Page 16

20509OR

FEATURE 3. If you wish, report the incident to the FBI IC3 website at https://www.ic3.gov/complaint/ default.aspx (you can follow up with the FBI after filing the IC3 report by calling your local FBI field office). If you suspect that any phone numbers or contact information were obtained due to a breach of your IT system, alert your brokerage’s IT department or engage an IT specialist to scan your systems and devices to make sure that you are free from malware. To keep abreast of the latest cyber crime warnings from REALTOR® organizations, check in regularly with ORRA, Florida Realtors and NAR websites for the latest news; follow their social media; and read their regular e-communications such as ORRA's Orlando REALTOR® Online e-newsletter. WORMS, AND NOT THE GARDEN-FRIENDLY KIND Behaving much like bacteria, computer worms are a type of malware that seek to self-replicate, using the infected computer or device as a “host” to spread damage to additional computers and devices. Often they operate under the radar by not altering files on their host computer, but rather using the host computer as a means to access and infect additional computers and devices. Worms operate independently and do not need a human’s guidance to replicate and cause damage. Worms often take advantage of holes or weaknesses in software programs; this is why it is vital to keep software programs, such as Microsoft Windows and Adobe Flash, up-to-date (“What is a Computer Worm,” n.d.). Worms can cause extensive damage to an entire network of computers. OUTBREAK: YOU’VE GOT A VIRUS! Viruses are also in the malware family and can cause great harm, often rendering computers and devices in a permanent state of disrepair. Through an executable file, viruses alter the existing framework and files on the infected computer or device. Viruses start with one infected file that is transferred and “executed” on one or more computers. Virus files are executed when one downloads an executable file that contains a virus, and then allows his/her computer to run the executable file. Viruses require human interaction in order to propagate. TROJAN HORSE RAMPAGE For those familiar with Homer’s story The Odyssey, the concept of a Trojan horse is nothing new. For those not familiar: the story has it that the Greeks built a giant wooden horse, used to conceal armed warriors, and presented it as a “gift” to the City of Troy; whilst the city slept, the warriors crept from the horse and conquered. Not unlike the historical Trojan horse, the computer malware Trojan horse arrives in the form of an enticing website link or useful “software update” request; upon clicking or accepting such requests, the Trojan horse is installed on the computer and begins a series of malicious actions, similar to that of a computer virus. EXHIBIT C — Scam Text > Source: NAR 14 Orlando REALTOR® September / October 2017


20509OR
To see the actual publication please follow the link above