Tips for Detection and Prevention of  Email Threats


...... go to any embedded URL nor open any attachment in uninvited email from an unknown, suspicious, or untrustworthy source!  Once these phishers and scammers capture your computer’s IP number, you are vulnerable to identify theft and you will surely get a LOT more spam!


... .. go directly to known URLs to verify if such email is genuine, not a spoof or scam.  Confirm vulnerabilities or viriuses!  Avoid Trojan horses, worms, malicious software and spyware!  Heed reliable warnings and email safety tips!  Consider installing antivirus software.


 

Go to:  http://www.symantec.com/norton/security_response/index.jsp


 

RELIABLE INTERNET SOURCES OF MUCH MORE INFORMATION

The User group Network News has published info on phishing and other current scams. Take a look to get up to date with current scams.  http://www.ugnn.com/2009/11/phishing/


 
 

http://www.microsoft.com/protect/fraud/phishing/spoof.aspx

http://www.symantec.com/norton/security_response/index.jsp
http://www.symantec.com/business/theme.jsp?themeid=state_of_spam
http://eval.symantec.com/mktginfo/enterprise/other_resources/b-state_of_phishing_report_11-2009.en-us.pdf

http://www.snopes.com/

http://urbanlegends.about.com/

http://vil.mcafee.com/hoax.asp
http://home.mcafee.com/VirusInfo/AntiVirusTips.aspx

http://www.securityfocus.com/infocus/1674

http://www.sophos.com/security/spyware/
http://www.sophos.com/blogs/gc/g/2009/03/25/apple-mac-malware-caught-camera/
http://www.sophos.com/blogs/gc/g/2009/11/28/hackers-exploit-tiger-woods-car-accident-spread-malware/

 
 

http://www.macworld.com/article/140873/2009/06/apple_java_security.html

 
 

http://blogs.zdnet.com/security/?p=2375&tag=col1;post-2375#more-2375
http://blogs.zdnet.com/security/?p=4104&tag=rbxccnbzd1

 
  http://en.wikipedia.org/wiki/Phishing
http://en.wikipedia.org/wiki/Scamming
http://en.wikipedia.org/wiki/E-mail_address_harvesting
http://en.wikipedia.org/wiki/Blind_carbon_copy
http://en.wikipedia.org/wiki/E-mail_spam
http://en.wikipedia.org/wiki/Spoofed_URL
http://en.wikipedia.org/wiki/Spoofing
http://en.wikipedia.org/wiki/Hoax_computer_virus
 
   
     
     

Checklist: Protecting your business, your employees and your customers

Do
  • Unsubscribe from legitimate mailings that you no longer want to receive. When signing up to receive mail, verify what additional items you are opting into at the same time. De-select items you do not want to receive.
  • Be selective about the Web sites where you register your email address.
  • Avoid publishing your email address on the Internet. Consider alternate options – for ex-ample, use a separate address when signing up for mailing lists, get multiple addresses for multiple purposes, or look into disposable address services.
  • Using directions provided by your mail administrators report missed spam if you have an option to do so.
  • Delete all spam.
  • Avoid clicking on suspicious links in email or IM messages as these may be links to spoofed websites. We suggest typing web addresses directly in to the browser rather than relying upon links within your messages.
  • Always be sure that your operating system is up-to-date with the latest updates, and em-ploy a comprehensive security suite. For details on Symantec’s offerings of protection visit http://www.symantec.com.
  • Consider a reputable antispam solution to handle filtering across your entire organization such as Symantec Brightmail messaging security family of solutions.
  • Keep up to date on recent spam trends by visiting the Symantec State of Spam site which is located here.

Do Not
  • Open unknown email attachments. These attachments could infect your computer.
  • Reply to spam. Typically the sender’s email address is forged, and replying may only result in more spam.
  • Fill out forms in messages that ask for personal or financial information or passwords. A reputable company is unlikely to ask for your personal details via email. When in doubt, contact the company in question via an independent, trusted mechanism, such as a veri-fied telephone number, or a known Internet address that you type into a new browser window (do not click or cut and paste from a link in the message).
  • Buy products or services from spam messages.
  • Open spam messages.
  • Forward any virus warnings that you receive through email. These are often hoaxes.