Page 32 - ATD27Febr2016
P. 32

A32

FEATURESaturday 27 February 2016

Watch out for phishy emails during tax season 

BREE FOWLER                      In this Aug. 21, 2014, file photo, shows health care tax forms 8962, 1095-A, and 8965, in Washington. It’s tax time, so you’d better
AP Technology Writer            think twice before clicking on that link in your email inbox. What may look like a legitimate communication from your bank, human
NEW YORK (AP) — It’s tax        resources department or email provider may actually be part of a scheme designed to steal the confidential information stored in
time, so you’d better think     your computer, or to gain access to the network it’s attached to. 
twice before clicking on
that link in your email inbox.                                                                                                                                                                      Associated Press. 
What may look like a legiti-
mate communication from         hack.                         order to create highly cus-    of phishing, they’re not as     go a long way toward pre-
your bank, human resourc-       Phishing also spikes around   tomized emails that look       prevalent anymore. Many         venting a data breach,
es department or email          Christmas, with attacks in    much more legitimate and       overseas hackers are no         even if a link in a phishing
provider may actually be        the form of fake delivery     are much more likely to be     longer using clunky trans-      email gets accidentally
part of a scheme designed       notifications. Thieves also   clicked on.                    lation websites, because        clicked on.
to steal the confidential       often tie phishing emails to  The rise of social media       there are fluent English        Using different passwords
information stored in your      major sporting events, or     has made this a lot easier.    speakers who specialize in      for different accounts, two-
computer, or to gain ac-        natural disasters like over-  Thanks to Facebook and         translating phishing emails     factor authentication and
cess to the network it’s at-    seas earthquakes, says        Twitter, details including a   for a fee, Samani says.         changing passwords fre-
tached to.                      Raj Samani, chief  technol-   person’s place of employ-      Meanwhile, it’s become          quently all can be a big
Experts warn that tax sea-      ogy  officer for Europe, the  ment, where they bank,         easier to shorten the Web       help. In addition, compa-
son is a prime time for this    Middle East and Africa at     like to shop and the names     links that direct a people to   nies should test their em-
brand of fraud known as         Intel Security.               and ages of their children     fake websites, he says.         ployees by periodically
“phishing,” with hackers        “They’re very much up with    are just a few clicks away.    Narang adds that people         sending out fake phishing
out to steal your informa-      the latest news and infor-    ___                            should be wary of emails        emails to see who falls for
tion in hopes of using it to    mation,” Samani says. “If     WHAT OTHER RED FLAGS           purported to be from            them, Narang says.
file a false tax return.        they can spend a little more  SHOULD I BE ON THE LOOK-       banks, or other companies       And companies need to
Phishing emails remain one      time and get a 0.1 percent    OUT FOR?	                      they do business with, but      make sure their security
of the top causes of data       increase in click-throughs,                                  didn’t opt into emails from.    keys are up to date, along
breaches. While people          then their campaign be-       In an effort to get more       He also notes that banks        with their anti-spam filters,
are more aware of their         comes hugely more profit-     people to click on a link be-  generally don’t include         so past bad senders don’t
danger than ever before,        able and successful.”         fore thinking about the pos-   Web links in emails.            keep getting through, Sa-
the lures continue to evolve    ___                           sible consequences, many       Those links will likely take a  mani says.
and increase in sophistica-     WHAT’S THE DIFERENCE          phishing emails will give an   person to a fake website        “I think common sense
tion, making it tough for the   BETWEEN PHISHING AND          impression of scarcity, or     where they will be asked to     goes a considerable long
average person to discern       SPEAR FISHING?                include some kind of time      login and those credentials     way,” Samani says.
which emails are legitimate     Narang likens phishing to a   limit.                         will ultimately be stolen, he   He adds that with any
and which ones aren’t.          person casually throwing a    For example, an email          says.                           email communications,
Here are a few answers to       rod in a lake and waiting     made to appear to be           And attacks don’t just          it’s always better to just go
common questions about          for a bite. Phishing emails   from a person’s bank or        come in the form of email.      straight to the main web-
phishing:                       don’t contain a lot of spe-   email provider may state       They can come as text           site of the entity it purports
___                             cifics, but are quick and     that if that person doesn’t    messages too, with those        to be from, just to be on the
WHY IS IT SO BAD THIS TIME      easy to send out in mass      click on the enclosed link     links often containing virus-   safe side.
OF YEAR?                        quantities.                   within 24 hours, they will     es, Samani says.                “I can’t remember the last
Phishing peaks during tax       “Spear phishing” is much      be locked out of their ac-     ___                             time I clicked on a link in an
season, partially because       more targeted and person-     count.                         IS THERE ANY WAY TO PRE-        email,” Samani says. “I just
it’s a time of year that many   alized. The people behind     And while poor English and     VENT A PHISHING-RELATED         don’t do it.”q
people are accustomed to        those attacks spend time      long, complex web links        HACKING?
entering their most person-     researching their targets in  were previously sure signs     Basic cyberhygiene can
al information — such as
their Social Security number
or bank account informa-
tion — on websites, Satnam
Narang, senior security-re-
sponse manager for secu-
rity software maker Syman-
tec, says.
Hackers can use that infor-
mation to file false tax re-
turns and steal a refund
This year is no exception.
Earlier this month, the IRS
said that it stopped an at-
tack on the e-filing portion
of its website. Hackers tried
to use a combination of
malware and 464,000 So-
cial Security numbers that
had been stolen elsewhere
to generate PIN numbers
that could be used to file
fraudulent returns.
No taxpayer data was sto-
len from the IRS computer
systems as a result of the
   27   28   29   30   31   32