Kesar Tech

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Friday, 16 November 2012

What is the difference between: Spam, Phishing and Spoofing

Posted on 07:37 by Unknown
Hello and welcome to another installment of the Kesar Tech blog. I have received several emails asking what the difference between Spam, Phishing, & Spoofing is? Here is what I found out.

Spam

Also known as unsolicited bulk e-mail messages or any email messages irrespective of content that is unwanted or unrequested by the recipient. Spam messages are mostly commercial advertising, although chain letters, political mailings and other forms of non-commercial mailings are often included under the same categorization. A large portion of spam has also been found to be comprised of ads for products of dubious quality and services of questionable legality.

There are two types of spam: intentional and unintentional.
  • Intentional spam comes from spammers who are soliciting products or attempting to commit fraud.
  • Unintentional spam originates from computers that are infected with a virus or worm that activates e-mail distribution processes in the background. The virus or worm attempts to send bulk messages from the infected computer without the awareness of the computer owner.


Phishing
Phishing is a special type of spam that is intended to trick you into entering your personal or account information for the purpose of breaching your account and committing identity theft or fraud.
Typically, a false e-mail message is delivered to you. The e-mail appears to come from a legitimate source, for example eBay, your bank, government departments etc. The message may contain a legitimate corporation's logo, and appear to be sent from the corporation's e-mail address. The message may ask you to click a link in the message to update your account, or run a software program to upgrade your computer.
Although the message looks legitimate, it is really trying to compel you to submit your personal and confidential information, which will be used to steal your credentials. Normally you are asked to enter information such as your name, date of birth, place of birth, social security number, mother's maiden name, bank account number, and bank account PIN. Web sites that are frequently spoofed by phishers include PayPal, eBay, MSN, Yahoo, BestBuy, and America Online.


Spoofing

Spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source. Spoofing is often used by spammers and can be accomplished by changing your "FROM" e-mail address.
E-mail spoofing may occur in different forms, but all have a similar result: a user receives email that appears to have originated from one source when it actually was sent from another source. E-mail spoofing is often an attempt to trick the user into making a damaging statement or releasing sensitive information, such as a password. E-mail spammers often use spoofing in an attempt to get recipients to open, and possibly even respond to, their solicitations.
To send spoofed e-mail, senders insert commands in headers that will alter message information. It is possible to send a message that appears to be from anyone, anywhere, saying whatever the sender wants it to say. Thus, someone could send spoofed e-mail that appears to be from you with a message that you didn't write.

I know this is a lot of information, but I hope it helps.
As always, keep your questions & comments coming.
Read More
Posted in Informative | No comments

Wednesday, 14 November 2012

Fake phone call from Microsoft

Posted on 07:20 by Unknown
The following is an email that I received and responded to. This is the second time in a month that I have had to address this phone scam. As you will read, someone posing as a Microsoft rep. calls the house and says you are loaded with viruses and they need access to your pc to clean it up. You are given a web address to go to and they will “take care of the rest.” As far as I can tell, this is a scam to get control of your pc and steal personal info. Bill Gates & Microsoft have much more important stuff to do then let you know you have a virus. Be on the look out for this and don’t become a victim.



“IT'S A SCAM!!! A friend of mine's daughter got the same phone call in South
Carolina about a moth ago.
As far as I can figure out, they want you to give them access to your pc.
Probably to steal any personal info you have stored on it.
Microsoft has no way, that I know of, to monitor your system. Even if they
did, I really don't think they are going to call you about a virus.
You did the right thing by not giving him any info.
Defender is most likely off because of Comodo. It should give you the
option to turn it back on.
FYI: I think you have Vista & not Windows 7 or 8.
Hope this helps.

Keith”

-----Original Message-----
To:

Kesartech@live.com
Subject: weird phone call.

“New question I just got a phone call from someone (India sounding)
saying I have a virus on the Windows program . He wanted me to turn on
my computer and he would lead me through fixing it. I checked the *69
and could not get the number that called me. I did tell him I had no way
to know who I was talking to or to prove he was legal nor did I get a
letter form Microsoft. I checked and Microsoft defender is off is this
because I have comodo? He had my name and knew I had windows, I do not
remember if he knew I had 7 or 8.”

Read More
Posted in Informative | No comments

Saturday, 10 November 2012

Barnes & Noble pulls PIN pads after fraud ring hits stores

Posted on 09:09 by Unknown

Have you used a credit or debt card at Barnes Noble lately? If so, read this article.

http://www.scmagazine.com/barnes-noble-pulls-pin-pads-after-fraud-ring-hits-stores/article/265235/
Read More
Posted in Informative | No comments
Newer Posts Older Posts Home
Subscribe to: Comments (Atom)

Popular Posts

  • I need your help.
    Hello and thanks for tuning in for another episode of the Kesar Tech blog. Today I would like to go in a little bit of a different directi...
  • 10 Reasons to Root Your Android Device
    Hello & Happy New Year. For those of you with Android devices, here is a way to take control of your device. It's called "Rooti...
  • Belarc Advisor
    This entry is to explain what the Belarc Advisor link on this page is for. Belarc's products automatically create an accurate and up-to-...
  • How do you get infected with malware?
    The answer to the above question is: Social engineering! Several people have asked me this very question, so to you guys, here is your answe...
  • Welcome
    Let me first start by saying, I am by no means an expert at writing, so you will probably find many grammatical errors and maybe even a spel...
  • Extortionware / Rogue Security Software / Malware
    You may not be familiar with the terms ‘rogue software, extortionware, or malware’ but there’s a very good chance that you or someone you kn...
  • Cell phone privacy reminder
    Cell phone numbers became public in March, and telemarketing companies can now call you on your cell. If you do not want to receive these ca...
  • Banking Scam
    Hello Everyone, I received the following scam email in my junk email account today. Many thing alerted me that this was false. * I have a Ch...
  • Free Download F-Secure Anti-Theft for Mobile 6.2
    Are you worried about your mobile phone being stolen and all your info (contacts, account info, etc..) being used for evil? Have no fear F-S...
  • Beware of Christmas scams
    Scammers absolutely love the holiday season. There are likely to be more online scam victims during those busy shopping and travelling Decem...

Categories

  • Facebook
  • Informative
  • Other
  • Security

Blog Archive

  • ►  2014 (1)
    • ►  January (1)
  • ►  2013 (14)
    • ►  December (6)
    • ►  November (3)
    • ►  October (1)
    • ►  September (1)
    • ►  August (1)
    • ►  June (1)
    • ►  April (1)
  • ▼  2012 (20)
    • ▼  November (3)
      • What is the difference between: Spam, Phishing and...
      • Fake phone call from Microsoft
      • Barnes & Noble pulls PIN pads after fraud ring hit...
    • ►  October (1)
    • ►  September (1)
    • ►  August (3)
    • ►  July (1)
    • ►  May (3)
    • ►  April (3)
    • ►  March (2)
    • ►  February (2)
    • ►  January (1)
  • ►  2011 (48)
    • ►  December (3)
    • ►  November (4)
    • ►  October (2)
    • ►  September (2)
    • ►  August (4)
    • ►  July (1)
    • ►  June (8)
    • ►  May (3)
    • ►  April (6)
    • ►  March (9)
    • ►  February (3)
    • ►  January (3)
  • ►  2010 (32)
    • ►  December (5)
    • ►  November (2)
    • ►  October (2)
    • ►  September (2)
    • ►  August (2)
    • ►  July (1)
    • ►  June (2)
    • ►  May (2)
    • ►  April (3)
    • ►  March (2)
    • ►  February (4)
    • ►  January (5)
Powered by Blogger.

About Me

Unknown
View my complete profile