Newer Technologies Fraud

Slides:



Advertisements
Similar presentations
Credit and Credit Cards
Advertisements

BUDGETING WITH TECHNOLOGY Presented by: Joe Lykowski Midland Computer Club 4/23/2014.
Online Holiday Shopping Brings Great Deals – and Fraud This lesson is part of the iKeepCurrent TM Program, provided by iKeepSafe TM.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
Opening a bank account.
FINANCIAL SOCCER Module 3 Credit, debit and prepaid cards Collect a quiz and worksheet from your teacher.
Internet Fraud By: Noelle Woodman.
Scams Stevie's Scam School videos
3. 18 Methods of making and receiving payments Methods of making and receiving payments Banks and bank accounts  All businesses have bank accounts.
EPS (Electronic payment system) is an online business process used for fund transfer using electronic means, i.e  Personal computers  services  Mobile.
Beware! Consumer Fraud Module 9.1.
Banking: Checking Account What is a Checking Account? An account where money is deposited and kept for day-to-day expenses Also called demand deposit.
Banking:
U.S. SECRET SERVICE “Worthy of Trust and Confidence” !!! SCAMS !!! $$$ SCAMMER KNOW WHAT TO LOOK FOR.
SIMPLE AND COMPOUND INTEREST Since this section involves what can happen to your money, it should be of INTEREST to you!
Internet Vulnerabilities & Criminal Activity Phishing, Nigerian 419’s, & High-Yield Investment Programs (HYIP) /31/2011.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
By: Mrs. McGinnis Sept,  Fradulent online shops  Sites that distruibute pirated music, videos and software  Bogus charity websites  Sites that.
Read to Learn Discuss the different types of checking accounts and how they work. Discuss other services and offerings that banks provide checking account.
 CONVENIENT  HELPS YOU KEEP TRACK OF MONEY: USING THE CHECK REGISTER OR ONLINE BANKING  SAVES YOU MONEY – EXPENSES ARE LESS THAN MONEY ORDERS.
Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can.
Checking Accounts. What is a checking account? A bank account that allows easy access to the funds. You can use your checking account to pay bills. With.
Banking Savings Checking Credit Cards
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Malware Targets Bank Accounts GAMEOVER!!. GameOver Cyber criminals have found yet another way to steal your hard-earned money: a recent phishing scheme.
Electronic Money. What is Electronic Money? Scrip or money that is exchanged only through electronically is referred to as electronic money. Electronic.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
SIMPLE AND COMPOUND INTEREST
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Carroll County Advisement Program FINANCIAL LITERACY *IDENTITY THEFT *MONEY MANAGEMENT.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Quiz 2 Post-Mortem Bruce Maggs. 2 Create a new BitCoin address, and use it only once. E.g., create a new wallet. Create a new address and mine a BitCoin.
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
Tips to Avoid Online Scams. About Several threats are there which spreads on every computer system just to infect each system with their harmful ways.
E-commerce payment system facilitates the acceptance of electronically made payment methods for online transactions. Also known as Electronic Data Interchange.
DIGITIZING OUR WALLETS Digital Wallets for E-Commerce Development.
Analyzing Credit and Debt  When you use credit responsibly it can be very convenient because you can use it to buy things now and pay for them later by.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
To understand how to recognise and avoid potential fraudulent situations To appreciate that being a victim of fraud may affect me emotionally as well.
Mobile Wallet & Its Usage
Get Exclusive Deals and Coupons on Online Recharge.
An Introduction to Phishing and Viruses
Join Bitcoin2You & Start Earning Today!!
Banking.
Cryptocurrencies by.
Origins of Banking & Fiat Money
YOUR MONEY ABROAD.
Bitcoin - a distributed virtual currency system
Cryptocurrencies By Rui Sakurai and Shane Spears
Bitcoin Created By: CoinSecure.in.
Mobile Banking What can it do for you?.
A private and secure cryptocurrency for mobile devices
Easy Tips for Beginners on How to Mine Zcash Cryptocurrency
Blockchain Adrian Zaragoza.
Zcash Mining – A Guide For Beginners. Zcash (also known as ZEC and seventeenth most valued cryptocurrency with market capitalization of $500 million)
Blockchain Helpline Number
Depository Institution Essentials
What is it? Why do I keep getting from Barracuda? SPAM.
Crypto Mining LLC.
BLOCKCHAIN BASICS & LEGAL ISSUES
Protecting Yourself from Fraud including Identity Theft
ELECTRONIC PAYMENT SYSTEMS
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Digital Payments NFC Payments, Digital Wallets, Virtua; Currencies and Cryptocurrencies, Bitcoins, Blockchains and Mobile and Cloud Based Payments.
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Newer Technologies Fraud

Mobile Mobile applications like mobile banking and mobile commerce are affected in exactly the same way as internet transactions. Added to this mobile phones and mobile networks have very weak security and are open to attack. Fraud is rising on mobile applications but slowly. Mainly because there are no international standards for mobile as there is for cards.

NFC We have all seen the clips on crooks stealing data fron NFC cards and phones. Whilst it could happen the fraudster would have to get so close to a wallet or purse (a few centimetres) it is unlikely to happen. Also because of the limits on NFC transactions there are easier ways to do fraud or higher amounts. But when limits go, fraud will rise on NFC devices.

Bitcoin Bitcoin is considered relatively safe due to the blockchain technology and low usage but has some scams below: 1. Bitcoin Ponzi Schemes and High-Yield Investment Programs. These scams lure people in with promises of high interest rates on deposits. As with other Ponzi schemes , early investors are paid out using investments from later investors. When new investors stop joining and payments cannot be made, the scheme collapses. These scams last often only a couple of months, but the organizers are prone to simply repeat the whole process again afterwards. 2. Bitcoin Mining Investment Scams. Bitcoin mining involves validating transactions and providing security for the public ledger, known as the blockchain. This process requires extremely powerful and expensive computer equipment. The mining scams typically involve orders for equipment that are paid for in advance and never delivered. 3. Bitcoin Wallet Scams. A bitcoin wallet is a software program used to store bitcoins. Wallet scams attract users with the assurance of greater transaction anonymity. Once the deposit level rises above a certain level, the scammers simply move the bitcoins into their own wallet. 4. Bitcoin Exchange Scams. These exchanges attract users by offering credit card processing at more competitive rate than their competitors. The fraudulent bitcoin exchanges simply do not return bitcoin or cash after receiving payment. 5. Bitcoin Phishing Scams. Phishing scams can involve emails informing people that they have been awarded or given bitcoins. They are told that they need to log into their bitcoin wallets through a link in the email that unbeknownst to them gives the phishers complete control the account.