Tips: Watch Out For Bots

According to the National Cyber Security Alliance, bots are the Internet’s fastest-growing cyber crime and 71 percent of consumers lack knowledge about this online threat. October is recognized as National Cyber Security Awareness Month and as the nation’s largest residential Internet Service Provider, Comcast is committed to informing consumers about how to have a safe and secure online experience.

“Online criminals are savvy and are developing more sophisticated ways to steal personal data, financial information, and the entire identities of unsuspecting people,” said Jay Opperman, Senior Director of Security and Privacy at Comcast. “According to the Federal Trade Commission, as many as nine million Americans have their identities stolen each year so it’s important that consumers learn how to protect themselves and their families from online scams that can lead to identity theft.”

A bot, also known as a Web robot, is a form of malicious software that is used to gain control over a computer. Once a bot is in control, the computer can be used to send spam, host phishing sites or infect other computers. Online thieves use bots to collect personal data about people such as their social security numbers, bank account information, and credit card information. When this personal data is collected, it is often used maliciously which can result in identity theft.

“A person can unknowingly infect their computer with a bot by not protecting his or her PC with anti-virus and security software, opening suspicious e-mails and/or e-mail attachments, or downloading software from a Web site with an unknown or falsified brand,” said Opperman.

Signs that indicate a computer may be infected with a bot include:

  • Numerous undelivered e-mail notifications in your inbox to unknown e-mail addresses. Bots will frequently use e-mail accounts to send out spam. Spam to unknown e-mail addresses will result in a failure to deliver notification in your inbox.
  • Suspicious e-mail account activity. Bots create multiple e-mail addresses in your e-mail account. If you notice additional e-mail addresses in your account, that you did not create, you may have an infected computer.
  • Multiple toolbars on your Internet browser. Bots will frequently install various toolbars to help collect search information from your browser.
  • Frequent flashing of the data light on your cable modem. If the data light constantly flashes for a period of days when you are not using the Internet, a bot could be operating on the computer.
  • Unusual error messages. Error messages that suggest applications cannot run or drives cannot be accessed can be indications of a bot infection.

To help prevent a bot infection, Comcast recommends the following tips:

  • Keep your computer protected by downloading reputable anti-virus and security software.
  • Make sure your computer is set to receive auto security updates.
  • Avoid downloading software from a Web site with an unknown or falsified brand.
  • Do not click through or open suspicious e-mails or e-mail attachments.
  • Avoid social networking scams -- never provide your personal information (i.e. social security number, credit card numbers) to e-mails that solicit this information, even if the e-mail looks to be from a legitimate company or brand that you recognize. A legitimate company would not request this information via e-mail.

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.