[4580] in Security FYI

home help back first fref pref prev next nref lref last post

[IS&T Security-FYI] SFYI Newsletter, April 29, 2013

daemon@ATHENA.MIT.EDU (Monique Yeaton)
Mon Apr 29 17:24:14 2013

Resent-From: ist-security-fyi@mit.edu
From: Monique Yeaton <myeaton@mit.edu>
To: ist-security-fyi <ist-security-fyi@mit.edu>
Date: Mon, 29 Apr 2013 21:22:02 +0000
Message-ID: <3ACED3B2A8CEFB4598A845F07FD4A05F25372B12@OC11EXPO24.exchange.mit.edu>
Content-Language: en-US
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="===============2004896614=="
Errors-To: ist-security-fyi-bounces@mit.edu

--===============2004896614==
Content-Language: en-US
Content-Type: multipart/alternative;
	boundary="_000_3ACED3B2A8CEFB4598A845F07FD4A05F25372B12OC11EXPO24excha_"

--_000_3ACED3B2A8CEFB4598A845F07FD4A05F25372B12OC11EXPO24excha_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

In this issue:


1. Fraud Statistics That May Surprise You

2. Protecting Your Twitter Account



-------------------------------------------------------

1. Fraud Statistics That May Surprise You

-------------------------------------------------------


Fraud is nothing new. Scammers have been attempting to trick consumers into=
 spending money on fake (or non-existent) products for a long time.


However, what IS new is how we are getting scammed. Did you know that one t=
hird of people who reported being scammed first learned of the fake pitch o=
nline? The other sources are print ads, TV and radio, and telemarketing cal=
ls. When you consider that fraud harms 25.6 million people in the U.S. in o=
ne year (from a survey done in 2011), that adds up to a lot of people. That=
's about one in every 10 adults in the U.S.


Learn more about the survey done by the Federal Trade Commission here<http:=
//www.business.ftc.gov/blog/2013/04/fraud-harms-256-million-people-anyone-y=
ou-know>.


Are you one of those affected? Learn how you can avoid or report fraud<http=
://www.consumer.ftc.gov/articles/0060-10-ways-avoid-fraud>.



---------------------------------------------

2. Protecting Your Twitter Account

---------------------------------------------


Last week a group called the Syrian Electronic Army hijacked the Twitter ac=
count of the Associated Press and sent out an erroneous message reporting e=
xplosions at the White House that injured President Obama.


Moments later it was confirmed that the Twitter account had been hacked and=
 the president was unharmed. Twitter suspended the account, but by then the=
 post had moved markets. The Dow Jones Industrial average plummeted by 150 =
points and then surged back.


The AP's account is the sixth prominent Twitter account to be hacked in rec=
ent months, according to the New York Times<http://thecaucus.blogs.nytimes.=
com/2013/04/23/hacked-a-p-twitter-feed-sends-erroneous-message-about-explos=
ions-at-white-house/>.


This causes some concern about the security measures put in place to protec=
t Twitter accounts, especially those with high profiles. The info graphic i=
n this article<http://www.mediabistro.com/alltwitter/twitter-hackers_b14222=
> shows just how dangerous hacking can be when a news source that is truste=
d has been targeted by hackers.


Learn how to protect your Twitter account by following these five tips<http=
://www.mediabistro.com/alltwitter/protecting-your-twitter-account_b40607>:


  1.  Create unique passwords across all your social accounts. How strong a=
re your passwords<http://kb.mit.edu/confluence/x/3wNt>?
  2.  Monitor your third-party apps.
  3.  Don't click on links from people you don't know.
  4.  Update your computer and operating system as well as your anti-virus =
software.
  5.  Sign out when done, especially on public computers.


Know what to do if your account has already been hacked<http://www.computer=
world.com/s/article/9238693/How_to_Recover_From_a_Twitter_Hack?taxonomyId=
=3D17>.



=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D

Read all Security FYI Newsletter articles and submit comments online at htt=
p://securityfyi.wordpress.com/.

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D

Monique Yeaton
IT Security Communications Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://ist.mit.edu/security



--_000_3ACED3B2A8CEFB4598A845F07FD4A05F25372B12OC11EXPO24excha_
Content-Type: text/html; charset="us-ascii"
Content-ID: <F601A274D827104FAA7B6B989E6A43E4@exchange.mit.edu>
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
</head>
<body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-lin=
e-break: after-white-space; color: rgb(0, 0, 0); font-size: 14px; font-fami=
ly: Garamond, sans-serif; ">
<div>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; ">In thi=
s issue:</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">1. Fraud Statistics That=
 May Surprise You</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">2. Protecting Your Twitt=
er Account</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">------------------------=
-------------------------------</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">1. Fraud Statistics That=
 May Surprise You</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">------------------------=
-------------------------------</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">Fraud is nothing new. Sc=
ammers have been attempting to trick consumers into spending money on fake =
(or non-existent) products for a long time.&nbsp;</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">However, what IS new is =
how we are getting scammed. Did you know that one third of people who repor=
ted being scammed first learned of the fake pitch online? The other sources=
 are print ads, TV and radio, and
 telemarketing calls. When you consider that fraud harms 25.6 million peopl=
e in the U.S. in one year (from a survey done in 2011), that adds up to a l=
ot of people. That's about one in every 10 adults in the U.S.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">Learn more about the sur=
vey done by the Federal Trade Commission
<a href=3D"http://www.business.ftc.gov/blog/2013/04/fraud-harms-256-million=
-people-anyone-you-know">
here</a>.&nbsp;</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">Are you one of those aff=
ected? Learn how you can
<a href=3D"http://www.consumer.ftc.gov/articles/0060-10-ways-avoid-fraud">a=
void or report fraud</a>.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">------------------------=
---------------------</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">2. Protecting Your Twitt=
er Account</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">------------------------=
---------------------</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">Last week a group called=
 the Syrian Electronic Army hijacked the Twitter account of the Associated =
Press and sent out an erroneous message reporting explosions at the White H=
ouse that injured President Obama.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">Moments later it was con=
firmed that the Twitter account had been hacked and the president was unhar=
med. Twitter suspended the account, but by then the post had moved markets.=
 The Dow Jones Industrial average
 plummeted by 150 points and then surged back.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">The AP's account is the =
sixth prominent Twitter account to be hacked in recent months,
<a href=3D"http://thecaucus.blogs.nytimes.com/2013/04/23/hacked-a-p-twitter=
-feed-sends-erroneous-message-about-explosions-at-white-house/">
according to the New York Times</a>.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">This causes some concern=
 about the security measures put in place to protect Twitter accounts, espe=
cially those with high profiles. The
<a href=3D"http://www.mediabistro.com/alltwitter/twitter-hackers_b14222">in=
fo graphic in this article</a> shows just how dangerous hacking can be when=
 a news source that is trusted has been targeted by hackers.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">Learn how to protect you=
r Twitter account by following
<a href=3D"http://www.mediabistro.com/alltwitter/protecting-your-twitter-ac=
count_b40607">
these five tips</a>:</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<ol>
<li style=3D"margin: 0px; font-family: Helvetica; ">Create unique passwords=
 across all your social accounts.
<a href=3D"http://kb.mit.edu/confluence/x/3wNt">How strong are your passwor=
ds</a>? </li><li style=3D"margin: 0px; font-family: Helvetica; ">Monitor yo=
ur third-party apps. </li><li style=3D"margin: 0px; font-family: Helvetica;=
 ">Don't click on links from people you don't know.
</li><li style=3D"margin: 0px; font-family: Helvetica; ">Update your comput=
er and operating system as well as your anti-virus software.
</li><li style=3D"margin: 0px; font-family: Helvetica; ">Sign out when done=
, especially on public computers.
</li></ol>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; ">Know what to do <a href=
=3D"http://www.computerworld.com/s/article/9238693/How_to_Recover_From_a_Tw=
itter_Hack?taxonomyId=3D17">
if your account has already been hacked</a>.</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "><br>
</p>
<p style=3D"margin: 0px; font-family: Helvetica; min-height: 17px; "></p>
<p style=3D"margin: 0px; font-family: Arial; ">=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D</p=
>
<p style=3D"margin: 0px; font-family: Arial; ">Read all Security FYI Newsle=
tter articles and submit comments&nbsp;online&nbsp;at
<a href=3D"http://securityfyi.wordpress.com/">http://securityfyi.wordpress.=
com/</a>.</p>
<p style=3D"margin: 0px; font-family: Arial; ">=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D</p=
>
<p></p>
</div>
<div><span class=3D"Apple-style-span" style=3D"border-collapse: separate; f=
ont-family: Calibri; font-size: medium; border-spacing: 0px; "><span class=
=3D"Apple-style-span" style=3D"border-collapse: separate; border-spacing: 0=
px; font-family: Helvetica; font-size: 14px; ">
<div style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line=
-break: after-white-space; ">
<span class=3D"Apple-style-span" style=3D"border-collapse: separate; border=
-spacing: 0px; "><span class=3D"Apple-style-span" style=3D"border-collapse:=
 separate; border-spacing: 0px; "><span class=3D"Apple-style-span" style=3D=
"border-collapse: separate; border-spacing: 0px; "><span class=3D"Apple-sty=
le-span" style=3D"border-collapse: separate; border-spacing: 0px; "><span c=
lass=3D"Apple-style-span" style=3D"border-collapse: separate; border-spacin=
g: 0px; "><span class=3D"Apple-style-span" style=3D"border-collapse: separa=
te; border-spacing: 0px; font-size: 12px; ">
<div><br>
</div>
<div>Monique Yeaton</div>
<div>IT Security Communications Consultant</div>
<div>MIT Information Services &amp; Technology (IS&amp;T)</div>
<div>(617) 253-2715</div>
<div>http://ist.mit.edu/security</div>
<div><br class=3D"khtml-block-placeholder">
</div>
<br class=3D"Apple-interchange-newline">
</span></span></span></span></span></span></div>
</span></span></div>
</body>
</html>

--_000_3ACED3B2A8CEFB4598A845F07FD4A05F25372B12OC11EXPO24excha_--

--===============2004896614==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
ist-security-fyi mailing list
ist-security-fyi@mit.edu
To Unsubscribe http://mailman.mit.edu/mailman/listinfo/ist-security-fyi
--===============2004896614==--

home help back first fref pref prev next nref lref last post