For many, the daily walk to the mailbox evokes mixed feelings: The glee that your favorite monthly magazine ? or a friend's hand-written letter (quite a surprise in the e-mail age) may be waiting is countered by anxiety of how many bills the postman left you.
Now, imagine coming across your phone bill, thicker and heavier than normal. When you open it, instead of "statement stuffers" from the phone company's marketing department, the bill is dozens of pages long ending in a one-month total of almost $5,400.
A quick glance at the details reveals hundreds of calls to the same 1-900 number. "A mistake," you insist. After all, you're the only person in the house and you have never called a 900 number before. Actually, this is no mistake. In this true story, the homeowner had fallen victim to one of the oldest computer scams around: the "Auto-Dialer" virus.
How Did This Computer Security Nightmare Begin
-----------------------------------------------------------
What is an "auto-dialer"? Some time ago, the phone companies came up with a feature that allowed merchants to reach a broader range of customers by allowing consumers to make payments via your phone bill. If you did not have a credit card, you just dialed a 900 number, connected by voice or modem (for Internet sites). Every minute you used the service, you were charged a fee ranging from $1 to $5 or more per minute. At month's end, the charge appeared on the phone bill. Many services were legit: Consumers called weather, horoscope and gambling services offering this feature. But many merchants sold expensive phone or online adult content.
How Did An Auto-Dialer Get Installed
-----------------------------------------------------------
But how did $5,400 in charges end up on the person's phone bill? Although many of these services require the user to physically dial the number or connect to the online site by instructing the modem to dial the number, this can happen without the user's knowledge. In the above case, the person's computer was infected with an auto-dialer virus. Somewhere during his Web travels, he connected to a site that popped up a rather confusing message instructing him to "Hit OK" to make the message go away. What this person didn't know was he was agreeing to download,install, and execute an adult content auto-dialer.
Behind the scene, the auto-dialer installed itself, checked for the presence of a modem and dial tone, and then proceeded to dial an overseas 900 number over and over again. Even though the person surfed using an always-on broadband Internet connection, the modem remained so he could send and receive faxes. One problem: When he wasn't using the modem, it remained plugged into the phone jack. Why should he have unplugged it? It's not like it could hurt anything, right? Wrong.
How To Protect Yourself
-----------------------------------------------------------
Unfortunately, there is no single solution to avoid these types of malicious acts. A short list of protective measures would include:
1) If you no longer need a modem in your computer, remove it. Or at least disconnect the phone line from the modem;
2) Install anti-virus software such as Trend Micro or Symantec's Norton Anti-Virus. Many are designed to prevent this kind of malicious software, or "Malware." More importantly, make sure your subscription for new virus patterns is current and configured to automatically download and install updates;
3) Install and regularly run Adware protection solutions such as LavaSoft's Ad-Aware or SpyBot Search & Destroy;
4) And do not, under any circumstances, blindly hit "OK" to pop-ups or similar annoyances without first making sure what you are agreeing to.
This tale is not fiction; in fact, it happens frequently, to businesses and consumers, kids and adults. But even the least savvy among us can thwart such an attack. A neighborhood teenager recently avoided potentially thousands in fees when an auto-dialer was downloaded and installed. How? She had unplugged the modem.
About The Author
----------------
Darren Miller is an Industry leading computer and internet security consultant. At the website - http://www.defendingthenet.com you will find information about computer security specifically design to assist home, home business and small business computer users. Sign up for defending the nets newsletter and stay informed and empowered to stay safe on the Internet. You can reach Darren at mailto:darren.miller@paralogic.net or at mailto:defendthenet@paralogic.net
URL
---
http://www.defendingthe
net.com/NewsLetters/Auto-Dialer-Newsletter.htm
![]() |
|
![]() |
|
![]() |
|
![]() |
Imagine this ? you open up your email box and... Read More
1)Spyware is on your system. Like it or not, statistically... Read More
Since its birth, the Internet has grown and expanded to... Read More
When it comes to reporting Internet scams most of us... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
One evening, during the graveyard shift, an AOL technical support... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
Computer security for most can be described in 2 words,... Read More
First, let's do a little recap'. As I stated in... Read More
Microsoft routinely releases new security updates, many of which are... Read More
Today,on most internet user's computers, we have the ability to... Read More
During the release of a new software product specialized to... Read More
If you know what is the 'Fishing' then it's very... Read More
Ebay is a great site and is used by many... Read More
Spyware and adware are becoming major problems for online surfers... Read More
There is no doubt that "how-to articles" have become a... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
Viruses are, however, not the only malicious software programs out... Read More
A few nights ago I received an email from "2CO"... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
The trash folder in my main inbox hit 4000 today.... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
A new variation of the Nigerian Scam theme ... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
I am the victim of an internet scam. It is... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
To blog or not to blog? Well, why not? Lots... Read More
This really chapped my lips...I recently bought a new computer.... Read More
Despite the current wave of identity theft and corporate security... Read More
Spyware is software or hardware installed on a computer without... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
You've seen it in the news - 40 million credit... Read More
P C. owners are constantly at risk from attacks by... Read More
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
If you constantly deal with bank or electronic accounts, it... Read More
When we think of adware, what comes to mind are... Read More
There are several basic concepts to keep in mind when... Read More
Everyone should eliminate spyware and adware from your hard drive... Read More
Did you know...? 1 in 5 children who use computer... Read More
Spyware symptoms happen when your computer gets bogged down with... Read More
We all know that it's dangerous to use the same... Read More
Identity theft ? also known as ID theft, identity fraud... Read More
Identity theft is one of the most common criminal acts... Read More
As you know, this time the virus under the name... Read More
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More
The money being spent online is steadily growing. With billions... Read More
Credit card fraud is a growing problem for online businesses... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
A couple of days ago, I was searching for a... Read More
Have you ever had to call Symantec or McAfee to... Read More
Electronic Fraud and Identity Theft Human beings are pretty... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
Over £5 billion pounds was spent on online shopping in... Read More
A couple of years back, I paid my dues the... Read More
The Threat10 years ago you could probably have run no... Read More
Whether we like it or not, we are all living... Read More
Spelt phishing, but pronounced as above, this despicable act is... Read More
Huge number of spyware software applications are available in the... Read More
Having a good Spyware eliminator on your computer is vital... Read More
In a word, no - an email message has always... Read More
Before you enter your name, address or any other data... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
My first experience with a spyware BHO based infection was... Read More
Internet Security |