Tips: Watch Out For Bots

According to the National Cyber Security Alliance, bots are the Internet’s fastest-growing cyber crime and 71 percent of consumers lack knowledge about this online threat. October is recognized as National Cyber Security Awareness Month and as the nation’s largest residential Internet Service Provider, Comcast is committed to informing consumers about how to have a safe and secure online experience.

“Online criminals are savvy and are developing more sophisticated ways to steal personal data, financial information, and the entire identities of unsuspecting people,” said Jay Opperman, Senior Director of Security and Privacy at Comcast. “According to the Federal Trade Commission, as many as nine million Americans have their identities stolen each year so it’s important that consumers learn how to protect themselves and their families from online scams that can lead to identity theft.”

A bot, also known as a Web robot, is a form of malicious software that is used to gain control over a computer. Once a bot is in control, the computer can be used to send spam, host phishing sites or infect other computers. Online thieves use bots to collect personal data about people such as their social security numbers, bank account information, and credit card information. When this personal data is collected, it is often used maliciously which can result in identity theft.

“A person can unknowingly infect their computer with a bot by not protecting his or her PC with anti-virus and security software, opening suspicious e-mails and/or e-mail attachments, or downloading software from a Web site with an unknown or falsified brand,” said Opperman.

Signs that indicate a computer may be infected with a bot include:

  • Numerous undelivered e-mail notifications in your inbox to unknown e-mail addresses. Bots will frequently use e-mail accounts to send out spam. Spam to unknown e-mail addresses will result in a failure to deliver notification in your inbox.
  • Suspicious e-mail account activity. Bots create multiple e-mail addresses in your e-mail account. If you notice additional e-mail addresses in your account, that you did not create, you may have an infected computer.
  • Multiple toolbars on your Internet browser. Bots will frequently install various toolbars to help collect search information from your browser.
  • Frequent flashing of the data light on your cable modem. If the data light constantly flashes for a period of days when you are not using the Internet, a bot could be operating on the computer.
  • Unusual error messages. Error messages that suggest applications cannot run or drives cannot be accessed can be indications of a bot infection.

To help prevent a bot infection, Comcast recommends the following tips:

  • Keep your computer protected by downloading reputable anti-virus and security software.
  • Make sure your computer is set to receive auto security updates.
  • Avoid downloading software from a Web site with an unknown or falsified brand.
  • Do not click through or open suspicious e-mails or e-mail attachments.
  • Avoid social networking scams -- never provide your personal information (i.e. social security number, credit card numbers) to e-mails that solicit this information, even if the e-mail looks to be from a legitimate company or brand that you recognize. A legitimate company would not request this information via e-mail.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3