Hackers ask 'Will You Be My Valentine?' | Opinions | ChannelWorld.in

PARTNER HOTLINES

Hackers ask 'Will You Be My Valentine?'

Added on Feb 10, 2012 by Tony Bradley
Tony Bradley About the author

Tony Bradley

Tony Bradley is a columnist at PC World.

There are only five days to Valentine's Day. Those of you who are shocked by that revelation are prime targets for Valentine's Day related spam and phishing attacks as hackers hope to catch you with your guard down for this day of romance.

Messages targeting Valentine's Day are expected to quadruple globally in the coming days -- in part because cyber criminals are adept at targeting holidays and current events as bait for attacks. An offer for a dozen roses for $5 might get some traction any time of the year, but with the clock quickly counting down to Valentine's Day it has much higher odds of duping frantic lovers in search of a last minute gift.

A blog post from McAfee warns, "Many consumers look for a little romance on Valentine's Day, whether it is a thoughtful gift, a romantic getaway, or a heartfelt e-card, but if you're looking for these things online, beware."

McAfee points out a number of types of Valentine's Day themed threats you should be aware of:

Phishing Scams

Attackers will send out spam promoting bargains for flowers, romantic dinners, jewelry, or other Valentine's Day gift related themes. Clicking on the offer might take you to a malicious site that could compromise a vulnerable PC, or it could take you to a site that looks legitimate, and asks for your credit card, and other personal information to "complete the order".

Malicious eCards

Any holiday that traditionally involves giving and receiving cards is a prime target for cyber criminals. Everyone loves to receive a personalized greeting card -- especially if it seems to be from someone that may be romantically interested.

Seriously, though, what are the odds that someone you don't know decided to send you an ecard for Valentine's Day out of the blue? Right.

Mr. (or Mrs.) Wrong

Another scam to watch out for are fake profiles on online dating sites. Cyber criminals create online dating profiles designed to be as attractive as possible to lure unsuspecting love seekers. The idea is to make connections, and establish trust as a means to further criminal activity.

McAfee outlines some additional threats to watch out for in its blog post. To steer clear of Valentine's Day cyber threats, follow the basic principles of online common sense. Don't open emails or file attachments, or click on links from people or sources you are not familiar with -- and even if you do know the sender, think twice about whether that person would really send you a Valentine's Day email.

Another basic rule is that if it sounds too good to be true, it probably is. Don't fall for unbelievable last minute Valentine's Day gift ideas no matter how desperate you are for a gift.

Protect your wallet, your identity, and your heart by avoiding Valentine's Day cyber scams.

Latest Opinions

  • Consumers love Samsung, but don't trust Apple or Facebook

    Judging by its huge sales numbers and unrivaled consumer interest in its products, you'd think that no company in the tech arena was more beloved than Apple. Think again. It turns out Samsung is the "most reputable" tech company in the world, at least according to a recent survey of more than 5,000 consumers.

    Bill Snyder
  • Why Apple Watch is a business traveler's best friend

    Last month, a week after I got my Apple Watch, I took a trip from Boston to San Francisco to cover a wearable technology conference. I purposely loaded up on travel-related Watch apps -- or iPhone apps that have Apple Watch extensions -- with the idea that I'd write a post about my experiences.

    Al Sacco
  • Turning off Connect makes Apple Music better

    Connect is the part of Apple Music where you'll supposedly enjoy a close, personal relationship with the artists and bands you care about. But just artists, not your friends--unlike Spotify and Rdio, you can't build a list of your friends, see what they're listening to and enjoying, subscribe to each other's handmade playlists, or collaborate on a shared playlist, say, for an upcoming road trip or party.

    Susie Ochs
  • Think Retro: An iPhone in Newton's clothing?

    Last week, the vice president of design for Lenovo, the company which a decade ago bought IBM's computer division, floated the idea of creating a computer which is both thoroughly modern and yet which "embraces the original design details [of 1992's 700c] in the strongest way possible." Basically, he wants to make a retro ThinkPad with modern guts, and he wants to know if you'd buy it.

    Christopher Phin
Latest Videos

Vishal Dhupar: NVIDIA is taking Graphics Virtualization to the next level

Vishal Dhupar, MD - South Asia, NVIDIA, talks cloud GPU, the power of graphics virtualization and how NVIDIA is going to be one of the cornerstones of the smart city pie.

Revisiting Customer Strategy Pays: Ram Kumar R, Gemini Communication

R Ram Kumar, Director of Chennai’s Gemini Communication (GCL), explains at length why an overhaul of GCL’s customer strategy and re-establishing connect were vital in helping the company bounce back.

Praveen Sahai: EMC has Consolidated its Channel Partner Strategy

Praveen Sahai, VP Channels, India & SAARC is upbeat about EMC's 3 P channel strategy

EDITOR'S PICK

Why Flash Storage Will Rule: Analysts

Analysts say flash storage’s enviable speed and performance are stirring up a revolution in the Indian storage market, opening new opportunities for organizations. 

3 steps to digitizing your work for maximum productivity

From the earliest days as a marketing slogan, the elusive concept of the so-called paperless office may finally be taking shape, if anecdotal evidence is anything to go by. A growing number of small businesses and startups, unencumbered by legacy processes, are quietly ditching printouts for an all-digital ecosystem, buoyed by soaring BYOD ownership and growing familiarity with a plethora of cloud services.

Is the information security industry having a midlife crisis?

The information security industry is hot right now, but it's hot because it's failing. The daily announcements about breaches and lost data confirm that criminals are winning the security battle, but how can InfoSec reposition itself in order to win the war?

SLIDESHOWS

The State of the Internet

Akamai's Q1 2015 state of the internet report provides insights into key global statistics including connection speeds, broadband adoption (fixed and mobile networks), and IPv4 exhaustion and IPv6 implementation.

India Software Market on an Upswing

According to IDC, the Indian software market has witnessed consistent growth of 10 percent since the second half of 2014, showing signs of growth and revival. 

7 Jobs Technology Has Replaced

Albert Einstein said once that it has become appallingly obvious that our technology has exceeded our humanity. With every invention of technology some poor soul becomes vulnerable to losing his or her job in some corner of the world. Here are few jobs that will cease to exist soon.

Changing Fortunes of Top Tech Companies

The tech sector has been led by these companies for a long time. But how have they fared over the quarters?

India's Leading VADs

Why Channels Want to Partner With Inflow Technologies

Inflow Technologies’ tie up with 39 vendor companies, an extensive tech portfolio, and a services play, are great value propositions for enterprise channels, says its President and CEO, Byju Pillai.

iValue Creates Real Value for Channels in India

Focused on niche vendor alliances around data, network and app management backed by a robust channel ecosystem marked iValue's success in 2014. What clicked for the seven-year-old VAD?

RAH Infotech Shows Channels the Way Ahead

Mutual trust and long lasting bond with vendor companies and channel partners helps VADs to evolve and succeed in today’s aggressively competitive market. Leveraging competent channel partners and forge niche vendor alliances marks RAH Infotech’s success in 2014.

How Satcom Infotech is Adapting to New Security Landscape

As a leading value added distributor, Satcom Infotech is emerging as an end-to-end security player, helping both customers and partners grow.

How ComGuard Shields Channel Partners

As emerging technologies introduce new threats to the enterprise landscape, they are making channel partners anxious. But VADs like ComGuard are putting their worries to rest. Here's how.

Tech Chat

Collaborating To Outcome Based World: Priyadarshi Mohapatra, Avaya

Priyadarshi Mohapatra, Managing Director, India and SAARC, Avaya, on how IT is transitioning from a keep-the-lights-on role to one that enables customers to deliver results.

The Dawn of the Digital Age: Akhilesh Tuteja, KPMG

The development of digital infrastructure will be a key growth driver for technology and solution providers. 

Paradigm Shift from End-Users to User-First : Parag Arora,Citrix

Parag Arora, Area Vice President and India Head, India Sub-continent, Citrix, says new technologies will force organizations to take a user-first approach in 2015.

Mobile and Cloud Are Gamechangers of the Future: Karan Bajwa, Microsoft

Karan Bajwa, Managing Director, Microsoft India, says, in  2015, organizations will adopt a mobile-first and cloud-first strategy to get ahead of competition.

A Network for the Internet of Everything : Dinesh Malkani,Cisco

Dinesh Malkani, President, India and SAARC, Cisco, talks about IoT and the significant technology transitions in the networking world.

Moving to the Third Platform: Jaideep Mehta, IDC

Cloud and mobility are the two technologies that will fuel the rapid adoption of the third platform in India.

Envisaging a Holistic Security Strategy For 2015: Sanjay Rohatgi,Symantec

Sanjay Rohatgi, President–Sales, Symantec India, says the company has a set of holistic solutions in place to secure organizations from security threats. 

Beating the Bad Guys: Sivarama Krishnan, PwC

Organizations will need to turn inwards to establish robust information security strategies.

Building Capabilities for a Digital Tomorrow: Alok Ohrie,Dell

Alok Ohrie, President and Managing Director, Dell India, on the company’s investments to build end-to-end solutions and delivery capabilities for a digital world.

FAST TRACK

Kamtron Systems

Transitioning towards a service-oriented company will boost our growth, believes Kavita Singhal, director, Kamtron Systems.

TIM Infratech

Delivering ‘best of breed’ technologies to enterprises is key to success, says Monish Chhabria, MD, TIM Infratech

Mudra Electronics

A vendor-agnostic strategy helped us sustain business, says Bharat Shetty, CMD, Mudra Electronics.

Systematix Technologies

Our USP is a customer-friendly approach backed by services, says Akhilesh Khandelwal, Director, Systematix Technologies.

CorporateServe Solutions

Our ability to turnaround complex ERP projects in record time is what gets us customer referral, says Vinay Vohra, Founder & CEO, CorporateServe Solutions.

KernelSphere Technologies

We are emerging as an end-to-end systems integrator, says Vinod Kumar, MD, KernelSphere Technologies.

Uniware Systems

We constantly validate emerging technologies for first-mover advantage, says Vergis K.R., CEO, Uniware Systems.

Astek Networking & Solutions

An innovative approach helps us stay successful, says Ashish Agarwal, CEO, Astek Networking & Solutions.

CSM Technologies

Our approach is backed by innovation and simplicity, says Priyadarshi Nanu Pany, CEO, CSM Technologies.

SOCIAL MEDIA @ CW India
SIGNUP FOR OUR NEWSLETTER

Signup for our newsletter and get regular updates.