David Abarca, Instructor Del Mar College Computer Corner Phishing, Pharming, Spear-Phishing, and now…. Vishing.

Slides:



Advertisements
Similar presentations
What Are Scams? Scams are designed to trick you into giving away your money or your personal details. Scams come to you in many forms – by mail, ,
Advertisements

David Abarca, Instructor Del Mar College Computer Science and Information Technology Department Computer Corner Computer Corner.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
David Abarca, Instructor Del Mar College Computer Corner Great Online Shopping Sites.
David Abarca, Instructor Del Mar College Computer Corner Online Shopping.
How to set-up your lunch payment for St. Johnsbury Academy Go to: Select Register for Free Account.
David Abarca, Instructor Del Mar College Computer Corner Wireless Tricks and Treats.
Computer Corner This Week’s Special Link Trend Micro’s Housecall Get a free online virus and spy-ware scan.
What is Wireless Networking? Wireless Networking is simply – Transmitting data between devices using radio waves Broadcast Television Stations and Radio.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
David Abarca, Instructor Del Mar College Computer Corner Keeping Your Children Safe Online.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
David Abarca, Instructor Del Mar College Computer Corner Computer Components Memory VS Storage.
David Abarca, Instructor Del Mar College Computer Corner A Safe Web for the Family.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
David Abarca, Instructor Del Mar College Computer Corner How to Buy a Computer.
David Abarca, Instructor Del Mar College Computer Corner Best Methods for Long-Term Data Storage.
David Abarca, Instructor Del Mar College Computer Corner Del Mar College Computer Science & Information Technology (CS/IT) Department.
David Abarca, Instructor Del Mar College Computer Corner How to create A Web Site, Part 1.
David Abarca, Instructor Del Mar College Computer Corner Protect Your Identity.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
David Abarca, Instructor Del Mar College Computer Corner Passwords, Passwords Everywhere !
David Abarca, Instructor Del Mar College Computer Corner Wireless Network Settings.
SAFETY What to be aware of and how to avoid problems. **This is not meant to make you fearful of . The goal of this discussion is to make sure.
David Abarca, Instructor Del Mar College Computer Corner Use Your Computer To Help Science.
David Abarca, Instructor Del Mar College Computer Corner Do you really need Updates?
By: Mrs. McGinnis Sept,  Fradulent online shops  Sites that distruibute pirated music, videos and software  Bogus charity websites  Sites that.
David Abarca, Instructor Del Mar College Computer Corner How to create A Web Site, Part 2.
David Abarca, Instructor Del Mar College Computer Corner Upgrade Your Computer.
David Abarca, Instructor Del Mar College Computer Corner Graduation Gifts.
Scams & Schemes Common Sense Media.
David Abarca, Instructor Del Mar College Computer Corner Internet Access Dialup, DSL, or Cable.
David Abarca, Instructor Del Mar College Computer Corner Let’s Go Phishing !
David Abarca, Instructor Del Mar College Computer Corner Del Mar College Computer Science & Information Technology (CS/IT) Department.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
David Abarca, Instructor Del Mar College Computer Corner Free Security Solutions.
CCT355H5 F Presentation: Phishing November Jennifer Li.
David Abarca, Instructor Del Mar College Computer Corner Trading-in or Donating Your Old Computer.
David Abarca, Instructor Del Mar College Computer Corner Wireless Network Access Control.
David Abarca, Instructor Del Mar College Computer Corner Online Safety Rules For Parents.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
David Abarca, Instructor Del Mar College Computer Corner Wireless Networks.
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
SANSUEB SOFTWARE PRESENTS SkyTextMsg – Online Texting for your Business.
Threats to IT security Jordan pilcher. phishing Phishing is when companies or people from other people who think they can get away with scamming you for.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
David Abarca, Instructor Del Mar College Computer Corner Microsoft’s Vista Is there any “WOW”, now?
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Investigating Methods for Reducing Spam By: Steven Siggers Instructor: Marko Puljic.
David Abarca, Instructor Del Mar College Computer Corner Keeping your child safe when they use the computer !
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
Do you know who you’re dealing with? Social Engineering: Minimise the risk of becoming a victim.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
is short for electronic mail!. What is ? An electronic message sent from one computer to another. saves money and time compared to regular.
Jeff loses his identity! Lesson 5: Identity Theft.
 77.4% of the perpetrators are male.  50% live in one of the following states: California, New York, Florida, Texas, and Washington.  55.4% complainants.
Done by… Hanoof Al-Khaldi Information Assurance
Learn how to protect yourself against common attacks
Cyber Security Awareness Workshop
What to be aware of and how to avoid problems.
Phishing is a form of social engineering that attempts to steal sensitive information.
Protect Your Computer Against Harmful Attacks!
Phishing.
Security Hardening through Awareness August 2018
Social Engineering Humans are often the weakest point in security
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

David Abarca, Instructor Del Mar College Computer Corner Phishing, Pharming, Spear-Phishing, and now…. Vishing

Computer Corner Phishing & Pharming Fraudulent Scams $929 Million Dollars lost in 2005 Banks, Credit Unions, Retailers Credit Card Companies E-Commerce Companies

Computer Corner Spear-Phishing s appear to come from within the targeted company Appear to be from IT or HR asking user to help test the “new system” by clicking on a link and using login ID and Password

Computer Corner Vishing (Voice-Phishing) s state the company wants to protect recipient from fraud by having the person call the company directly to verify information. HOWEVER……. The phone number is NOT the company’s phone number, and an automated system asks the caller to enter account information.

Computer Corner How can you protect yourself? NEVER respond to an unsolicited . NEVER send money to someone that YOU did not contact. NEVER use your ID and Password to login into a website in response to an . Go to the website then login.

Computer Corner How many time does this happen? Let’s find out! Please forward suspect s to Results will be presented on August 31st

Computer Corner For a copy of today’s presentation, please visit and follow the KIIITV link Please your questions to: David A. Abarca at