Picture
Olympic Games are gaining popularity speedily. With searches for the term “Olympic tickets” climbing up the charts of the recent most searched terms, it is evident that this event will surely, be a hit among masses. This has also awakened the Scam community, to new possibilities of churning out scams and frauds, exploiting the public interest, using social engineering strategies, leading to numerous scams and malware attacks. Among these some common scams reported by Olympics organizers are:

  • Emails informing the recipient they have won an ‘Olympic lottery’ that they haven’t entered.
  • Emails/letters to manufacturing companies, asking them to pay large fees in order to provide items for the Games.
  • Emails/letters informing the recipient that they can apply for a job being involved with the Games for a fee.


Looking at these scams and attack attempts, Cyberoam offers few internet protection tips that will help you stay protected from probable Olympic scams.

Primary focus of Scam attackers has been seen, in the area of fraudulent ticket selling. To ensure your web security it’s good to refer the official Olympics tickets page at the website, before you proceed with your process of buying tickets. The official Olympics website quotes, “Tickets for the London 2012 Games are only available for purchase through the London 2012 website and our appointed ticketing partners. If you receive offers of tickets from anyone else, they are likely…committing fraud by offering fake or non-existent tickets.” The website, also offers an online website checker, for those who are buying London 2012 tickets and can use the same, to ensure that the tickets are authentic.

Apart from this, incidents where emails are sent falsely claiming to be from the Olympics 2012 group, or other organisations concerned to the Games, act as the first step in a scam. These mails ask the recipient to reveal sensitive information to win a prize. The Olympic council warns the users to look for a padlock icon at the browser window, whenever such information is being asked. If the padlock, icon is missing then one should not enter sensitive information at such a page. Also clicking on the padlock, should either reveal, London Organising Committee of the Olympic Games and Paralympic Games Ltd), or identify other pages as part of london2012.com. In addition to this users should also check whether the website address begins with ‘https://’ or not.

Users can get more information on the same, at Stay Safe Online page at the Olympics website. The Olympics website also shares a list of other reported scams; one can also download the list of known scams.





 
Picture
Security is always at the back of everyone’s mind, whether it’s using internet or web applications. Security concerns, have since long influenced the very way users, use Web. Realising this, service providers of today’s time are constantly on alert, to ensure overall security.

Talking about one such service provider, we have Google who regularly studies the threat landscape and offers regular internet security updates – warnings.  Lately, Google announced that they will warn their users with security warnings for suspected state-sponsored attacks. For users, who Google believe are being targeted, Google will flash a message on the top of the page reading ‘Warning: We believe state-sponsored attackers may be attempting to compromise your account or computer. Protect yourself now’.

Google also emphasizes that, if a user sees such a warning it does not necessarily mean that the users account has been hijacked. It implies that Google believes that the user may be a target for malware or phishing. Google also clarifies that these warnings are not being shown because Google’s internal systems have been compromised or because of a particular attack, instead it is only to alert for the user to be prepared for probable chances of an attack.

Taking a step further, Google also suggests few immediate steps, which can help the user secure their accounts. These steps include:
  • Creating a unique password that has a good mix of capital-lowercase letters- punctuation marks and numbers
  • Enabling 2-step verification for additional security
  • Updating the browser, operating system, plug-ins, document editors and so-on, regularly
  • Look for https://accounts.google.com/ in your browser bar, while signing in to Google as attackers often send links through fake sign-in pages, to steal your password

Eric Grosse, VP Security Engineering, further highlights that Google’s detailed analysis along with victim reports; strongly suggest the involvement of states or groups that are state-sponsored.

Being a leading network security provider, Cyberoam appreciates the proactiveness Google is endorsing in terms of ensuring user Security.  It is really worth applause, that Google takes steps to notify users about attacks/ probable attacks, so that users can take the right step to protect their privacy.




 
Picture
With increase in bring-your-own-device (BYOD,) among businesses of all sizes; data security, network security or web security issues have become more complex. The effects of extensive usage of tablets and smart phones can be clearly seen on organizations and the way they operate today. With more employees using their own tablets /smartphones at office for work purpose, the challenge for IT teams to tackle security risks has increased, creating the dilemma of whether the new BYOD culture is indeed a blessing or a curse in disguise. 

BYOD no doubt is flexible and highly useful, but it also comes along with some grave challenges to businesses, like network threats, data leakage and bandwidth crunch. Under the BYOD scenario, the challenge to monitor all the various devices has increased. In addition to this some devices can also infect the entire network with malware /viruses.

Apart from security, the strain these devices can cause on networks is a cause of concern for many IT network administrators. Constant OS updates/upgrades, file downloads and data streaming, on these devices leads to huge strain on organization’s network resources; and with multiple devices in an organization, this impacts the network drastically!

Having a solution to deal with these new looming threats, on network security and bandwidth control, is the need of the hour. And Cyberoam UTM can help IT teams in this regard. 

Cyberoam UTM’s unique Layer 8 Technology, allows network administrators to design identity-based policies, which extends throughout the network, irrespective of the device used by the employee to connect to the network. Along with Layer 8 Technology, Cyberoam UTM offers secure AAA (Authentication, Authorization, Audit) over a single device, allowing control and knowledge of who is connected to your network, using what device and what are they accessing. You can design security policies that allow you to decide, what each user /user group can access in terms of websites/applications over Internet and for how long, the amount of data transfer and bandwidth they can consume.

Image Credits :- ifindkarma