MyCRA Specialist Credit Repair Lawyers

Tag: malware

  • ‘TAX REFUND NOTIFICATION’ Don’t get caught out with this scam at tax time.

    tax refund notificationA high priority alert has just been issued from Stay Smart Online in regards to malware-carrying emails supposedly from the Australian Taxation Office, which could send your credit file into the doghouse. Most people who regularly read this blog will probably be well aware of the high prevalence of scam emails designed to capture your financial details either directly or through malware. They would also be well aware of the dangers that can pose for your ability to obtain credit in your own right if fraudsters steal your identity and pose as you to take out credit in your name. But we feel it is important to remain vigilant in warning the community when such emails are on the increase. They could just catch out someone you know. So we look at the details on this email and its variants, and what dangers it poses for the financial information of ordinary Australians.

     

    By Graham Doessel, Founder and CEO of MyCRA Credit Rating Repair and www.fixmybadcredit.com.au.

    Today Stay Smart Online (the government’s online safety website) issued a warning about cyber criminals taking advantage of the upcoming tax deadline for filing tax returns by launching thousands of scam emails. The emails are purporting to be from the ATO, but contain malware which can steal your personal information.

    Security firm Bitdefender reported the detection of three email spam campaigns in late July and early August that saw up to 10,000 spam emails sent on 6 August. This surpassed the 3,000 messages sent on 23 July and the 5,000 messages sent on 15 July.

    “This sort of malicious outbreak is expected to continue heavier and more targeted as the tax time approaches its deadline in October,” a Bitdefender advisory warned. “Attackers hope their targets are too concerned with their financial duties to double check the sender’s address and discover the con.”

    If your system is infected by the malware in these messages, private data such as passwords and logins for financial institutions can be stolen and distributed to cyber criminals who will exploit it for financial gain.

    If your computer becomes infected, not only can personal information be stolen, but malware may force the computer to join a global ‘botnet’ that uses thousands of slave computers to distribute further malware-laden emails—or it might take part in distributed denial of service (DDoS) attacks. Among other things, this can seriously reduce the effective speed of a home Internet connection.

    What the emails look like…

    Most common spam emails

    ‘Australian Taxation Office – Refund Notification’, with body text including ‘TAX REFUND NOTIFICATION’. It instructs you to open an attachment called ‘ATO_TAX_pokeefe.zip’ or similar. The attachment is typically malware.

    ‘New information regarding lodgement’ and suggests that the ATO has been attempting to refund a payment to “the credit card we have on file.” Recipients are advised to log into an ‘e-portal’ to receive the refund manually, and that “during the payment process you will be given the opportunity to update the credit card that is on record.”

    Important Information…

    The ATO will never ask for such information via email. Any email that requests additional information before a refund can be released is a hoax.

    If you receive a message like this, do not under any circumstances open the attachment. Delete the message immediately. Never open attachments that arrive with these sorts of messages.

     

    Identity theft and your credit file

    Identity theft can lead to fraud, and can affect your credit file. It often goes undetected until the victim applies for credit and is refused.

    Any kind of credit account (from mortgages and credit cards through to mobile phone accounts) which remains unpaid past 60 days can be listed as a default by creditors on the victim’s credit rating, and those defaults remain there for 5 years.

    The consequence of people having a black mark on their credit rating is generally an inability to obtain credit.  Most of the major banks refuse credit to people who have defaults, or even too many credit enquiries, so it is really essential to keep a clean credit record.

    If you think your identity has been stolen, or that your personal information has been compromised there are three things you should do to protect your credit file:

    1. Contact Police immediately

    2. Contact the credit reporting agencies which hold your credit file.

    3. Contact your Credit Providers – especially financial institutions.

    If you think your tax file number has been stolen, you can visit the ATO’s Client Identity Support Centre for more help. They also give comprehensive advice on what to do in different situations of theft of your personal information.

    By law in Australia, if a listing contains inconsistencies the credit file holder has the right to negotiate their amendment or removal.

    But to clear their good name, the identity theft victim needs to prove to creditors they did not initiate the credit – which can be difficult. Not only are victims generally required to produce police reports, but large amounts of documentary evidence to substantiate to creditors the case of identity theft.

    Contact www.mycra.com.au for more details on credit repair following identity theft.

    Image: Stuart Miles/ www.FreeDigitalPhotos.net

  • Cyber-safety and financial identity: 5 reasons why parents need to be cyber-savvy.

    Media Release

    child internet useCyber-safety and financial identity: 5 reasons why parents need to be cyber-savvy.

    8 August 2013

    A credit expert is urging parents to focus on maintaining a dialogue with their children and get themselves up to speed with technology, in order to best prevent families from falling prey to the internet’s financial predators.

    CEO of MyCRA Credit Rating Repair, Graham Doessel says no parent should be complacent when it comes to their child’s internet use, particularly when they’re engaging in social networking.

    “At any age, we can be at risk of sharing too much information, adding suspect friends, downloading malware and falling for scams – all of which can threaten the integrity of not only our finances as parents – but for children, potentially their financial future as well,” he says.

    Mr Doessel says his company helps Australians clear adverse listings from their credit file which they believe should not be there. He says no one is immune to financial predators – and when a client experiences identity theft which leads to credit being taken out in their name, they are left financially crippled.

    “Basically the victim ends up with defaults on their credit file which unfortunately means they are black listed from credit for 5 years. These victims can’t borrow for anything – they can’t even take out a mobile phone plan,” he says.

    His warning comes following the release of the Australian Communications and Media Authority’s (ACMA) special report last Friday, on the way young Australians use the internet and social media.

    The report ‘Like, post, share’ explored emerging trends such as the rise of mobile access to the internet.

    “Whether it’s for study, playing games or connecting to friends and family, young Australians are placing more and more importance on the online aspects of their lives,” said ACMA Deputy Chairman Richard Bean.

    Mr Doessel says there are many reasons for parents to understand their child’s vulnerability to fraud from internet use – but he has identified 5 key reasons:

    1. Our kids are actually targets for fraudsters.

    Just because children are not 18, doesn’t mean they are not financially at risk. There have been warnings from Police about crooks scrolling through thousands of social networking pages purposely looking for young people, because they usually have the most open privacy settings.

    That information is not used right away, but is stored or ‘warehoused’ until the young people turn 18. They can then go on a ‘spending spree’ with the young person’s fake identity and credit.

    Mr Doessel says kids can also put their parents’ credit file at risk.

    “Downloading viruses can also mean the family computer is put at risk – which can threaten the financial identity of anyone using that computer for banking or other sensitive activities, and sharing too much information about parents can also be dangerous,” Mr Doessel says.

    2. Kids are on the net at increasing rates.

    According to the ACMA’s report, the percentage of Australian eight to nine year olds who rate the internet as ‘very important’ in their lives has doubled since 2009.

    Up to 35 per cent of eight to 11-year-olds have their own mobile phone, rising to 94 per cent of 16 to 17-year-olds.

    As children and young people get older their understanding of the internet and their use of it increases.

    “Older children and young people come to view the internet as a primary activity in and of itself and a source of entertainment, information and education,” the report says.

    One emergent area of avid use has been identified as social networking services, with the ACMA stating that it has become a “primary means of building, negotiating and presenting their social identities.”

    3. Social networking is incredibly risky.

    Mr Doessel says social networking offers fraudsters a whole host of personal information which can be misused.

    “Personal information can be extracted from social network sites, and fraudsters can build a profile on the victim – which can lead to identity theft and subsequent fraud,” he says.

    Social networking risks can include predatory friend requests, extraction of ‘public’ information for fraudulent use, viruses which include malware to extract passwords and other personal information from computers, and scam emails.

    Despite the risks, the ACMA report shows privacy is not always practiced by children.

    “Compared to their theoretical knowledge, perception and awareness of risks, their actual behaviour demonstrates that this knowledge is often not put into practice,” the report states.

    4. Pre-teens are vulnerable.

    The ACMA reports that parents need to think about starting conversations about cyber-safety with their kids earlier, with fewer eight to 11 year olds reporting having discussed issues of cyber-safety with their parents than 12 to 17 year olds.

    Younger teens are also slightly less likely to have private profiles or take other steps to manage their privacy.

    “From the research it seems that there is an age threshold of around 14 onwards where the relevance of a [fusion_builder_container hundred_percent=”yes” overflow=”visible”][fusion_builder_row][fusion_builder_column type=”1_1″ background_position=”left top” background_color=”” border_size=”” border_color=”” border_style=”solid” spacing=”yes” background_image=”” background_repeat=”no-repeat” padding=”” margin_top=”0px” margin_bottom=”0px” class=”” id=”” animation_type=”” animation_speed=”0.3″ animation_direction=”left” hide_on_mobile=”no” center_content=”no” min_height=”none”][digital] footprint can be grasped,” the report states.

    5. Our kids think they know more than us (and often they’re right!).

    Parents are the main source of advice and support for young people who are experiencing difficulties online, and ideally should be perceived as the authority on technology matters.

    “If parents don’t know their way around the web, they owe it to themselves and their family to get to know,” Mr Doessel says.

    “Whilst we can offer more freedom as they age, children still require our parenting in the virtual world as they would in the real one,” he says.

    The ACMA report shows when messages were delivered by individuals who children and young people perceive as being authorities in the area as well as having active knowledge of the activities they pursue, then such messages of cyber-safety can really get through.

    For more advice on protecting your financial identity, or for recovering from identity theft, people can go to MyCRA’s website  http://www.mycra.com.au/identity-theft/.

    /ENDS.

    MEDIA ENQUIRIES

    For Interviews – Graham Doessel – Founder and CEO MyCRA    Ph 3124 7133

    For all media enquiries – Lisa Brewster – Media Relations media@mycra.com.au

    media@mycra.com.au http://www.mycra.com.au/       www.mycra.com.au.blog

    246 Stafford Road, STAFFORD QLD. Ph: 07 3124 7133

    MyCRA Credit Rating Repair is Australia’s number one in credit rating repairs. We permanently remove defaults from credit files.


    http://www.acma.gov.au/theacma/newsroom/newsroom/media-releases/we-like-we-post-we-share-the-online-lives-of-young-australians
    http://www.smh.com.au/technology/technology-news/police-warn-of-sophisticated-plan-to-steal-identities-20111108-1n5l8.html#ixzz1dB4ctHcT

    Image: stockimages/ www.FreeDigitalPhotos.net[/fusion_builder_column][/fusion_builder_row][/fusion_builder_container]

  • Phishing email alert

    phishing emailStay Smart Online recently issued an alert about a number of new phishing emails carrying malware which have been identified in the recent days. The emails pretend to come from a number of Australian institutions including the Australian Tax Office (ATO), the Commonwealth Bank, National Australia Bank (NAB) and Telstra. Others have also been identified mimicking MMS messages. We look at the details of these phishing emails, and the dangers malware can pose for your identity and your credit file.

    By Graham Doessel, Founder and CEO of MyCRA Credit Rating Repair and www.fixmybadcredit.com.au.

    It seems these phishing emails are more prolific than ever, and can be an easy trap to fall for with the untrained eye. For example, last week MyCRA received some emails via our published email addresses, purporting to be from credit reporting agency Dun & Bradstreet. The email contained a zip file which if opened, I’m sure would have contained malware. The email looked very convincing at first glance, and was relevant to our profession both with the source and content of the email. It was only after reading thoroughly through the email we identified it was from an international DnB – and we understood it to be a scam. DnB UK had issued an official warning to its customers and clients about this scam. But how many people would fall for it?

    These fraudsters must have programs to troll through websites, identify frequently used words, and allocate appropriate phishing emails accordingly. How advanced – and how dangerous this process is.

    Stay Smart Online has provided examples of the current ATO phishing messages which appear to be sent from payroll provider ADP, and may include malware attached as a .zip file (currently ATO_TAX_16072013.zip). The banking examples have included malware attached as SecureMessage.zip. An example of the ATO phishing email is below:

     

    ———- Forwarded message ———- Date: Mon, 15 Jul 2013 15:35:42 -0800 From: payroll.invoices @adp com Subject: Australian Taxation Office – Refund Notification

    Australian Taxation Office 16/07/2013

    TAX REFUND NOTIFICATION

    After the last calculation of your fiscal activity we have determined that you are eligible to receive a refund of 6731.76 AUD.

    For more details please follow the steps bellow :

    – Right-click the link on the attachment name, and select Save Link As, Save Target As or a similar option provided. – Select the location into which you want to download the file and choose Save. – Open the file Microsoft Word file to view the details.

    Sonny Stout, Tax Refund Department Australian Taxation Office

    If you receive this email, simply delete it. Do not respond or open the attachment.

    SSO says many security products are not identifying the attachment correctly as malware, meaning that if you open the attachment, a Trojan will attempt to install on your computer.  But the say detection rates are improving quickly as more security vendors add this malware definition to their products; in the meantime, your computer may be vulnerable. Another reason to include automatic updates of your anti-virus product.

    Avoid phishing emails

    Always be suspicious of unsolicited emails.

    Do not click links or open attachments unless you are confident about the sender and information the email contains. The best advice is to simply delete the email.

    If you are uncertain about the origin of any email you can always cross check the information by going independently to the company or source’s website or by calling them directly.   More information   Read Stay Smart Online’s advice about avoiding phishing and advice about spam.

    Information provided by Telstra’s Chief Security Specialist, Scott McIntyre.

    The ins and outs of phishing scams

    Phishing scams are generally emails or text messages which impersonate genuine companies in the hope of tricking victims into giving out their personal and financial information.

    The aim of phishing is to steal information like bank and credit account numbers, passwords, and other crucial data. The ACCC’s Scamwatch website warns that phishing emails are not easily distinguishable from genuine corporate communication:

    “Phishing emails often look genuine and use what look to be genuine internet addresses—in fact, they often copy an institution’s logo and message format, which is very easy to do. It is also common for phishing messages to contain links to websites that are convincing fakes of real companies’ home pages.

    The website that the scammer’s email links to will have an address (URL) that is similar to but not the same as a real bank’s or financial institution’s site. For example, if the genuine site is at ‘www.realbank.com.au’, the scammer may use an address like ‘www.realbank.com.au.log107.biz’ or ‘www.phoneybank.com/realbank.com.au/login’.”

    The ramifications of falling for a phishing scam

    Clicking on links in phishing scams can mean just the simple act of clicking on the link can put you in danger. Many phishing emails are designed to infect computers through virus-containing links in the emails. This could mean that you could download a Trojan or similar virus designed to steal your financial information – and you may have no idea its happening.

    This could be dangerous for your credit file. Because while you are carrying out your normal online transactions, the Malware that you have installed could be tracking passwords, financial details and personal details about you. This could be used by a clever and determined cyber-crook in order to build a fake identity in your name.

    Suddenly credit could be accessed in your name, and you probably won’t know about it until you apply for credit yourself and are refused. This presents real problems for fixing your credit rating, because what we know about removing unfair or inaccurate listings from your credit file is that you must provide evidence and proof that you didn’t initiate the credit. This can be difficult to do when you have no idea how the theft of your information occurred. It can be a nightmare for victims.

    So don’t get hooked by a phishing scam. If you receive an email that looks legitimate – go independently to the Bank or other company’s website to verify it. Or use the official Bank phone number (not the phone number presented on the email) to call the bank directly to verify the email is legitimate.

    Image: David Castillo Dominici/ www.FreeDigitalPhotos.net

  • Gamers: cheating could cost you your credit rating

    If you or someone in your family is a gamer, then you would be familiar with gamershacks. Hacks and cheats are designed to give a gamer help with a game by allowing them to download useable software for assistance. But security company, AVG says downloading hacks could open up a can of worms not only for the gamer, but for anyone else that uses the computer, because you have probably also just downloaded Malware. We look at how this occurs, what Malware does and what the risks are for your personal information and  your credit file.

    By Graham Doessel, Founder and CEO of MyCRA Credit Rating Repair and www.fixmybadcredit.com.au

    Antivirus vendor AVG has issued a warning to gamers following research which suggests that more than 90 per cent of ‘hacks’ available online contain some form of malware or malicious code.

    Hacks and cheats are commonly incorporated into games; however, the sheer popularity of online multiplayer games has made gamers prime targets for cybercriminals.

    “The research suggests more than 90 per cent of hacks, cracks, patches, cheats, key generators, trainers and other downloadable game tools contain malware or executable code.

    These hacks are commonly delivered via unregulated torrents and file sharing sites, an easy vector for malware.

    Malware inadvertently downloaded with hacks can give attackers easy access to your online gaming account as well as other sensitive information such as online banking details, personal data and passwords for other online services,” Stay Smart Online recently advised.

    They advise gamers to only download patches from the game’s official site, and to avoid any unofficial software. They also recommend:

    Always be suspicious of any files downloaded from torrents and file sharing websites.

    Ensure you always have up-to-date security software installed on your computer.

    Use unique account logon and password information for each of your online gaming accounts (and every other online service you use).

    What is ‘malware’?

    Malware— is short for ‘malicious software’. It is a type of malicious code or program that is used for monitoring and collecting your personal information (spyware) or disrupting or damaging your computer (viruses and worms). Stay Smart Online explains in more detail:

    Spyware

    The term spyware is typically used to refer to programs that collect various types of personal information or that interfere with control of your computer in other ways, such as installing additional software or redirecting web browser activity.

    Examples of spyware include:

    Keyloggers  

    A keylogger is a program that logs every keystroke you make and then sends that information, including things like passwords, bank account numbers, and credit card numbers, to whomever is spying on you.

    Trojans

    A Trojan may damage your system and it may also install a ‘backdoor’ through which to send your personal information to another computer.

    Viruses and worms

    Viruses and worms typically self-replicate and can hijack your system. These types of malware can then be used to send out spam or perform other malicious activities and you may not even know it.  Both can use up essential system resources, which may lead to your computer freezing or crashing.  Viruses and worms often use shared files and email address books to spread to other computers.

    malwareMalware and your credit file

    If fraudsters can get their hands on your personal information they can steal passwords to not only the gaming site, but also to the bank or credit accounts of anyone who uses that computer.

    They can also create a patchwork quilt of information that can allow them to eventually have enough on you to request duplicate identity documents (identity theft), and apply for credit in your name (identity fraud).

    Running up credit all over town, perhaps buying and selling goods in your name, or in some cases mortgaging properties –you may have a stack of credit defaults against your name by the end of their ordeal – and sometimes no proof it wasn’t you that didn’t initiate the credit in the first place.

    Recovery can be slow, and in some cases you may have no way to prove you weren’t responsible for the debt – with fraudsters leaving no trail and the actual identity theft happening long before the fraud took place.

    Who might be most at risk?

    Gamers often aren’t worried about risks to their personal information as they are often young people who consider they don’t have much to lose, when in fact they do. Firstly, if Malware is downloaded – it puts the entire family at risk. But secondly, a young person is just as vulnerable as anyone to exploitation. There have been reports of crooks harvesting the personal information of young people and storing it until the victim turn 18. Australian Police have issued warnings on the issue of data warehousing in relation to Facebook in the past, but fraudsters won’t be fussy about where they get it from. It all has a lucrative price on the ‘black market’ of personal information.

    For more help with teaching kids and young people about online risks, go to the Stay Smart Online website http://www.staysmartonline.gov.au/kids_and_teens.

    Visit our main website www.mycra.com.au for more information on identity theft and your credit file.

    Image 1: Arvind Balaraman/ www.FreeDigitalPhotos.net

    Image 2: Salvatore Vuono/ www.FreeDigitalPhotos.net

  • Beware Christmas ‘spamvertising’ could threaten your credit file

    Fraudsters are out in full force this festive season and are planting cyber-bombs for you to unknowingly let off in your computer. We look at some of the things to watch out for, and what falling for a scam or downloading a virus could do to your credit file.

    By Graham Doessel, Founder and CEO of MyCRA Credit Rating Repairs and www.fixmybadcredit.com.au.

    According to an article ‘Cybercriminals start spamvertising Xmas themed scams and malware campaigns’ in online tech magazine ZD Net, security researchers from Symantec are warning about a recently intercepted flood of Xmas themed malicious and fraudulent campaigns.

    “Over the past year, we’ve seen numerous attempts to entice users into clicking on these links, by impersonating a legitimate message or notification from a respected, trusted and well known brands. These are prone to intensify over the next two months,” ZD Net’s Dancho Danchev writes.

    In an example of spamvertising, recently cybercriminals spamvertised millions of emails impersonating the popular e-card service 123greetings.com in an attempt to trick end and corporate users into clicking on client-side exploits and malware serving links, courtesy of the Black Hole web malware exploitation kit.

    According to Security experts Sophos, Black Hole malware is marketed and sold to cybercriminals in a typical professional crimeware kit that provides web administration capabilities. But it offers sophisticated techniques to generate malicious code. And it’s very aggressive in its use of server-side polymorphism and heavily obfuscated scripts to evade antivirus detection. The end result is that Blackhole is particularly insidious.

    Users are advised to avoid clicking on links found in such messages, and to report them as spam immediately.

    Malware—short for ‘malicious software’—is the term often used to refer to any type of malicious code or program that is used for monitoring and collecting your personal information (spyware) or disrupting or damaging your computer (viruses and worms). Some programs (spyware) collect various types of personal information or interfere with control of your computer in other ways, such as installing additional software or redirecting web browser activity.

    The purpose of malware can be to obtain personal information for identity theft and login details – especially for banking sites.

    If fraudsters get their hands on your personal information, they can steal passwords to your bank or credit accounts and they can also create a patchwork quilt of information that can allow them to eventually have enough on you to request duplicate identity documents, and apply for credit in your name.

    Running up credit all over town, perhaps buying and selling goods in your name, or in some cases mortgaging properties – the victim can have a stack of credit defaults against their name by the end of their ordeal – and sometimes no proof it wasn’t them that didn’t initiate the credit in the first place.

    Recovery can be slow, and in some cases victims have had no way to prove they weren’t responsible for the debt – with fraudsters leaving no trail and the actual identity theft happening long before the fraud took place.

    So to prevent devastating identity theft, which leaves you in debt and can leave your credit file tarnished and without any way of obtaining new credit for years to come, make it your business to educate yourself on internet and or computer risks. And think before you click this Christmas….it could save your financial future.

    If you need help to recover your credit file after identity theft – you may be suitable for credit repair. Contact a Credit Repair Advisor at MyCRA Credit Rating Repairs for help 1300 667 218 or visit the main website for more information www.mycra.com.au.

    Image: digitalart/ www.FreeDigitalPhotos.net

  • Skype users in Australia warned of identity theft threat

    The Stay Smart Online (SSO) Advisory service has issued a warning to Skype users this week about messages circulating the internet voice and video service which contain malware. Known as  ‘Dorkbots’, the malicious software can overtake your computer if you click the link in the message, infecting your computer and opening you up to identity theft. We show you what to look out for, and how you can be at risk of identity theft and other nasties which can impact your life and your credit rating.

    By Graham Doessel, Founder and CEO of MyCRA Credit Rating Repairs and www.fixmybadcredit.com.au.

    SSO Advisory is warning users to be careful about clicking on a link coming from a Skype instant message.

    Skype issued a warning on October 9 via the security section of their website about the ‘Dorkbot’ malware that is currently spreading via Skype.

    Users may receive a message asking ‘lol is this your new profile pic?, along with a link. You are warned not to click this link. This message may come from friends in your Skype contacts lists.

    If the link is clicked, the malware infects your computer. It may also cause your computer to become part of what is known as a ‘botnet’. A botnet is a group of compromised (infected by malware) computers that are used by criminals to carry out attacks on other computer systems.

    Dorkbot variants may also attempt to steal user name and password details for other services you use. Botnets are controlled remotely and can be instructed to perform further malicious acts via the internet.

    Whilst back on October 9 Skype had said a “small number” of Skype users have been targeted, this number may have escalated to greater levels, for SSO to launch an advisory. Security company Trend-Micro’s blog post ‘Skype worm spreading fast’ revealed on October 8 the company had blocked 2500 infected files in the 24 hours since discovery.

    If you are tech savvy, Trend-Micro explains further:

    “These Dorkbot variants will also steal user name and password credentials for a vast array of websites including Facebook, Twitter, Google, PayPal, NetFlix and many others. They can interfere in DNS resolution, insert iFrames into web pages, perform three different kinds of DDoS attack, act as a Proxy server and download and install further malware at the botmaster’s initiation. These are only some of the functionality of this pernicious worm.

    Some infections will subsequently install a ransomware variant locking the user out of their machine, informing them that their files have been encrypted and that they will be subsequently deleted unless the unfortunate victim surrenders a $200 fine within 48 hours.”

    Skype says, as a general word of caution, here are the steps to follow to avoid being scammed:

    1. Keep your Skype up-to date to ensure latest security features.

    2. Keep your PC or device security up to date with the latest anti-virus software

    3. It’s never adviseable to click on suspicious or unusual files and links, even if it’s coming from people you know.

    4. Check heartbeat or community for the latest news if unsure.

    As always, we regularly encourage our users to only download the latest version of Skype from skype.com. This is done to not only to ensure our users are able to take advantage of new features and functionality, but also to make sure you are getting a genuine version of Skype, as we remain committed to providing the best quality and security to our users.

    Back in July we featured a post explaining Malware which you might want to read if you want to know the ins and outs of Malware, titled ‘How Malware can infect your life and put you and your credit file at risk of fraud.’

    Here is an excerpt from that post:

    What can fraudsters do if they can get their hands on your personal information?

    They can steal passwords to your bank or credit accounts and they can also create a patchwork quilt of information that can allow them to eventually have enough on you to request duplicate identity documents, and apply for credit in your name.

    Running up credit all over town, perhaps buying and selling goods in your name, or in some cases mortgaging properties – the victim can have a stack of credit defaults against their name by the end of their ordeal – and sometimes no proof it wasn’t them that didn’t initiate the credit in the first place.

    Recovery can be slow, and in some cases victims have had no way to prove they weren’t responsible for the debt – with fraudsters leaving no trail and the actual identity crime happening long before the fraud took place.

    So to prevent devastating identity crime, which leaves you in debt and can leave you without any way of obtaining new credit for years to come, make it your business to educate yourself on internet and or computer risks. And think before you click….it could save your financial future.

    For help in recovering your good name following identity theft that has infected your credit file and your life, contact a Credit Repair Advisor on 1300 667 218 or visit the MyCRA Credit Rating Repairs website www.mycra.com.au.

    Image: Salvatore Vuono/ www.FreeDigitalPhotos.net

  • How Malware can infect your life and put you and your credit file at risk of fraud

    Think malware is a term used to describe clothes you go shopping in? Then you might have a big problem. Malware is what’s known as a syntactic form of identity crime – where fraudsters attempt to exploit technical vulnerabilities in order to commit fraud. Today the total malware count is just shy of 80 million. That’s scary stuff. We tell you exactly what it is, and what you can do to prevent your personal information from being exploited by fraudsters and prevent debt and bad credit history from credit fraud.

    By Graham Doessel, Founder and CEO of MyCRA Credit Rating Repairs and www.fixmybadcredit.com.au.

    Last week I received a warning from the Stay Smart Online alert service about a new spam email containing a Trojan horse virus as an attachment. This must have caught out enough people for SSO to put out a warning about it. In fact, new forms of malware catch out millions of people every day. It is reported there are 55,000 new unique malware samples per day sent out there. So how can we stay on top of it?

    Stay Smart Online defines malware, and explains how it can infect your life through your computer:

    What is ‘malware’ and how does it affect your computer

    Malware—short for ‘malicious software’—is the term often used to refer to any type of malicious code or program that is used for monitoring and collecting your personal information (spyware) or disrupting or damaging your computer (viruses and worms).

    Spyware

    The term spyware is typically used to refer to programs that collect various types of personal information or that interfere with control of your computer in other ways, such as installing additional software or redirecting web browser activity.

    Examples of spyware include:

    Keyloggers

    A keylogger is a program that logs every keystroke you make and then sends that information, including things like passwords, bank account numbers, and credit card numbers, to whomever is spying on you.

    Trojans

    A Trojan may damage your system and it may also install a ‘backdoor’ through which to send your personal information to another computer.

    Viruses and worms

    Viruses and worms typically self-replicate and can hijack your system. These types of malware can then be used to send out spam or perform other malicious activities and you may not even know it.  Both can use up essential system resources, which may lead to your computer freezing or crashing.  Viruses and worms often use shared files and email address books to spread to other computers.

    How does your computer become infected with malware

    Most spyware is installed without your knowledge. It often gets onto your computer through deception or through exploitation of browser vulnerabilities.

    •Spyware can come bundled with other software. When you download a program, the spyware can be downloaded and installed at the same time.
    •Some spyware infect a system through security holes in the Web browser or in other software. When the user navigates to a Web page controlled by the spyware author, the page contains code which attacks the browser and forces the download and installation of spyware.
    •Be wary of USB sticks from unfamiliar or untrustworthy sources, for example those given away at conferences, trade shows, or in promotional packs. These devices may contain malicious software, which could cause severe damage to your computer or compromise your personal information.
    •Some “rogue” spyware programs masquerade as security software.
    •Worms can also be used to install spyware on your computer.

    A recent article published in the Sydney Morning Herald Tech Section has some alarming concerns from some pretty hefty security people about the internet’s battle with malware. Many wonder if we could possibly be losing the fight against it – with updates unable to keep up with new developments, and anti-virus letting some slip through the cracks. If you’re game, you can read this article here: Anti-virus can’t keep up with threat onslaught.

    Concerns aside, far and away the best way we can have any hope of fighting it – is with installing updates on our computers. Here are Stay Smart Online’s best tips for preventing malware:

    How to prevent spyware from getting onto your computer

    •Install anti-spyware and anti-virus software and set it to automatically check the product website for updates. This will ensure that your computer is protected against the latest viruses and spyware.

    •Install a firewall. It will prevent unauthorised access to your computer and the installation of spyware on it. Some firewalls can also prevent information being taken from your computer and sent to someone else.

    •If you must use a USB stick from an unfamiliar source, you should always scan the USB stick for viruses or other malware before accessing any of its content. You should also disable the autorun function, which is commonly enabled on the Microsoft Windows operating system. This will lessen the risk that any malicious software that may be on the USB stick, will automatically start when you connect it to your computer.

    •Keep yourself informed about the latest security threats and solutions. You can sign up for the free Cyber Security Alert Service from this website. Alternatively, your anti-virus software vendor may have an email alert system. Look for a ‘keep informed’ tab or section on the software’s main screen.

    •Be cautious about opening emails from unknown or suspicious sources. Look at the sender of the email as well as the body and the subject of the email. Do not open email attachments or click on hyperlinks in these emails. You should install spam filters to minimise the amount of spam you receive.

    •Set your anti-virus software and anti-spyware software to automatically scan incoming email.

    •Only download files and software from reputable web sites. Read the licence agreement and terms of use before you download software and don’t download it if you don’t understand or trust the terms and conditions.

    •Be wary when exchanging files even with colleagues or friends. Scan the files before you install them or run them on your computer.

    •Never click on an ‘Agree’, ‘Ok’ or ‘No’ button to close a window on a suspicious website or pop-up. This can launch spyware onto your computer. Instead, click the red ‘X’ in the corner of the window to close the window.

    Your credit file at risk

    In SMH’s article, Charles Wale, security and risk consultant at Lee Douglas and Associates, who has consulted for over 50 ASX-listed companies says consumers need to realise their machines are targets.

    “They are after your personal information for identity theft and login details, especially for banking sites so they can remove funds in their favour,” he tells SMH.

    What can fraudsters do if they can get their hands on your personal information?

    They can steal passwords to your bank or credit accounts and they can also create a patchwork quilt of information that can allow them to eventually have enough on you to request duplicate identity documents, and apply for credit in your name.

    Running up credit all over town, perhaps buying and selling goods in your name, or in some cases mortgaging properties – the victim can have a stack of credit defaults against their name by the end of their ordeal – and sometimes no proof it wasn’t them that didn’t initiate the credit in the first place.

    Recovery can be slow, and in some cases victims have had no way to prove they weren’t responsible for the debt – with fraudsters leaving no trail and the actual identity crime happening long before the fraud took place.

    So to prevent devastating identity crime, which leaves you in debt and can leave you without any way of obtaining new credit for years to come, make it your business to educate yourself on internet and or computer risks. And think before you click….it could save your financial future.

    If you need help in recovering your good name following identity theft, you may find a professional credit repairer can give you the best chance at having the defaults removed from your credit file. Contact MyCRA Credit Rating Repairs on 1300 667 218 for more information.

    Image: Idea go/ www.FreeDigitalPhotos.net

     

  • Is your smartphone use increasing your risk of identity theft?

    A recent survey found that over half of all mobile phone users own a smartphone.  The survey conducted by TNS Mobile Life found 52% of mobile users own a smartphone device, which is an increase of 24 per cent from 2010.

    But unfortunately fraudsters are also aware of this. People should be wary about the possible risks to the security of their personal information when they are using their smartphone.

    The fact that people are using these devices to log in to social networking, use email, download applications and access bank accounts means they also need to be careful they are not opening the door to identity theft. This could leave them hugely out of pocket, and potentially ruin their credit rating.

    Security firm Earthwave Managed Services guest blogged on CSO this week, and warned readers about emerging identity theft risks with smartphones.

    “The smartphones of today don’t just make calls and take pictures. They serve as handheld PC’s and can potentially provide a thief with enough information about your online presence so that further theft of finances and identity can occur,” the firm says.

    Earthwave says the same types of malicious malware and viruses that are present on home computers are being directed to smart phones, but there is a gap in adequate security in this area. Here’s how they say people’s personal information can be compromised:

    “The malware could be injected using a PDF document, an image on a website, an e-mail or even embedded in webpage code. While the PC and notebook fall victim to the same attacks, the smartphone is even more vulnerable due to sluggish software development and user naivety…

    “The hype surrounding the app-race gives attackers another means of entry – App Stores. Cyber criminals can code apps which include malware with the aim of gaining anonymous and complete access to the data residing on the phone,” the firm says.

    Earthwave says people should adhere to the same security practices as those applied to their notebook to prevent smartphone identity theft. They suggest four security measures to take:

    1. Install firmware updates that resolve security issues.
    2. Always use strong passwords and stay vigilant with your email and web browsing.
    3. Always be extremely careful what information you provide on social networking sites
    4. Configure websites containing personal or financial information to be encrypted for the entire session, if the site provides this functionality.

    Identity theft can be devastating for the victim, and many times they face an uphill battle with their credit rating following it. If the crime is sophisticated – as could be the case with malware-generated identity theft, the virtual stealing of someone’s good name can go undetected for a significant time.

    Often it is not until the victim applies for credit somewhere and is refused that they realise their personal information has been stolen and identity fraud has been committed against them. People may have credit applications as a minimum and possibly defaults, mortgages and mobile phones attributed to them incorrectly.

    Once any account remains unpaid past 60 days, the debt may be listed by the creditor as a default on a person’s credit file. Under current Australian legislation, defaults remain listed on the victim’s credit file for a 5 year period.

    What is not widely known is how difficult recovery from identity theft can be. Unfortunately there is no guarantee defaults can be removed from a person’s credit file. The onus is on the identity theft victim to prove to creditors they didn’t initiate the debts. But for the victim who is virtually robbed of their financial freedom, it is a point worth fighting for.

    For more information on identity theft, or for help with credit repair following identity theft, visit the MyCRA Credit Repairs website.

    Image: Salvator Vuono / FreeDigitalPhotos.net