Vulnerabilities / Threats
9/29/2009
06:32 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Microsoft Bing Ads Warn About Scams

As part of its ongoing security push, Microsoft is teaming up with the government and Western Union to run search ads to educate users about potential online fraud.

In keeping with expanding efforts to educate consumers about security risks, Microsoft, in conjunction with the Federal Trade Commission, the United States Postal Inspection Service and Western Union, has launched a series of online public service announcements (PSAs) on its Bing search engine to warn searchers about online scams.

The PSAs appear as sponsored ads atop Bing search results lists in response to keywords commonly targeted by scammers.

A search for "Microsoft Lottery," for example, returns a sponsored link at the top of the search results list titled "Advance Fee Fraud Scams," followed by the admonition, "Don't send money before verifying the source of the request."

The link leads to a Microsoft Web page that explains how advance fee fraud scams work.

Other keywords designed to trigger the PSAs -- such as "credit repair" and "mortgage foreclosure" -- lead to landing pages hosted by the FTC. However, these PSA links are intermingled with other sponsored links on Bing.com, making them less noticeable than the lone Microsoft ad triggered by the keywords "Microsoft Lottery."

"The campaign builds on similar information we recently began providing in Windows Live, all with the idea that by providing education within the product experience, consumers will be reminded to be cautious at the very moment it's most important," said Microsoft associate general counsel Tim Cranton, in a blog post. "Obviously, these particular issues are not the only scams or fraud consumers might come across online, but they certainly are some of the more prevalent scams out there. We see this campaign as a positive step in an ongoing effort to help make the Internet a safer place."

Microsoft has taken other steps in the same direction recently. Two weeks ago, Cranton announced a related effort to improve online security: the filing of five lawsuits aimed at curbing the spread of malicious online ads, or malvertising. And on Tuesday, Microsoft also released its own free antivirus software, Microsoft Security Essentials, in an effort to raise the security baseline of Windows systems.

Rohyt Belani, managing partner and co-founder of the Intrepidus Group, a security consultancy, said in a phone interview that organizations with large consumer bases have become more focused on educating consumers, partly in response to the FTC's "Red Flag Rule," which requires creditors and financial institutions to have identity theft prevention programs to detect and respond to activities that may be indicative of identity theft.


InformationWeek has published an in-depth report on smartphone security. Download the report here (registration required).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6335
Published: 2014-08-26
The Backup-Archive client in IBM Tivoli Storage Manager (TSM) for Space Management 5.x and 6.x before 6.2.5.3, 6.3.x before 6.3.2, 6.4.x before 6.4.2, and 7.1.x before 7.1.0.3 on Linux and AIX, and 5.x and 6.x before 6.1.5.6 on Solaris and HP-UX, does not preserve file permissions across backup and ...

CVE-2014-0480
Published: 2014-08-26
The core.urlresolvers.reverse function in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not properly validate URLs, which allows remote attackers to conduct phishing attacks via a // (slash slash) in a URL, which triggers a scheme-relative URL ...

CVE-2014-0481
Published: 2014-08-26
The default configuration for the file upload handling system in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 uses a sequential file name generation process when a file with a conflicting name is uploaded, which allows remote attackers to cause a d...

CVE-2014-0482
Published: 2014-08-26
The contrib.auth.middleware.RemoteUserMiddleware middleware in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3, when using the contrib.auth.backends.RemoteUserBackend backend, allows remote authenticated users to hijack web sessions via vectors relate...

CVE-2014-0483
Published: 2014-08-26
The administrative interface (contrib.admin) in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not check if a field represents a relationship between models, which allows remote authenticated users to obtain sensitive information via a to_field ...

Best of the Web
Dark Reading Radio
Listen Now The Best of the Rest of Black Hat: The Enterprise View
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.