DO YOU LOVE FISHING “PHISHING” ? OR Global Wealth Management Group MORGAN STANLEY & SMITH BARNEY A term used to describe fraudulent attempts to steal.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

OVER VIEW OF BANKING FRAUDS
1 Identity Theft and Phishing: What You Need to Know.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
What is identity theft, and how can you protect yourself from it?
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
1 What is Phishing? …listening to music by the band called Phish or perhaps …a hobby, sport or recreation involving the ocean, rivers or streams…nope.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Internet Phishing Not the kind of Fishing you are used to.
ONLINE SAFETY Online safety Money Works: Level 1 Topic 3.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
How It Applies In A Virtual World
Security Issues: Phishing, Pharming, and Spam
Internet safety By Lydia Snowden.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Web Spoofing John D. Cook Andrew Linn. Web huh? Spoof: A hoax, trick, or deception Spoof: A hoax, trick, or deception Discussed among academics in the.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Cyber Crimes.
Security Chapter What Should I Ask Santa Claus For? spoofing: fraudulent activity in which the sender address and other parts of the.
Matthew Hardaway CSCI101 Thursday 3:30pm.  Fishing (Encyclopedia Britannica): ◦ Sport of catching fish—freshwater or saltwater— typically with rod, line,
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Reliability & Desirability of Data
Scams & Schemes Common Sense Media.
IT security By Tilly Gerlack.
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking Funded by a grant from Take Charge America, Inc.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
C OMPUTER C ONCEPTS Unit 1 Concept 3 – Solving Technological Problems.
Phishing, Spoofing, Spamming and Security How To Protect Yourself Additional Credits: Educause/SonicWall, Hendra Harianto Tuty, Microsoft Corporation,
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
Information Security Sharon Welna Information Security Officer.
CCT355H5 F Presentation: Phishing November Jennifer Li.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
How Phishing Works Prof. Vipul Chudasama.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
What is Spam? d min.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
PHISHING PRESENTED BY: ARQAM PASHA. AGENDA What is Phishing? Phishing Statistics Phishing Techniques Recent Examples Damages Caused by Phishing How to.
Do you know who you’re dealing with? Social Engineering: Minimise the risk of becoming a victim.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
 77.4% of the perpetrators are male.  50% live in one of the following states: California, New York, Florida, Texas, and Washington.  55.4% complainants.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
PHISHING A Melbourne Athenaeum Library Cybersafety Information Guide
Objectives Define phishing and identify various types of phishing scams Recognize common baiting tactics used in phishing scams Examine real phishing messages.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Scams & Schemes Common Sense Media.
Phishing, identity theft, and more
Done by… Hanoof Al-Khaldi Information Assurance
IT Security  .
ISYM 540 Current Topics in Information System Management
Phishing, what you should know
Phishing is a form of social engineering that attempts to steal sensitive information.
Protect Your Computer Against Harmful Attacks!
Computer Security.
What is Phishing? Pronounced “Fishing”
Presentation transcript:

DO YOU LOVE FISHING “PHISHING” ? OR

Global Wealth Management Group MORGAN STANLEY & SMITH BARNEY A term used to describe fraudulent attempts to steal an individual’s identity through VISA Also called brand spoofing The creation of messages and Web pages that are the replicas of the existing, legitimate websites and businesses for the purpose of committing fraud. English Oxford Dictionary The fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers, online.

Users are sent an unsolicited appearing to be from a legitimate company. claims that a billing error or account problem has occurred OR the user’s information needs to be updated or validated. Users are asked to follow instructions that will take them to a Web site that appears to be legitimate. While at the site, users are asked to update personal and financial information by completing an online form. The form requests a variety of information such as credit card numbers, account numbers, passwords, date of birth, driver’s license number and social insurance numbers. Users respond to the request as the site looks authentic and therefore fooled by disclosing their financial and personal information to criminals. Criminals then uses the information to purchase goods and services, obtain credit, or commit identity theft. SCENARIO 1

User receives a pop-up reward message. Enters personal and financial details to retrieve reward Phishers receives user’s personal and financial information Users does not get the reward but finds out that their account OR identity has been used for some other matters. YOU HAVE BEEN PHISHED! THANK YOU FOR YOUR GENEROSITY… SCENARIO2SCENARIO2

The yellow lock does not appear anywhere on the screen. Fake request of “alternative password” Inappropriate request for personal information The pictures in the Web site are hyperlinked to unidentified addresses Threatening words to get user’s attention to disclose personal/financial information Web address are longer than usual. The Web address starts with “

PHARMING: Through Spoofed Websites / s PHARMING: Through Spoofed Websites / s SMISHING: Through Short Messaging Service (SMS) SMISHING: Through Short Messaging Service (SMS) VISHING: Through Voice IP (Phone calls) VISHING: Through Voice IP (Phone calls) ~ TYPES OF PHISHING ~

1. Be cautious with spams received through s. ~ Especially from unrecognized senders ~ Asking for personal information ~ Stating sense of urgency to respond; threatening possible consequences if do not act immediately ~ Requesting you to click on a link, download files or open attachments 2. Protect your computer with firewall, spam filters, antivirus, and anti-spyware softwares. ~ Install the latest softwares and constantly update them 3. Regularly check your bank account, credit and debit card statements ~ Keep track of your transactions ~ Easy to detect irregularities

4.Give personal information only through secured websites. ~ ‘Lock’ icon on the browser bar ~ ‘https’ URL instead of ‘http’ ~ Fully type URL address of website by yourself instead of using search 5.Contact the related company or bank to enquire if in doubt. ~ Regarding any s, sms, phone calls received asking for personal information

1.Maybank2u.com became victim to phishing culprits in Notification sent through the fake Maybank website and s sent to victims.

− Lures victims to the fake internet banking site from the link given in the and notification notice. −Unsuspecting victims enter their personal information to login.

2. Apple was attacked by phishers in Customers receive s purportedly from Apple. - Aimed at tricking customers to reveal their AppleID Billing Information. - Well-crafted scam with unusually well written and grammatically correct sentences with an authentic looking website.

Victims are directed to the fake link given in the .

 Morgan Stanley and Smith Barney,  Bloggers.com, Tech Guide, yourself-from-phishing.htmlhttp://techno-guideforall.blogspot.com/2011/06/how-to-protect- yourself-from-phishing.html  Visa,  Identity Theft Killer, Prevent Identity Theft in 5 Minutes,  infosec ISLAND, 10 ways to prevent phishing, Wednesday, May 19,  PHISHING.ORG, How to prevent phishing scams, phishing/ phishing/  Maybank Phishing Scam s in Malaysia,  TG Daily, Massive phishing scam targets Apple users, Emma Woollacott,  New phishing scam targets Apple users, George Wong,  Saturday Party, Walter and Simon, Dance mood by Nitro Album.  Google images

Together as 1 Malaysia, let us unite as one to curb phishing!