Issue link:

Contents of this Issue


Page 3 of 3

FALL 2019 SECURITY SMART 4 Security Smart is published by CSO, the leader in news, analysis and research on security and risk management. © 2019 IDG To purchase an individual subscription, email or for more information. FROM IDG 8 Signs You've Been Hacked Here are eight sure signs that your computer or mobile device has been hacked. If you encounter any of them, contact your employer's IT or security team immediately. 1 You get a ransomware message. This is a sudden screen takeover that tells you all your data is encrypted and asks you for a payment to unlock it. 2 You get a fake antivirus message. A pop-up message on your computer or mobile device tells you that it is infected. The message pretends to be an antivirus scanning product and is purporting to have found malware infec- tions on your computer. 3 You have unwanted browser toolbars. Your browser has multiple new toolbars with names that seem to indicate the tool- bar is supposed to help you. 4 You see frequent, random pop-ups. This widespread sign that you've been hacked is also one of the more annoy- ing ones. When you're getting random browser pop-ups from websites that don't normally generate them, your system has been compromised. 5 You receive social media invitations from your friends that they didn't send, or vice-versa. Either you or your friends receive invita- tions to "be a friend" when you are al- ready connected. Usually, you're thinking, "Why are they inviting me again? Did they unfriend me, and now they are re-inviting me?" Then you notice the new friend's so- cial media site has very few recognizable friends and doesn't contain older posts. 6 Your online password isn't working. If you are typing in your online password correctly, for sure, and it isn't working, then you might have been hacked. 7 Antimalware, Task Manager or Registry Editor is disabled. If your antivirus software is disabled and you didn't do it, you've probably been exploited—especially if you try to start Task Manager or Registry Editor and they won't start, start and disappear, or start in a reduced state. 8 Your online account is missing money. As in, lots of money. Online bad guys like to transfer everything or nearly every- thing, often to a foreign exchange or bank. Usually it begins with your computer being compromised or with you respond- ing to a fake email supposedly from your bank or stock trading company. The bad guys log on to your account, change your contact information, and transfer large sums of money to themselves. Kwamaine Ford worked for a celeb- rity and had social media accounts that showed him living a glamorous life, sur- rounded by well-known people. But Ford funded his lifestyle with an illegal hobby—using his knowledge of ce- lebrities to phish their personal accounts and charge the associated credit cards. Between 2015 and 2018, Ford, posing as an Apple customer service employee, emailed various celebrities to ask them to change or share their passwords. More than 100 victims, including athletes and musicians, unwittingly gave Ford their passwords for their iCloud ac- counts, giving him access to anything stored in the cloud, including email and photos. Apple notified the FBI, who began in- vestigating. They discovered that Ford had stolen about $325,000 by fraudulently using victims' credit card numbers. Ford pleaded guilty to computer fraud and aggravated identity theft charges and was sentenced to more than three years in prison. The FBI recommends you take these steps to protect yourself and your informa- tion from these kinds of scams: ■ If a company sends you an unsolic- ited request for your password or other information via text or email, don't click on anything. Look up the company's phone number on your own (don't use the one a potential scammer is providing). Call the company or bank to ask if the re- quest is legitimate. ■ Set up two-factor (or multifactor) au- thentication on any account that it allows it and never disable it. ■ Be careful how much information you share online. If one of your security questions is your pet's name, for ex- ample, and you reveal your pet's name on a social media account, someone can easily guess your answer. SOURCE: WWW.FBI.GOV BUSTED! Phishing the Famous A fraudster has been sentenced for scamming celebrities. Here's what the FBI says about his crime, and its advice for keeping you from falling for the tactics he used. andreypopov, gettyimages For more information on staying safe online here at BSU or at home, contact

Articles in this issue

Links on this page

Archives of this issue

view archives of BSU - Security_Smart_Fall2019_Bridgewater