Basic Internet & Email Safety
Avoiding Scams, Malware, and Unsafe Practices
The internet is a great resource, we can buy products and services, research, educate, pay bills, and keep in touch with loved ones. The internet is also a great resource for criminals who want to steal your identity, hack into your bank account, use your computer and connection for illegal activities, and those that simply want to damage your computer and software. The amount of malware and viruses that is created is so large that no antivirus, firewall, nor malware detector can stop them all. Educating ourselves on how malware and scams work is the best prevention, but please do not disable or get rid of your antivirus, firewall, or malware detectors.
Internet scams do not always derive from the internet or email; sometimes it starts with a phone call. Your phone rings and on the other end is a person telling you your computer contains a virus and they are there to help. Hang up! This is a scam, the only people who may call you would be Cable Co-op and we will not ask you to log onto your computer nor provide us with any information, we will simply tell you your computer needs fixed by a professional, and that professional is not us. There are many other phone based scams; the FBI lists many of them and what to do at this link: http://www.fbi.gov/scams-safety/fraud.
Email related scams often come in the form of “phishing”. Phishing is an email scam that is attempting to get you to provide personal information. This information can include, email username and password, date of birth, bank account number, and much more. Any email you receive asking for verification of information should be considered a scam, and you should delete it. If the person, business, or company needs that information, they will contact you in another medium, such as a phone call or letter. Here is an example of a phishing scam;
Due to congestion in our mail server, all unverified accounts would be shut down within the next 72hours. To confirm this account(s) is active, please complete your email verification details below.
COMPLETE YOUR EMAIL VERIFICATION BELOW
*Email address: email@example.com
Thank you for using Oberlin!
Copyright © 2014 Oberlin
Notice how they use an official looking email address and email! They have spoofed (used an email address that is not theirs) an email that does not exist and is even misspelled.
Here is another example of phishing; (notice the horrific spelling)
Barrister Hassan & Chembers
31 Sabongeri Street Kano State
I am barrister Hasan Ibrahim (SAN)Senior Advocate Of Nigeria from Skoto state Federal Republic of Nigeria,Please i want to know if your DEAD or ALIVE because on friday i traveled from Kano State to Federal High Cout Abuja, for an assignment, and find out where MR TOM WILLIAM from United States Of America swarn an Affidavite that your are his late brother who died on a crucial accident. that he is your next of kin to claim your contract inheritance fund. but i told the chief george Federal Republic Of Nigeria that i have come accross your file three years ago when i worked with the High Court Of Lagos, that i must contact you to know if that is true.
Why am contacting you is that they have arraged the transfer documents from the Federal High Court to eneble the paying Bank in Aboroad to effect the fund to Mr Tom Williams account before i stoped them, for immediate verification from you before any further action.
My dear if your still alive and want me to work for you kindly get back to me so that i will procced to Abuja tomorrow and arrange all the document on your favour so that you can contact the paying bank withgout any further delay.
I wait for your urgent responds.
Barrister Hassan Ibrianim
And another example;
Hello good friend.
I know you will see this message as a surprise, but i send it to you personally.
This is a serious business and needs urgent attention.
It is real and it requires your assistance. I am talking about $2.8million, here.
If you are willing to work with me, just reply back for explanation.
When it comes to emails, never open an attachment and never respond with any information. Just delete it and if someone needs to get a hold of you they have many other ways of doing so. If a company wants this information and wants you to provide it via email, then they need to change their practices and policies.
Internet based malware often come in the form of pop ups. “Your PC is Infected”, “Virus Detected”, and “You Won an Ipad”, are common pop ups that are disguising malware. They want you to download their product to “protect” your computer or input your information, but in reality you are opening yourself up to malware.
If you get one of these pop ups, or any other, simply close it out. If the pop up persists, close out your browser, if that doesn’t work, restart your computer.
These are the basics and in no way represents a complete list of known email, internet, or phone scams. The Cable Co-op is not responsible for preventing or fixing issues related to these and other issues. Be safe, use caution, and more importantly don’t allow scammers to ruin your internet experience.
When it comes to safety some simple rules apply.
Email Spam is prevalent in today’s Electronic World and impossible to stop. In fact, the only known way to completely stop spam is not using email. For those of us who need to use email, do we have any options? The short answer is no, and let me explain why.
Spam filters and Spam stopping software certainly exist, but the time spent training your filters and monitoring your spam folder is just as much, if not more, time consuming than simply deleting them out of your inbox. Spam filters find spam based on key words but key words can be manipulated to pass through a filter. Here is an example;
You can set your filter to catch any email with the word Viagra in it. But what about V1agra, vi@gra, viagr@, and so on. You can change one letter and now you can pass through the filter. So, to filter out any email containing the word Viagra we will need to come up with every variation possible, and this is just one word.
Then we must remember that a spam filter simply moves emails that are classified as spam to another folder, a spam folder. This folder still needs to be accessed, emails need to be looked at to make sure it did not accidently capture a wanted email, and then we will need to select all the emails and delete them. I have experimented with spam filters in Outlook, Outlook Express, Windows Mail, and Thunderbird, and have concluded it is more time consuming to set up filters, train the filters, and deal with the emails in the spam folder, than it is to simply delete them from my inbox.
Spam software can use filters to stop spam but some go a step farther and block known server addresses that are associated with spam. This software uses what is known as a spam server blacklist, literally a list of server addresses that are known to send out spam. This method of spam blocking is more effective than filtering, but is not an end all solution. The reason being is that another email server, with a different address being used, and much like an anti-virus program can only stop known viruses, and spam blocking system based on server addresses can only stop those that are known. With hundreds of new ones being created each day, it is impossible to stop them all.
Oberlin.net uses Barracuda to protect our members from any known viruses trying to attach themselves to emails. Barracuda is often referred to as a spam filter, but the filtering causes more issues than it fixes. For this reason, Barracuda is used primarily for detecting and quarantining known viruses and stopping blacklisted spam servers.
Oberlin.net provides Barracuda for free. Oberlin.net techs will help manage your user name and passwords. Oberlin.net techs will provide the settings needed to set up an email account on numerous devices and with numerous programs. Oberlin.net cannot provide any further assistance with spam blocking, setting up filters, or using spam blocking programs. We provide you with an email address, how you use it is up to you.
Here are some articles on managing spam,