April 25, 2024

Bucks Blog: Tips on Avoiding Phishing Frauds

I consider myself fairly cautious about Internet security, but I was still nearly caught off guard by a phishing effort aimed at me a couple of years ago.

I had gone online, as I routinely do, to check my bank account balance, and make sure nothing looked amiss. I logged out and returned to my work. A few minutes later, I received an e-mail — apparently, from my bank.

The message had my bank’s logo, and said the bank was following up on a possible problem with a transaction. Could I please reply, it asked, with some additional information?

Normally, I would immediately delete such an e-mail — but I had been online with my bank just minutes before. Could it be a coincidence? I hesitated, and decided to contact my bank directly to check. It turned out that the e-mail wasn’t from my bank, but most likely from some sort of fraudulent outfit trying to get information to obtain access to my account.

Such ploys are known as “phishing,” in which fraud artists pose as legitimate companies to try to get you to reveal important personal information, like account numbers, passwords or even your Social Security number. Such information can be used to get into your accounts, or create fake identities to apply for credit in your name.

Since I got the suspicious e-mail, phishing attempts have become more sophisticated, according to the Consumer Federation of America. The fraud artists are now better at aiming their efforts. Instead of sending e-mails randomly, they may look for an employee’s e-mail address on a company Web site and send messages that appear to be from the employer.

The federation, with backing from Visa, has put together an updated tip sheet on how to avoid phishing scams.

Tips include these:

– If you are contacted by someone asking for personal or account information, think about why they would need it. If it’s an organization you already doing business with, they should already have such information.

– Be wary of clicking on links or attachments in unsolicited e-mails. The links could take you to a rogue Web site, in an effort to have you enter personal information.

– Watch out for phishing by phone, in which callers ask you for personal information for illegitimate purposes.

Visa also offers advice about identifying fraudulent e-mails on its “Fraud News” site.

For examples of phishing e-mails, you can go to Cornell University’s “Phish Bowl” Web site.

Have you ever received an e-mail that seemed to be a phishing effort? What happened?

Article source: http://bucks.blogs.nytimes.com/2013/05/20/tips-on-avoiding-phishing-frauds/?partner=rss&emc=rss

Bucks Blog: Thursday Reading: Jeans Tight? Blame the ‘Sandy Five’ Weight Gain

November 08

Thursday Reading: Jeans Tight? Blame the ‘Sandy Five’ Weight Gain

Blaming Hurricane Sandy for those tight jeans, devising passwords that drive hackers away, the pay-as-you-go remodel and other consumer-focused news from The New York Times.

Article source: http://bucks.blogs.nytimes.com/2012/11/08/thursday-reading-jeans-tight-blame-the-sandy-five-weight-gain/?partner=rss&emc=rss

Bits Blog: Behind I.B.M.’s Big Predictions

Suzanne DeChillo/The New York Times

I.B.M. just issued its annual list of five predictions of developments in technology that it thinks will come true in the next five years. Like lots of predictive lists, particularly those that come around New Year’s, this is something of a pseudo-event that serves as an advertisement for the predictor’s own product or service. I.B.M.’s is no different in that regard, but it is worth looking at, both for the pedigree of who is doing the predicting, and what I.B.M.’s choices say about itself.

“To predict the next five years, you have to have a deep understanding of the last 50,” said Bernie Meyerson, vice president of innovation at I.B.M., and a highly regarded researcher in advanced microprocessor design and computer systems who oversees the list’s creation.

And so here are the predictions:

– Small amounts of energy created by actions like people walking or water moving through pipes will be captured, stored in batteries  and used to power things like phones, cars or homes. “You’ll see new ecosystems of generation and capture,” Mr. Meyerson said. “You generate 60 to 65 watts while walking. You could easily use that to power a phone forever.”

– There will be no more passwords, as increasingly powerful phones and sensors will store your personal biometric information, enabling machines to automatically know you are who you say you are.

– Better sensors on and inside the human brain will allow for mental control of objects. Already there are experiments involving moving cursors by thinking, but his prediction is that technology will go further. “You will observe thought patterns, which are highly personal,” he said. “You can use this to better understand stroke, or disorders like autism.”

– Powerful mobile devices, capable of precise language translation, will belong to 80 percent of the world’s population. While this is nearly intuitive, given the ever-lower cost of phones, the real breakthrough will be ubiquitous voice recognition and translation capabilities, which will make the phones highly useful to large populations who are illiterate, or who have languages that aren’t easily written with keypads.

(A question is: What would this mean for world markets and politics when ordinary people can easily communicate with each other despite speaking different languages?)

– Much the way powerful mobile devices store your biometric information and translate your language, personalized information filters and search engines will bring you only the information you want. “This will invert the premise of marketing,” Mr. Meyerson said. The phones “will start to be your advocate, recognizing what is near and dear to you and getting it. Instead of companies speaking to you, you will reach out to companies.”

While I.B.M. is conducting research in all of these areas, it makes neither phones, games nor commercial batteries. Why, then, should it be predicting the advent of such magic-seeming devices for the commercial periphery?

The most likely reason is that I.B.M. makes the software and services for the core networks without which all these devices would not function, commercially. If Mr. Meyerson’s ideas play out, the phones and sensors will do their magic only by interaction with an Internet almost unimaginably more complex than the one we have today. Few companies in the world will be able to engineer and run it at a large scale, and I.B.M. would almost certainly be one.

“With devices like this at the edge of the network, at the core you will need to have machines that can manage 30,000 complex commands a second and yawn,” Mr. Meyerson said. “We’ve spent over $15 billion buying analytics companies in the last five to seven years. It is a huge investment that has given us deep, deep scientific and technical skills that go way beyond the businesses these companies were in.”

I.B.M. is said to have over 300 people working just on the advanced math needed to make this much complexity something like a well-integrated whole. If its predictions come true, I.B.M. may need many more people than that.

Article source: http://feeds.nytimes.com/click.phdo?i=34d313fe704ec5807f92b7d22c24091f

4 in Philippines Accused of Hacking U.S. Phones to Aid Terrorists

A statement from the Philippines Criminal Investigation and Detection Group, a law enforcement agency, said three men and one woman had been arrested in raids across the capital, Manila, last week.

According to the agency, the men were working with a group called Jemaah Islamiyah, a terrorist group linked to Al Qaeda and responsible for the 2002 bombings in Bali, which killed 202 people.

The group has been held responsible for several other terrorist attacks in Southeast Asia, mostly in Indonesia but including the Philippines.

If the new accusation holds up, it would point to a troubling connection between hackers and terrorist cells.

The Federal Bureau of Investigation said on Saturday that it was working with the police in the Philippines on the investigation into the telephone hacking effort, which apparently began as early as 2009.

The suspects remotely gained access to the telephone operating systems of an unspecified number of ATT clients and used them to call telephone numbers that passed on revenues to the suspects.

ATT said it reimbursed its customers for the charges. It said in a statement that “its network were neither targeted nor breached by the hackers.”

The company declined to say how many business customers were affected, nor how much it cost ATT. The Philippines police agency’s statement said the scheme cost $2 million. It is known as a “remote toll fraud” and singles out telephone accounts that are protected by weak passwords.

Article source: http://feeds.nytimes.com/click.phdo?i=f0cf359ace522d60654177519a9f1f42

Bucks: Out of Office: Call Bernanke in Case of Emergency

June 13

Monday Reading: How to Avoid Credit Card Problems Abroad

How to avoid credit card problems when traveling abroad, safeguarding your passwords, the new iTunes and other consumer-focused news from The New York Times.

Article source: http://feeds.nytimes.com/click.phdo?i=1358e9e88166ce724666b141e261d4f6

Bucks: Monday Reading: How to Avoid Credit Card Problems Abroad

June 13

Monday Reading: How to Avoid Credit Card Problems Abroad

How to avoid credit card problems when traveling abroad, safeguarding your passwords, the new iTunes and other consumer-focused news from The New York Times.

Article source: http://feeds.nytimes.com/click.phdo?i=3c7f8b8e526f21e0e6c17f9a85619998