www.facug.org/ Members help members w/ problems Attend meetings occasionally – build relationships PC Users Groups
84. Disclaimers Information presented here is based on currently available information. This information changes frequently. No guarantee of accuracy is possible. Hardware, software, companies and techniques discussed are options, not recommendations. You alone are responsible for software and /or hardware choices and use of any techniques. Please read all legal agreements, instructions, user agreements and privacy terms associated with any hardware, software or websites.
85. Thanks to… Bill Black – IT Support Ninja Brent Broaddus – Local IT Jedi DarryD – Obi-Wan & IT Master