Posts Tagged ‘malware’

Know thy enemy – a glossary of online bad guys – BEACON – Feb 2017

In third grade, my friends and I found a dartboard by the shallow irrigation ditch where we spent all summer keeping cool.

READ COLUMN AS IT APPEARED IN THE BEACON

After we grew tired of throwing the darts into the dartboard, the grass, the walls, etc., we realized that if you throw a dart high into the air, it makes a spark when it hits the pavement. This provided hours of fun—until a dart came back down and stuck neatly into my friend’s little brother’s head, that is. He lived, and we learned a lesson about having siblings nearby when we did stuff like that.

Tools, toys and technology all have something in common: They can all be dangerous if misused. Education can prevent you from becoming a victim of the misuse of technology.

One of the biggest problems to overcome is that negative tech terms are often incorrectly used interchangeably. Here, we’ll define some common terms that are important to know.

Clickbait

Friends on Facebook love sharing articles with headlines like, “15 reasons why you shouldn’t drink water. I did No. 5 this morning!” These stories are written to get you to click on them, because when you do, the site where the story is posted makes money from its advertisers. Clicking on these won’t hurt your computer—it’s just sensationalism for profit.

Hacker

This is a person or group of people who gain remote access to a computer system. It may be done to control the system or to access information stored on the computer.

Hoax

A hoax doesn’t hurt your computer at all, it’s just a lie perpetuated by internet users. It can be dangerous to fall for a hoax, but it’s usually just a waste of time and better to ignore. Nobody’s giving away 15 RVs on Facebook and the government isn’t going to tax email.

Malware

Any type of bad software falls under the malware category. Viruses, ransomware, extortionware, adware and bloatware are all varieties of malware.

Ransomware

This type of malware scrambles all the document and image files on your computer, making it inaccessible until you pay the criminals who created the program whatever money they demand. Hospitals and schools are the most common targets of ransomware.

Scam

A scam is a method used by bad guys to get you to send them money. Scams can be very simple hoaxes that con people out of their money, or complex tricks that fool you into thinking you’re giving money to a good cause.

Virus

There are very few virus-like programs that can take over your computer without your permission and spread to others. Most malware today tricks you into installing it yourself. Before you install an update or agree to download a program, examine it closely. It might be a new type of virus that antivirus programs.

01

07 2017

New Twitter spam tactics

 

 

We are sure that someone has written about this new approach spammers are using on Twitter, but we haven’t seen anything about it.

Twitter spam needs a name so we are going to call it spatter (get it spam+Twitter – not that clever, but at least it’s something).

Twitter filters out spammers by measuring blocked users and also users who post a lot but have few followers. To get around this, spammers are setting up new accounts and posting content that is not spam.

The first hundred or so messages are about food, movies, humorous comments, etc. We assume that they are using content from other Twitterers to create these posts.

Once they have a few posts established, they start following people. Especially those who automatically follow back. Many users do a quick check to see if the user is posting real content or just spatter. Typically users don’t read many of the posts, they check to make sure that all of the posts aren’t made up of sales pitches.

Once the spammer has build up enough of a following, then they unleash their spatter. Typically stuff about how to work from home, porn, or other typical spam material.

To some, a follower is a follower, but eventually this could cause a problem for Twitter as bad guys setup automated systems to let spatter loose throughout the network. This could be one reason that Twitter objects so much to programs that automatically return follows. The more followers a spammer has, the more difficult it will be to distinguish them from legitimate Twitter users.