Protecting yourself from vishing attacks

June 15, 2009

You might have heard about online "phishing" scams designed to steal money from unsuspecting Web users, but now criminals are using another type of scam called "vishing" to commit the same crimes.

Last week, the Federal Trade Commission filed lawsuits against two telemarketing firms in Florida and a company claiming to sell extended automobile warranties for violating the Do Not Call registry and fraud for selling bogus warranties for between $2,000 and $3,000 a pop. Since 2007, the companies supposedly made 1 billion calls and generated more than $10 billion.

These companies likely used spoofed caller ID numbers to hide their identities from consumers and law enforcement authorities.

The case is the latest example in what is known as vishing attacks, which use the phone network to swindle people out of money. To help readers understand what these scams are, how they work and how they can protect themselves. CNET News has put together this FAQ.

What is vishing? The term "vishing" is a socially engineered technique for stealing information or money from consumers using the telephone network. The term comes from combining "voice" with "phishing," which are online scams that get people to give up personal information.

How does it work? Typically attackers use a technique called caller ID spoofing to make it look like calls are coming from a legitimate or known phone number. It's a very similar technique to email spoofing, which makes e-mail addresses look like they are coming from a trusted source. But because people typically trust the phone service and caller ID, spoofing phone numbers can be particularly damaging.

And just like with online phishing attacks, which direct consumers to phony Web sites, vishing attacks usually have a recorded message that tells users to call a toll-free number. The caller is then typically asked to punch in a credit card number or other personal information. In the case of the warranty scams, users are asked to buy a bogus extended warranty for their car, which can cost anywhere between $2,000 and $3,000.

How easy is it to spoof a phone number? With voice over IP phone technology, caller ID spoofing has become fairly easy to do. The traditional phone network works by connecting one circuit to another. Each circuit on either end of the call is assigned a phone number by the phone company. So changing the phone number of a caller was more difficult. Of course, there were people who had figured out ways to hack into the old phone network to do this, but it wasn't as easy as it is today with voice over IP technology. With VoIP services, there is no circuit. These services use the Internet, which assigns different devices on the network IP addresses instead of actual phone numbers. Phone numbers are actually assigned by the users themselves.

There are several companies offering commercial spoofing services, such as SpoofCard. And even VoIP services, such as Skype, allow people to pick an area code and even the prefix number they want when they set up a new phone number. These numbers can be used to disguise where calls are originate. Of course Skype is built for individual use, but other services like Flowroute provide VoIP services for businesses using PBXs. A PBX, or private branch exchange system, is used by companies to provide a single phone number for multiple people working for the same company. These services allow companies to pick any phone number for caller ID they want. And some telemarketers use the service to spoof numbers.

The practice of caller ID spoofing is so widespread and common that one of the telemarketers accused in the FTC lawsuit supposedly bragged to a prospective client that he could call the entire United States in just a few hours and would not get caught calling people on the Do Not Call List.

Is caller ID spoofing illegal? No it's not. But there is proposed legislation that could make manipulating a phone number to look like it's coming from someone else illegal.

Are there are legitimate uses for caller ID spoofing? Yes, there are some legitimate uses for spoofing. Voice over IP providers by definition must use spoofing, or some kind of number manipulation, to create phone numbers. But there are other legitimate uses, such as doctors who might want to call back patients without giving their home numbers. Some online dating services that let people talk to potential matches without revealing their real phone numbers use spoofing. Lawyers might also use ID spoofing to protect the whereabouts of clients in domestic violence cases.

Even though there are some legitimate users for caller ID spoofing, Lance James, co-founder of Secure Science, which specializes in fraud protection, says 75 percent of all caller ID spoofing is likely for illegitimate purposes. Still, he advocates for any new law to distinguish between people using spoofing for legitimate purposes and those looking to harm or scam people out of money.

Who typically uses caller ID spoofing and vishing scams? Most of the vishing attacks have been from nefarious individuals or crime rings who are stealing credit card numbers or other personal information in identity theft. But telemarketers are also using the technique to get people to buy bogus products. Because the costs are so low for using caller ID spoofing using VoIP, it means that companies using the technique only have to get a few people to buy a product or hand over information to make the efforts profitable.

How do the scams usually work? Scammers often use either a war dialer, which is software that identifies numbers that can be used to make calls, to call phone numbers in a given region or they access a legitimate voice messaging company with a list of phone numbers stolen from a financial institution. Usually they set up an automated recording to call individuals telling them that their credit cards have been flagged for fraudulent activity. Then they either ask people to provide credit card numbers, PIN codes, and/or Social Security numbers to verify their account or they provide another number where the consumer is to call to provide account details.

Some sophisticated attacks have combined vishing and phishing. These scams typically start with a phishing e-mail that says there has been a problem with an online account from a known Web site, such as a bank, credit card company, or online retailer, and it directs users to call a number and enter information to verify their account.

Is it hard for authorities to catch vishers? Yes and no. Because all calls originate and terminate somewhere, there is usually a billing record that law enforcement officials can use to trace calls to their sources. But this often takes several subpoenas to get access to the right information, which takes time and costs money.

Are there any technologies that can be used to identify vishing attacks? The biggest vulnerabilities in the communications network occur where older technologies meet new technologies, according to Secure Science's James. As a result, he believes that a coordinated effort by traditional phone companies and newer VoIP companies can help stop many attacks. Essentially, carriers can verify and authenticate that people making calls are who they say they are, which should cut down on much of the illegal activity that is done by spoofing caller ID numbers.

Carriers could also add clauses to their terms of use that would prohibit customers from using spoofed IDs to commit fraudulent acts. And if they are caught doing so they could have their service terminated.

Some companies are offering blacklist software that blocks certain IDs, but this can be tricky since numbers are often changed. For example, Google will offer a feature in its Google Voice product that will allow phone calls to be filtered like email so that users can block calls or send some calls from certain phone numbers to a "spam" folder.

And finally caller ID spoof providers like SpoofCard, which handles the large majority of spoofed numbers on the market, can work with service providers and law enforcement to flag suspicious spoofers.

What can consumers do to protect themselves? Here is some advice from security experts:

• Be aware. Consumers need to know that these scams exist. To find out more information, go to the FTC website.

• Be suspicious of all unknown callers. People should be just as suspicious of phone calls as they are of e-mails asking for personal information. And some experts suggest letting all calls from unknown callers go to voicemail.

• Don't trust caller ID. Just because your caller ID displays a phone number or name of a legitimate company you might recognize, it doesn't guarantee the call is really coming from that number or company. As explained earlier, caller ID spoofing is easy.

• Ask questions. If someone is trying to sell you something or asking for your personal or financial information, ask them to identify who they work for, and then check them out to see if they are legitimate.

• Call them back. Again if someone is selling you something or asking for information, tell them you will call them back and then either verify the company is legitimate, or if it's a bank or credit card company, call them back using a number from your bill or your card. Never provide credit card information or other private information to anyone who calls you.

• Register your number with the National Do Not Call registry at donotcall.gov. Even though criminals and unscrupulous telemarketers may ignore the list, a call from a supposed telemarket might tip you off that it's a bogus offer. Most legitimate telemarketers obey the rules of the list. Also, the Web site provides a place where complaints can be filed.

• Report incidents. Report vishing calls to www.ftc.gov or call (888) 382-1222. The FTC wants the number and name that appeared on the caller ID as well as the time of day and the information talked about or in a recorded message. If you think you've been a victim of a vishing attack you can also contact, the Internet Crime Complaint Center.

 

Gmail helps you migrate from other e-mail services

June 15, 2009

Correction: This article was updated at 11:10 PDT to remove the statement that AOL doesn't allow using non-AOL e-mail clients to access its e-mail, which is untrue.

It's been a challenge to persuade my friends to move on from AOL. It's not because I am not convincing enough (I am!), it's just that it's impossible for them to move their e-mail archive and contacts to a new non-AOL account.

(Credit: Gmailblog)

But now my persuasion level has just been raised a notch as Gmail announced Wednesday a new feature that helps make the move easier.

Gmail now migrates e-mail and contacts from other providers, including Yahoo, Hotmail, AOL, and a few dozen others. This means you can still view those special messages sent to the old account in your new Gmail account.

The new migration feature also lets you have your messages forwarded from your old account for 30 days, giving you time to inform those on your contact list about the new e-mail address. Of course, in my own experience, you can always go back and check the old account once in a while in case that person you never expect to hear from writes you again after years of zero correspondence.

For AOL users, by the way, you don't need to install the AOL software, which tends to slow down your computer and your Internet connection significantly, to check its e-mail; you can do that just by going to the Web site and log-in with your e-mail address and password.

Chad Parry, a Gmail engineer, said that for now the new feature is only available to newly created Gmail accounts. But soon, in matter of days, it will be available to all existing accounts. You'll know this when you see the "Accounts and Import" tab, which used to be called just "Accounts," under the "Settings" section of your Gmail account.

(Credit: Gmailblog)

This new migration feature, unfortunately, won't be available for schools and businesses using Google Apps. The reason for this, I believe, is that these entities tend to use e-mail addresses ending in their own domain instead of gmail.com.

Prior to this, you could always export your old account's contact to a CSV file then import it into Gmail, and you can still do that now. However, this new feature offers a much simpler way for importing them. It also offers the option to import the e-mail archive, which is very important.

I don't know about other e-mail providers, but AOL and Yahoo users should definitely take this opportunity to move on. AOL software is notoriously horrible in many ways, and Yahoo still charges you a yearly fee if you want to use a standard e-mail client to check e-mail, which is ridiculous.

 

Google revises AdWords trademark policy

June 15, 2009

Google has revised its policy on trademarks appearing in keyword ads, allowing brand names to appear in AdWords copy.

Google will begin accepting new ads that contain trademark terms on Friday although the ads will not begin appearing online until June 11, Dan Friedman, a member of the Inside AdWords crew, announced Thursday in a company blog:

In an effort to improve ad quality and user experience, we are adjusting our trademark policy in the U.S. to allow some ads to use trademarks in the ad text. This change will bring Google's policy on trademark use in ad text more in line with the industry standard. Under certain criteria, you can use trademark terms in your ad text in the U.S. even if you don't own that trademark or have explicit approval from the trademark owner to use it. This change will help you to create more narrowly targeted ad text that highlights your specific inventory.

For example, under our old policy, a site that sells several brands of athletic shoes may not have been able to highlight the actual brands that they sell in their ad text. However, under our new policy, that advertiser can create specific ads for each of the brands that they sell. We believe that this change will help both our users and advertisers by reducing the number of overly generic ads that appear across our networks in the U.S.

The move comes on the heels of a lawsuit filed against Google by Firepond, which makes sales management software, over whether the search giant should be allowed to sell keywords bearing a company's trademark to its competitors. A similar suit involving PC support company Rescuecom was brought back to life in April by an appeals court after initially being dismissed in 2006.

Rescuecom and Firepond argue that their respective keywords are an extension of the trademark they have acquired on their brands, and that Google should not be encouraging competitors to violate that trademark by using it to promote their own products.

AdWords allows anyone to bid on a given keyword and win placement on the top or right side of a search results page based on a combination of factors such as the size of the maximum bid for that keyword as well as the quality of the ad.

 



Best Communitation Website
Which communication website is best?

Myspace
Facebook
Twitter
Furry-paws
Youtube


Make a free website with Yola