17_275191-bk03ch01.qxp 6/16/08 9:50 PM Page 221
Chapter 1: Addressing
Internet Security
In This Chapter
Stopping hackers with a firewall
Getting outfitted for the battle against Internet viruses and infections
Fighting back against spam and junk e-mails
Realizing the dangers of the virtual fishing game — phishing
Putting your foot down on pop-ups and staying safe when surfing
s you may know, the Internet opens your computer up to infections —
Athose nasty little programs like viruses and spyware — and to hackers.
But did you know you can protect yourself against these infections and
threats? It isn’t hard and you don’t have to have a computer degree: just at
most some money and an hour of your time.
In addition to viruses, you have to worry about other online threats and
annoyances, like spam and phishing e-mails. You can protect yourself, but
first you need to know how. This chapter shows you how.
Blocking Internet Hackers Using Firewalls
The Internet is in effect just a big network, similar to your home network,
but with billions of computers interconnected from around the world. Some
of the people behind these computers are trustworthy, but others are not.
Connecting your computer to the Internet without proper protection gives
hackers the opportunity to connect to your computer to do nefarious
things like
✦ Getting your files and sensitive information
✦ Monitoring your Internet traffic
✦ Taking over your computer to change settings and cause havoc
You can, however, use a firewall to protect yourself from these hackers.
www.it-ebooks.info
http://itbookshub.com/17_275191-bk03ch01.qxp 6/16/08 9:50 PM Page 222
222 Blocking Internet Hackers Using Firewalls
The big picture behind what firewalls do
A firewall is a filter that monitors data traffic to either let it through or block it,
depending on the settings you’ve created when you set up your firewall. You
could compare this process to a DUI checkpoint set up by the authorities:
1. Cars (data traffic) on both sides of the road (incoming and outgoing)
must stop at the road-block (firewall) to be inspected.
2. Safe drivers (authorized data traffic) are let through to the other side of
the roadblock (firewall).
3. Impaired drivers (unauthorized data traffic) are blocked and aren’t
allowed through the roadblock (firewall).
Figure 1-1 gives you a visual of this type of filter provided by computer
firewalls.
Blocks
unauthorized Lets authorized
outgoing traffic traffic through
Firewall
Blocks
unauthorized
incoming traffic
Figure 1-1:
A depiction
of a firewall
Internet
filtering your
data traffic.
www.it-ebooks.info
http://itbookshub.com/Addressing Internet
Security
17_275191-bk03ch01.qxp 6/16/08 9:50 PM Page 223
223
Blocking Internet Hackers Using Firewalls
A firewall doesn’t come with authorities to do the inspection, nor does it
automatically prosecute violators; however, a firewall helps keep your com-
puters from being hacked.
What a firewall actually blocks: Ports
The previous section helps paint a good picture in your mind to understand
the basic concept behind firewalls, but to better understand firewalls, you
should know that they work by blocking ports. A firewall doesn’t just magi-
cally know what data is good or bad for your computer out of thin air, or
from some type of inspection of the data itself.
On a network and the Internet, there are different ports (thousands of them)
that data can travel through. For instance, think of a CB radio: You have 40
channels you can talk on, but all the talk is done through one medium, the
airwaves. Likewise, all the data on a network and the Internet travels
through the same mediums, but on a variety of ports.
Half of the protection provided by firewalls is blocking all ports except those
specified as authorized ports. The other half of the protection is provided by
blocking all programs on your computer (no matter what port is used) from
using the network or Internet, again, except for those you have specifically
authorized.
Book III
Chapter 1
Getting a firewall to protect yourself
A firewall can be a software program loaded on your computers or a piece of
hardware that sits between your Internet connection and your computers
(or router). Newer operating systems such as the following come with built-
in firewall software:
✦ Windows Vista
✦ Windows XP
✦ Mac OS X
Ubuntu doesn’t automatically come with a firewall installed and active.
However, you can set it up, which is discussed shortly.
You can also find firewall software available as a standalone product or as a
part of an entire Internet security suite, for purchase (or for free) from com-
panies such as
✦ McAfee:www.mcafee.com
✦ CA (Computer Associates):shop.ca.com
✦ Norton (Symantec):www.symantec.com/norton
www.it-ebooks.info
http://itbookshub.com/17_275191-bk03ch01.qxp 6/16/08 9:50 PM Page 224
224 Blocking Internet Hackers Using Firewalls
✦ ZoneAlarm (basic firewall software is free):www.zonealarm.com
✦ Comodo Firewall Pro (free):www.personalfirewall.comodo.com
Because your operating system (Windows, Mac, and so on) probably
includes a firewall, using a third-party firewall isn’t necessary. However, if
you are purchasing an Internet security suite for viral and spyware protec-
tion, and it includes a firewall, you may want to disable the built-in firewall
for your operating system. You’ll probably find it easier to use the third-
party firewall because it will be from the same vendor, providing you with
streamlined access and configuration of all your Internet security products.
Hardware firewall solutions are covered later in this chapter, in the “Using
Internet Security Hardware Solutions for Your Entire Network” section.
Configuring the Windows Firewall
Windows XP and Vista come with a firewall (called Windows Firewall)
installed and enabled by default. Because common programs and services
are authorized by default, you don’t have to configure the Windows Firewall
that much. Additionally, when a program on your computer tries to access
the Internet or network for the first time, you’re prompted to authorize or
block the access. Then, depending upon your response to whether to
authorize or block, the firewall utility is automatically updated.
The firewall settings are saved, so when you restart your computer nothing
needs configured again. You basically need to configure your firewall settings
only when you want to disable or enable the feature or manually add or
remove an application or software.
Using Windows XP
You can access the firewall settings in Windows XP from the Control Panel.
To do so, choose Start➪Control Panel➪Network and Internet Connections➪
Windows Firewall.
Figure 1-2 shows the main window of Windows Firewall, where you can easily
turn it on or off.
Clicking the Exceptions tab shows you all the programs/ports that are
authorized to pass by the firewall, such as those shown in Figure 1-3. These
exceptions apply to all your network adapters.
www.it-ebooks.info
http://itbookshub.com/Addressing Internet
Security
17_275191-bk03ch01.qxp 6/16/08 9:50 PM Page 225
225
Blocking Internet Hackers Using Firewalls
Figure 1-2:
The main
window of
the firewall
utility in
Windows XP.
Book III
Chapter 1
Figure 1-3:
The
Exceptions
tab of the
firewall
utility in
Windows XP.
Clicking the Advanced tab (see Figure 1-4) gives you access to more complex
settings:
✦ Enable/disable firewall protection for certain network adapters
✦ Configure the logging settings of the Windows Firewall
www.it-ebooks.info
http://itbookshub.com/17_275191-bk03ch01.qxp 6/16/08 9:50 PM Page 226
226 Blocking Internet Hackers Using Firewalls
✦ Configure the Internet Control Message Protocol (ICMP) settings
✦ Restore Windows Firewall to its defaults, which is useful if you think
you’ve caused problems by changing its settings
Figure 1-4:
The
Advanced
tab of the
firewall
utility in
Windows XP.
Using Windows Vista
You can access the firewall settings in Windows Vista from your Control
Panel by choosing Start➪Control Panel➪Security➪Windows Firewall. If UAC
is active and you received an alert, click OK to continue.
Figure 1-5 shows the main window of Windows Firewall. On the left are the
main tasks, such as turning the firewall off and on or allowing a program
through the firewall.
You can click the Change Settings link to bring up the Windows Firewall
Settings dialog box, which enables you to review or change other settings:
✦ General tab: This is where you can easily turn the firewall on or off, or
block all incoming connections for maximum protection.
✦ Exceptions tab: Shows you all the programs/ports that are authorized to
pass by the firewall. These exceptions apply to all your network adapters.
✦ Advanced tab: Lets you enable/disable firewall protection for certain
network adapters. From here, you can also restore Windows Firewall to
its defaults, which is useful if you think you’ve caused problems by
changing its settings.
www.it-ebooks.info
http://itbookshub.com/Addressing Internet
Security
17_275191-bk03ch01.qxp 6/16/08 9:50 PM Page 227
227
Blocking Internet Hackers Using Firewalls
Figure 1-5:
The Main
window of
the firewall
utility in
Windows
Vista.
Configuring Mac OS X’s firewall
The firewall feature in Mac OS X Tiger and Leopard is also installed and
enabled by default. Just as with the Windows Firewall, you don’t have to do
much configuring of the firewall in Mac OS X. Common programs and serv-
ices are authorized by default, and the firewall is updated when you turn on Book III
Chapter 1
and off most other features that communicate with the Internet or your net-
work, such as Personal File Sharing or Personal Web Sharing. You basically
need to configure your firewall settings only when you want to disable or
enable the feature or manually add or remove an application or software.
Accessing the firewall feature in Tiger
Here’s how to access the firewall feature in Mac OS X Tiger:
1. Click the Apple icon on the menu bar.
2. Click System Preferences.
3. Click Sharing.
4. Click the Firewall tab.
The status of the firewall (shown as Firewall On or Firewall Off) is displayed
in the upper-left of the Firewall tab window. Just below the status is the
button (labeled Stop or Start, depending upon the current status) to disable
or enable the firewall.
www.it-ebooks.info
http://itbookshub.com/17_275191-bk03ch01.qxp 6/16/08 9:50 PM Page 228
228 Blocking Internet Hackers Using Firewalls
Many common features and programs are listed in the scrolling list box. Only
the items that are checked are authorized to pass through the firewall. Many
items can’t be selected or deselected; in that case, the feature can be turned
on or off in the Services pane (by clicking the Services tab button in the
Sharing window). You can, however, choose an item and click the Edit button
to see exactly what ports the item uses. If the item is editable (meaning that
you can select or deselect it), you can edit the ports for the item.
You can add new features and applications to the firewall to allow their
traffic to and from the Internet or your network from the particular Mac
computer you’re currently using. To do this, click the New button. On the
drop-down menu, select the appropriate feature or application from the Port
Name drop-down list. Click OK to add the new entry to the firewall.
If you want to block a service or application (remove it from the firewall),
select the desired item from the scrolling list box and click Delete.
Clicking the Advanced button brings up the following three advanced fire-
wall settings:
✦ Block UDP Traffic: Selecting this can help secure your computer.
✦ Enabled Firewall Logging: Enabling this feature logs the activity of the
firewall (such as the IP addresses and ports that are blocked by the fire-
wall), which is useful if you want to see whether someone is trying to
hack into your computer, or when trying to troubleshoot an application
or feature that isn’t communicating over the Internet or network.
✦ Enable Stealth Mode: When this option is enabled, your computer won’t
respond to unrequested data traffic, thereby making your computer vir-
tually invisible on the Internet. One benefit of this is that it can prevent
you from being detected by a hacker using a popular method of detec-
tion called a ping. Hackers can send pings to random IP addresses (what
identifies you on the Internet) and when a response is sent back, they
know that a computer or network is there and may try to hack into it.
Stealth mode keeps your computer from responding to pings.
Accessing the firewall feature in Leopard
Here’s how to access the firewall feature in Mac OS X Leopard:
1. Click the Apple icon on the menu bar.
2. Click System Preferences.
3. Click Security.
4. Click the Firewall tab.
www.it-ebooks.info
http://itbookshub.com/Addressing Internet
Security
17_275191-bk03ch01.qxp 6/16/08 9:50 PM Page 229
229
Blocking Internet Hackers Using Firewalls
When you have the Firewall tab opened on the Security window, you can
select one of the following radio button options:
✦ Allow All Incoming Connections: This option provides the least amount
of protection and essentially turns the firewall feature off.
✦ Allow Only Essential Services: This option provides a great amount of
protection; however, it blocks ports and services that you may want to
use while on your home network, such as file and printer sharing. Only a
few system-essential ports (for example, those that support networking
services, such as DHCP, Bonjour, and IPSec) are opened by default when
this option is selected.
This option is best when you are connected to other networks, such as
Wi-Fi hotspots or other public connections to the Internet.
✦ Set Access for Specific Services and Applications: This is typically the
best option to use when connected to your home network because it
lets you control the firewall while also being flexible. This option is com-
parable to using the Windows Firewall feature in Windows. Ports and
services typically used in home networks (such as file and printer shar-
ing) are automatically authorized, letting you add other (non-Mac) appli-
cations or services as you want.
If you select either Allow Only Essential Services or Set Access for Specific
Book III
Services and Applications, you can click the Advanced button and choose
Chapter 1
the Enable Firewall Logging and Enable Steal Mode options, if you want. See
the “Accessing the firewall feature in Tiger” section for a description of these
two options.
Additionally when you have Allow Only Essential Services or Set Access for
Specific Services and Applications selected, you can add and remove appli-
cations (that you want to either block or allow through the firewall) from the
list. Click the plus sign near the bottom-left corner of the window, select the
application from dialog box, and click Add. Then select whether you want to
allow or block the application.
Installing and setting up Ubuntu’s firewall
Ubuntu doesn’t come with a firewall feature automatically installed and
active. You must install the firewall feature (called Firestarter). Here’s how
to do it:
1. Click System from the Ubuntu toolbar.
2. Choose Administration.
3. Open Synaptic Package Manager.
4. If prompted, enter your account password and click OK.
5. Click Settings from toolbar.
www.it-ebooks.info
http://itbookshub.com/17_275191-bk03ch01.qxp 6/16/08 9:50 PM Page 230
230 Blocking Internet Hackers Using Firewalls
6. Choose Repositories.
7. Make sure that the Community-Maintained Open Source Software
(universe) option is selected.
8. Click Close.
9. If prompted, click Close again.
10. Click the Reload button on the Synaptic Package Manager window.
11. Click the Search button, type firestarter, and hit Enter.
12. Click the checkbox next to the Firestarter item and choose Mark for
Installation.
13. Click Apply, review changes, and click Apply.
14. Close Synaptic Package Manager.
Now you can configure Firestarter:
1. Click System from the Ubuntu toolbar.
2. Choose Administration.
3. Select Firestarter.
4. If prompted, enter your account password and click OK.
The Firewall Wizard should run. If it doesn’t, you can bring it up manu-
ally by clicking Firewall, and then clicking Run Wizard.
5. Click Forward.
You should be taken to the Network Device Setup page.
6. From the Detected Device(s) drop-down list, select the network
adapter that’s connected to the Internet.
Viewing the Connection Information window when you’re connected to
your network or Internet connection can give you a hint as to the device/
adapter to select. Right-click the Ubuntu’s network icon in the upper-
right side of the screen and click Connection Information. If the window
is filled with your network connection information, you’ll most likely
want to select the same device/adapter from the Firestarter Wizard as the
value for the Interface field, which is at the top of the window.
7. Select the Start the Firewall on Dial-Out option if your computer is
hooked directly to a dial-up Internet connection device, such as a DSL
modem, or you connect to VPN (Virtual Private Network) connections.
Most likely, this won’t apply to you and you can leave the option
unselected.
8. Select the IP Address Is Assigned via DHCP option if your computer is
hooked directly to an Internet connection and it uses DHCP to obtain
www.it-ebooks.info
http://itbookshub.com/Addressing Internet
Security
17_275191-bk03ch01.qxp 6/16/08 9:50 PM Page 231
231
Blocking Viruses, Spyware, and Adware with Software
its IP address (which is the case for just about all home Internet con-
nections), or if the computer is connected to a network using DHCP
(which is set by default on all home networking products).
This option applies to most people and usually needs to be selected.
9. Click Forward to go to the Internet Connection Sharing Setup page.
10. If you plan to use your computer in a computer-to-computer network,
or otherwise want to share your computer’s Internet connection
among other computers connected to your computer, select the
Enable Internet Connection Sharing option.
If you also want to provide other computers with an IP address, select
the Enable DHCP for Local Network option. However, you probably don’t
need to worry about either of these options if you are connecting all
your computers to a router, either wirelessly or via an Ethernet cable.
11. Click Forward.
12. Make sure that the Start Firewall Now option is selected and then
click Save.
To make changes to Firestarter or add/remove applications from the firewall,
you can bring up the Firestarter application:
Book III
1. Click System from the Ubuntu toolbar.
Chapter 1
2. Choose Administration.
3. Select Firestarter.
4. If prompted, enter your account password and click OK.
When you have Firestarter open, you can easily disable and enable the fire-
wall by clicking the Stop Firewall or Start Firewall button (depending upon
the current status), which is on the top-right side of the window.
You can find documentation and further help on installing and using
Firestarter at www.fs-security.com/docs.
Blocking Viruses, Spyware, and Adware with Software
Using the Internet makes you more susceptible to three major computer
infections:
✦ Viruses
✦ Spyware
✦ Adware
www.it-ebooks.info
http://itbookshub.com/17_275191-bk03ch01.qxp 6/16/08 9:50 PM Page 232
232 Blocking Viruses, Spyware, and Adware with Software
In the following sections, I detail a little more about these major threats and
how to protect your computer and data from them.
The wrath of computer infections
Whether downloaded automatically without your knowledge or disguised as
a real program or file that you voluntarily downloaded, viral and spyware
infections can cause problems, such as the following:
✦ Altering your computer settings to cause chaos
✦ Deleting your personal or system files
✦ Monitoring your Internet activity
✦ Displaying pop-up advertisements
✦ Spreading the infection to other computers on your network or on the
Internet
Protecting your computers against infections
Even though newer operating systems (Windows XP and Vista, Mac OS X
Tiger and Leopard) include a firewall (to protect your computer from hack-
ers), you need to protect your computer from viral and spyware infections.
You can use a software program loaded on all your computers, or install a
piece of hardware between your Internet connection and your computers
(or router). These anti-infection solutions usually work by
✦ Constantly scanning commonly infected areas for infections so that they
are found quickly and the damage they do is minimal, if any.
✦ Performing routine, full-system scans of all files for infections to make
sure your computer is completely free of infections.
✦ Alerting you to any infections that are found and automatically fixing
them or asking you what you want to do.
You can find antivirus, antispyware, and antiadware software as standalone
products or as a part of an entire Internet security suite for purchase from
companies such as
✦ McAfee:www.mcafee.com
✦ CA (Computer Associates):shop.ca.com
✦ Norton (Symantec):www.symantec.com/norton
www.it-ebooks.info
http://itbookshub.com/Addressing Internet
Security
17_275191-bk03ch01.qxp 6/16/08 9:50 PM Page 233
233
Controlling Your Spam or Junk E-Mail
You can also find free software products that provide similar protection,
such as
✦ AVG Anti-Virus Free Edition:free.grisoft.com
✦ avast 4 Home Edition:www.avast.com
✦ PC Tools AntiVirus:www.pctools.com/free-antivirus
✦ AVG Anti-Spyware Free Edition:www.grisoft.com
✦ Ad-Aware: www.lavasoftusa.com
✦ Avira AntiVir:www.free-av.com
Windows Vista includes Windows Defender, an antispyware program.
However, as is true of Windows Firewall, you may find it easier to use a secu-
rity suite with all protections rather than have a separate application for
each item.
Hardware solutions for combating infections are covered later in this chap-
ter, in the “Using Internet Security Hardware Solutions for Your Entire
Network” section.
Controlling Your Spam or Junk E-Mail
Book III
Chapter 1
Spam is any unsolicited e-mail message that arrives at your inbox that doesn’t
provide proper contact information, contains illegal content, or doesn’t give
you a way to stop further e-mails from that source. E-mails that meet all of
those criteria and are legitimate — for instance, advertisements and
announcements — can still be considered junk mail if they are unwanted.
You can find out more about spam laws and regulations at the Federal Trade
Commission’s Web site:
http://www.ftc.gov/bcp/conline/edcams/spam/
You can probably relate these types of e-mails to the snail-mail junk mail —
credit card offers, product advertisements, and occasional scams — that
you receive in your mailbox at home. Snail-mail junk mail, however, costs
companies and illegal enterprises money in paper, envelopes, and stamps.
E-mail communication is virtually free and allows scammers and spammers
to send messages to thousands or millions of people with just a touch of a
button — just the right ingredients to support illegal, fraudulent, and fake
operations, originating from anywhere in the world.
Problems behind spam and junk e-mail
Besides the fact that spam and junk e-mails are annoying, they can also
cause real problems:
www.it-ebooks.info
http://itbookshub.com/17_275191-bk03ch01.qxp 6/16/08 9:50 PM Page 234
234 Controlling Your Spam or Junk E-Mail
✦ Can contain illegal, adult, and false content: First off, this type of mate-
rial often isn’t appropriate for youngsters — think about your children’s
e-mail accounts — and you may find it offensive as well. Second, scams
are extremely prevalent in spam and junk e-mails. These scams can
range from selling frivolous products to sending you to fake Web sites
that can con you out of money and your identity. The “Protecting Your-
self Against Phishing Scams” section, later in this chapter, gives you
more information on this practice.
✦ Just pressing Delete doesn’t help: You can do nothing to prevent spam/
junk messages and just keep deleting them as they arrive, but they’ll just
keep coming.
✦ Causes extra traffic for all: In addition to the time you’ll spend deleting
your junk messages (if you don’t help prevent them), the messages are
still being sent and delivered to your inbox, which wastes the resources
of our entire e-mail/Internet system.
Preventative measures against
spam and junk e-mail
Besides using spam and junk mail filtering solutions provided by your e-mail
account provider or e-mail software, you can do a few simple things yourself
to help prevent spam altogether:
✦ Don’t publish your e-mail address: If people don’t know your e-mail
address exists, you won’t receive much, or any, spam or junk mail.
Spammers often get e-mail addresses right from Web sites. Similarly to
how Google and other search engines compile their enormous databases
of sites, spammers use automated systems that scan the Web and
extract e-mail addresses. So try not to post your e-mail addresses on
public Web pages, such as discussion forums or social networking sites.
But if you do, you can help prevent spammers from extracting your
address by putting it in a different format to foil programs that search
the Web for e-mail addresses. For example, if your e-mail address is
youraccountdomain.com, you may want to use one of the following
formats (note the use of spaces in the last two):
• youraccountATdomainDOTcom
• youraccount (AT) domain . com
• youraccount AT domain DOT com
Another source of your spam or junk e-mails could be from organiza-
tions selling your address. Large or respected businesses that obtain
your address typically do not sell it, but free Web sites or services that
you’ve signed up for certainly might.
www.it-ebooks.info
http://itbookshub.com/Addressing Internet
Security
17_275191-bk03ch01.qxp 6/16/08 9:50 PM Page 235
235
Controlling Your Spam or Junk E-Mail
✦ Remove yourself from the lists: Unsolicited e-mail is supposed to
include a way for you to remove yourself from further mailings. Some
spam/junk messages follow this rule; others don’t. Those that have a
removal method usually describe it at the bottom of the message, which
usually involves just clicking a link and maybe entering your e-mail
address. Removing yourself from mailings may help your problem (when
you are dealing with a legitimate company); however, in some cases it
may worsen your problem because spammers may use this opting out to
verify that their messages are going to legitimate addresses, and you’ll
end up with more spam messages
✦ Create a secondary account: You may find it necessary to create a sec-
ondary e-mail account that you can make public to post on Web sites
and use for free services. Then you can use another account for corre-
sponding with family, friends, colleagues, and Web sites or places that
you can trust.
Stopping spam when you’ve had enough
If spam and junk e-mails are still an issue after you follow the preventative
measures I cover in previous sections, you may want to use a spam or junk
mail solution. The main types are as follows:
✦ Address filtering: This is the least effective spam solution. When an
Book III
e-mail arrives, the filter checks the sender against your blacklist. If the
Chapter 1
sender is on the list of blocked senders, the filter sends the e-mail to the
spam/junk folder; otherwise, it’s delivered to your regular inbox.
To help the filter do its job, you mark unwanted messages that arrive in
your inbox as spam or junk. These messages are then moved to the
spam/junk folders and the senders are put on your blacklist. The prob-
lem is that spammers usually change their e-mail addresses regularly, so
you may be doing a lot of work for nothing.
✦ Content filtering: Content filters scan your e-mails for words or attrib-
utes that you typically find in spam/junk e-mails. Flagged messages go to
a spam/junk folder instead of your normal inbox. Although content filter-
ing isn’t the best solution, it usually helps. You just have to remember to
regularly check the junk folder for real messages that may have been
flagged for some reason.
✦ Verification: Verification is generally the best solution because your
messages are manually verified by the senders before the messages
reach your inbox.
People who send you e-mail get an automated response right back after
their first e-mail to you (if you haven’t sent them an e-mail in the past),
which tells them that they must verify the message. They usually have
to click a link in the automated message that takes them to a Web page
where they must enter a string of letters or numbers that’s displayed in
www.it-ebooks.info
http://itbookshub.com/17_275191-bk03ch01.qxp 6/16/08 9:50 PM Page 236
236 Protecting Yourself Against Phishing Scams
an image. This process helps ensure that the e-mail is from a real person
rather than an automated mailer.
Most spammers don’t spend time responding to verifications. Unverified
messages are put into a different folder that you may want to check peri-
odically for messages that you may want to read.
Some legitimate senders don’t verify their messages because they’re
sent automatically, such as newsletters, notifications for online accounts,
or other mass mailings. But when you go through your unverified e-mails,
you can authorize those senders’ e-mails from that point on.
When using any spam filter, you should periodically check your spam or
junk folder for e-mails and carefully monitor the situation when you’re
expecting important e-mails.
You can find spam and junk e-mail solutions from a variety of places:
✦ E-mail (Internet) service provider: Your e-mail provider may offer some
sort of spam or junk mail filter.
✦ E-mail client software: You may want to check whether your e-mail
client — for example, Outlook, Thunderbird, or Windows Mail — offers
built-in filtering.
✦ Internet security software: Most Internet security suites include a spam
feature.
✦ Third-party applications or services: A search of Google will probably
give you plenty of results, but here are a few good leads of other applica-
tions or services that help combat spam:
• Spam Arrest: www.Spamarrest.com
• SPAMfighter: www.spamfighter.com
• MailWasher: www.mailwasher.net
• Spamihilator: www.spamihilator.com
Protecting Yourself Against Phishing Scams
Phishing — pronounced like fishing — is the attempt to criminally and fraud-
ulently extract sensitive information from you. You can receive phishing
attempts from e-mail messages, instant messages, and Web pages that you
stumble across on the Web. The people behind these attempts use these
items as their bait, and you are the fish that they hope to catch. In other
words, they hope that you fall for the trick and are fooled into handing them
sensitive information such as
www.it-ebooks.info
http://itbookshub.com/Addressing Internet
Security
17_275191-bk03ch01.qxp 6/16/08 9:50 PM Page 237
237
Protecting Yourself Against Phishing Scams
✦ Account info: Usernames and passwords for e-mail accounts, social net-
working sites, online auction sites, or, more important, financial Web
sites
✦ Credit card info: Your credit card number, verification number, and
billing address
✦ Your identity: Your full personal details, such as your full name,
address, and Social Security number
Additionally, some phishers or scammers may even con you out of some
cash. For example, you may receive an e-mail telling you that you have won a
prize or have inherited money but that you must send a fee of some amount
before your money is turned over to you.
Watch out for imposters
The most popular way phishers catch their prey is to impersonate legitimate
companies. They do this by crafting and sending out e-mail messages that
are formatted just like the ones the real company sends, asking you to update
information and pointing to a Web site that’s also crafted to look just like the
company’s real site. Then the fake or dummy site captures your personal or
login information.
Book III
A list of the types of companies prone to being impersonated and some
Chapter 1
examples of them follows:
✦ Internet service providers: AOL
✦ Auction and payment companies: eBay and PayPal
✦ Financial institutions: National banks and mortgage companies
✦ Government organizations: The Internal Revenue Service
✦ Non-profit organizations: The Red Cross
✦ Social networking sites: MySpace and Facebook
Stories that reel you in
Popular scenarios that phishers use to get you to hand over information
include
✦ Requesting that you update or verify information: They may imitate a
company you have services through and tell you that you need to
update your credit card information.
✦ Selling (legal) drugs: They may say they sell prescription drugs for pen-
nies on the dollar.
www.it-ebooks.info
http://itbookshub.com/17_275191-bk03ch01.qxp 6/16/08 9:50 PM Page 238
238 Protecting Yourself Against Phishing Scams
✦ Informing you of an inheritance of money: Someone may say you’ve
inherited a large sum of money and that you need to hand over personal
information or money to start the collection process.
✦ Announcing that you’re a lottery winner: You may be told you’ve won
a prize or the lottery and be asked for personal information or money.
✦ Requesting donations: You may be asked for donations to some good
cause or another, although your money will actually go to a con artist.
Phishers try to copy a real company’s look and feel in their e-mails and Web
sites, including a company’s logo and sayings.
Spotting the bait of phishers
To help spot phishing scams before you’re reeled in, you can
✦ Examine the Web site address: When imitating a real company, a
phisher usually tries to use a Web site address that won’t look fake at
first glance. They do this using subdomains. For example, say you own
the Web site www.yoursite.com. Scammers can easily create a sub-
domain of paypal.yoursite.com, making it look as though the
address is related to the real www.paypal.com, the Web site for the
popular online payment processing company.
✦ Inspect the Web site: Review the Web site for anything that looks odd.
Or if you suspect the site to be an imitation, look for elements on it that
are different from what you can remember from the real Web site of the
company.
You may also be able to get a clue from links on the Web site. Compare
the links against the Web site address of the Web page you’re on; just
hover over the links to see the address that should appear on the
bottom of your browser. Phishers usually create only a few fake Web
pages, not an entire Web site, so they usually include links on their Web
site that go back to the real Web site of the company. Using these links
may help them fool you into the idea that the site is authentic; however,
these links may also help you recognize the imposture. For instance, say
they told you to go to their fake Web site at paypal.1947395.com
(remember, a subdomain — see the first bullet in this list), but some
links on the Web site point to just paypal.com. This is a red flag.
✦ Look for misspellings: Some phishing e-mails may contain intentional
spelling and grammatical errors to get by spam filters that look for typi-
cal words or phrases of junk messages. Some e-mails may also just have
errors due to poor review.
✦ If it sounds too good to be true: It’s probably fake, period.
✦ Research the company: If you are suspicious of something with a com-
pany you aren’t familiar with, you should do some research. Do some
www.it-ebooks.info
http://itbookshub.com/Addressing Internet
Security
17_275191-bk03ch01.qxp 6/16/08 9:50 PM Page 239
239
Protecting Yourself Against Phishing Scams
searching on Google or your favorite search engine. Consider checking
the BBB (Better Business Bureau) at www.bbb.org.
✦ Contact the company directly: If you think an e-mail or Web site is an
imitation of a real company, contact the company through means other
than those described in the suspicious e-mail or Web page. For instance,
check your bills or statements for the company’s Web site address or
phone number.
Reporting the catch
If you do determine that you’ve received a phishing e-mail, you can report it
to a variety of places:
✦ Company Web site: Go to the real Web site of the company that’s being
mimicked and find where you can report phishing or scam e-mails; these
areas are often called security centers.
✦ Government: You can also report suspicious e-mails to the United States
Computer Emergency Readiness Team (US-CERT) at www.us-cert.gov/
nav/report_phishing.html.
✦ Anti-phishing organizations: Independent organizations also track
phishing e-mails, including the Anti-Phishing Working Group:
Book III
www.antiphishing.org/report_phishing.html
Chapter 1
✦ Friends: Don’t forget about your friends Forwarding them your phishing
e-mail and letting them know about it can help raise awareness of the
issue.
If you think you’ve already been reeled in by a phisher or scammer, you can
report ID theft and fraud to these two government organizations, which can
investigate the crime:
✦ Federal Trade Commission:
www.consumer.gov/idtheft
✦ FBI’s Internet Fraud Complaint Center:
www.ifccfbi.gov/index.asp
Checking for phishing licenses
In addition to watching out for the signs of phishing scams, you can use
phishing detectors. These tools maintain a list of known phishing sites and
alert you if you go to a site on the list. Here are a few places you may be able
to find this feature:
www.it-ebooks.info
http://itbookshub.com/17_275191-bk03ch01.qxp 6/16/08 9:50 PM Page 240
240 Protecting Yourself Against Phishing Scams
✦ Built into Web browsers: Most of the latest versions of the popular Web
browsers (for example, Microsoft Internet Explorer 7 and Mozilla Firefox
2.0) contain this type of anti-phishing feature.
✦ Internet security software: Many Internet security suites also include an
anti-phishing feature.
The Safari 3 Web browser (at the time of this writing) doesn’t include a
phishing filter feature.
Using Internet Explorer’s phishing filter
If you’re using Internet Explorer 7 for your Web browser, here’s how you can
access the settings for the anti-phishing feature:
1. Open Internet Explorer 7.
Choose Tools➪Internet Options.
2.
3. Click the Advanced tab.
4. Find the Phishing Filter setting, shown in Figure 1-6.
Scroll near the bottom of the list, under the Settings section.
Figure 1-6:
The
phishing
settings for
Internet
Explorer 7.
www.it-ebooks.info
http://itbookshub.com/
Advise:Why You Wasting Money in Costly SEO Tools, Use World's Best Free SEO Tool Ubersuggest.