During this holiday season, hackers are increasing their efforts to contact consumers in a variety of ways. They are currently using robo calls to contact people saying they are from Microsoft and have found malware on your computer. By simply allowing them to take over your computer for a minute, they tell unsuspecting consumers that they will eliminate the malware, when in fact they are loading it on. Tim Erlin, Director of IT Security and Risk Management at Tripwire says you have to be extra careful not only during the holidays, but year round.
[su_note note_color=”#ffffcc” text_color=”#00000″]Tim Erlin, Director of Security and Product Management at Tripwire :
“The FCC offers some simple, and effective, advice for dealing with phone scams, say “No thank you,” then hang up and file a complaint with the FCC.
Most people simple don’t imagine that a cyberattack can be initiated over the phone, but these scams ultimately lead to malware being installed on your computer.
If you’re concerned that the call might be legitimate and you want to ensure you’re not missing something, hanging up and calling the organization or company back on a verifiable phone number is a good policy. If you’re having a hard time understanding which actual company to call, that’s probably a red flag.
Unfortunately, scams around the holidays are nothing new, and they tend to be effective with the very folks who don’t read this kinds of articles.
It’s always good to approach unsolicited phone calls with a healthy dose of skepticism.”[/su_note][su_box title=”About Tripwire” style=”noise” box_color=”#336588″]Tripwire is a leading provider of advanced threat, security and compliance solutions that enable enterprises, service providers and government agencies to confidently detect, prevent and respond to cybersecurity threats. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business-context and enable security automation through enterprise integration. Tripwire’s portfolio of enterprise-class security solutions includes configuration and policy management, file integrity monitoring, vulnerability management and log intelligence.[/su_box]
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.