{"id":2265,"date":"2011-06-25T11:12:55","date_gmt":"2011-06-25T15:12:55","guid":{"rendered":"http:\/\/thundercloud.net\/infoave\/new\/?p=2265"},"modified":"2011-06-25T11:12:55","modified_gmt":"2011-06-25T15:12:55","slug":"theft-by-deception-is-legal-on-the-internet","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/theft-by-deception-is-legal-on-the-internet\/","title":{"rendered":"Theft by Deception is legal on the Internet"},"content":{"rendered":"<p>We thought it would be a good time to remind all of you, once again, not to  fall for these malicious \u2013 and costly scams. You really have to be careful \u2013  rogue security programs are everywhere.<\/p>\n<p>No doubt you\u2019re already too well  aware that on your travels around the Web you\u2019re bound to be to come across  messages telling you to install and update security software for your computer.  And, you might be tempted by a \u201cfree security scan,\u201d especially when this  program or that has detected \u201cmalicious software\u201d on your computer. But, much to  everyone\u2019s concern, that particularly scary message is most often (but not  always) the first step in a very well planned consumer ( that means YOU)  rip-off. The people who create these bogus programs are not stupid. They make  them look very professional. They can make the scan windows look just like a  dialog running on your Windows computer.<\/p>\n<p>These free scans will always  find a bevy of problems, and seconds later you\u2019re bombarded with urgent pop-ups  and messages to buy this or that security software. After you agree to spend  $20, $30, $40 or more on the software, the program tells you that your problems  are fixed. But the reality is harsh: there probably was nothing to fix. Worse,  the program you bought during the onslaught of urgent distress message is now  installed on your computer \u2013 and it is not only useless and expensive, it could  be very harmful.<\/p>\n<p>These free bogus security programs that offer \u201cfree\u201d  scans \u2013 are not free \u2013 but they\u2019ll find hundreds of problems (which don\u2019t really  exist) and then offer to fix all the problems they find if you buy the program.  While there are certainly some legitimate software programs that work this way,  they don\u2019t jump out at you from a Web site and start warning you of problems.  And these bogus security programs that sell themselves to you by scaring the  daylights out of you often have authentic sounding names like \u201cWindows AntiVirus  2010?, \u201cSecurity Essentials 2010?, and dozens of other names designed to trick  you into thinking they\u2019re something they\u2019re not.<\/p>\n<p>The following is from  the FTC\u2019s excellent consumer fraud Web site:<\/p>\n<p>\u201cAccording to attorneys at  the Federal Trade Commission (FTC), the nation\u2019s consumer protection agency,  scammers have found ways to create realistic but phony \u201csecurity alerts.\u201d Though  the \u201calerts\u201d look like they\u2019re being generated by your computer, they actually  are created by a con artist and sent through your Internet browser.<\/p>\n<p>These  programs are called \u201cscareware\u201d because they exploit a person\u2019s fear of online  viruses and security threats. The scam has many variations, but there are some  telltale signs. For example:<\/p>\n<p>* you may get ads that promise to \u201cdelete  viruses or spyware,\u201d \u201cprotect privacy,\u201d \u201cimprove computer function,\u201d \u201cremove  harmful files,\u201d or \u201cclean your registry;\u201d<br \/>\n* you may get \u201calerts\u201d about  \u201cmalicious software\u201d or \u201cillegal pornography on your computer;\u201d<br \/>\n* you may be  invited to download free software for a security scan or to improve your  system;<br \/>\n* you could get pop-ups that claim your security software is  out-of-date and your computer is in immediate danger;<br \/>\n* you may suddenly  encounter an unfamiliar website that claims to have performed a security scan  and prompts you to download new software.<\/p>\n<p>Scareware purveyors also go to  great lengths to make their product and service look legitimate. For example, if  you buy the software, you may get an email receipt with a customer service phone  number. If you call, you\u2019re likely to be connected to someone, but that alone  does not mean the company is legitimate. Regardless, remember that these are  well-organized and profitable schemes designed to rip people off.<\/p>\n<p>How do  the scammers do it?<\/p>\n<p>Scareware schemes can be quite sophisticated. The  scam artists buy ad space on trusted, popular websites. Even though the ads look  legitimate and harmless to the website\u2019s operator, they actually redirect  unsuspecting visitors to a fraudulent website that performs a bogus security  scan. The site then causes a barrage of urgent pop-up messages that pressure  users into downloading worthless software\u2026..\u201d<\/p>\n<p>What can you do?<\/p>\n<p>If  you\u2019re faced with any of the warning signs of a scareware scam or you suspect a  problem, shut down your browser immediately. DO NOT click \u201cNO\u201d or \u201cCancel\u201d or  the \u201cX\u201d in the top-right corner of your browser. Most scareware trickery knows  that you\u2019ll try to close your browser in the middle of their pop-up and warning  frenzy. So, \u2018NO\u201d, \u201cCANCEL\u201d and even the \u201cX\u201d in the top-right corner will  activate the download.<\/p>\n<p>So how can you safely shut down your browser in  the middle of one of these scareware routines? You can press the ALT plus F4  keys in sequence \u2013 that will close the window in focus (the window on top). If  there are underlying windows, you can keep pressing ALT + F4 until all the  windows are closed. If that doesn&#8217;t work,  you can right-click on your task bar  and choose \u201cTask Manager\u201d (or press Ctrl + Alt + Delete) click on Processes and  highlight Internet Explorer or Firefox (or whatever browser you use) and  right-click and choose \u201cEnd Process Tree\u201d. This forces all instances of the  browser to shut down immediately. The safest way to escape is simply to turn off  your computer at the power switch. Simple. Certain.<\/p>\n<p>How do you know if a  security program is legitimate or a scareware scam? You have the world at your  fingertips \u2013 literally. Type in the name of the software program in Google (or  your favorite search engine) and read the results. Most scams will show up as  scams and legitimate programs will show up as legitimate. It only takes a few  minutes of your time and it can save you hours of grief and hard earned  money.<\/p>\n<p>Check that your security software is active and current: at a  minimum, your computer should have anti-virus and two anti-spyware software  programs. Windows XP, Windows Vista and Windows 7 users should make sure that  the Windows firewall is enabled.<\/p>\n<p>If you have a new computer, remember  that the security software that came installed on your computer (normally -and  unfortunately- Norton or McAfee) when you bought is Trial Software and it will  work for only a short time \u2014 unless you pay a subscription fee to keep it  working. Trouble is, that many times these programs will simply stop updating  after your subscription expires, even though the program still starts with  Windows and appears to be working. Therefore, many people are using very  outdated security software and don\u2019t realize they are not protected. Others know  it is expired and not updating, but figure that something is better then nothing  at all. Not so!<\/p>\n<p>If you bought a computer recently and you\u2019re still using  the security software that came with your computer, now is a good time to get  rid of it and get something that works and that won\u2019t cost you an arm and a leg  every year or go ahead and pay McAfee or Norton\u2019s annual ransom. But, either  way, do not continue using out-dated security software or you\u2019ll not be  protected at all.<\/p>\n<p>We strongly recommend if you have McAfee or Norton you  dump whichever you have and get the programs we recommend instead (Microsoft  Security Essentials, SuperAntiSpyware, Malwarebytes) and leave your Windows  Firewall turned on. If you\u2019ve had Norton, McAfee, Zone Alarm or any other  program which includes or which is a third-party firewall, you might find that  your Windows Firewall has been disabled. If so, you can turn it back on by  clicking Control Panel, Security Center, and making sure your Windows Firewall  is enabled.<\/p>\n<p>Don\u2019t click on links within pop-ups generated by products you  don\u2019t recognize. Don\u2019t click links in emails that come from unknown senders. Use  care when opening your email \u2013 shut off the Windows Mail \/ Outlook Express  preview pane. Don\u2019t fall for the \u201cA friend sent you a birthday greeting\u201d (or  similar) E-card scam. Don\u2019t visit sites known for questionable content (like  adult sites, ware\/z sites, or questionable game or music download  sites).<\/p>\n<p>If you think you\u2019ve been scammed or defrauded, report it to by  going to <a href=\"http:\/\/www.ftc.gov\/\">www.ftc.gov<\/a> or calling 1-877-FTC-HELP  (1-877-382-4357) . Be prepared to give details about the purchase \u2014 including  what website you were visiting when you were redirected. Any information you can  give is helpful to investigators. The FTC enters consumer complaints into the  Consumer Sentinel Network, a secure online database and investigative tool used  by hundreds of civil and criminal law enforcement agencies in the U.S. and  abroad. If you would like more information about the FTC\u2019s program to stop  online scams and schemes designed to defraud consumers, visit <a href=\"http:\/\/www.onguardonline.gov\/\">www.OnGuardOnline.gov<\/a> . It\u2019s an  excellent site with lots of good information on how you can protect yourself,  your identity and your money.<\/p>\n<p>IMPORTANT! Please read:<\/p>\n<p>And remember  \u2013 no matter which antispyware or antivirus program you use, most will not  protect you from rogue security programs. Why? Because rogue security programs  are tricky \u2013 they install as normal software. The criminals who make rogue  security software are not stupid. They are excellent programmers who know how to  make programs that can evade detection &#8211; and even shut down Windows Security  Center &#8211; thus rendering normal antispyware \/ antivirus programs useless.<\/p>\n<p><span style=\"font-size: small;\">Since rogue security software is made to mimic legitimate Windows software,   it often installs without being detected by most antivirus and antispyware  programs. Scareware or rogue security programs spread by various means &#8211;  sometimes even by SQL injection (which means that innocent sites who are not  protected from these kinds of attacks, become unwitting purveyors of scareware &#8211;  when malware is injected surreptitiously on their servers). Sometimes scareware  is propagated by sites created by the scareware developers themselves. However  the scareware is advertised &#8211; one thing that always happens is that the sites  spawn popups with animated gifs made to look like something is scanning your  computer. These scans look genuine. They look like actual Windows warning  dialogs &#8211; and even those of us who have seen them before can be caught off  guard.  And always at the end of the fake scan, many problems (most of them  serious and scary) will be detected; and all will be fake. The fix for the fake  problems is the scareware program. The scareware requires the user to take  action \u2013 i.e. click a download link. But many times closing the window is the  same as clicking the download link. It\u2019s tricky. You have to be careful. You can  tell if a rogue attack is going on because no legitimate security software  starts scanning your computer from a web site without being initiated by you. No  legitimate security software will flash a warning, randomly in your browser,  from a web page, that you\u2019re infected with spyware, viruses, or other malicious  software. The only time legitimate security software warns you, is if you\u2019ve  downloaded malicious programs or files. Some legitimate security programs may  warn you that a site is unsafe \u2013 but it never tells you that your computer is  infected when you are simply viewing a Web page. Legitimate security software  warns you only if you download something malicious or when you\u2019ve come to a site  with malicious content.<\/span><\/p>\n<p><span style=\"font-size: small;\">The worst part about scareware is that in order to clean the infections which  it detected but which don&#8217;t really exist, you will have to pay $39, $49, even  $69. And when you buy it, of course, all your problems go away &#8211; because the  scareware detected problems which never existed in the first place. To add  insult to injury, many of these rogue (or scareware) programs are spyware  themselves. So after you&#8217;ve paid for them, you have spyware on your computer  which may be sending sensitive data back to the criminals who already stole your  money. And this is all legal on the Internet. Theft by Deception will get you a  jail term almost anywhere in the world &#8211; but not on the Internet.<\/span><\/p>\n<p><span style=\"font-size: small;\">There are literally hundreds of scareware programs out there &#8211; with  legitimate sounding names like &#8220;Windows AntiVirus 2011&#8221;, &#8220;XP Security 2011&#8221;, or  any of a hundred other legitimate-sounding names.<\/span><\/p>\n<p>You have to learn to  tell by the actions a rogue security\/scareware program takes and by the methods  it uses; you cannot simply rely on antispyware or antivirus  or any software to  protect you all of the time. There are no guarantees that new rogues will be  recognized by any security software program. More and more, your security  depends on your knowledge and your experience. In short, your security rests  with you!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We thought it would be a good time to remind all of you, once again, not to fall for these malicious \u2013 and costly scams. You really have to be careful \u2013 rogue security programs are everywhere. No doubt you\u2019re already too well aware that on your travels around the Web you\u2019re bound to be to come across\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/theft-by-deception-is-legal-on-the-internet\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[1279,1280,1157,1275,1278,1281],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/2265"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=2265"}],"version-history":[{"count":1,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/2265\/revisions"}],"predecessor-version":[{"id":2266,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/2265\/revisions\/2266"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=2265"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=2265"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=2265"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}