What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Threats To A Computer Network
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
HUNTINGTON BEACH PUBLIC LIBRARY Basics. What is ? short for electronic mail send & receive messages over the internet.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Quiz Review.
Security Issues: Phishing, Pharming, and Spam
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Matthew Hardaway CSCI101 Thursday 3:30pm.  Fishing (Encyclopedia Britannica): ◦ Sport of catching fish—freshwater or saltwater— typically with rod, line,
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Staying Safe Online Keep your Information Secure.
Scams & Schemes Common Sense Media.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
A Matter of Your Personal Security Phishing. Beware of Phishing s Several employees received an that looked legitimate, as if it was being.
And more……. ‘Leadership and communication are inseparable. You can’t have one without the other.’ ---Claude I. Taylor.
What is Spam? d min.
A Matter of Your Personal Security Phishing Revised 11/30/15.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
U.S. Businesses Targeted Randy Wolverton Brian J. Koechner.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Cybersecurity Test Review Introduction to Digital Technology.
Any criminal action perpetrated primarily through the use of a computer.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    1 Overall Classification of this Briefing is UNCLASSIFIED//FOUO Phishing.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Fall Phishing - attempt to acquire sensitive information, like bank account information or an account password, by posing as a legitimate entity.
Important Information Provided by Information Technology Center
Objectives Define phishing and identify various types of phishing scams Recognize common baiting tactics used in phishing scams Examine real phishing messages.
An Introduction to Phishing and Viruses
Phishing, identity theft, and more
Done by… Hanoof Al-Khaldi Information Assurance
Learn how to protect yourself against common attacks
links and attachments: Help stop malware from spreading
IT Security  .
Unit 4 IT Security.
Lesson 3 Safe Computing.
Phishing, what you should know
Information Security 101 Richard Davis, Rob Laltrello.
Protect Your Computer Against Harmful Attacks!
Huntington Beach Public Library
Cybersecurity Awareness
What is it? Why do I keep getting from Barracuda? SPAM.
Phishing.
Basics HURY DEPARTMENT OF COMPUTER SCIENCE M.TEJASWINI.
HOW DO I KEEP MY COMPUTER SAFE?
Social Engineering Humans are often the weakest point in security
What devices use the internet?
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

What is Bad Email? Spam, Phishing, Scam, Hoax and Malware distributed via Email Email is one of the most effective tools in the cybercriminals arsenal. Spam filters stop much of the bad email that would otherwise end up in your inbox, but crafty cybercriminals know how to design their emails in a way that can circumvent your these filters. This tutorial was created to address the question, what is bad email? Several examples have been identified for you on the following slides.

Spam: Spam is unsolicited or undesired electronic junk mail Spam: Spam is unsolicited or undesired electronic junk mail. Characteristics of spam are: Mass mailing to large number of recipients Usually a commercial advertisement Annoying but usually harmless unless coupled with a fraud based phishing scam What is spam? Spam is unsolicited or undesired electronic junk email. Some characteristics of spam are: Mass mailing to a large number of recipients Usually a commercial advertisement, Annoying but usually harmless unless coupled with a fraud based phishing scam

EXAMPLES SPAM Advertising and great deals Do I know this person? Warning from Google-nice job Google Sent to a large number of users at once Lets review one that we received here at SLU. Notice the Super Offer advertised Pfizer Sale is the supposed sender (hmm-someone doesn’t know their grammar very well). Who is Elise200fb@orange.es? I don’t know this person and I am certainly not buying pharmaceuticals from her. A red flag that this is spam is that it is sent to a large number of users as one time. This one ended up in our spam folder due to the spam filters set in place. Thanks Google for the warning notice. Now they want you to click on a link in this email. Too many red flags in this one, I think I’ll get a prescription from my doctor. These emails often end up in our spam folder because of our spam filters in place Is this a trusted website?

EXAMPLE SPAM & PHISHING americanexpress.com is the legitimate address not aexp.com EXAMPLE Sent to a large number of users at one time Generic greeting Asking you to click on a link that goes to a fraudulent website. Hover over the link to see where it really goes

Phishing Email: A phishing email is a fraudulent message carefully crafted to trick you into giving up your password or other sensitive information. Financial gain and criminal activity are the key motivations for email phishing. Characteristics of phishing emails are: Invoke a sense of urgency Asking you to click on a link embedded in the email that has no affiliation with the organization it is masquerading as Asking for passwords or other sensitive information such as a social security number Generic greetings and signatures Odd spelling or grammar

PHISHING EXAMPLE

Scam Email: Email fraud or scams can come in many different forms such as job scams and lottery scams. They are cons and share the same characteristics: Requests for money Requests to cash a check, wire money, or set up a bank account Promises of money for little or no effort Odd grammar and misspellings

JOB SCAM EXAMPLE Email address looks real but does not actually exist Asking you to respond to a non-SLU email address EXAMPLE Odd grammar Too good to be true Not a SLU person and no contact information

JOB SCAM EXAMPLE Asking you to send personally identifiable information such as SSN, drivers license or other ID

Hoax Email: A hoax email is also known as a spoof email. The sender alters part of the email such as the senders name or address so it appears to come from a legitimate source. Characteristics of hoax emails are: Spread urban myths or outlandish stories Sell a bogus product or market an online service Spoofed email address to appear legitimate Odd spelling or grammar Promise or request of money

This could be a spoofed email address or compromised account of a SLU student so it looks legitimate HOAX & SCAM EXAMPLE Invoke of sense of urgency or need Sent to a member of the students contact list Poor punctuation and odd grammar throughout body of message Actual signature of SLU student

Malware distributed via Email: Malware, or malicious software, is software used to disrupt computer operation, gain access to private computer systems or gather sensitive information. Attachments in emails and internet advertising are two ways malware is distributed. Some types of malware include: Viruses, ransomware, worms, Trojan horse, rootkits, keyloggers, dialers, spyware and adware A common Trojan horse masquerades itself as anti-virus software. The Trojan presents itself as something harmful or useful in order to get victims to install it on their computer Could be a keystroke logger that can capture all your passwords!

MALWARE EXAMPLE Often sent from someone you trust without their knowledge Enticing subject line Generic looking attachment or link that will download malware to your computer without your knowledge

What do I do with Bad Email? Spam or phishing from an unknown sender can be marked as spam within your email program. This alerts Google to begin blocking the sender address. Other bad email such as hoaxes, can just be deleted unless….. Bad email from a known sender such as someone in your SLU contact list might indicate they have a compromised account. Forward the email to helpdesk @slu.edu so it can be investigated. Phishing email that is concerning, can be forwarded to the helpdesk so they can be investigated. Once forwarded, choose the report phishing option within Google. This alerts Google of the fraudulent activity. Other bad email that is concerning, such as those that might contain a malware attachment or job scams, can be forwarded to the helpdesk. If you have responded to any of these emails with personal information, or clicked on links that may have downloaded malware, please contact the ITS Service Desk at 977-4000 or helpdesk @slu.edu. The helpdesk will involve Information Security when necessary (infosecurityteam@slu.edu)

Summary: The easiest way for cybercriminals to gain access to our resources is through unaware end users. Because this activity will continue to increase, it is imperative that we critically evaluate emails we receive. We cannot stop cybercriminals from sending bad email, however, by becoming aware of what we should be looking for, we can limit our response to them which in turn will protect our resources as well as our personal information. More info: For more examples on phishing emails, visit: http://netforbeginners.about.com/od/scamsandidentitytheft/ig/Phishing-Scams-and-Email-Cons/ Take the anti-phish IQ Test hosted by Dell SonicWall visit: http://www.sonicwall.com/furl/phishing/