Info – Watch Out Over New Car Theft Strategy.

People please take full concern with this article that I’m going to share up. This is not a small matter that can be taken lightly cause what this article state might make you freak out and jump crazy. There is a new strategy that car theft use to steal our vehicle slickly curse them).

Articles based on first person point of story – I don’t know if this is true or not, but hey it’s never hurt to take precocious action.

I locked my car. As I walked away I heard my car door unlock. I went back and locked my car again three times. Each time, as soon as I started to walk away, I would hear it unlock again!! Naturally alarmed, I looked around and there were two guys sitting in a car in the fire lane next to the store.

They were obviously watching me intently, and there was no doubt they were somehow involved in this very weird situation. I quickly chucked the errand I was on, jumped in my car and sped away. I went straight to the police station, told them what had happened, and found out I was part of a new, and very successful, scheme being used to gain entry into cars. Two weeks later, my friend’s son had a similar happening…

While travelling, my friend’s son stopped at a roadside rest to use the bathroom.. When he came out to his car less than 4-5 minutes later, someone had gotten into his car and stolen his cell phone, laptop computer, GPS navigator, briefcase… name it.

He called the police and since there were no signs of his car being broken into, the police told him he had been a victim of the latest robbery tactic — there is a device that robbers are using now to clone your security code when you lock your doors on your car using your key-chain locking device..

They sit a distance away and watch for their next victim. They know you are going inside of the store, restaurant, or bathroom and that they now have a few minutes to steal and run. The police officer said to manually lock your car door-by hitting the lock button inside the car — that way if there is someone sitting in a parking lot watching for their next victim, it will not be you..

When you hit the lock button on your car upon exiting, it does not send the security code, but if you walk away and use the door lock on your key chain, it sends the code through the airwaves where it can be instantly stolen.

This is REAL.

Be wisely aware of what you just read and please pass this note on. Look how many times we all lock our doors with our remote just to be sure we remembered to lock them — and bingo, someone has our code and whatever was in our car.

Please share with everyone you know!!

P/s: I’m taking this action by sharing this all out. Do spread things about this!!!

Online – 10 Hackers Tricks Messing With Your Online Banking.

I’m taking a rest after this but hey, before doing that – better put up this entry for everyone. Some might want to said that this kind of entry have flood the NET. But, this is my blog and I want to put it in, no matter what other might says.

People are haunt by electronic break-in, hacking, and cyberspace fraud for many years, which one of most hottest topic in news and blogs – Online banking threats. What consumers really have to know are how the hacker’s games or tools in their road toward tarnishing people’s life. We should remind ourselves on how they do their works. Read below list:

  1. Phishing Scam
    Phishing scam is the classic form of identity theft. It occurs when a person receives an official-looking email aimed to fish your personal information by false pretenses. For example, the message can ask recipients to change their passwords or resubmit contact information due to the bank’s technical problems.Links in those emails will redirect you to websites that look and feel like the authentic banking  sites. Scammers recreate pages using information and logos from legitimate websites in hopes to fool consumers. If you enter your account details into them, the information will go directly to the criminals.Avoiding phishing scam is simple: don’t click on links in e-mails that ask you to provide your personal or financial information online. Call the banking company if it appears to be from or open up a separate window in your browser, type in the official address of your bank and navigate the site on your own.
  2. Teaming up with an insider.
    A US Treasury Department analysis indicated that over half of all reported computer break-ins involved an insider. One type of insider is a person who finds weaknesses unknown to system administrators and uses this information to access online accounts.
    Another type of insider finds a job at the bank specifically to commit a fraud. People who work in the customer assistance department may try to steal consumer information databases. Law enforcement officials investigating computer crimes often tell that they find passwords even on Post-it notes stuck on the employees’ monitors. Other criminals join technology staff to find a glitch, bug, or vulnerability in the network and software.
  3. Using a worm or virus.
    Viruses like Trojans can be caught by downloading programs you think you need or clicking on a link to a greeting card of video that arrives in e-mails spam. Or, you can pick viruses up by visiting a web page that’s been corrupted by hackers.If you get infected with a virus, the data on your PC will be recorded and sent to the hacker automatically. Viruses can hide silently inside your computer only to activate once you enter information into specific websites, like banking sites.Then they steal usernames and passwords by copying the log-on page or capturing keystrokes.So-called man-in-the-middle Trojans are more advanced. They can make fraudulent fund transfers while the victim is on the banking website. Another type of new viruses can make a copy of the web page showing account balances, but the amount will be changed so the user will see what he or she expects to see.If you want to avoid catching worms and viruses, a suspicious eye and up-to-date anti-virus software can help. You need to be careful about where you surf on the Internet when you are not banking.
  4. Using malicious software on public computers.
    The scam typically begins when a hacker installs keystroke-monitoring software on any public computer to obtain customer login names and passwords. Fraudsters can even get a temporary job in a library, hotel business center, Internet café, airport, etc. to simplify this task.Then hackers wait until anyone types in the web address of online banking account, user name and password. All keystrokes entered on the computer will be recorded by the malicious software and e-mailed to the hackers’ PC.This emerging Internet fraud is a new version of the widely used phishing e-mail scams, in which spammers send out mass e-mails containing hyperlinks to fake websites.
  5.  Stealing passwords.
    Password theft, password cracking, and even password guessing are still serious problems. Computers can process large amounts of data in a relatively small period of time. It is estimated that financially-motivated hackers can guess passwords at the rate of 1 billion guesses a second.Dictionary attacks, hybrid attacks and brute force attacks are various methods used to guess or crack passwords. The only real protection against such threats is to use multilevel authentication or very long passwords. A 5-character password will take 10 seconds to guess, 6 characters – 1,000 seconds, 7 characters – 1 day, 8 characters – 115 days, 9 characters – 31 years, 10 characters – 3,000 years.
  6. Exploiting default settings.
    If a target network uses the defaults set by the manufacturer or vendor, it is much easier to attack it. To see the scope of this problem, just Google “default passwords”. You will find a lot of websites that list thousands of the default log names, passwords, settings, access codes and naming conventions for various types of software and hardware.That’s why one of the most effective and simplest security precautions is to change the default settings to other alternatives. You also need to pay attention to the installation defaults like path names, folder names, components and configurations. If it is possible, consider all options for customization.
  7. Attacking wireless networks
    Wireless networks provide a lot of benefits, for example freedom from wires and the ability to be mobile within your office or home. However, hackers find it easier to make DOS, interference, hijacking, eavesdropping, man-in-the-middle, spoofing, and other attacks in wireless networks.You will need more time and efforts to secure wireless networks than to deploy a traditional wired network. In addition, many organizations have discovered that workers have brought in their own WAP and opened up security holes in wireless networks.
  8. Gaining access to the servers.
    Some hackers prefer attacking the hardware itself. They exploit attacks-prone Web systems to take control of the servers running the bank’s online operations, for example Microsoft IIS (Internet Information Server) or Unix Web servers.By gaining access to the servers through security holes, a hacker can modify any trusted applications to perform fraudulent operations. Such internal applications probably won’t be noticed by the network’s security system.
  9. Using back door’s  programs.
    A backdoor program allows the hacker access to your computer, bypass normal authentication , get full access to every facility and file on your computer (including your bank account’s log name and password) and send this information to the hacker’s PC.The backdoor could be an installed program (e.g. Back Orifice), or a modification to an existing program or hardware device . A specific form of backdoors is rootkits,which discloses the presence of other users, programs, services and open ports.
  10. Monitoring vulnerability researches.
    Hackers often read websites, blogs, discussion boards, and other sources of public information to learn more about bugs, issues, and vulnerabilities with hardware and software. Their aim is to find about possible attack points before users and companies become aware of this bug.To combat vulnerability research on the part of the hacker, you have to be just as vigilant as the hacker. Keep watching on discussion groups and web sites to learn about problems in order to protect against them just as intently as the hacker is looking for problems to exploit.

With all that risks, threats, and vulnerabilities existing in IT environment, 100% online banking security is just a dream. Keep in mind that hackers are looking for the easiest way to penetrate into online banking systems, and they know that the biggest security hole is usually sitting between the keyboard and the back of the chair.


p/s: Read also my entry on “Meets Identity Theft Crisis Freak Outs