Verified by Visa Scam: How to Spot the Fake.

Verified by Visa Scam: How to Spot the Fake.

Update: Learn about Visa’s (rumored) replacement for Verified by Visa, V.me.

Keep on the lookout for a scam regarding the Verified by Visa (VbV) program; a legitimate security layer set up to provide increased protection for your data for online purchases. Internet scam artists are sending out spam linking to fake versions of the program that do nothing to protect you.

The Verified by Visa program is part of the 3-D Secure protocol (developed by Visa), with similar programs adopted by Mastercard (SecureCode) and JCB (J/Secure). These programs provide an additional authentication step (i.e. a password request) for your online purchases through participating Internet retailers. This added step is set up to help ensure your identity at the time of purchase. Here’s the official word from Visa:

In addition to our other ways of preventing, detecting, and resolving fraud, we offer Verified by Visa, a free, simple-to-use service that confirms your identity with an extra password when you make an online transaction.

Phishers are casting their lines and looking for new victims. The bait they’re using is usually an email that looks like the real deal, but ultimately leads to a scam website that tries to get you to submit your credit card number and other information under the guise of the Verified by Visa program. Luckily we’ve got three suggestions for you to protect yourself from getting caught by this scam:

  1. Scrutinize your email:

    Most Verified by Visa phishing attempts start with an official-looking email that requests you to join. However, Visa isn’t sending out emails to customers in order to get them to sign up. The usual way you’d get the Verified by Visa sign up option is through a participating retailer as you begin the checkout process on their website. If you receive one of these emails, call your Visa provider and ask them to verify if the email is legit. Chances are it’s not.

  2. Watch where you’re surfing:

    If you do happen to click on the link from your email, be careful. Phishers and other scam artists are great at copying real websites and making their VbV scam version look legitimate. Check the URL, or web address, that you’re on to make sure you’re on the real site. See our blog post entitled “How to Spot a Fake Website” for more information.

  3. Go to the source:

    If you’re interested in signing up for the Verified by Visa program or learning more about it, visit the official Verified by Visa FAQ.

As always, be wary of emails in your inbox asking you to sign up for anything or giving you a link to click on to enter any of your information.

If you're looking for great anti-virus software that won't break the bank, try StopSign. You don't pay extra for tech support for difficult malware, and our web protection software just works. Download & install StopSign to find out why our members choose us over the other options.

Getting Started with Internet Safety.

Getting Started with Internet Safety.

As parents, the topic of Internet safety isn’t always one that’s always easy to navigate, but it’s certainly one of the most important things to integrate into our lives. For many of us, computers and the Internet aren’t things that were ever-present while growing up; at least not like they are today. These days it seems like every kid in Kindergarten knows how to access the web, and most teens have some kind of Facebook or MySpace account.

Because it’s tough to know where to start, we’ve got a few suggestions to help make the process of making the Internet a safe place to visit (at least in your home) an easier task. While this is by no means an exhaustive list, it’s a good starting point to use or modify to fit the needs of your family.

  • Keep Internet-enabled computers out in the open:

    Allowing a computer to be used in private isn’t necessarily a bad thing, but it’s not necessarily a good thing, either. Whether or not your kids are viewing inappropriate websites or their chat/email conversations are getting out of hand, keeping computers in an open space allows you to periodically check up on your children to make sure they’re handling the responsibility of Internet usage properly.

    We suggest that you keep any computers that can access the Internet to be in plain view of everyone. Bringing a laptop to the kitchen table, setting up a desk in the living room, or anything else that will keep the screen of the computer easily visible are all good starts.

  • Set times limits for casual Internet usage:

    It’s a good idea to set time limits for children to be able to check their email, IM with friends, or update their Facebook pages. Time limits ensure that your kids get to have a bit of fun, but not get so wrapped up in the Internet that things like homework or family time get pushed aside.

    Whether you set up limits on daily usage (e.g. no more than 2 hours per day), or whether you set up a specific block of time (e.g. between 7:00PM and 9:00PM), a schedule helps everyone understand when the appropriate time to surf the web is, and to schedule other events around it. It also ensures that you know when you’ll be able to check your Facebook page, too. ๐Ÿ™‚

  • Verify browser settings and check their history:

    Setting up an appropriate browsing environment is especially important for younger children, but even teens and young adults can benefit from some added safety settings. Make sure that the security settings on your browser aren’t set too low, making it easier for malicious software (“malware”) to get onto your computer. Also make sure that the browser history is left intact so that you can periodically review where your kids have been browsing.

  • Know who your kids are chatting with online:

    Just like you want to know who your kids are friends with in real life, the same should go for their online friends. Who they are and what they talk about are important pieces of information for a parent to know.

    More than likely their friends are other family members or kids from school, but the Internet is a big place, and not everyone is who they say they are. Things to check for should include sending photos of themselves to strangers, arranging to meet anyone they don’t know in real life, and inappropriate chat/email conversations.

  • Talk to your kids about Internet safety:

    Above all, make sure that you sit down and talk with your kids about Internet safety, your expectations, and what is appropriate and inappropriate for your kids and your family to view or search for online. Curiosity or accidentally clicking on a bad link are one thing, but actively searching for illicit materials or engaging in dangerous or inappropriate behaviors are another. Set firm boundaries so that there are no questions regarding what’s OK and what’s not OK.

If you have any additional tips or suggestions, or even how you’ve set up a safe Internet environment in your home, we’d love to hear from you. Just leave us a comment below and share your story.

If you're looking for great anti-virus software that won't break the bank, try StopSign. You don't pay extra for tech support for difficult malware, and our web protection software just works. Download & install StopSign to find out why our members choose us over the other options.

What’s a “botnet”?

What’s a “botnet”?

botnet (bot·net) noun A collection of software robots that’s normally associated with malicious software. Botnets are notorious for being platforms for spam distribution.

The term botnet can refer to any group of software “robots” and normally consists of a collection of compromised (“zombie”) computers running the botnet software. In most cases the PCs running the botnet software are turned into zombie computers unknowingly, usually through drive-by downloads (software that is downloaded and automatically installed through exploited browser vulnerabilities, or by software worms, Trojan horses, or other malware). Botnets are usually controlled remotely by a botmaster using a central command-and-control interface on his or her computer.

A really good botnet can be installed on a user’s machine and never arouse any suspicion to the user through normal means of detection such as computer performance slowdowns, increased bandwidth usage, pop-ups, etc. It’s possible that a PC can be the unknowing accomplice to a number of blackhat operations, including:

  • Spam:

    By utilizing it’s network of zombie computers, a botnet can be a powerful spam distribution platform. Millions of spam emails are sent out by botnets every day.

  • DDoS:

    With enough infected computers, issuing a Distributed Denial of Service Attack (flooding a website with enough bogus traffic to bring it down) can easily be done with a botnet.

  • Spreading malware:

    A zombie PC in a botnet can also be set up to not only self-propagate onto other unsuspecting computers, but it can also be a delivery system for other forms of malware, too. (viruses, spyware, Trojans, etc.)

  • Information collection:

    Sometimes the only job of the zombies in a botnet is to collect information about the human host: what they click on, who they email, their passwords, etc.

If you're looking for great anti-virus software that won't break the bank, try StopSign. You don't pay extra for tech support for difficult malware, and our web protection software just works. Download & install StopSign to find out why our members choose us over the other options.

How to Deal with a CyberBully.

How to Deal with a CyberBully.

If you’re a parent, you’ve undoubtedly heard about cyberbullying in the media. If you’re a student, there’s a good chance you’ve not only heard about it, you may have been the victim of a cyberbully, or maybe one of your friends has been the target of an attack. The fact is, with the explosive growth the Internet has had since the early 1990’s, cyberbullying has become more and more prevalent and no one seems to be immune.

Just like bullies in the real world, cyberbullies get pleasure from tormenting their victims and the feeling of power from doing it. The reasons for their actions vary, but the end result is almost always the same for the victim: pain, hurt, revulsion, broken confidence, and in the worst cases, death. There’s no guarantee that you, a friend, or a loved one won’t be bullied online, but there are steps that you can take to help lessen their effect and maybe even get them to stop altogether.

Keeping in mind that every case is different, here are some tips that parents, students, and anyone else who may be dealing with a bully can use to help diffuse the situation. With any luck the days of dealing with threatening and/or harassing people will be short lived.

  • Block any cyberbully you meet online:

    If they can’t contact you, it’s much harder to annoy you. Most services and/or social networking websites have a way to block another user, and if you or someone you know is being bothered, don’t be afraid of blocking them.

  • Remember that cyberbullying is a big deal:

    It’s never OK for anyone to harass you, belittle you, or threaten to harm you. If you’re dealing with a bully, make sure to tell a trusted person like a parent, guardian, or teacher. The quicker a responsible adult knows about the situation, the quicker it can be resolved.

  • Don’t delete any threatening or harassing messages:

    In many cases bullying comes down to a “he said/she said” scenario. If you’ve been bullied and you have hard evidence, keep it to prove your case. Without it, you’ll have a hard time convincing anyone else otherwise.

  • Don’t pass along cyberbullying messages:

    If a friend or relative asks you to forward anything harassing to someone else, or if they ask you to join in harassing someone, just say no. Don’t be a part of the problem, be part of the solution.

  • Donโ€™t open or read messages from a cyberbully:

    It may be hard to do, but if someone continually sends you emails, instant messages, or phone calls that threaten or harass you, don’t respond. Most bullies thrive on your reaction, and not letting them get to you lessens the likelihood that they’ll continue.

  • Report cyberbullying to a trusted adult:

    Friends, parents, teachers, law enforcement officials… any of these people can help you if you’re being cyberbullied. And if you’re threatened with physical harm, inform the local police immediately.

Keeping safe from cyberbullies is often a matter of removing their ability to bother you and/or just ignoring them. If that doesn’t work, it’s time to get other people involved. Don’t be a victim, stand up for your rights, and be safe!

If you're looking for great anti-virus software that won't break the bank, try StopSign. You don't pay extra for tech support for difficult malware, and our web protection software just works. Download & install StopSign to find out why our members choose us over the other options.

StopSign Review: 5 Cow Rating from Tucows.com

StopSign Review: 5 Cow Rating from Tucows.com

We’re thrilled to announce that our StopSign™ Internet Security software has received a “5 Cows” rating by the download site Tucows in a recent review.

StopSign received favorable ratings in all categories of the rigorous Tucows evaluation process, and we could not be more honored by this spectacular review from one of the most venerable download and Internet services sites online. The Tucows.com review of StopSign is definitely one of our proudest moments in recent history.

Tucows is a well known and trusted Internet services company which hosts over 40,000 software titles that are all tested to be virus and spyware free. Their Tucows Rating Guide details the stringent requirements needed for a positive rating, and sets the bar to which reviewed products must reach for in order to get a good review.

StopSign's 5-cow review from Tucows.com

Image courtesy of Tucows.com

If you're looking for great anti-virus software that won't break the bank, try StopSign. You don't pay extra for tech support for difficult malware, and our web protection software just works. Download & install StopSign to find out why our members choose us over the other options.

Census Scams Strike at Citizens.

Census Scams Strike at Citizens.

If you live in the United States, you’ve probably already heard that the 2010 US Census is making its way across the country. What you may not know, however, is that with the Census comes a legion of fraudsters trying to pull a fast one on folks like you and I.

We’d like to remind everyone that the 2010 US Census will only arrive in a physical mail box, and not your email inbox or anywhere online! Scammers are already hard at work sending phishing emails and setting up fake web sites, trying to get people to reveal personal and/or financial information for the Census. Do not respond to these US Census scam emails and web sites! They’ll only lead to scams, phishing, and worse.

The US Census Bureau has a Fraudulent Activity and Scams web page that gives more information on how they’ll contact you:

  • The Census Bureau does NOT conduct the 2010 Census via the Internet
  • The Census Bureau does not send emails about participating in the 2010 Census
  • The Census Bureau never:
    • Asks for your full social security number
    • Asks for money or a donation
    • Sends requests on behalf of a political party
    • Requests PIN codes, passwords or similar access information for credit cards, banks or other financial accounts.

For more details on official US Census policy, visit the US Census web site.

If you're looking for great anti-virus software that won't break the bank, try StopSign. You don't pay extra for tech support for difficult malware, and our web protection software just works. Download & install StopSign to find out why our members choose us over the other options.