Risk
1/20/2009
06:12 PM
Thomas Claburn
Thomas Claburn
Commentary
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Question The Internet

While many people have embraced Timothy Leary's advice to question authority, too few demonstrate willingness to question the Internet.

While many people have embraced Timothy Leary's advice to question authority, too few demonstrate willingness to question the Internet.It might seem obvious that one's online experience can be improved by some skepticism and fact checking, but too many people get duped by online scams.

I was thinking about this because a colleague forwarded an e-mail to me that purports to be IRS advice about how to receive a stimulus check.

"After the last annual calculations of your fiscal activity we have determined that you are eligible to receive a Stimulus Payment," it says. "Please submit the Stimulus Payment Online Form in order to process it." It is, of course, a phishing attempt.

It's not hard to figure this out and most computer users can do so. This particular scam is documented at Snopes.com. The FBI has warned about it. The IRS explicitly says that it "does not initiate taxpayer communications through e-mail."

And if that's not enough, the purported IRS Web site page cited to make this phishing scam believable is hosted on .es Web site -- .es being the top-level country code domain for Spain.

Search for the title of the page -- "Welcome to Where's My Stimulus Payment?" -- on the IRS site and you'll find the following message: "We're sorry but our online tool, Where's My Stimulus Payment?, is no longer available."

The IRS adds: "Stimulus payments were required by law to be issued by December 31, 2008."

So anyone receiving an e-mail about a stimulus check isn't getting one.

Phishing shouldn't work. But it does.

I expect that most of the people reading InformationWeek aren't fooled by phishers. But at the risk of stating the obvious, here are a few suggestions to help reduce the risk of being duped. (If this is second nature to you, pass it on to someone less tech savvy or more credulous.)

• First, set your e-mail client so that it won't load images by default.

• Second, set your e-mail client to display message in text rather than HTML.

• Third, if you must display HTML, don't click on links in e-mail messages. Visit Web sites by typing URLs into the address bar of your browser. Notice typos designed to be mistaken for known brands.

• Fourth, use a pop-up blocker or the NoScript Firefox extension.

• Fifth, get curious and use the View Source command for e-mail messages (right-click on a message body in Microsoft Outlook) and Web pages. Look for references to unexpected servers or e-mail addresses, even in messages that appear to come from friends.

• Sixth, search for the subject line or a key phrase from a suspicious e-mail. More often than not, others have spotted the scam and the search engines have noticed.

And if that's too much bother, think of The X-Files and say, "I want to disbelieve." Because while the truth may be out there, it's not in your in-box.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-2184
Published: 2015-03-27
Movable Type before 5.2.6 does not properly use the Storable::thaw function, which allows remote attackers to execute arbitrary code via the comment_state parameter.

CVE-2014-3619
Published: 2015-03-27
The __socket_proto_state_machine function in GlusterFS 3.5 allows remote attackers to cause a denial of service (infinite loop) via a "00000000" fragment header.

CVE-2014-8121
Published: 2015-03-27
DB_LOOKUP in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) 2.21 and earlier does not properly check if a file is open, which allows remote attackers to cause a denial of service (infinite loop) by performing a look-up while the database is iterated over...

CVE-2014-9712
Published: 2015-03-27
Websense TRITON V-Series appliances before 7.8.3 Hotfix 03 and 7.8.4 before Hotfix 01 allows remote administrators to read arbitrary files and obtain passwords via a crafted path.

CVE-2015-2157
Published: 2015-03-27
The (1) ssh2_load_userkey and (2) ssh2_save_userkey functions in PuTTY 0.51 through 0.63 do not properly wipe SSH-2 private keys from memory, which allows local users to obtain sensitive information by reading the memory.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.