<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0">

	<channel>
		<title><![CDATA[ICT Insight | Darwin Blog - Articles - SPAM Threats]]></title>
		<link>https://www.itblog.com.au</link>
		<description><![CDATA[Technology blog site for Darwin and Northern Territory based companies to read about technology without all the heavy technical details. We aim to provide useful articles, advice and information to assist in working out where your business needs to be with Information Technology and Communications in the workplace. Topics that we will cover, SPAM, Exploits, Security, CCTV General IT, Cloud, Mobile Devices, Telephony, Communications, Software, Business Process and many more topics that you need to assist in developing your business.]]></description>
		<language>en-us</language>
		<copyright><![CDATA[https://www.itblog.com.au]]></copyright>
		<generator>N/A</generator>
		<webMaster>help@web365.com.au</webMaster>
		<lastBuildDate>Mon, 02 Mar 2020 20:46:33 ACST</lastBuildDate>
		<ttl>20</ttl>
		<item>
			<title><![CDATA[Spear-Phishing]]></title>
			<link>https://www.itblog.com.au/articles/18/1/Spear-Phishing/Page1.html</link>
			<description><![CDATA[<p>It is amazing to see the terms that are defined for different types of attack as below.</p>
<p><img src="http://www.itblog.com.au/content_images/images/SPAM Examples/Phishing vs Spear-Phising.jpg" alt="" constrain="true" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p></p>
<p>A more targeted form of phishing is known as &lsquo;spear-phishing&rsquo;. Rather than emailing many people at once, these emails are more targeted and are usually only sent to one person, and made to look like it&rsquo;s from someone you know, and that the topic is relevant to you. <br /><br />Spear-phishing is used to target employees by impersonating senior executives asking for funds transfers. This is also known as &lsquo;wire fraud&rsquo;.<br /><br />They usually ask the target to make a wire funds transfer for them- or confidential information (eg tax details). By making the email appear to come from a very senior person, they are hoping you&rsquo;ll action it quickly without verifying the request.</p>
<p>In recent weeks through our Helpdesk we have seen a huge increase in very personalised emails for smaller amounts of money targeting small companies.&nbsp; <br /><br />Many businesses have lost large amounts of money due to spear-phishing- eg Irish airline, Ryanair, lost $5 million to this type of scam.<br /><br />Raising awareness of these scam emails with employees (especially Personal Assistants or payment authorisers) is important to reduce this risk. If you receive a request like this, simply call the person (on a known number) to confirm they requested the transfer.<br /><br /></p>
<p><img src="http://www.itblog.com.au/content_images/images/SPAM Examples/Spear-Phishing.png" alt="Spear Phishing Example" constrain="true" style="display: block; margin-left: auto; margin-right: auto;" /></p>]]></description>
			<author>no@spam.com (Michael Feldbauer)</author>
			<pubDate><![CDATA[Wed, 24 Jan 2018 08:00:00 ACST]]></pubDate>
			<guid isPermaLink="true">https://www.itblog.com.au/articles/18/1/Spear-Phishing/Page1.html</guid>
		</item>
		<item>
			<title><![CDATA[What is SPAM and how do I avoid it?]]></title>
			<link>https://www.itblog.com.au/articles/16/1/What-is-SPAM-and-how-do-I-avoid-it/Page1.html</link>
			<description><![CDATA[<p>As a kid and even in my twenties I loved a good SPAM sandwich or SPAM on toast.</p>
<p>Now after 30 years in the ICT Industry SPAM has a whole different meaning and is certainly not as appetising as it used to be.</p>
<p>Spam email is a form of commercial advertising which is economically viable because email is a very cost-effective medium for the sender. If just a fraction of the recipients of a spam message purchase the advertised product, the spammers are making money and the spam problem is perpetuated.</p>
<p>Spammers harvest recipient addresses from publicly accessible sources, use programs to collect addresses on the web, and simply use dictionaries to make automated guesses at common usernames at a given domain.</p>
<p>At the present more than 95% of email messages sent worldwide is believed to be spam, making spam fighting tools increasingly important to all users of email.</p>
<p>Did you know that good / clean emails are referred to as HAM..&nbsp;</p>
<p><strong>Spam and viruses</strong></p>
<p>Spam is increasingly sent from computers infected by computer viruses. Virus-makers and spammers are combining their efforts to compromise innocent computer users&rsquo; systems and converting them into spam-sending &ldquo;drones&rdquo; or &ldquo;zombies&rdquo;. These malicious programs spread rapidly and generate massive amounts of spam pretending to be sent from legitimate addresses.</p>
<p>It&rsquo;s important for all computer owners to install and maintain anti-virus software to avoid having their computer infected and possibly become a source of spam without their knowing.</p>
<p>&nbsp;</p>
<p><strong>Effects of spam</strong></p>
<p>Aside from the amount of junk arriving in the Inboxes of millions of innocent email users every day, spam can have a more indirect and serious effect on email services and their users.</p>
<p>Hijacking of real users&rsquo; addresses or email accounts is also common. Typically these messages will have the From field showing something like &ldquo;Australian ATO Collections&rdquo; <a href="mailto:info@hotmail.com">info@hotmail.com</a> and it is very important to check that the email address has some relationship to the identity the email is coming from.</p>
<p>Several email users have been affected by falsified messages claiming to be from the service&rsquo;s administrators, stating that users&rsquo; account are closed and require some action by the user to be reopened. Such messages often contain viruses and should be ignored or deleted.</p>
<p>When hijackers succeed in sending spam via an email services, it can be temporarily blocked by other services and private domains who try to protect themselves. Providers such as Arafura Connect do everything we can to prevent this, but it&rsquo;s important that email users protect their own account with strong passwords to prevent their account being hijacked.</p>
<p>&nbsp;</p>
<p><strong>Phishing</strong></p>
<p>An increasingly common phenomenon is &ldquo;phishing&rdquo;, where messages appearing to be sent from e.g. legitimate financial institutions attempt to trick recipients into &ldquo;verifying&rdquo; sensitive data (such as credit card information) on fraudulent web sites.</p>
<p>Legitimate services will rarely (if ever) send messages requesting you to click a link and provide personal or sensitive information. Be sure to verify the source of the message before complying with such a request.</p>
<p>Check out our article here for more details on the embedded content.</p>
<p><a href="http://www.itblog.com.au/articles/11/1/False-Emails---How-To-Check/Page1.html">http://www.itblog.com.au/articles/11/1/False-Emails---How-To-Check/Page1.html</a></p>
<p></p>
<p></p>]]></description>
			<author>no@spam.com (Michael Feldbauer)</author>
			<pubDate><![CDATA[Wed, 17 Jan 2018 17:00:00 ACST]]></pubDate>
			<guid isPermaLink="true">https://www.itblog.com.au/articles/16/1/What-is-SPAM-and-how-do-I-avoid-it/Page1.html</guid>
		</item>
		<item>
			<title><![CDATA[False Emails - How To Check]]></title>
			<link>https://www.itblog.com.au/articles/11/1/False-Emails---How-To-Check/Page1.html</link>
			<description><![CDATA[<p>We all get dozens of emails every day, sometime the SPAM emails are obvious to spot sometimes they are not.</p>
<p>The easy ones have poor grammar, spelling mistakes or poor translation from the country of origin, we refer to them affectionately as "Chinglish" mistakes.</p>
<p>Some are pretty good, and if you are not sure then how do you check.....</p>
<p>The example below from Suncorp looks pretty good with no obvious errors, the next thing to do is move your mouse over the places where the email wants you to go, the links.</p>
<p>In this case you can see the page that you are being re-directed to has no relationship to Suncorp, this is a dead giveaway that the email is fake and you are being re-directed to a site that has been hacked.</p>
<p><img src="http://www.itblog.com.au/content_images/images/SPAM Examples/Suncorp.JPG" alt="Suncorp SPAM Example" constrain="true" style="display: block; margin-left: auto; margin-right: auto;" /></p>]]></description>
			<author>no@spam.com (Michael Feldbauer)</author>
			<pubDate><![CDATA[Fri, 09 Dec 2016 11:30:00 ACST]]></pubDate>
			<guid isPermaLink="true">https://www.itblog.com.au/articles/11/1/False-Emails---How-To-Check/Page1.html</guid>
		</item>
	</channel>
</rss>