Teach a man (person) to Phish Recognizing email scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

How to protect yourself, your computer, and others on the internet
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
The Internet.
SECURITY CHECK Protecting Your System and Yourself Source:
What is identity theft, and how can you protect yourself from it?
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Acceptable Use Policy –The Acceptable Use Policy defines the rules of the machine and internet connection you are on. –Specific policies differ by machine.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Lecture 16 Secure Social Networking. Overview What is Social Networking? The Good, the Bad and the Ugly How to protect yourself How to protect your children.
What do I need to know?.   Instant Messages  Social Networking.
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Basics: Getting Started Uploading and Sharing Videos on YouTube. Basics: Getting Started Uploading and Sharing Videos on YouTube. 1.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Scams Stevie's Scam School videos
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
1 Computer Security: Protect your PC and Protect Yourself.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
How It Applies In A Virtual World
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Cyber Crimes.
JMU GenCyber Boot Camp Summer, Cyberspace Risks and Defenses Facebook Snapchat P2P filesharing Apps Craigslist Scams JMU GenCyber Boot Camp© 2015.
Scams & Schemes Common Sense Media.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
C OMPUTER V IRUSES Julia White. W HAT ARE COMPUTER VIRUSES ? Computer viruses are small software programs that are designed to spread from one computer.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Internet Security and Your Computer Welcome to Boot Camp.
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
What is Spam? d min.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Managing Money Workshop The National Autistic Society AGM
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Internet Safety.
Scams & Schemes Common Sense Media.
Phishing, identity theft, and more
Class Name: Online Safety & Privacy Basics
Learn how to protect yourself against common attacks
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Internet Identity, Safety, & Security
Unit 4 IT Security.
Digital Citizenship Middle School
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
Protect Your Computer Against Harmful Attacks!
Internet Safety Vocabulary
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Introduction-Cyber Safety
Presentation transcript:

Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013

How to Know it’s Fake Alarmist or dire warnings of account closures Promises of money from complete strangers If it sounds too good to be true... Misspellings or bad grammar URLs that have no connection to sender Sender return addresses that have no relation to subject

Top Ten Scams* The Nigerian scam, also known as 419 Advanced fees paid for a guaranteed loan or credit card Lottery scams Phishing s and phony web pages Items for sale overpayment scam Employment search overpayment scam Disaster relief scams Travel scams Make Money Fast” chain s "Turn Your Computer Into a Money-Making Machine!"

What does a Phishing look like?

Beware of links! If you “hover” your mouse over the link without touching it, the URL the link will take you to should be displayed in your browser.* * Will vary from browser to browser, operating system to operating system

Protect yourself from cybersquatting and fake web addresses What is cybersquatting? – Cybercriminals sometimes register web addresses (also called "domain names" or "URLs") that are similar to the web addresses of popular websites or are common misspellings of popular websites. – Scammers register these web addresses in order to compete with popular sites or to earn money through advertisements. – If you enter an incorrect web address, you might be taken to a place where you'll see an ad for the site you really wanted. But if you click that ad, you might get to where you want to go, but you might also help scammers earn money, which in turn might increase the cost of merchandise from the scammed company. In addition to getting others to make money for them, typosquatters and cybersquatters can download malicious software programs and spyware onto the unprotected computers of people who visit their site

Beware of phishing phone calls Cybercriminals might call you on the phone and offer to help solve your computer problems or sell you a software license. Once they've gained your trust, cybercriminals might ask for your user name and password or ask you to go to a website to install software that will let them access your computer to fix it. Once you do this, your computer and your personal information is vulnerable. Treat all unsolicited phone calls with skepticism. Do not provide any personal information.

go to If you aren’t sure,

Help protect your privacy in online communities distribution lists Message boards and newsgroups Instant message (IM) services Chat rooms Blogging sites Social networking sites Online communities require you to provide personal information. Profiles are public. Comments you post are permanently recorded You might even mention when you plan to be out of town. Even if you've been involved with a community for a long time, don't be lulled into a false sense of security. Stay aware of how such information might be used by scammers of all kinds, both online and off, and refrain from sharing too much. and phishing scammers count on the appealing sense of trust that is often fostered in online communities to steal your personal information.

How does a computer get infected with a virus or spyware? Accepting without reading Opening attachments Not running the latest updates Pirating software, music, or movies No antivirus spyware scanner Downloading infected software

How to report SPAM Open the message into its own window. Click on the Other Actions: button and select Forward as Attachment. In the new message window that opens, address the message to Click the Send button. Instructions are for Outlook on a PC. For more details, go to kb.pomona.edu, log in with your user account and password and search for “Spam”. Finding answers will be covered in next week’s High Tea!