Tag Archive | "Trojan Horse"

Scam Alert: The Hotel Reservation Scam

Tags: , , , , , , ,


 

I recently received several emails purportedly from Booking.com, a reputable reservations booking site on the Web (see email image below).  Having not booked a hotel reservation, I would normally simply delete this email.  However, I was struck by the warning that a cancellation or prepayment penalty of $195 would be billed to my credit card and tempted to click on the link provided in the email.

 

I’m glad I didn’t.  I did a little research and discovered that these emails represent a very widespread scam.  The scam can work in one of two ways – either with an email attachment or a link within the email.  In each instance, whether a phishing expedition or a Trojan attack or both, the result can be potentially devastating for users with sensitive information on their computers.

 

Malware attacks are on the rise and computer users should be on guard against them.  However, even the most security savvy among us may – in a moment of weakness – click a link or open an attachment that we will come to regret.

 

Of course, a close look at the email provides us telltale signs that this email is not legitimate.  Take a look at some of the grammar in the email like “The hotel Arriva Hotel” and “does the expiration date of the card finish until the date arrival registration.”  Also, misuse of punctuation can be indicative of malicious intent, such as the word “shouldnt” without the apostrophe and the “195$” prepayment penalty with the dollar sign following the amount (not typical of an American establishment).

 

Should you receive an email similar to the one below, or any email of which you are uncertain, do not open any attachments or click any links within the suspicious email.  You may be saving yourself from the consequences including identity theft, credit card fraud,  or costly computer repairs.

 

 

The Trojan Horse in Your Home

Tags: , , , , ,


According to the legendary ancient Greek epic poet Homer, during the ten-year siege of Troy, the Greeks plotted to invade their enemies by leaving a giant wooden horse at the gates of Troy.  This “gift horse” was carefully timed to coincide with what appeared to be a recession of the Greek fleet.  Assuming that the gargantuan equine was a peace offering, the Trojans opened their gates and rolled the horse inside.  In the dead of night, a team of thirty select Greeks quietly stole out of the horse and reopened the gates to their own armada that destroyed Troy.


Since that time, the term “Trojan Horse” refers to trickery or sleight-of-hand conducted with ill intent.  In the computer world, a “Trojan Horse” refers to malevolent computer programs (“malware”) that appear to be useful or harmless.  They induce the user to install and run them and thereby, seriously compromise, crash, or totally obliterate the user’s system.


Herein lies the crux of this article.  By having a computer system linked to the World Wide Web, have we invited foes into our homes?


I recently heard on the radio that a school in Pennsylvania gave every one of its students a free Apple laptop computer without notifying them that it could reveal what the students were doing at school or home, whenever the school decided to access its video cameras linked to those laptops.  The school’s treachery was revealed when its administrators interrogated one student concerning his use of drugs.  Needless to say, when the student informed his parents of this occurrence, the question arose as to whether or not this constituted a violation of the student’s civil rights.


If this could happen to a student, via a body of adults that he and his parents trusted implicitly, the question arises as to how widespread this problem may be. Legally, the issue impacts not only the unwary user but also the manufacturer(s) of the computer and videocam, the Internet provider, and those who supplied the laptop to the student.   If you think you’re immune to such deception, consider how many times you have agreed to terms of software utilization and access, via the Internet, without actually reading all of the terms.


The PC may be the greatest learning tool in recent history, but at what cost?  Is your personal business at risk? Once the foe has access to your home and its possessions, you are at his mercy.  It’s twenty-six years after George Orwell’s prognostications about “1984” have come and gone, and it appears that the author was correct.  “Big Brother” is indeed watching!


Our Constitution guarantees us freedom from illegal searches and seizures, but how many times have you heard that someone who has been accused of a crime has had his computer impounded by law enforcement authorities?  If the presumption of “innocent until found guilty” is the basis for our law, and if the Constitution protects us against invasions of this nature, what exactly is going on here, and why is it going on?  Is this part of the Patriot Act now expanding into avenues it was never intended to survey?


Finally, we have a subject into which the ACLU can really sink its sharp little incisors.  If the ACLU is so concerned with safeguarding our inalienable rights, let them examine the legality of cyberspace agreements and malware programs.   Let them then push to institute laws that would protect PC users — nearly every American above the age of two — from pitfalls such as these.


Your files on your PC contain what you are and who you are: your thoughts, your opinions, your desires, the sites you enter, the products you purchase, your banking documents, ad infinitum.  You may consider these aspects of your life to be highly personal and accessible only by the use of a password.  Consider again how private they really are if a Trojan Horse in the guise of a malicious program or an unscrupulous party should be left at your gateway to the Internet. 

Site Sponsors

Site Sponsors

Site Sponsors










RSSLoading Feed...

Live Traffic Feed

RSSLoading Feed...