Download presentation
Presentation is loading. Please wait.
1
Phishing, identity theft, and more
Scams and Schemes: Phishing, identity theft, and more
2
Identity theft What kind of info do thieves look for?
3
Identity theft? Birth date and location Full name Addresses, phone numbers Driver’s license, passport # Account numbers Passwords Social Security number
4
WHAT CAN A COMMON THEIF FIND EASILY?
Birth date and location Full name Addresses, phone numbers Driver’s license, passport # Account numbers Passwords Social Security number
5
GIVING AWAY YOUR INFORMATION
Passwords Security questions answers Usernames
6
Phony emails, fake links, and more
Phishing Phony s, fake links, and more
7
Defined The fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
19
Spotting scams: REVIEW
Need to verify account information Sense of urgency Spelling errors Threats to your account Link in or attachment Too good to be true Generic greeting
20
PROTECT YOURSELF! If it looks suspicious, don’t open it, because it probably is. Don’t click on links or download attachments (unless reliable). They could bring viruses to your computer. Don’t reply to the message. Mark the message as “spam” or “junk mail” and report it. Call the company DIRECTLY if you have questions about an that seems “off” (using a legitimate phone number) When in doubt, just delete!
21
Resource Review Visit
22
Thank you! Jordan Gruber Media Facilitator gruberj@cliu.org
Carbon Lehigh Intermediate Unit #21 Jordan Gruber Media Facilitator
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.