QR Codes Can Pose a Security Risk. Yes, Really…

By Scott AurnouThe Security Advocate QR Code (with caption)

QR (short for ‘quick response’) codes are often relatively small boxes that look somewhat like scrambled checkerboards and can be scanned to connect to websites, pictures, files and other content hosted online. While many of them have a black and white boxed-shaped design similar to the image accompanying this article, they can also come in different shapes and colors. In addition to purpose-built scanners designed to read the codes – like one you might see at an airport security checkpoint – many mobile devices can read them if you download a scanning app.

In addition to practical applications like the aforementioned airport security checkpoint or tracking manufactured goods in a factory or warehouse setting, QR codes are often used as marketing tools offering up promotional information or discounts (i.e., ‘Scan here to get 10% off your next order,’ etc.). There are a number of uses for them, but they can also present a significant security risk. In effect, the codes are direct links to online content and they can introduce malware onto your mobile device just like an infected link in an Internet search, an email or text message can. Does that mean you shouldn’t use them? No, but – like dealing with anything else on the Web – don’t forget your common sense at the door.
Read more ›

Tagged with: , , , , , , ,
Posted in Fraud & Scams, Smartphones & Tablets

A Web Inject Attack Can Empty Your Online Banking Account Before You Know What Happened


Computer Security Tip of the Week

Scott Aurnou – Web inject attacks are a serious risk when online banking. While they masquerade as security enhancements, they actually steal your log in information and start emptying your bank account almost immediately. Here’s how to recognize them and what to do when you see one.

Helpful websites referenced in this video include:
Secunia: http://secunia.com/
AppFresh for Mac: http://metaquark.de/appfresh/mac

If you enjoyed this video, you can see more on TheSecurityAdvocate YouTube channel (and subscribe if you like).

Tagged with: , , , , , , , , , , , , ,
Posted in Fraud & Scams, Laptops & Desktops, Security Tip of the Week

International Traveler? You May Want to Know About This…

Customs AgentBy Scott Aurnou

In late January 2013, the U.S. Department of Homeland Security’s Office of Civil Rights and Civil Liberties (CRCL) issued an executive summary of a report concluding that it is legal for border agents to seize, inspect and confiscate laptop computers, mobile devices and other electronics at the U.S. border for any reason – or no reason. There is no requirement for any level of suspicion beforehand. This is called the ‘border search exception’ to the Fourth Amendment. Simply put, its protections against unreasonable search and seizure do not apply at the border (which is actually defined as up to 100 miles inland).

This may sound like a shocking overreach, but this policy is not new, only the recent report asserting its legality is. In effect, the CRCL equates searching your laptop, smartphone, etc. with looking through your luggage at an airport.

Of course, other countries have similar approaches. Some will also seek to copy your data for future use or install spyware to read and listen in on what you do. This begs the question:

What steps should you take to protect your company and personal data? If you’re traveling internationally for business, keep in mind where you will be going and what rules apply there.
Read more ›

Tagged with: , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
Posted in Laptops & Desktops, Privacy Issues, Smartphones & Tablets

A Scam Delivered Through Your Phone? Watch Out for ‘Smishing’ & ‘Vishing’ Attacks


Computer Security Tip of the Week

Scott Aurnou – Like a phishing attack, ‘smishing’ texts and ‘vishing’ robocalls are used to trick you into revealing your personal, financial and/or log in information. Here’s how to recognize them and what to do when you see one.

If you enjoyed this video, you can see more on TheSecurityAdvocate YouTube channel (and subscribe if you like).

Tagged with: , , , , , , , , , , , , , , ,
Posted in Fraud & Scams, Security Tip of the Week, Smartphones & Tablets