Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec

Hackers target donation sites in run up to charity season.

Webroot Software : 16 November, 2007  (Technical Article)
Webroot offers advice to users of charitable donation sites to prevent further victims of credit card fraud and identity theft as hackers target such sites during the Christmas season when donations are at their peak.
Webroot Software urges Internet users to exercise caution when visiting websites dedicated to charitable causes, which can expose users' personal information to cyber criminals.

"We are seeing increases in spoofing and typo squatting around events that are driving traffic on the Web. Internet users need to think about protection and good habits when surfing online for information or donating," said Nick Banks, Managing Director of EMEA, Webroot Software. "Unfortunately, because cyber criminals are targeting heavily trafficked websites, donors seeking to contribute to worthy causes have to use caution when visiting these sites. Do not download applications such as screensavers or videos unless you know they are coming from a trusted source. This type of seemingly benign behavior will make them more susceptible to an attack from hackers."

"Children in Need's" fundraising activities have been taking place throughout the year, but on Friday 16th November 2007, its expected that more than several million people will watch a dedicated televised fundraising and awareness initiative, with a proportion of them sure to visit related websites with the intention of donating. Dating back to 1980, "Children in Need" has provoked the nation to open its purses and give generously to the cause by televising the appeal in the format we have learned to recognise today. £33 million was donated in 2006.
As Internet usage increases, Webroot cautions users about a potential spike in the instances of system monitors and keyloggers which can easily be downloaded onto a computer from a spoofed Website. Classified as some of the most dangerous computer security threats, system monitors and keyloggers can track and record a user's individual keystrokes, making it easy for spyware criminals to steal personal information such as credit card numbers or bank account numbers.

"We recently saw an example of spoofing and typo squatting in the US surrounding their Presidential candidate Websites," added Banks. "Donors were giving their credit or debit card numbers to cyber thieves because they simply made a typographical error, or selected the wrong Website. We also saw a large number of Trojan Horse downloads. They can be used to take control of a person's computer or to load potentially unwanted software onto their machines like keyloggers or system monitors for stealing other personal information."

To help Internet users ensure the safety of their information, Webroot is offering a free computer scan to check for spyware, viruses and other threatening forms of malware. Users can visit Webroot's website and run a complete, deep scan of their system.

In addition to running a free spyware and virus scan, Webroot recommends users adhere to the following best practices when placing online wagers:.

Keep your computer protected: Run updated versions of best-of-breed anti-spyware and anti-virus software and firewall. Scan your entire system at least once a week.

Follow general best practices for online purchasing: According to, all secure websites have the following characteristics in common:.

* The website address should begin with 'https:'
* The page should display a closed padlock symbol or state that information is encrypted
* Every Website should have a privacy policy. The statement should advise what information is collected, how it will be used, and provide you with an opportunity to refuse having your information sold or shared with others.
* Monitor Your Credit: Many victims do not realise they are a victim until they have lost a lot of money. It is important to monitor your credit report and/or credit status on a regular basis to quickly spot anything unusual.
* Use a Credit Card not a Debit Card: If you are a victim of fraud or cyber crime, most credit card agreements limit your liability for the charges and you won't compromise any accounts linked to your banking.
Bookmark and Share
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo