Security Awareness Cloud Phishing Attacks

Slides:



Advertisements
Similar presentations
Instant Messages: I am bored. Social Networks: Facebook, Myspace.
Advertisements

You are responsible for security of your internet banking transactions ONLINE.
Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
The Internet.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Fraud and Identity Theft Test Review. Who should you contact if you are a victim of identity theft?
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
SECURITY AND SOCIAL ENGINEERING US Department of Commerce Office of Security Updated 09/26/11 Security is Everyone's Responsibility – See Something, Say.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
e-safety and cyber bullying
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
Basics: Getting Started Uploading and Sharing Videos on YouTube. Basics: Getting Started Uploading and Sharing Videos on YouTube. 1.
Surrey Libraries Computer Learning Centres Totally New to Computers Easy Gmail September 2013 Easy Gmail Teaching Script.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Cooperating Teachers: How to Reset Your Password in Tk20 Use this after your initial account set up if you cannot remember your TK20 password.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Company/Product Overview. You have lots of files all over the place.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Tutorial Video basic skills basic skills Next page -->
Social impacts of the use of it By: Mohamed Abdalla.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Identity Theft By: Victoria Tuttle. DeterDetect Defend.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Reliability & Desirability of Data
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Keeping Safe While Using the Internet. We live in a community. What are some safety rules we have in our community? Cyberspace is also a community. What.
Protecting Yourself Against Identity Theft By Sierra Monif Next.
Identity theft is one of the main problems in cyberspace increasing each year by 500%. Identity theft is when another public citizen/citizens take your.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Presentation Title runs here l 00/00/00 How to Access MasteringPhysics 1.
Information System Security. Agenda Survey Results Social Networking Multi-Factor Authentication & Passwords Phishing Schemes Cyber Bullying Advice.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
 Introduction to Computing  Computer Programming  Terrorisom.
At the Log in page enter your college provided username and password then click submit to login to Owl Link.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Cyberbullying Activity 4: Advice Quiz. Ask an Internet Expert These people need help from someone who knows how to be safe online... YOU! What advice.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
YEAR 6’S GUIDE TO STAYING SAFE ON THE INTERNET. CHATTING When you are chatting to people online, try not to give out any personal information about yourself.
that keeping money and personal information safe is very important That losing money or having personal information stolen can be distressing.
Setting Up Your New iPad. Turn on Your iPad and then… Select English Select United States Select DVUSD Mobile as your wifi network Select enable location.
BASICS. Objectives Choose an provider Fill out an online form Learn about usernames and addresses Learn about Capcha Explore the organization.
Fraud Protection.
Fraud protection.
Class Name: Online Safety & Privacy Basics
Unit 4 IT Security.
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
Report Phishing Forward phishing s to
Phishing is a form of social engineering that attempts to steal sensitive information.
What The Right Steps To Check RR Mail If It Is Hacked?
GET IN TOUCH WITH US AT APPLE SUPPORT TEAM Apple Support Number Give a Call on Reset Apple ID Password.
Practice Safe Computing
Phishing.
Report Phishing Forward phishing s to
Office 365 Login Instructions
Phishing Don’t fall for fake
What is Phishing? Pronounced “Fishing”
What devices use the internet?
What To Do If You Forgot Apple ID or Password Toll Free Number +1-(877) Visit at
Presentation transcript:

Security Awareness Cloud Phishing Attacks Protection from Cloud Based Attacks February, 2015

Cloud Phishing Attacks Con artists have evolved and have been using the Internet to try and take advantage of people. Their goal: To get someone to give up their username and password.

Cloud Phishing Attacks Your AppleID was recently used for the acquisition of “Lane Splitter” from the iTunes Store on a Personal Computer or another device that hadn’t previously been linked to that AppleID. The buying was observed from 207.149.65.23 (Volgograd Russia) If you made the purchase you can safely ignore this email. It was sent only to alert you in case you did not make the buying by your own. If you are not the one who made this operation, we recommend that you urgently check your AppleID: Apple ID> Fake emails are sent to the masses asking if a strange purchase was made from some place you most likely aren’t right now. The email instructs to disregard the email but… If you didn’t buy the strange item, to log in and contact them right away! SAMPLE

Cloud Phishing Attacks The email links to an exact replica of the official page. Most people, hoping to protect their account ASAP, do not look at the URL to see if it’s official. They sign in and … URL www.notApple.Yeah!

Cloud Phishing Attacks I just stole your login!

Cloud Phishing Attacks With your login, the cyber crook can: Compromise privacy Email/chats/IMs/photos/ Calendar Spam coworkers, family, friends Ask your family for money while pretending you are stranded Get you fired from work with inappropriate messages/pictures Reset your: Bank account passwords Billing addresses

Cloud Phishing Attacks Remember, con artists play their victims on their sense of ‘HOPE’. We hoped nobody really bought something from that account. We hoped it was not too late to stop this. Be Aware!

Cloud Phishing Attacks I hope you ignored this Security Awareness message!

Questions or Comments DL Awareness SecurityAwareness@CSAA.com http://go/aware Like our new format? Let us know in the discussion!