Eight Common Cybercriminal Tactics
Folks, a quick reading recommendation today. This article by Joan Goodchild describes and explains how the cyber-criminals try to trick us into clicking on links and/or revealing our personal information. Forewarned is forearmed, so learn to spot these ruses now…
Social Engineering: Eight Common Tactics
“Famous hacker Kevin Mitnick helped popularize the term ’social engineering’ in the ’90s, but the simple idea itself (tricking someone into doing something or divulging sensitive information) has been around for ages. And experts say hackers today continue to steal password, install malware or grab profits by employing a mix of old and new tactics.
Here’s a refresher course on some of the most prevalent social engineering tricks used by phone, email and Web.” Click here to read.
See how many you recognize.
Copyright 2007-9 © Tech Paul. All rights reserved. post to jaanix
Share this post : | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Using Your Keyboard Instead Of Your Mouse*
I do pretty well, but I am not a fast typist. This is due to the fact that I just never seemed to get the hang of touch typing (read: never made the proper effort in mastering it). I use a bizarre self-invented method of two-handed hunting/pecking and common key memorization that astounds observers.
The reason I am as fast on a computer as I am is my use of keyboard shortcuts to navigate, edit, and control the machine. (A brief aside: I have tried voice recognition, but just cannot get used to talking to my computer– it makes me feel foolish.)
In the Realm of the Geek, one measure of your skill is how much you can do without touching your mouse. You may not know this but there is almost nothing you cannot do using only the keys on your keyboard. Using keyboard shortcuts is much faster, and gives me more granular control over my selections.
Tip(s) of the day: Use some common shortcuts to maximize your efficiency (and Geek Quotient).
I will start by pointing out what a quite a few of us simply were never told (unless we’ve been using Windows for many generations). You may have noticed (in some programs) that there’s a single letter underlined in each menu choice (and that this is standardized across all programs), such as the “F” in the File menu, “E” in Edit, and the “o” in Format– and this carries to submenus as well.
These are “Alt shortcuts”– hold down the “Alt” key and hit F, and the File drop-down menu opens; press the down arrow one time, and the Open dialogue opens; use the up and down arrow keys to select your file and hit Enter, and your file opens. All without touching the mouse.
One more important Alt shortcut is Alt+Tab: this cycles through your open program windows.
You may have also noticed a weird key located on the lowest left, between the “Ctrl” and “Alt” keys, that has the Windows logo on it. Believe it or not this “Windows” key actually serves a purpose and does things.
A single tap opens your Start menu (again, the up/down arrows will allow you to select [highlight] your choice of the options). Combine it with other keys to: Winkey+R, opens the Run tool; Winkey+M, minimizes all open windows (sometimes handy for when the boss walks by); and Winkey+E opens Windows Explorer.
For navigating, the tools to use are the arrow keys. To move around in a document, a single click on an arrow key moves it one character; this is not a fun way to move whole sentences or paragraphs, so add the Ctrl key to move by whole words (or other blocks of characters) with the left/right arrow keys. And jump paragraphs with the up/down keys.
[Bonus tip: A Windows feature called Mousekeys allows you to mover your cursor with the arrow keys on your number pad. Turn it on by pressing Left SHIFT + ALT + NUM LOCK]
To highlight (select) the text, add the Shift key. Say I wanted to delete this whole paragraph, I would hit Ctrl+Shift+up arrow, and then either Delete or Backspace.. or just combine Ctrl+Backspace, and erase a sentence-a-press. Ctrl+A selects all.
The Page Up and Page Down, Home and End keys can speed your scrolling.
“Command shortcuts” are typically done with the “Ctrl” key, and you probably already are familiar with some of them: Ctrl+C is the Copy command, Ctrl+V is Paste, and — my favorite — Ctrl+Z is the Undo command.
A few others are: Ctrl+P followed by Enter will print your current page/document, Ctrl+S will Save it.
These are “universal” commands and can be used no matter which program or application you happen to have open. Most programs have their own set of shortcuts built in as added features, and if you use them a lot learning these can be a real boon. As a for instance, Microsoft Word has a whole slew of shortcuts (and the ability to record “macros”) to reduce the number of steps you need to accomplish tasks. If you spend a lot of time in Word, I suggest a search for “Word shortcuts” will be a big benefit to you as there’s a lot of published guides out there. I have only presented a very short list of the shortcuts available!
Today’s free link: While not everyone is a Word user, most people are web browsers (how else did you find Tech–for Everyone?). The official Microsoft list of Internet Explorer shortcuts can be found here.
Today’s free download: 10 Finger BreakOut is a real arcade game, in which you are escaping from invaders, shooting and trying to hit balls, but don’t worry, by playing 10 Finger BreakOut you sure will be learning to type. Improve your typing skills with this free typing tutor – typing game.
Copyright 2007-8 © Tech Paul. All rights reserved. post to jaanix
Share this post : | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Anatomy of a Phish
“Dear Wells Fargo customer,
Security and confidentiality are at the heart of Wells Fargo. Your details (and your money) is protected by a number of technologies, including Secure Sockets Layer (SSL) encryption.
We like to notify you that Wells Fargo carries out customer details confirmation procedure that is compulsory for all our customers. This procedure is attributed to a routine banking software update.
Please visit our Customer Verification Form using the link below and follow the instructions on the screen.”
There are several things wrong here, and I hope you detect them. Loyal Friends and True to this series should recognize a couple right away. (And if you remember this recent article, the word “compulsory” might have rung a bell.) Here’s how the e-mail actually looks.
* One BIG clue is that in this case Hotmail has detected the Sender and the true source don’t match. That means the Sender has been “spoofed”. The red shield and warning doesn’t always mean a phraudulent e-mail, but 9 times out of ten it does.
* The next clue is the two “Bcc” recipients.. similar in name, but completely unrelated. Why are they there?
* There is some poor grammar.
* The next clue is that I don’t currently bank at Wells Fargo. I haven’t in, oh, about 20 years.
* Another clue is that e-mail contains a hyperlink (you are always suspicious of e-mail hyperlinks, right?), and that hyperlink is a little bit “off”. Yes, it says “wellsfargo.com”.. but what’s the www4? And all that other garbage?
* (now this is interesting) when you place the cursor on the URL (hyperlink), the actual link– shown in the lower left of the bottom bar of Internet Explorer — are different. Clicking on the link that says “www4.wellsfargo.com/blah blah blah” will REALLY take you to someplace called “online7.wellsfargo.com.bnk7.co.uk/blah blah blah”.
Now.. why would they want to put a hidden redirect as the link? Hmmm?
* And lastly, (as you know) legitimate businesses never send you important information, requests, or “notices” via e-mail.
This is a classic phish. It is an attempt by cyber-criminals to get you to visit a webpage they have created which looks very much like a Wells Fargo web page. On that page you will be asked to enter your Wells Fargo logon/password, all your person information, and banking details. When you’re finished giving your identity away, and handing them the keys to your bank account, you will be thanked for your cooperation and “bounced” to the real Wells Fargo website.
Game over.
Surely.. nobody falls for this anymore, right?
Wrong. The experts will tell you that cyber-criminals have a harder time moving all the money they steal than anything else.
But, if I clicked the link.. and I filled out the “compulsary” Customer Verification Form.. and basically just handed my information over.. is it really stealing?
Tip of the day: Be savvy. And that means always be suspicious and wary. Look for the tell-tales.
Copyright 2007-8 Tech Paul. All rights reserved. post to jaanix
Share this post : | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |