SlideShare une entreprise Scribd logo
1  sur  1
Télécharger pour lire hors ligne
Simple Safeguards:                                                         Presented by Retired
                                                                                                FBI Special Agent
           Preventing Social Media Fraud                                                                Jeff Lanza

 Keep your guard up on sites like Facebook, LinkedIn and Twitter. Scammers are exploiting the trust we
        have of our connections on these sites to gain access to your accounts and commit fraud.

                    Current Threats                                        Specific Actions to Avoid
Fake Notification E-mails                                             1.    Don’t click on a message that seems
Look out for fake emails that look like they came from                      weird. If it seems unusual for a friend to
Facebook. These typically include links to phony pages that                 write on your Wall and post a link, that
attempt to steal your login information or prompt you to                    friend may have gotten phished.
download malware. Never click on links in suspicious                  2.    Don’t enter your password through a
emails. Log-in to a site directly.                                          link. Just because a page on the Internet
                                                                            looks like Facebook, it doesn't mean it is.
Suspicious Posts and Messages                                               It is best to go the Facebook log-in page
Wall posts or messages that appear to come from a friend                    through your browser.
asking you to click on a link to check out a new photo or             3.    Don't use the same password on
video that doesn't actually exist. The link is typically for a              Facebook that you use in other places
phony login page or a site that will put a virus on your                    on the web. If you do this, phishers or
computer to steal your passwords.                                           hackers who gain access to one of your
Money Transfer Scams                                                        accounts will easily be able to access
Messages that appear to come from friends or others                         your others as well, including your bank.
claiming to be stranded and asking for money. These                   4.    Don’t share your password with
messages are typically from scammers. Ask them a                            anyone. Social sites will never ask for
question that only they would be able to answer. Or                         your password through any form of
contact the person by phone to verify the situation,                        communication.
even if they say not to call them.                                    5.    Don't click on links or open
                                                                            attachments in suspicious emails. Fake
                                                                            emails can be very convincing, and
                General Online Safety Rules                                 hackers can spoof the "From:" address so
       Be wary of strangers - The internet makes it easy for               the email looks like it's from a social site.
        people to misrepresent their identities and motives. If             If the e-mail looks weird, don't trust it,
        you interact with strangers, be cautious about the
                                                                            and delete it from your inbox.
        amount of information you reveal or agreeing to meet
        them in person.                                               6.    Don’t send money anywhere unless
       Be skeptical - People may post false or misleading                  you have verified the story of someone
        information about various topics, including their own. Try          who says they are your friend or relative.
        to verify the authenticity of any information before taking   7.    Don’t provide your cell phone number
        any action.
                                                                            to verify the results of a Facebook
       Evaluate your settings - Use privacy settings. The
        default settings for some sites may allow anyone to see             game or survey without reading the
        your profile. Even private information could be exposed,            terms and conditions. It may result in
        so don't post anything that you wouldn't want the public            recurring charges on your cell phone bill.
        to see.
       Use strong passwords - Protect your account with                      More resource Information:
        passwords that cannot easily be guessed. If your
        password is compromised, someone else may be able to          www.us-cert.gov or www.fbi.gov
        access your account and pretend to be you.
                                                                                 Speaker Information:
       Security Information For Social Networking Sites                                Jeff Lanza
                  www.facebook.com/security                                       Phone: 816-853-3929
         www.twitip.com/twitter-security-dos-and-donts                     Email:jefflanza@thelanzagroup.com
                www.linkedin.com/secure/settings                           Web Site: www.thelanzagroup.com

Contenu connexe

Tendances

Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpumajcullishpum
 
Internet saftey
Internet safteyInternet saftey
Internet safteyryanbud
 
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)Celia Bandelier
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Parenting & Education
 
Social Networking Safety
Social Networking SafetySocial Networking Safety
Social Networking Safetyguestd5e1d2
 
The Basics Of Internet Safety
The Basics Of Internet SafetyThe Basics Of Internet Safety
The Basics Of Internet SafetyBobbi Newman
 
Facebook Password Sniper
Facebook Password SniperFacebook Password Sniper
Facebook Password Sniperhellishyard9256
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety PresentationLJ Henshell
 
Slideshow - Lil Rat
Slideshow - Lil RatSlideshow - Lil Rat
Slideshow - Lil Ratmegg16
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parentssafetyseminar
 
How to keep your digital identity safe
How to keep your digital identity safeHow to keep your digital identity safe
How to keep your digital identity safeTSageer
 
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersRajesh Soundararajan
 

Tendances (17)

Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpuma
 
Internet saftey
Internet safteyInternet saftey
Internet saftey
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental Control
 
Social Networking Safety
Social Networking SafetySocial Networking Safety
Social Networking Safety
 
The Basics Of Internet Safety
The Basics Of Internet SafetyThe Basics Of Internet Safety
The Basics Of Internet Safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Facebook Password Sniper
Facebook Password SniperFacebook Password Sniper
Facebook Password Sniper
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
 
Slideshow - Lil Rat
Slideshow - Lil RatSlideshow - Lil Rat
Slideshow - Lil Rat
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parents
 
How to keep your digital identity safe
How to keep your digital identity safeHow to keep your digital identity safe
How to keep your digital identity safe
 
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and Beginners
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
Online Security
Online SecurityOnline Security
Online Security
 

En vedette

En vedette (7)

ICD- 10 is coming -Brenda Edwards
ICD- 10 is coming -Brenda EdwardsICD- 10 is coming -Brenda Edwards
ICD- 10 is coming -Brenda Edwards
 
Polozhenie o konkurse__moya_malaya_rodina
Polozhenie o konkurse__moya_malaya_rodinaPolozhenie o konkurse__moya_malaya_rodina
Polozhenie o konkurse__moya_malaya_rodina
 
Social networking fraud handout june 2011
Social networking fraud handout june 2011Social networking fraud handout june 2011
Social networking fraud handout june 2011
 
Glrb2010 auvi
Glrb2010 auviGlrb2010 auvi
Glrb2010 auvi
 
Lawrence mm june 2011
Lawrence mm june 2011Lawrence mm june 2011
Lawrence mm june 2011
 
Medical identity theft handout june 2011
Medical identity theft handout june 2011Medical identity theft handout june 2011
Medical identity theft handout june 2011
 
Jeff lanza id theft handout business march 2011
Jeff lanza id theft handout business march 2011Jeff lanza id theft handout business march 2011
Jeff lanza id theft handout business march 2011
 

Similaire à Social networking fraud handout june 2011

IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptxTanvir Amin
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2JayMarkBandoy1
 
Facebook Hacked, Protect Your Facebook Account
Facebook Hacked, Protect Your Facebook AccountFacebook Hacked, Protect Your Facebook Account
Facebook Hacked, Protect Your Facebook AccountKANKIPATI KISHORE
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxNoelBuctot1
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxvdgtkhdh
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUBilly Warero
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxamby3
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacksNamik Heydarov
 
phishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptxphishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptxErrorError22
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxDominicCaling
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social mediasanjeev kumar
 

Similaire à Social networking fraud handout june 2011 (20)

IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
S_A_T.pptx
S_A_T.pptxS_A_T.pptx
S_A_T.pptx
 
Facebook Hacked, Protect Your Facebook Account
Facebook Hacked, Protect Your Facebook AccountFacebook Hacked, Protect Your Facebook Account
Facebook Hacked, Protect Your Facebook Account
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Online privacy
Online privacy Online privacy
Online privacy
 
Online privacy
Online privacyOnline privacy
Online privacy
 
Security-Awareness-Training.pptx
Security-Awareness-Training.pptxSecurity-Awareness-Training.pptx
Security-Awareness-Training.pptx
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
Heads up!
Heads up!Heads up!
Heads up!
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacks
 
Cyberbullying and Cybercrime
Cyberbullying and CybercrimeCyberbullying and Cybercrime
Cyberbullying and Cybercrime
 
phishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptxphishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptx
 
Phishing
PhishingPhishing
Phishing
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
 

Plus de Lawrence Medical Managers

Plus de Lawrence Medical Managers (11)

Accountable care organizations lawrence 101211
Accountable care organizations lawrence 101211Accountable care organizations lawrence 101211
Accountable care organizations lawrence 101211
 
Cms aco information
Cms aco informationCms aco information
Cms aco information
 
Social networking fraud handout june 2011
Social networking fraud handout june 2011Social networking fraud handout june 2011
Social networking fraud handout june 2011
 
Id theft handout individual june 2011
Id theft handout individual june 2011Id theft handout individual june 2011
Id theft handout individual june 2011
 
Presentation by Sheila Richmeier
Presentation by Sheila RichmeierPresentation by Sheila Richmeier
Presentation by Sheila Richmeier
 
Software vendor 5010 checklist
Software vendor 5010 checklistSoftware vendor 5010 checklist
Software vendor 5010 checklist
 
Clearinghouse payer 5010 checklist
Clearinghouse payer 5010 checklistClearinghouse payer 5010 checklist
Clearinghouse payer 5010 checklist
 
ICD-10 action plan-revised
ICD-10 action plan-revisedICD-10 action plan-revised
ICD-10 action plan-revised
 
ICD-10, Brenda Edwards 07.14.2010
ICD-10, Brenda Edwards 07.14.2010ICD-10, Brenda Edwards 07.14.2010
ICD-10, Brenda Edwards 07.14.2010
 
Disaster Planning Local state-federal roles and responsibilities
Disaster Planning Local state-federal roles and responsibilities  Disaster Planning Local state-federal roles and responsibilities
Disaster Planning Local state-federal roles and responsibilities
 
Secretary Rod Bremby Presentation
Secretary Rod  Bremby  PresentationSecretary Rod  Bremby  Presentation
Secretary Rod Bremby Presentation
 

Dernier

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 

Dernier (20)

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 

Social networking fraud handout june 2011

  • 1. Simple Safeguards: Presented by Retired FBI Special Agent Preventing Social Media Fraud Jeff Lanza Keep your guard up on sites like Facebook, LinkedIn and Twitter. Scammers are exploiting the trust we have of our connections on these sites to gain access to your accounts and commit fraud. Current Threats Specific Actions to Avoid Fake Notification E-mails 1. Don’t click on a message that seems Look out for fake emails that look like they came from weird. If it seems unusual for a friend to Facebook. These typically include links to phony pages that write on your Wall and post a link, that attempt to steal your login information or prompt you to friend may have gotten phished. download malware. Never click on links in suspicious 2. Don’t enter your password through a emails. Log-in to a site directly. link. Just because a page on the Internet looks like Facebook, it doesn't mean it is. Suspicious Posts and Messages It is best to go the Facebook log-in page Wall posts or messages that appear to come from a friend through your browser. asking you to click on a link to check out a new photo or 3. Don't use the same password on video that doesn't actually exist. The link is typically for a Facebook that you use in other places phony login page or a site that will put a virus on your on the web. If you do this, phishers or computer to steal your passwords. hackers who gain access to one of your Money Transfer Scams accounts will easily be able to access Messages that appear to come from friends or others your others as well, including your bank. claiming to be stranded and asking for money. These 4. Don’t share your password with messages are typically from scammers. Ask them a anyone. Social sites will never ask for question that only they would be able to answer. Or your password through any form of contact the person by phone to verify the situation, communication. even if they say not to call them. 5. Don't click on links or open attachments in suspicious emails. Fake emails can be very convincing, and General Online Safety Rules hackers can spoof the "From:" address so  Be wary of strangers - The internet makes it easy for the email looks like it's from a social site. people to misrepresent their identities and motives. If If the e-mail looks weird, don't trust it, you interact with strangers, be cautious about the and delete it from your inbox. amount of information you reveal or agreeing to meet them in person. 6. Don’t send money anywhere unless  Be skeptical - People may post false or misleading you have verified the story of someone information about various topics, including their own. Try who says they are your friend or relative. to verify the authenticity of any information before taking 7. Don’t provide your cell phone number any action. to verify the results of a Facebook  Evaluate your settings - Use privacy settings. The default settings for some sites may allow anyone to see game or survey without reading the your profile. Even private information could be exposed, terms and conditions. It may result in so don't post anything that you wouldn't want the public recurring charges on your cell phone bill. to see.  Use strong passwords - Protect your account with More resource Information: passwords that cannot easily be guessed. If your password is compromised, someone else may be able to www.us-cert.gov or www.fbi.gov access your account and pretend to be you. Speaker Information: Security Information For Social Networking Sites Jeff Lanza www.facebook.com/security Phone: 816-853-3929 www.twitip.com/twitter-security-dos-and-donts Email:jefflanza@thelanzagroup.com www.linkedin.com/secure/settings Web Site: www.thelanzagroup.com