European Championships 2017

Slides:



Advertisements
Similar presentations
SHARING CALENDARS IS EASY! GORDON SCHRUBBE, JR.. OUTLOOK 2013 CALENDAR VIEW CLICK ON “SHARE CALENDAR”
Advertisements

What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Sending Newsletters with Wordpress and Subscribe2.
CONDO MANAGER The Leader in Association Accounting and Management Software Mailing Address: P.O. Box Charlotte, North Carolina Web Site
UT Wing Civil Air Patrol. Objective Identify network and cyber vulnerabilities and mitigations Social Media/Metadata/Exfil data MITM Attacks Malware Social.
Gmail Tutorial This tutorial aims to quickly cover some of the basic elements of web based using Gmail - a free service Use the Index on the.
Internet Fraud By: Noelle Woodman.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
OCR Functional Skills Keywords Use the right keywords To do this you need to know what it is you are searching for! – For example, you might want to search.
Submitting Book Chapters via Manuscript Central A Short Guide for Wiley-VCH Authors.
How to My Essay. How to name a document Click “file” Click “Save As” Choose where you want to save it.
Threats to I.T Internet security By Cameron Mundy.
Name: alex lewis Form:.  You must make sure that you include the following in your presentation:  Transitions between slides.  Speaker notes (what.
I have attached a file to this by selecting the paperclip on the bottom of the page.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Information guide.
Reliability & Desirability of Data
The KS3 online test -The software. - You must be really familiar with this application to show what you can do! In the test all the detailed.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Encryption Cisco Ironport using Click here to begin Press the ‘F5’ Key to Begin.
By Masum Ahmed UNIT ONE (TASK TWO) – RETRAINING OF CURRENT EMPLOYEES ON THE ING SYSTEM.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
K A R A Creations ARLIARLI Topic: Why facebook can be dangerous!!
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
s By Adam Dallaway Unit 1. Sending an .
A Matter of Your Personal Security Phishing. Beware of Phishing s Several employees received an that looked legitimate, as if it was being.
Santa’s s By Chantelle Cogin. Sending an attachment to Santa I made a new message and i pressed the insert button and choose what I wanted.
This is the iInterfolio site: Click on APPLY NOW FOR FREE.
A Matter of Your Personal Security Phishing Revised 11/30/15.
By Liam Wright Manga comic group Japan SAFETY on your computer.
This Guide is going to be about how to  attach files  create a signature  send to multiple recipients with using ‘Cc’ and ‘Bcc’  change the priority.
and the business environment Explain what is and how is it used in a business environment A02 .
Phishing and online fraud What parents need to know.
Safety in the digital world. Survey Thank you for completing the Information Security Survey!
Do you know who you’re dealing with? Social Engineering: Minimise the risk of becoming a victim.
3M Partners and Suppliers Click to edit Master title style USER GUIDE Supplier eInvoicing USER GUIDE The 3M beX environment: Day-to-day use.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
Tips to Avoid Online Scams. About Several threats are there which spreads on every computer system just to infect each system with their harmful ways.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
Inbox Sent Box Subject New Message New Message Delete Password
Cyber Security and Computer Safety
Internet Safety.
Media education: from passive consumers to active creators
An authorized user can make payments on your account by logging on with their own username and password. Click on the Authorized Users tab to add an authorized.
Unit 4 IT Security.
Log in but don’t open any work. Things are changing!!!
Information Security.
Lesson 3 Safe Computing.
Encrypting Confidential Student
Overview 1. Phishing Scams
Report Phishing Forward phishing s to
Hotmail Customer Support Number Hotmail Customer Support Number Now a day a lot of people are receiving s with a link in it or an.
Lesson 2- Protecting Yourself Online
Cybersecurity Awareness
Fastmail Password Recovery. Customer Service Number: For more details visit this link:
What you can do to support people to be safe online
Cyber Security and Computer Safety
DON’T GET HOOKED! YOU MAY BE UNAWARE BUT YOU ARE A PHISHING TARGET FOR CYBER CRIMINALS. A. Unknown sender address B. Offer too good to be true &
How to My Essay.
Report Phishing Forward phishing s to
Social Engineering Humans are often the weakest point in security
Information Security – Sep 18
Lesson 2- Protecting Yourself Online
Phishing 101.
Presentation transcript:

European Championships 2017 Fraud Event

What Happened Alan Ludkin’s email account was compromised (Alan was sending out all of the invoices) Emails to and from Alan were being intercepted, amended to alter bank payment details and sent on. They still appeared to be sent from Alan’s email address but were in fact coming from elsewhere. A number of emails never reached Alan, the ‘criminal’ created appropriate invoices and sent them back. We were unaware of those bookings. There was even whole email conversations questions/answers going on.

How? Possibly – a ‘man in the middle attack.

Infected by Malware? Yes – that’s very easy to happen if you aren’t very careful. Malware can modify you programmes such as Outlook properties Malware is often in an attachment – Word, Excel, .pdf and more Don’t open attachments unless you know where they came from and check if the email seems suspicious – check – by other means – not email – with the sender. Don’t ever click on a link – again unless you are absolutely sure. People who were subject of the fraud in 2017 also received fraudulent emails with links about their accreditation.

Secure or Not Secure? Emails are NOT secure – they are very easy to intercept Word documents are easily edited So are .pdf files now!!! You used to have to purchase a .pdf writer – but now Word will do it for you!! And create the .pdf for you again.

Suggestions Don’t put bank details on the invoice. However that doesn’t stop a criminal adding information or creating their own invoices! ONLY put your bank details on the website – yes it can be changed but it is harder and more easily recognised if it has been changed Should we agree, as hosting countries that is what we will do and will NEVER put ANY payment details in an invoice? Send invoices by encrypted .pdf files – send password by alternate means – from a second email address or even split between a second and third email address Or by other secure means such as Whatsapp

Thank you – I hope that was useful Any questions - debate