The methods of phishing By EverTokki Lee

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

You are responsible for security of your internet banking transactions ONLINE.
THE DHS PHISHING IQ TEST PART 2 LEGITIMATE V PHISHING How do you know if an is legitimate, or is a phony, phishing ? Take the.
Unit 1: Module 1 Objective 10 identify tools used in the entry, retrieval, processing, storage, presentation, transmission and dissemination of information;
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Phishing Scams use spoofed s and websites as lures to prompt people to voluntarily hand over sensitive information Phishing s may contain.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
DO YOU LOVE FISHING “PHISHING” ? OR Global Wealth Management Group MORGAN STANLEY & SMITH BARNEY A term used to describe fraudulent attempts to steal.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
Hey check out this cool PHISHING presentation! Benjamin Ross Lyerly.
Scams Stevie's Scam School videos
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Text Your Students Presented by: DeAnna Kirchen. What students say: “ is for old people” “I never check my ” “I didn’t receive your announcement”
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Threats to I.T Internet security By Cameron Mundy.
E safety. Ads It’s always best to not click on ads when you see them, and it’s always a good idea to ignore them, but if there are too many you can always.
Staying Safe Online Keep your Information Secure.
Reliability & Desirability of Data
Scams & Schemes Common Sense Media.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
CCT355H5 F Presentation: Phishing November Jennifer Li.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
PHISHING & MALWARE By Bailey Hoover September 2, 2010.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
Newsgroups, Listservs, Chats & Phishing Electronic Writing & Publishing.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
Cybersecurity Test Review Introduction to Digital Technology.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
is short for electronic mail!. What is ? An electronic message sent from one computer to another. saves money and time compared to regular.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Publish you App on Google play. Steps for Publishing your App Step 1Getting a Google Play Publisher Account Step 2Export Signed Application Step 3Uploading.
PHISHING A Melbourne Athenaeum Library Cybersafety Information Guide
Important Information Provided by Information Technology Center
QQ Registration & Usage
Cyber Info Gathering Techniques
An Introduction to Phishing and Viruses
Scams & Schemes Common Sense Media.
& Google Gmail.
Done by… Hanoof Al-Khaldi Information Assurance
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
Unit 4 IT Security.
Lesson 3 Safe Computing.
Working with Google Applications Gmail, a popular
is short for electronic mail!
Download Instructions
Phishing, what you should know
Phishing is a form of social engineering that attempts to steal sensitive information.
Registering for Revel™
Security Guard Reporting Android App
Google Account Recovery Phone Number Lost For any information regarding Google Account Recovery phone number lost, please read the following presentation.
What you can do to support people to be safe online
UCO BANK HONOURS YOUR TRUST
How to install App from Google Play
Phishing Don’t fall for fake
How safe are you and your information when you are on the internet?
Bethesda Cybersecurity Club
What is Phishing? Pronounced “Fishing”
What devices use the internet?
Creating a new user for the channelcandy app
Claxi – taxi just a click away
Confidential, not for publication
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

The methods of phishing By EverTokki Lee

(ex: banking, taking out money) Voice Phishing Phisher calls victim, tells them fake information Your bank account is in trouble. Can you please reconfirm your info? Victim confirms information, phisher receives information then use them for their purposes (ex: banking, taking out money) Ok. Name:000000 000 Account number:00000000-00000000 ..etc

SMS Phishing (Smishing) 2G Phones: Phisher sends SMS, which consists that the victim reconfirm info via SMS. Victim sends SMS, phisher retrieves information and uses for their purposes. 3G Phones: Phisher sends SMS, which contains harmful links. (ex: malware, keylogger) Victim clicks on link, personal info is sent to phisher (ex: email logs, credit card info)

Email/link Phishing Phisher sends email containing a link of a phishing site, (ex: googlle.com) asking victim to confirm info. Victim clicks on link…

The two methods of link-phishing Phishing site Info goes to phisher Type info Phishing site Types info, and downloads file which can contain malware/viruses Info goes to phisher

Chat phishing Victim sends money to the phisher. Phisher fakes as a friend of yours telling that he/she needs money. OR… Victim clicks link, which leads to a phishing site. Phisher fakes a friend and tells victim to check out a link

Phishing Apps App Phisher publishes phishing app on market. Android Store (Google Play) Victim downloads phishing app. The app will then receive and gather information about the user and send it to the phisher regularly. (ex: Google account, credit card, emails,..etc)

In order to prevent phishing… Do not download ANY apps from the market if it looks suspicious. It is good to keep a vaccine that will detect any phishing tools. Do not give anyone your information via SMS, phone, chat, and links. Think before you act and give information. If phishing is suspected, check the internet if the information is real. Keep little footprints on the internet. And do not forget, Phishing can happen anywhere, any when on the internet.