Don’t Be “Phooled” By Phishing Federal Trade Commission National Consumers League Microsoft Corporation March 31, 2005.

Slides:



Advertisements
Similar presentations
Primary Threats to Computer Security
Advertisements

Internet Investigations COEN 252 Computer Forensics  Thomas Schwarz, S.J
By Derek Hahn Washington State Director of Finance and Ian Newby Lake Stevens Member In 3-D.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
The Internet.
Protecting Yourself Against Identity Theft TSCPA Member Name, CPA Firm/Company Name.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
What is identity theft, and how can you protect yourself from it?
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
1 What is Phishing? …listening to music by the band called Phish or perhaps …a hobby, sport or recreation involving the ocean, rivers or streams…nope.
Bsharah Presentation Threats to Information Security Protecting Your Personal Information from Phishing Scams.
DO YOU LOVE FISHING “PHISHING” ? OR Global Wealth Management Group MORGAN STANLEY & SMITH BARNEY A term used to describe fraudulent attempts to steal.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Felicia Cervantes. Using someone's personal identifying data for unlawful purpose. (This is a SERIOUS crime.) More than 8 million American Adults fell.
Online Shopping Take Charge of Your Finances
Protecting Our Personal Space Security in a Virtual World.
© Family Economics & Financial Education –October 2007 – Consumer Protection Unit – Online Shopping Funded by a grant from Take Charge America, Inc. to.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Identity Theft Statistics Identity Theft – “Fastest Growing Financial Crime in the United States.” (1) 9.3 million U.S. Adults were Victims of ID Theft.
Protecting Our Personal Space Security in a Virtual World by David Hines - Information Security Officer
Security Issues: Phishing, Pharming, and Spam
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Matthew Hardaway CSCI101 Thursday 3:30pm.  Fishing (Encyclopedia Britannica): ◦ Sport of catching fish—freshwater or saltwater— typically with rod, line,
Have Fun, Be Safe Strategies for Internet and Social Media Safety.
Safe Internet Use Mark Wheatley CSI Onsite
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Scams & Schemes Common Sense Media.
© Family Economics & Financial Education –October 2007 – Consumer Protection Unit – Online Shopping Funded by a grant from Take Charge America, Inc. to.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Phishing, Spoofing, Spamming and Security How To Protect Yourself Additional Credits: Educause/SonicWall, Hendra Harianto Tuty, Microsoft Corporation,
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Information Security Sharon Welna Information Security Officer.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
Phishing: Trends and Countermeasures Blaine Wilson.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Phishing Dennis Schmidt, CISSP Director, Office of Information Systems HIPAA Security Officer UNC School of Medicine UNC School of Medicine.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Chapter 9 Credit Problems and Laws. Slide 2 How Can Consumers Protect against Errors and Fraud? 9-1 Resolving Credit Problems Disputing a charge is the.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Phishing and online fraud What parents need to know.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
PHISHING PRESENTED BY: ARQAM PASHA. AGENDA What is Phishing? Phishing Statistics Phishing Techniques Recent Examples Damages Caused by Phishing How to.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Top Tips for Online Safety Speaker Name Speaker Organization.
Fall Phishing - attempt to acquire sensitive information, like bank account information or an account password, by posing as a legitimate entity.
Important Information Provided by Information Technology Center
Phishing, identity theft, and more
Digital Citizenship Middle School
ISYM 540 Current Topics in Information System Management
Information Security 101 Richard Davis, Rob Laltrello.
Protect Your Computer Against Harmful Attacks!
Information Security Session October 24, 2005
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

Don’t Be “Phooled” By Phishing Federal Trade Commission National Consumers League Microsoft Corporation March 31, 2005

Susan Grant Director, National Consumer League’s National Fraud Information Center and Internet Fraud Watch Program

Phishing Statistics  #4 Internet Fraud  #10 Telemarketing Fraud – National Fraud Information Center / Internet Fraud Watch, National Consumers League, 2004  43% or 91 million U.S. adults have received a phishing contact  Of those 5% or 4.5 million U.S. adults have provided personal information to phishers – STAR/First Data, November 2004

Can You Spot a Phish? Jacqueline Beauchere Business Strategy Manager Microsoft Corporation

Deceptive Address Source code reveals actual mail from address as msn-network.com Deceptive Link Source code reveals that the actual address linked to is href= msnupdate.com/?sess=qCKWmHUBPPZwT8n 4GEMNh7owHDEGt40IHKG5tAGiqGOjNeovRc msnupdate.com/?sess=qCKWmHUBPPZwT8n 4GEMNh7owHDEGt40IHKG5tAGiqGOjNeovRc The difference between these two URLs could be a sign that the message is fake. (However, even if the URLs are the same, don't let down your guard, because the pop-up could be a trick, too.) Alarmist Message Criminals try their best to create a sense of urgency so you'll respond without thinking. Also, look for misspellings, grammatical errors, and typos--such as “…an access to MSN services for your account…” Unpersonalized Messages Be wary if a company you regularly do business with fails to address you by name.

Know the Company eBay generally does not send out s to customers containing login links. Look carefully at the status bar for all links and URLs—the URL in the status bar for the login link is not eBay.com. Differences between links or URLs in an and the status bar should make you suspicious. If you receive an like this one, open a new browser window, type in the URL yourself and login into your account to see if there are any real account problems. PHISH

Look carefully at the link. See sign? This is a common phishing trick. In some browser applications, when a URL uses sign, everything to the left of sign is disregarded and the browser only reads to the right of sign. When you see or suspect trick, be suspicious. If you think that the sender of the has no legitimate association with the domain you see there, suspect a phish. PHISH

Aaron Kornblum Internet Safety Enforcement Attorney Microsoft Corporation

MSN Billing Phishing Case 3 Subpoenas identified ISP in Austria 5 Subpoena to Qwest and investigations identified Jayson Harris in Iowa, US 1 MS filed John Doe lawsuit in WA 6 Referred to FBI and obtained $3 million Default Judgment 2 Issued subpoenas to web hosts in CA 4 Austrian ISP identified IP address registered to Qwest in the US

Lydia Parnes Acting Director, Bureau of Consumer Protection Federal Trade Commission

Tip Number 1 : If you get an or pop up message that asks for personal or financial information, don’t reply, and don’t click on the link in the message. Legitimate companies don’t ask for this information by Tip Number 2 : Don’t personal or financial information. Tip Number 3 : Read your credit card and bank account statements as soon as you receive them to spot any unauthorized charges Tip Number 4 : Use anti virus software and a firewall, and keep them up-to-date. Tip Number 5 : Report suspicious activity to the FTC.