Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search
Joe BidenCongratulations to our presumptive Democratic nominee, Joe Biden!
 

ancianita

(36,023 posts)
Thu Feb 6, 2020, 08:49 PM Feb 2020

FWIW -- EFF Training in Malware, Phishing, What They Are, How To Protect Against Them

Just putting this Electronic Frontier Foundation (home page https://www.eff.org) training material out here in case it's useable.



Right now it might be for any of us who actively work on campaigns through computers, or communicate through emails or apps across campaign sites, party sites; or collect data, and actively input information during campaigns.

I'll be working through the GE and plan to check how computers security work and/or is used if/when I get near any.

It's better to be aware and not need it, than to need it and not be aware when we do.

https://sec.eff.org/uploads/upload/file/34/SEC-MalwareandPhishingHandout.pdf

https://sec.eff.org/topics/phishing-and-malware?fbclid=IwAR1rByWW6T2QEwRxpqio42M3joN4VIPI7ZLyusmlaocLUGx4wGQ39IsHPkQ

Any and all original material on the EFF website may be freely distributed at will under the Creative Commons Attribution License, unless otherwise noted. All material that is not original to EFF may require permission from the copyright holder to redistribute.

You do NOT have to ask permission to post original EFF material on a mailing list or newsgroup, to use an EFF logo as a pointer to us on your web site, or to reprint an EFF statement in a newspaper article. Permission to do such things is explicitly granted. Please do not write to us asking for permission, as this wastes our time and yours.

From page 1

Examples of malware include:
● computer viruses
● programs that steal passwords
● programs that secretly record you
● programs that secretly delete your data

PHISHINGis when an attacker sends a message, email, or link that looks innocent, but is actually malicious. Phishing often involves impersonating someone you know or impersonating a platform that you trust.

Note: Not all phishing includes malware.
Sometimes an attacker wants to steal passwords to a service and might do so by impersonating a website, without installing malware on the user’s device.

--- COMMON WAYS MALWARE IS INSTALLED ---

-- OPENING A MALICIOUS ATTACHMENT OR FILE
A malicious attachment is often shared in phishing messages

-- CLICKING A MALICIOUS LINK
A malicious link is often shared in phishing messages.

-- DOWNLOADING UNLICENSED SOFTWARE
Software that cannot receive security updates increases risk (e.g. not from the Apple App store or Google Play store.)

-- VISITING COMPROMISED WEBSITES
Sometimes websites are taken over and are used to host malicious content.

-- DOWNLOADING AUTOMATIC CONTENT
Attackers may gain access to a network and can use this network to spread malware.

-- SHARING USB DEVICES OR PLUGGING INTO SUSPICIOUS PORTS
A charging station or port can be used to download malware.


--- TYPES OF MALWARE ---

ADWARE
ads everywhere
This malicious software usually attempts to display advertising to the user via overloading pop-ups or other methods. Some adware tracks information on the user or extracts personal information. Adware, like other malware, can be bundled with other software, often downloaded from non-reputable sources, such as outside of official app stores or from the software developer.

STALKERWARE
when your device helps your stalker
Stalkerware runs silently and gives the attacker full control over a device. Stalkerware can be installed when somebody has physical access to your device (such as a family member or partner, “let me use your phone for a moment”) and installs a stalkerware app or when a user gets tricked into downloading the app.

TROJAN
like a gift but an attack in disguise
When downloaded, Trojan software may perform like the intended legitimate application, but is in fact doing malicious things in the background. This is often found in pirated or “cracked” software or fake antivirus software.

RANSOMWARE
software holding you hostage
When downloaded, this malicious software holds a company, organization, or individual’s data for ransom. Ransomware gained popularity in the last decade and is now a multi-million dollar business for hackers around the world.

A.P.T. ATTACK
Advanced Persistent Threat

An A.P.T. attack is malware from an adversary with sophisticated capabilities and substantially more resources dedicated to achieving their goals: compromising your system. A.P.T. attacks are often used simultaneously with nation-state actors who will attempt to maintain “persistence,” or long -term access, to the system they are targeting.

from page 2

5 TIPS FOR DEFENSE AGAINST MALWARE
TIP #1: UPDATE YOUR SOFTWARE
(& CHECK YOU ARE USING LICENSED* SOFTWARE)... and lots more







If I were to vote in a presidential
primary today, I would vote for:
Joe Biden
Latest Discussions»Retired Forums»Democratic Primaries»FWIW -- EFF Training in M...