New CIBC spam email circulating

Hello All,

Please be aware of this new CIBC spam email circulating around the internet if you receive this email please delete it right away DON’T RESPOND to the email or CLICK ANY LINKS

Be internet smart and stay secure !!!

From: CIBC Protect
Date: Fri, Feb 14, 2014 at 12:36 PM
Subject: Credit Card Locked
To:

Dear CIBC valued customer,

Due to maintainance services on our databases, we require
our customers to verify their online accounts by completing
an online form.

We have upgraded our services to provide a higher layer of
security to our clients.

To verify your online account click on the following link
to access the validation form:

Click here to login to your account

This update is intended for the purpose of protection our
customer accounts. Failure in account verification will result
in limiting your online access.

Thank you,
Jessica Blanche,
IT Security.

CIBC spam email Recived

From: CIBC
Date: Tue, Feb 11, 2014 at 10:54 PM
Subject: Security Notice
To:

Dear CIBC valued customer,

Due to maintainance services on our databases, we require
our customers to verify their online accounts by completing
an online form.

We have upgraded our services to provide a higher layer of
security to our clients.

To verify your online account click on the following link
to access the validation form:

Click here to login to your account

This update is intended for the purpose of protection our
customer accounts. Failure in account verification will result
in limiting your online access.

Thank you,
Jessica Blanche,
IT Security.

IF you receive the above email delete it right away it contains a link to a site hosting maleware

Protecting your self online during the holidays !

Hello everyone

With the Christmas season in full swing that time of year where hackers and scam artists try to exploit the holiday season with new tricks to steal your identity and try their new scams here are some tips when shopping online

When shopping online

1.) Beware of too good to be true offers

this sounds like a simple one if you are online and reach a site you have not heard of before offering too good to be true prices like a Xbox one for 100$ when they are currently retailing for much more this should set off some red flags in your mind I would research the site your are on remember Google is your friend a quick search of the URL on Google will usually bring up reviews of that site

2.) Is the site secure

Checking for basic security features like HTTPS:// indicates the site is using a secure connection between you and the server does the server have a badge that shows its secure an example would be secured by verisign badge when you see this badge click it you should be brought to a page showing the registration info of the domain make sure it matches the site your on

3.) Forms of payment

What types of payment is the merchant looking for PayPal is a trusted source and usually offers buyer protection if the site is asking for credit card information I would strongly suggest to make sure you are on a HTTPS site during the transaction

Email security during the holidays

1.) Read over emails carefully if you don’t trust the sender click the mark as spam button and delete the email
2.) Don’t click any links that are embedded into the email
3.) if you receive offers via email make sure they check out again Google or the vendors website are good indications if the email is legit
4.) Keep passwords strong use 8 characters with upper and lower case and include at least a number and a special character

Tips for Securing your PC during online shopping

1.) Keep your antivirus up to date
2.) use anti-spyware software
3.) use browser plugin HTTPS everywhere which I have review on this site
4.) keep your web-browser up to date

Protecting your identity

1.) Don’t give you credit card to someone over the phone
2.) Monitor all accounts for abnormal transactions after purchases online
3.) Don’t post credit card information online

I hope this information is helpful to all online shoppers

If you have any questions leave them in the comments section below

Until next time stay secure !

Telus spam email

Hello all,

Please be aware of the following spam message circulating

Originating ip 217.25.118.34
Location 217.25.118.34 located in Austria
Originating email [email protected] << email address is spoofed Type of threat Phishing

Link is message point to Http://telus.com-region-select.zezrza.info”

If you see this message in your inbox mark as spam and delete

Beginning of message

Verification is required
Telus mobility is having problems with servers and may have lost some basi=
c information that can cause problems for you. =

We are presently fixing these problems To avoid having problems with your =
services or bill payments, we need you to confirm your information
Verification is required to protect your account information and helps us =
serve you better.
Please log in TELUSmobility.com to verify your account:
Log in to verify account
=

=A9 2012 TELUS Communications Company =

Headder info

Received: by 10.58.135.226 with SMTP id pv2csp948257veb;
Wed, 28 Nov 2012 09:56:12 -0800 (PST)
Received: by 10.14.209.193 with SMTP id s41mr34695652eeo.9.1354125371525;
Wed, 28 Nov 2012 09:56:11 -0800 (PST)
Return-Path:
Received: from Zeit.waltersoftware.local (mail.uniter.cc. [217.25.118.34])
by mx.google.com with ESMTP id a9si44191495eeo.18.2012.11.28.09.56.10;
Wed, 28 Nov 2012 09:56:11 -0800 (PST)
Received-SPF: fail (google.com: domain of [email protected] does not designate 217.25.118.34 as permitted sender) client-ip=217.25.118.34;
Authentication-Results: mx.google.com; spf=hardfail (google.com: domain of [email protected] does not designate 217.25.118.34 as permitted sender) [email protected]
Received: from Zeit.waltersoftware.local ([127.0.0.1]) by Zeit.waltersoftware.local with Microsoft SMTPSVC(7.5.7601.17514);
Wed, 28 Nov 2012 18:56:10 +0100
Content-Type: multipart/alternative; boundary=”===============0449421078==”
MIME-Version: 1.0
Subject: Verification is required
To: s
From: “Telus”
Date: Wed, 28 Nov 2012 18:56:10 +0100
Return-Path: [email protected]
Message-ID:

Job posting scam email

Hello all,

Please be aware of the below email that has been going around
offering a data Entry Position

Analysis

Mail server ip located in :117.41.185.73 is from China(CN) in region Southern and Eastern Asia
Type of Threat – Phishing
Link leads to a suspicious website offering advertizing

If you see the below email please mark as spam and delete

Beginning of the email

Numerous companies are looking for workers
to submit information into online forms and they
will pay you nicely in return. You can get paid
up to $25 per transaction.

This is not a get-rich-quick scheme but a
legitimate way to earn money from home.

Visit our website:
http://www.dataentry-jobs.net/affiliates/dataentry/

Beginning of header information

Delivered-To: [email protected]
Received: by 10.58.135.40 with SMTP id pp8csp120037veb;
Fri, 16 Nov 2012 18:48:24 -0800 (PST)
Received: by 10.49.29.199 with SMTP id m7mr7069752qeh.41.1353120504693;
Fri, 16 Nov 2012 18:48:24 -0800 (PST)
Return-Path:
Received: from advertise-bz.cn ([117.41.185.73])
by mx.google.com with SMTP id i8si2437232qec.28.2012.11.16.18.48.19;
Fri, 16 Nov 2012 18:48:24 -0800 (PST)
Received-SPF: pass (google.com: domain of [email protected] designates 117.41.185.73 as permitted sender) client-ip=117.41.185.73;
Authentication-Results: mx.google.com; spf=pass (google.com: domain of [email protected] designates 117.41.185.73 as permitted sender) [email protected]
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws;
s=key; d=advertise-bz.cn;
h=Message-ID:Date:From:User-Agent:X-Accept-Language:MIME-Version:To:Cc:Subject:Content-Type:Content-Transfer-Encoding;
b=fflppRk9QLhukPHlTAMl8sm56nAEMw5Iy2E2l32q6E4vPATMpAmyDrrVxBx0Xc6ONVbh1EJ6JHLG2/ZH7J+HX1YNs+srLNaYmoI26M84zQNzyOVuQU1E8RFYQB3TI5iZNm3KUVbA/lDDvcOSVYixlI0OX49QgdlTPOHf+oDsfYY=;
Message-ID:
Date: Fri, 16 Nov 2012 18:48:24 -0800
From: “Data Entry jobs”
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-GB; rv:1.8.1.6) Gecko/20070728 Thunderbird/2.0.0.6
X-Accept-Language: en-us
MIME-Version: 1.0
To:
Cc: ,
,
,

Subject: Enter Data Online
Content-Type: text/plain;
charset=”iso-8859-1″