1 What is Phishing? …listening to music by the band called Phish or perhaps …a hobby, sport or recreation involving the ocean, rivers or streams…nope.

Slides:



Advertisements
Similar presentations
Internet Safety at Work Protect company, customer, and your data online.
Advertisements

Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Account HIGHJACKING & IDENTITY THEFT GPCE Credit Union has prepared a slide show presentation to examine the most prevalent financial crimes at work today.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
Keeping Your Identity Your Own Amy Ginther, Project NEThics Coordinator OIT Town Meeting August 24, 2005.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
What is identity theft, and how can you protect yourself from it?
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
Bsharah Presentation Threats to Information Security Protecting Your Personal Information from Phishing Scams.
DO YOU LOVE FISHING “PHISHING” ? OR Global Wealth Management Group MORGAN STANLEY & SMITH BARNEY A term used to describe fraudulent attempts to steal.
Internet Phishing Not the kind of Fishing you are used to.
Hey check out this cool PHISHING presentation! Benjamin Ross Lyerly.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Over 3,000 computers are affected monthly by Malware and Phishing.
Have You Lost Your Identity? By Sierra Bowland. Deter Detect Defend.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Matthew Hardaway CSCI101 Thursday 3:30pm.  Fishing (Encyclopedia Britannica): ◦ Sport of catching fish—freshwater or saltwater— typically with rod, line,
Have Fun, Be Safe Strategies for Internet and Social Media Safety.
Reliability & Desirability of Data
Scams & Schemes Common Sense Media.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Phishing, Spoofing, Spamming and Security How To Protect Yourself Additional Credits: Educause/SonicWall, Hendra Harianto Tuty, Microsoft Corporation,
Be Cautious of Identity Theft By: Sydney Langley.
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
CCT355H5 F Presentation: Phishing November Jennifer Li.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
To:Employee From: impersonated official company Message: Give us personal information here.
How Phishing Works Prof. Vipul Chudasama.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Phishing Dennis Schmidt, CISSP Director, Office of Information Systems HIPAA Security Officer UNC School of Medicine UNC School of Medicine.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
PHISHING PRESENTED BY: ARQAM PASHA. AGENDA What is Phishing? Phishing Statistics Phishing Techniques Recent Examples Damages Caused by Phishing How to.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
Scams & Schemes Common Sense Media.
Phishing, identity theft, and more
Done by… Hanoof Al-Khaldi Information Assurance
Learn how to protect yourself against common attacks
Digital Citizenship Middle School
Protecting What’s Yours: Your Identity
Phishing, what you should know
Protect Your Computer Against Harmful Attacks!
Cybersecurity Awareness
Practice Safe Computing
Information is at the heart of any University, and Harvard is no exception. We create it, analyze it, share it, and apply it. As you would imagine, we.
Phishing Don’t fall for fake
Setting up a Gmail Account & Safety Kamlesh Singh Bisht IT Specialist.
Internet Safety – Social Media
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

1 What is Phishing? …listening to music by the band called Phish or perhaps …a hobby, sport or recreation involving the ocean, rivers or streams…nope

2 Phishing A computer scam on the rise!

3 Did you know… One in four people have never heard of the term “Phishing”. Half of the people surveyed could not accurately define phishing.

4 Phishing Facts 6.1 Billion – Number of phishing s sent world-wide each month. $1,200 – Average loss to successfully phished person. 7,484 Number of phishing Web sites in January 06. A new phishing scam is launched every two minutes.

5 Be Alert, Be Wary, and Be Informed.

6 “Phishing” Scam Occur when You get an that looks like it comes from your bank, credit card company, etc. Asking you to “update their records” –May be due to potential fraud, other reasons Provides a hyperlink to a web page where you enter your personal information The link takes you to a thief’s website that is disguised to look like the company’s.

7 Why Phishing Scams? A phishing expedition, like the fishing expedition it's named for, is a speculative venture: the phisher puts the lure hoping to fool at least a few of the prey that encounter the bait. The thief is hoping to hook you with a very slick but very fake website to fish for your personal information.

8 What kinds of personal information do the thieves want? –Your name, address and date of birth –Social Security number –Driver’s License number –Credit Card numbers –ATM cards –Telephone calling cards

9 Why people fall for phishing scams. Typically, the messages appear to come from well known and trustworthy Web sites. Web sites that are frequently spoofed by phishers include PayPal, eBay, MSN, Yahoo, BestBuy, and America Online.PayPal Yahoo

10 Current Phishing Targets This chart highlights which institutions were targeted in phishing attacks recently.

11 How a Phishing might read Dear valued [CompanyName] member, Due to concerns, for the safety and integrity of the online [vendor service] community we have issued the following warning message. It has come to our attention that your account information needs to be confirmed due to inactive customers, fraud and spoof reports. If you could please take 5-10 minutes out of your online experience and renew your records you will not run into any future problems with the online service. However, failure to confirm your records may result in your account suspension. Once you have confirmed your account records your internet [vendor service] service will not be interrupted and will continue as normal. Please click here {fake web site address} to confirm your [vendor service] account records. Thank you for your time, [CompanyName] Billing Department.

12 Phishing s Examples

13 More Phishing s

14 More Phishing Examples

15 “Actual Phishing”

16 How can you tell if the message is real ? There are many other clues to look for: See if the contains obvious grammatical or spelling errors ("Due to concerns, for") The message opening very –general, or incorrectly identifies you, or only your account name The asks you to renew or update your account information. The message asks you to link to a web site which seems to be legitimate, but has extra information or characters at the end ( The web site prompts you for your userid and password, and then opens a page asking for credit card numbers, bank account numbers and so forth.

17 What should I do if I suspect the is a fake? Report it. Most legitimate companies encourage you to forward suspicious s to their security department, if you are unsure of the 's authenticity, and will respond within 24 hours with an answer. Then, delete it. Drag it to the trash, then empty the trash. And forget about it. You've defeated the spammers by not falling for their tricks.

18 How to Protect Yourself. Never click on hyperlinks in s. never cut and paste the link into your web browser. - INSTEAD, type in the url to go to the website in your search engine. Call the company directly to confirm whether the website is valid. Don’t reply to or pop-up messages that ask for personal or financial information. Don’t personal information. Be cautious opening attachments Forward spam that is phishing for information to and visit FTC’s

19 What if I was tricked and entered my information on the web site? Take immediate action to protect your identity and all of your online accounts. Treat the situation like you lost your wallet or purse. Immediately contact all of your financial institutions, preferably by phone, and inform them of the situation. Choose a strong password that is significantly different from your old passwords. Go to every web site where you may have stored credit card and/or bank numbers and change the password at each web site

20 What happens once phishing is reported to authorities… Once the thieves have “fished out the pond" so to speak, they move on. Normally, the link will shows a "cannot be displayed" page.

21 How do you avoid a Phishing Scam DO NOT respond to the . DO NOT provide personal information.

22 Work Cited tml istics.asp