PHISHING A Melbourne Athenaeum Library Cybersafety Information Guide

Slides:



Advertisements
Similar presentations
What Are Scams? Scams are designed to trick you into giving away your money or your personal details. Scams come to you in many forms – by mail, ,
Advertisements

Accessing electronic journals from off- campus This causes lots of headaches, but dont despair, heres how to do it! (Please note – this presentation is.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
What is identity theft, and how can you protect yourself from it?
Bsharah Presentation Threats to Information Security Protecting Your Personal Information from Phishing Scams.
Internet Phishing Not the kind of Fishing you are used to.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
I have attached a file to this by selecting the paperclip on the bottom of the page.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
STAY SAFE ONLINE. STAY SAFE ONLINE! PLEASE MAKE SURE YOU LOGIN AT THE CORRECT BANK URL / ADDRESS 1.NEVER LOGIN VIA LINKS 2.NEVER REVEAL YOUR PIN.
Information guide.
Reliability & Desirability of Data
Scams & Schemes Common Sense Media.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Information Security Sharon Welna Information Security Officer.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
STAYING SAFE: Here are some safety tips when using Change your password regularly and keep it in a safe place. Don’t share your password with anyone.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Phishing and online fraud What parents need to know.
Do you know who you’re dealing with? Social Engineering: Minimise the risk of becoming a victim.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN Protecting Yourself and Your Family Online.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and.
Fraud, scams and commercial exploitation. The dangers Children are still generally quite trusting and uncritical about what they read online They are.
Managing Money Workshop The National Autistic Society AGM
Computer Security Keeping you and your computer safe in the digital world.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
Important Information Provided by Information Technology Center
Objectives Define phishing and identify various types of phishing scams Recognize common baiting tactics used in phishing scams Examine real phishing messages.
PUBLIC COMPUTER SAFETY
Internet Safety.
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
PASSWORD SECURITY A Melbourne Athenaeum Library
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Fraud Protection.
An Introduction to Phishing and Viruses
Scams & Schemes Common Sense Media.
Fraud protection.
Phishing, identity theft, and more
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
Learn how to protect yourself against common attacks
Unit 4 IT Security.
Don’t get phished!, recognize the bait
ISYM 540 Current Topics in Information System Management
Lesson 3 Safe Computing.
Overview 1. Phishing Scams
Information Security and Privacy Pertaining to Phishing and Internet Scams Brian Corl COSC 316 Information Security and Privacy.
Phishing, what you should know
Information Security 101 Richard Davis, Rob Laltrello.
Phishing is a form of social engineering that attempts to steal sensitive information.
Cybersecurity Awareness
Practice Safe Computing
Protecting Your Identity:
Personal IT Security Cyber Security – Basic Steps
HOW DO I KEEP MY COMPUTER SAFE?
Protecting Senior Citizens from Phishing s
9 ways to avoid viruses and spyware
Internet Safety – Social Media
What is Phishing? Pronounced “Fishing”
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

PHISHING A Melbourne Athenaeum Library Cybersafety Information Guide Image source: http://3foldx.com/worriers-guide-to-identifying-phishing-e-mails/ A Melbourne Athenaeum Library Cybersafety Information Guide Image source: http://3foldx.com/worriers-guide-to-identifying-phishing-e-mails

What is phishing? Phishing is the fraudulent practice of contacting people online, purporting to be from reputable companies, to induce individuals to reveal personal information, such as passwords and credit card numbers. Phishing is carried out with one goal in mind – identity theft. Providing your personal information online can lead to identity theft, draining of bank accounts or being signed up to programs without your consent. Image source: http://jphotostyle.com/handwriting/i/identity-theft.html

Being vigilant Phishing works because it is sent to large numbers of internet users. Studies suggest that even the least successful scams have approximately a 3% success rate. To give you an idea of the numbers involved a moderate sized scam, sent to the equivalent of every email account in Australia, would have a success rate greater than the populations of Geelong and Canberra combined. You could be targeted anywhere (or anytime) you’re using or connected to the internet – including when you’re using a computer, laptop, iPad or smartphone. Vigilance against phishing is an important part of staying safe online. Rather than following links that are sent to you, it is best to use a search engine to find the official website for the organisation. Phishing can seem relatively innocent, or inconsequential, or even appear to be a request for charity or aid. Make sure you verify the details of any unsolicited online contact using an independent source before donating money or otherwise interacting with them. Image source: https://pixabay.com/en/internet-computer-screen-monitor-1593384/ Image source: https://pixabay.com/en/internet-computer-screen-monitor-1593384

Examples of phishing Try to avoid following links directly from emails such as in the example (left). Instead, go to the company’s site yourself by using a search engine such as Google. Pop-up windows (right) are often used in phishing scams. Note here that the message isn’t from Adobe Flash but update91.com

Examples of phishing Fake antivirus program specifically created for phishing. Phishing is designed to look either appealing or threatening, often so it appears to come from a source of authority. Any virus or malware warnings that don’t come from antivirus software you’ve installed are probably phishing scams.

Identifying phishing emails The Address – if the email claims to be from one place but the domain section of the email is from somewhere else it is probably a scam. In this case (right) rather than studentloan the address is studntslon and the ending ‘.click’ is suspect as well. The Address – this email (right) has copied the email address of the receiver so it looks as though it has come from within the organisation. If you get an email claiming to be from your own address that you don’t remember sending it is almost certainly a scam. The Subject – don’t be taken in by urgent or threatening language in the subject, or by offers that seem too good to be true. Remember if you are concerned contact the company yourself rather than engaging with the email, this includes checking phone numbers yourself rather than those offered in the email. Both the examples on this page make offers which aren’t appropriate for an organisation.

Identifying phishing emails If the email begins ‘Dear Sir/Madam’ ‘Valued customer’ or just ‘Hello’, it is probably a scam. Companies want to identify themselves for brand awareness so always be wary when an email claims to be from a ‘well known’ or ‘highly respected’ company but doesn’t name it. Lack of identifying information about the sender in the signature of the email strongly suggests a scam. In the example (below) ‘HR department’ doesn’t tell you anything about to company or person sending this. Spelling and grammar mistakes, such as those in the last line of the example (above) are a good sign that the email is a scam. Companies put a lot of work into making sure their emails are high quality.

Identifying phishing websites URL – any site asking for a password or any other personal information should begin with ‘https:’ rather than ‘http:’. The s stands for secure so do not provide personal details to any site that doesn’t begin with ‘https:’. The top address bar is this site’s actual address, while the bottom address is part of the page content designed to mimic the address bar.

Identifying phishing websites Because scam sites are getting good at hiding addresses, it is worth checking the site’s digital certificate. This is usually represented by a padlock icon in the address bar. Any site asking for your details should have one and clicking on it should display information about the certificate. Often the colour of the padlock is an indicator about the level of security of the page, with green being most secure and red a potential threat to your computer. However, this is not always the case and should not be relied on. Internet Explorer Firefox Chrome

Identifying phishing websites If the company name is misspelled or not included in the url this is probably not a legitimate site. A common trick is substitution (eg. replacing the letter ‘l’ with the numeral ‘1’). Be wary of any site that immediately opens a pop-up window asking for login details. Sometimes phishing attempts direct you to a legitimate site but use a pop-up to get your account information. If you are still unsure whether a site or email is a scam, check the Australian government website dedicated to finding and notifying people about them: https://www.scamwatch.gov.au/

SMiShing Phishing can target any device connected to the internet. One form which is becoming increasingly common is smishing or SMiShing. This stands for SMS phishing. These attacks target smartphones rather than emails or websites and trick users into downloading malware onto their mobile device. Remember to be aware of this when downloading apps or opening attachments to messages on your phone. Image source: https://pixabay.com/en/phone-scams-fraud-dishonest-crime-449836/ Image source: https://pixabay.com/en/phone-scams-fraud-dishonest-crime-449836

What action to take If you or someone you know has been the victim of a scam: Stop sending money. Contact your bank and any organisation which is compromised. Change your passwords, even ones which you don’t think have been compromised. Recover your identity. Report the scam to the authorities: Police, Scamwatch, etc. Alert other people to the scam. If needed, contact a support or counselling service. Beware of being targeted with follow-up scams.

Thank you Thank you for taking the time to read this guide. If you have any further queries please don’t hesitate to ask library staff. Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.