KUALA LUMPUR: In the age of information and communications technology, where an increasing amount of transactions happen in cyberspace, Internet users need to remain a step ahead of scammers.
They need to be extra careful to not download unknown software and applications, and to never open attachments from unknown senders, while exercising caution when performing online transactions.
This advice comes from Anthony Ung, country manager for SouthEast Asia for network antivirus and content security expert Trend Micro Inc.
"People can do anything online, from shopping to paying bills and conducting business transactions. "You don't have to prove who you are. As long as you have a credit card number, a (personal) indentification number and password, you can buy or download anything," he said.
According to him, identity theft or "phishing" and other computer security issues that can harm your reputation or that of others, are things to watch out for.
Phishing, he said, tricks victims into revealing personal information, which is then used to raid bank accounts, ring up credit card charges and apply for monetary loans.
He said phising scams arrive via e-mail and appear to originate from a legitimate organisation or agency, such as the Inland Revenue Board (IRB).
"The cybercriminals create a fake website which looks just like the original website of the IRB and spread it via e-mail with blank subject lines.
"Instead of using the e-mail address irb.com, they could use 1rb.com, for example. This happens especially when the deadline for filing income tax returns is looming.
"When you are rushing to submit your income tax form, you don't realise that "i" looks like "l." You just click, key in your password and identification number, put in all the data and send it.
"While you think you have submitted the file, it actually goes to the fake website," he said.
In a blur
Ung said most people are still unaware that cybercriminals use e-mail and fake websites to steal money and identities.
He said social networking sites are also popular with cybercriminals, to trick people into divulging personal information or downloading software onto their computers.
"Take Facebook, Google or Yahoo! e-mail systems, for example. Everytime you type your password and identification, the cybercriminals can also log in. When your the computer is not in use or busy, they go to your account and see what information you have. They then use it for something else, pretending to be you.
"Another thing is scams. You may receive an e-mail stating that you have won a lottery or were selected randomly for the prize. They will then request a fee to be paid upfront in order to get the prize. Of course, you will not see your money again, or the prize," Ung said.
To protect themselves from online scams, he said, Internet users are advised to change their identification and password every month, stop opening spam that tries to evade filters by delivering an image instead of just text, and to install anti-spyware technology.
Trend Micro is a global leader with more than two decades of expertise in endpoint, messaging and web security.
It has come up with a solution called Internet Security Pro 2010 for comprehensive protection against viruses, worms, trojans and hackers. It also detects and removes spyware, and blocks spam.
The software includes a firewall, system tuner, remote field lock utility and smartphone protection. It is easy to install and use, and offers good protection while surfing the Internet, the vendor claimed. - Bernama
No comments:
Post a Comment