Presentation is loading. Please wait.

Presentation is loading. Please wait.

PHISHING A Melbourne Athenaeum Library Cybersafety Information Guide

Similar presentations


Presentation on theme: "PHISHING A Melbourne Athenaeum Library Cybersafety Information Guide"— Presentation transcript:

1 PHISHING A Melbourne Athenaeum Library Cybersafety Information Guide
Image source: A Melbourne Athenaeum Library Cybersafety Information Guide Image source:

2 What is phishing? Phishing is the fraudulent practice of contacting people online, purporting to be from reputable companies, to induce individuals to reveal personal information, such as passwords and credit card numbers. Phishing is carried out with one goal in mind – identity theft. Providing your personal information online can lead to identity theft, draining of bank accounts or being signed up to programs without your consent. Image source:

3 Being vigilant Phishing works because it is sent to large numbers of internet users. Studies suggest that even the least successful scams have approximately a 3% success rate. To give you an idea of the numbers involved a moderate sized scam, sent to the equivalent of every account in Australia, would have a success rate greater than the populations of Geelong and Canberra combined. You could be targeted anywhere (or anytime) you’re using or connected to the internet – including when you’re using a computer, laptop, iPad or smartphone. Vigilance against phishing is an important part of staying safe online. Rather than following links that are sent to you, it is best to use a search engine to find the official website for the organisation. Phishing can seem relatively innocent, or inconsequential, or even appear to be a request for charity or aid. Make sure you verify the details of any unsolicited online contact using an independent source before donating money or otherwise interacting with them. Image source: Image source:

4 Examples of phishing Try to avoid following links directly from s such as in the example (left). Instead, go to the company’s site yourself by using a search engine such as Google. Pop-up windows (right) are often used in phishing scams. Note here that the message isn’t from Adobe Flash but update91.com

5 Examples of phishing Fake antivirus program specifically created for phishing. Phishing is designed to look either appealing or threatening, often so it appears to come from a source of authority. Any virus or malware warnings that don’t come from antivirus software you’ve installed are probably phishing scams.

6 Identifying phishing emails
The Address – if the claims to be from one place but the domain section of the is from somewhere else it is probably a scam. In this case (right) rather than studentloan the address is studntslon and the ending ‘.click’ is suspect as well. The Address – this (right) has copied the address of the receiver so it looks as though it has come from within the organisation. If you get an claiming to be from your own address that you don’t remember sending it is almost certainly a scam. The Subject – don’t be taken in by urgent or threatening language in the subject, or by offers that seem too good to be true. Remember if you are concerned contact the company yourself rather than engaging with the , this includes checking phone numbers yourself rather than those offered in the . Both the examples on this page make offers which aren’t appropriate for an organisation.

7 Identifying phishing emails
If the begins ‘Dear Sir/Madam’ ‘Valued customer’ or just ‘Hello’, it is probably a scam. Companies want to identify themselves for brand awareness so always be wary when an claims to be from a ‘well known’ or ‘highly respected’ company but doesn’t name it. Lack of identifying information about the sender in the signature of the strongly suggests a scam. In the example (below) ‘HR department’ doesn’t tell you anything about to company or person sending this. Spelling and grammar mistakes, such as those in the last line of the example (above) are a good sign that the is a scam. Companies put a lot of work into making sure their s are high quality.

8 Identifying phishing websites
URL – any site asking for a password or any other personal information should begin with ‘ rather than ‘ The s stands for secure so do not provide personal details to any site that doesn’t begin with ‘ The top address bar is this site’s actual address, while the bottom address is part of the page content designed to mimic the address bar.

9 Identifying phishing websites
Because scam sites are getting good at hiding addresses, it is worth checking the site’s digital certificate. This is usually represented by a padlock icon in the address bar. Any site asking for your details should have one and clicking on it should display information about the certificate. Often the colour of the padlock is an indicator about the level of security of the page, with green being most secure and red a potential threat to your computer. However, this is not always the case and should not be relied on. Internet Explorer Firefox Chrome

10 Identifying phishing websites
If the company name is misspelled or not included in the url this is probably not a legitimate site. A common trick is substitution (eg. replacing the letter ‘l’ with the numeral ‘1’). Be wary of any site that immediately opens a pop-up window asking for login details. Sometimes phishing attempts direct you to a legitimate site but use a pop-up to get your account information. If you are still unsure whether a site or is a scam, check the Australian government website dedicated to finding and notifying people about them:

11 SMiShing Phishing can target any device connected to the internet. One form which is becoming increasingly common is smishing or SMiShing. This stands for SMS phishing. These attacks target smartphones rather than s or websites and trick users into downloading malware onto their mobile device. Remember to be aware of this when downloading apps or opening attachments to messages on your phone. Image source: Image source:

12 What action to take If you or someone you know has been the victim of a scam: Stop sending money. Contact your bank and any organisation which is compromised. Change your passwords, even ones which you don’t think have been compromised. Recover your identity. Report the scam to the authorities: Police, Scamwatch, etc. Alert other people to the scam. If needed, contact a support or counselling service. Beware of being targeted with follow-up scams.

13 Thank you Thank you for taking the time to read this guide. If you have any further queries please don’t hesitate to ask library staff. Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.


Download ppt "PHISHING A Melbourne Athenaeum Library Cybersafety Information Guide"

Similar presentations


Ads by Google