COMPUTER VIRUS


Every day as internet user we open lot of website and download many file like game,application software,songs,movie with this hope we are safe and secure.but my friends this is not true huge number of virus program gets download and install our pc and make us unsecure.Trojen virus is one of them.Lets gather some information about Trojen------
 Viruses work in many different ways. They are harmful to your computer and may even work to steal passwords and personal information. If you have a virus on your computer, make sure you get it taken care of immediately before it ruins your operating system and everything in it.
Trojan viruses steal passwords and other personal information. Trojans can also disable your current anti-virus or anti-spyware software, which makes it easier for other viruses to infect your computer along with the Trojan virus.
A remote access Trojan virus is often hidden in games or other small programs. Through remote access, a hacker will be able to get your personal information off of your computer just by doing a simple search, because they will have total control of your computer through a remote location.
Data sending Trojans work to gain your information through emails, credit card information, or even through your chat contact lists. A key logger can also be installed so that your every keystroke is recorded, which makes it easier for them to determine your credit card number, social security number, or any other number that you type into your computer.
A destructive Trojan is hard to detect, but it will work to destroy the files on your computer. Once this Trojan is installed, it will work to delete all of your information and files, where it will eventually work to delete your operating system. This type of Trojan is very hard to remove, and is often not even detected through normal anti-virus software.
If you suspect you may have a Trojan virus remove at as soon possible and disconnect internet connection.Install highly secured or updated antivirus and scan whole pc.If you found more than 50 file is infected then formate your pc and install new Os but remeber before doing any thing install antivirus first.
Good Luck !!!

Remote access Trojan


A remote access computer Trojan (RAT) designed to steal credit card details from hotel point-of-sale (PoS) applications is being sold on the underground forums, according to researchers from security firm Trusteer.
The researchers found an advertisement on a black market forum for a custom RAT designed to infect hotel front desk computers and steal customer credit card and billing information.
The seller was offering the computer Trojan, together with instructions on how to trick hotel front desk managers into installing it on their computers, for $280 (£175). The seller also claimed that the malware won't be detected by any antivirus program when it's delivered to the buyer.
Malware writers often repackage their malicious installers with new algorithms in order to evade signature-based antivirus detection, said Bogdan Botezatu, a senior e-threat analyst at antivirus vendor BitDefender.
The repackaged samples can then be delivered via email or instant messaging without being stopped at the network perimeter. However, if an antivirus product with strong heuristic and behavioural detection capabilities is running on the targeted systems, the malware should be blocked at execution time, Botezatu said.
The hotel RAT's seller specified in the ad that the malware doesn't collect card security numbers, also known as CVV or CID, but this doesn't necessarily make the rest of the stolen information less useful to cybercriminals.
Some merchants are allowed to charge cards without the CVV details, especially in the US, Botezatu said. However, even if that wasn't the case, the data can still be used to phish the security codes from the card owners themselves or to search for the codes in existing data dumps that resulted from older phishing attacks, he said.
Most remote access computer Trojans have the capability to take screenshots, record keystrokes, download/upload files and execute arbitrary code, which makes them suitable for many types of cybercriminal operations.
The hotel RAT advertisement included screenshots of a particular PoS application, but its functionality might not be restricted to that specific program.
"The strength of RATs is their generic nature - they can be used to attack many different applications in use by many industries,"
The fact that the RAT's creator decided to target the hospitality industry is consistent with a recently observed change in the focus of cybercriminals - an expansion from online banking attacks to attacks against PoS systems.
RAT,RAT,RAT,RAT,RAT
taken from http://news.techworld.com/security/3352279/computer-trojan-horse-steals-credit-card-details-from-hotel-reception-software/

Credit Card Transaction Processing and Security

  1. Cardholder. Cardholder is an authorized user of a credit or debit card.
  2. Card issuer. Card issuers are financial institutions that are members of Visa and MasterCard, which issue payment cards on behalf of the two Credit Card Associations and contract with their cardholders for the terms of the repayment of transactions.
  3. Acquiring bank. Acquiring banks (also called acquirers, processing banks or merchant banks) are financial institutions, members of Visa and MasterCard, that contract with merchants to enable them to accept debit and credit card payments for their products and services. They can also, and that is the case most of the time, contract with third parties to provide some of these services.
  4. Payment processor. Payment processor is an organization that has contracted with an acquiring bank to provide merchants with card payment processing services on behalf of the acquirer. Payment processors must be registered with Visa and MasterCard and must identify on all of their marketing materials, including their websites, the name of their bank partner.
  5. Merchant. Merchant is a business or a non-profit organization that has contracted with an acquiring bank or a merchant processor to accept card payments.
  6. Credit Card Associations. The Credit Card Associations of Visa and MasterCard are member-owned associations of banks that govern the issuing of Visa and MasterCard cards and the acquiring of Visa and MasterCard card transactions. Both organizations have developed payment systems to facilitate the processing of transactions between member banks.
  7. Service provider. A service provider can be any third party that provides a service used in the card payment transaction process: point-of-sale (POS) terminals, payment gateways, web hosting, SSL certificates, shopping carts, etc.



Login Security for Credit Card


Fraud and identity theft are not only a risk to your privacy, but a risk to your finances, so knowing what to look for can help prevent you from becoming a victim.
Fraudsters use ‘phishing’ or ‘spoofing’ tactics to get sensitive information from you. The deception usually involves a counterfeit website or email which looks similar to one you’d normally trust. Information you give on a phishing site could be used by criminals to access your account or use your identity fraudulently.

Login Userid and Password
After entering your username, you’ll be presented with the SiteKey™ image and phrase you selected when setting up your Online Card Services account - giving you reassurance that it’s really us.
SiteKey™ adds another layer of security, helping to prevent unauthorized access to your account and protecting your information from those who would use your identity for fraudulent purposes.
Address of Website
The address used by a counterfeit site may be very similar to our genuine website addresses. Look closely for spelling differences or the use of symbols, e.g. www.xyz.com, www.pqr@xyz.com or www.verify-xyz.com.
Hidden addresses - rest your cursor over a link in an email (but don't click on it) and a box will pop up showing you the link destination - do you recognize it as a legitimate address? If not it could suggest that the sender has something to hide.
credit crard Security

Credit card

A credit card scam can come in many forms. For example, scammers may use spyware or some other scam to obtain your credit card details. A scammer might steal or trick you into telling them your security code (the three or four digit code on your card) and then make purchases over the internet or the telephone. If they know your PIN, they could get cash advances from an ATM using a ‘cloned’ credit card (where your details have been copied onto the magnetic strip of another card). credit card scam 
Of course, there is also a danger of someone using your credit card if it has been physically lost or stolen
Protect yourself from credit card scams
  1. NEVER send money, or give credit card or online account details to anyone you do not know and trust.
  2. Check your bank account and credit card statements when you get them. If you see a transaction you cannot explain, report it to your credit union or bank. credit card scam
  3. Keep your credit card and ATM cards safe. Do not share your personal identity number (PIN) with anyone. Do not keep any written copy of your PIN with the card.  credit card scam
  4. Choose passwords that would be difficult for anyone else to guess. credit card scam
  5. Try to avoid using public computers (at libraries or internet cafes) to do your internet banking. credit card scam
  6. Do not use software on your computer that auto-completes online forms. This can give internet scammers easy access to your personal and credit card details. credit card scam
  7. Do not give out your personal, credit card or online account details over the phone unless you made the call and the phone number came from a trusted source. credit card scam
  8. Never send your personal, credit card or online account details through an email. credit card scam


Credit Card online Scam

Online Scam
As more and more people are using online tools to pay for their monthly utility bills, scammers have found a way to take advantage of the convenience, according to the Internet Crime Complaint Center.
Victims are sent emails from a scammer claiming to be from a utility company asking for the recipient to pay an outstanding bill, according to a release from IC3. When the victim clicks on the attachment, they are actually opening up their computers to a virus.
Authorities warn people to always be suspicious of any unsolicited emails, even those from companies which appear to be legitimate.
Those who do receive an email from a source claiming to be a utility company asking for payment, are advised to go straight to the company’s website instead of opening the email, IC3 officials suggest. They also recommend deleting the email immediately.
But it’s not just individuals scammers are targeting, officials said. Businesses have recently been receive phony emails from fraudsters claiming to be with the Better Business Bureau.
So many businesses have fallen victim to the online crooks, that the BBB issued a statement warning businesses and consumers to the scam.
The subject line in the phony email usually says “Complaint from your customers,” according to the BBB website. When an unsuspecting business owner clicks on a link, he or she could be downloading a virus.
In one particular complaint received by the IC3, a business owner reported he lost nearly $100,000 when criminals successfully wired money from the company’s bank account after the virus enabled them to capture passwords and other important banking information.
Credit Card online Scam.