1 Online Self-Defense: Avoiding Email Scams Chau Mai December 5, 2013.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

How to protect yourself, your computer, and others on the internet
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
Online Shopping Self-Defense
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
What is identity theft, and how can you protect yourself from it?
How To Use This Lesson Go-Givers ’ PowerPoints are designed to inform and support critical thinking and discussion. They can be used in their entirety.
The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore.
What do I need to know?.   Instant Messages  Social Networking.
Goodbye Snail Mail, Hello
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Name: alex lewis Form:.  You must make sure that you include the following in your presentation:  Transitions between slides.  Speaker notes (what.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
SAFETY What to be aware of and how to avoid problems. **This is not meant to make you fearful of . The goal of this discussion is to make sure.
. Open a Click on your inbox and click on a you want to open then it will open.
Scams & Schemes Common Sense Media.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Surfing the Internet Teaching Children about the SMARTS of using the Internet Are you being responsible when you use the Internet??? B E SMART! B E RESPONSIBLE!
Safety! Jessica Brown. What Is the Point of Having an Online Space? It needs to be Safe Clean And Efficient.
1 Safely Using Shared Computers Amanda Grady December 2013.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
XHS Students Web Tools 2.0 Class. Personal Information Passwords Make it hard for others to figure out Never give it to your friends Don’t use the same.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Chapter 9 Sending and Attachments. 2Practical PC 5 th Edition Chapter 9 Getting Started In this Chapter, you will learn: − How works − How.
Quick Thoughts on PGP Use Cases for KMIP 1 Michael Allen Sr. Technical Director.
The current state of Cybersecurity Targeted and In Your Pocket Dale “Dr. Z” Zabriskie CISSP CCSK Symantec Evangelist.
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
Company Guidelines and Basic Rules for …. No text words or slang, all s sent have to be polite and formal Use suitable, relevant subject lines.
To:Employee From: impersonated official company Message: Give us personal information here.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Imagine receiving a real live from Walt Disney, Jr. himself? Hard to believe but enough people actually did to make this Disney hoax a real problem.
Protecting Your Assets By Preventing Identity Theft 1.
Partner Proctored Assessment Registration Process Ajit Jha 1 Partner Assessment.
Tips to Avoid Online Scams. About Several threats are there which spreads on every computer system just to infect each system with their harmful ways.
is short for electronic mail!. What is ? An electronic message sent from one computer to another. saves money and time compared to regular.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Maximize Profits Through Stronger Security Brook Chelmo Product Marketing
Gosbecks E-Safety Guide
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Internet Safety How to stay safe online.
Fraud Protection.
Scams & Schemes Common Sense Media.
Fraud protection.
Digital Citizenship.
Learn how to protect yourself against common attacks
Lesson 3 Safe Computing.
is short for electronic mail!
What to be aware of and how to avoid problems.
Internet Fraud By (NAMES).
Lesson 2- Protecting Yourself Online
Cybersecurity Awareness
Basics HURY DEPARTMENT OF COMPUTER SCIENCE M.TEJASWINI.
Electronic Transactions
9 ways to avoid viruses and spyware
Electronic Mail: send and receive messages across the internet
Setting up a Gmail Account & Safety Kamlesh Singh Bisht IT Specialist.
Lesson 2- Protecting Yourself Online
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
A Quick Look at the Risks for Virtual Scams and Fraud!
Presentation transcript:

1 Online Self-Defense: Avoiding Scams Chau Mai December 5, 2013

The Internet is mostly safe … … but any public environment filled with unknown people requires caution, preparedness, and awareness. 2

Today You Will: – Learn the “Golden Rules” for safety – Learn how to spot Internet / scams – Practice with real-life examples 3

The “Golden Rules” for safety 1.If you don’t immediately recognize the sender, don’t open it, just delete it 2.Never send personal information via > Call them 3.Never click on a link from an unless is from a friend and it sounds like is from them Avoiding scams 4

Scams: Chain Letters They instruct to “forward to 10 other people” or “everyone you know” Sometimes sounds well-meaning Often their purpose is to spread a dangerous virus! What to do: Delete them Don’t click on any links If sent by a friend, ask them not to forward to you 5

Scams: Tax Time Scams They offer an “inexpensive tax preparation service” > Don’t click on links; call them to verify Comes from the IRS or State of California > Don’t click on links; delete the > IRS/California will NEVER contact you by (they will send you a letter) 6

Scams: ‘Get Rich Quick’ Schemes Promise earning money by selling items for them Become a ‘professional shopper’ Process an inheritance or other payment for people other of the country >Don’t click on links; delete 7

Scams: Financial Institution Asking for Your Personal Information Your bank, insurance, broker, PG&E, etc. asking to verify your password, social security number, etc. Usually with an excuse: ‘need to verify …”, ‘need to update every year …”, “we have detected potential fraud …”, etc. They will look EXACTLY as the institution you do business with > Don’t reply; don’t click on links > Call them > Report the scam 8

Activity: Practice your Internet Self-Defense Read the message or website text Circle any “danger signs” - things that make you think the message could be a scam What would you do? Be prepared to explain your choices. 9

Case Study #1 10 Subject: Prayer Request from Peggy Lesley Special Prayer Request from Peggy Lesley at Brookwood Church. I am starting a signing for my son's best friend who has cancer (Hodgkin's Lymphoma). He is 11 years old and is not doing well at all. He was diagnosed with this cancer 2 weeks ago. The tumor is the size of a large eggplant and is sitting right above his heart. This little boy needs all the prayer he can get. When I get the 1,000 people that have signed it...I am going to print this up for my sons best friend and show him how many people care and how many people are praying for him to get better. If you have a heart at all, you will all do this for me. Hit FORWARD and add your name to the bottom of the list and send it out to as many people as you can and pray for him!

Case Study #2 11

Case Study #3 12

Instead of clicking a suspicious link from an , type the web address yourself when you want to visit the site. – This is especially important for bank, credit card, and IRS websites. 13 Case Study #3

Case Study #4 14 Greetings of the day to you, although you may be skeptical receiving this as we have not met before, I am Mr. Patrick K.W. Chan (Executive Director and Chief Financial Officer) of the Hang Seng Bank Ltd., nevertheless I have a business proposition involving the sum of $22,000, usd in my bank which I know we will be of mutual benefit to both of us, and I believe we can handle it together, once we have a common understanding and mutual cooperation in the execution of the modalities. Should you be interested, please send me: 1.Full names, 2.Age 3.Occupation, 4.Private phone number, 5.Current residential address. Via this Your earliest response to this mail will be highly appreciated. Mr. Patrick Chan.

Remember the “Golden Rules” for safety 1.If you don’t immediately recognize the sender, don’t open it, just delete it 2.Never send personal information via > Call them 3.Never click on a link from an unless is from a friend and it sounds like is from them 15

Questions?

Thank you! Copyright © 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Avoiding scams 17