Search This Blog

Saturday, June 25, 2011

Phishing scam hits some very important Gmail users


Some VIPs who use Gmail — including high-ranking U.S. officials — had their email accounts hacked in a phishing scam that apparently originated from China, Google announced in a blog post on Wednesday.
The “campaign,” as Google called it, affected hundreds of users “including, among others, senior U.S. government officials, Chinese political activists, officials in several Asian countries (predominantly South Korea), military personnel and journalists.”
By Mike Zapler | 1/06/2011 
---------------------------------------------------------------------
Phishing e-mails are e-mails, which can be sent through ordinary email services with intrusion purposes. Users of e-mail services must be aware of this kind of e-mails and don’t provide their private information for hijackers. Let me share my own experience with you. A few months ago I was received an e-mail said “I’m a guy who leaves in a refugee camp, and I’m not able to withdraw my money from my dead father’s account. I need someone from outside help me to transfer some million dollars. I will pay you whenever I come out of this hell. And ….” At that time, fortunately I knew this sort of fraudulence, but I liked to play some steps with the guys to learn how they are going to act. They first started from the emotional aspect to attract me then asked me to send them some verification, which shows my identity to generate trust that they are real (of course I sent them some fake identity information). Finally, they asked me to talk to a lawyer of them and pay some dollars for transfer processes. Thus, be careful gays and don’t trust such kind of e-mails.

Thursday, June 23, 2011

What is spyware?

Despite its name, the term "spyware" doesn't refer to something used by undercover operatives, but rather by the advertising industry. In fact, spyware is also known as "adware." It refers to a category of software that, when installed on your computer, may send you pop-up ads, redirect your browser to certain web sites, or monitor the web sites that you visit. Some extreme, invasive versions of spyware may track exactly what keys you type. Attackers may also use spyware for malicious purposes. 

How can you prevent spyware from installing on your computer?

To avoid unintentionally installing it yourself, follow these good security practices:
  • Don't click on links within pop-up windows - Because pop-up windows are often a product of spyware, clicking on the window may install spyware software on your computer. To close the pop-up window, click on the "X" icon in the titlebar instead of a "close" link within the window.
  • Choose "no" when asked unexpected questions - Be wary of unexpected dialog boxes asking whether you want to run a particular program or perform another type of task. Always select "no" or "cancel," or close the dialog box by clicking the "X" icon in the titlebar.
  • Be wary of free downloadable software - There are many sites that offer customized toolbars or other features that appeal to users. Don't download programs from sites you don't trust, and realize that you may be exposing your computer to spyware by downloading some of these programs.
  • Don't follow email links claiming to offer anti-spyware software - Like email viruses, the links may serve the opposite purpose and actually install the spyware it claims to be eliminating.
Source: us-cert.gov

Cyber Security


Cyber Law in Malaysia


The Malaysian Government has enacted several set of regulations to deal with the problems and crimes which related to networked information devices and also technologies. It is called as cyber laws. The government had taken an early step which is in 1997, by providing an inclusive framework of societal and commerce-enabling laws which cover aspects regarding security of information and network reliability. There are six cyber laws that have been passed, which are:
Telemedicine Act 1997
It is an act to provide for the regulation and control of the practices or the application of telemedicine in Malaysia and anything related to it.
Digital Signature Act 1997
This act was enforced in 1st October 1998. It is an act legalizes the legal recognition and authentication of the creator of an electronic document. The target of this act is actually to promote the processing of transactions such as commercial transactions through digital signatures.
The Copyright (Amendment) Act 1997
Copyright protection in our country is governed by the Copyright Act 1987. It provides a very sufficient protection for copyrightable works. The copyrightable works includes computer software. But then, as the world of Information technology developed, it has challenged the traditional concept of copyright protection. Because of that, the Amendment Act comes into force, which amended the Copyright Act 1987. This Act seeks to update the law on copyright. As a sum-up this particular act provides the copyright protection on-line.
Computer Crimes Act 1997
This act is enacted in order to impose penalties on fraudulent, dishonest acts and misuse of computer which can be considered as crime, either it is committed outside of the country. It deals with unauthorized access, unauthorized access to commit further offenses and unauthorized modification. There is also a provision to make possible investigations for the enforcement of the Act. The Act elaborates about the crimes and also provides the punishments. Usually the use of this act will be also referred to the traditional act, Penal Code.
Communications and Multimedia Act 1998
This is most important legislation which enforced on the 1st April 1999. The legislation concerned about the policy, regulatory framework for convergence of the telecommunications, broadcasting and computer industries.
Malaysian Communications and Multimedia Commission Act 1998
It is an Act to provide for the establishment of the Malaysian Communications and Multimedia Commission, with powers to supervise and regulate the communications and multimedia activities in Malaysia and to enforce the communications and multimedia laws of Malaysia, and for related matters. (Accordance to the act itself)
source: http://computer-evidence.blogspot.com
This weblog is created for the purposes of assignment for the subject BYL 7134, Cyberlaw by Faculty of Management, Multimedia University (MMU), Malaysia. The materials posted on this weblog are for the purposes of the assignment as well as study and non-profit research only. Appropriate acknowledgements to the materials that do not belong to the weblog owner have been publicly made. If you are the author or a copyright or a trademark owner of any of the articles or images or graphics or pictures or any material posted in this weblog herein and you object to such posting on any grounds, including copyright or trademark infringement, please contact me and I will take your material down. I state herein that I am relying on the doctrine of fair use.

Proposal Statement

Nowadays, the internet and online activities are growing exponentially and besides attacks on the cyber networks has also had growth. Thus, security is become one of the most serious issues, which affect economic and national activities. This weblog is trying to provide news, e-security issues, and other useful information over online environment. The author hopes this information would help creating insights around web security and aware of potential threats which anyone may be faced in cyber area.