SlideShare a Scribd company logo
1 of 27
12 Holiday
             Shopping
               Scams
              Greater Cleveland PC
                  Users Group
                November 2011
Basic information from MSNBC / McAfee
Many of us are already shopping
online, or will be soon, for the
holidays. "Cyber-criminals rub their
hands with glee when they think of
the holidays," said Gary
Davis, director of consumer product
marketing at McAfee.
“Consumers are making
travel plans, shopping
for gifts and bargains,
updating Facebook and
connecting with friends.”
However, the vast majority have no
security protection for their
smartphones or tablets, despite using
them heavily during the holiday
season.
Consumers need to stay one step
ahead of this season's cyber-
scrooges, and make sure they have
protection for all of their internet-
enabled devices. Otherwise, they
could risk giving the bad guys the
biggest gift of all - their own personal
and financial information."
Mobile Malware
More of us are using our
phones for shopping, to
research products or to
redeem coupons. McAfee
says Android phones are
"most at risk," citing "a 76
percent increase in malware
targeted at Android devices in
the second quarter of 011 over the first,
making it the most targeted smartphone
platform."
Mobile Malware
McAfee also says
new malware "has
recently been found
that targets QR codes,
a digital barcode that
consumers might scan
with their smartphone to find good deals on
Black Friday and Cyber Monday, or just to
learn about products they want to buy."
Malicious Mobile Apps
These are mobile apps
designed to steal infor-
mation from smartphones,
or send out expensive
text messages without
a user’s consent. Dangerous apps are
usually offered for free, and masquerade
as fun applications, such as games.
Malicious Mobile Apps
For example, last year,
4.6 million Android smart-
phone users downloaded
a suspicious wallpaper app
that collected and trans-
mitted user data to a site
in China.
Phony Facebook
          Promotions
"Who doesn’t want to win
some free prizes or get a
great deal around the
Holidays?" One recent
scam promised two free
airline tickets — something that sounds
appealing at this time of year especially —
"but required participants to fill out multiple
surveys requesting personal information."
Scareware: Fake Antivirus /
     Security Update
"Scareware is the
fake antivirus
software that
tricks someone
into believing that
their computer is
at risk or already
infected — so they agree to download and
pay for phony software.”
Scareware: Fake Antivirus /
     Security Update
McAfee says it's
one of "the most
common and
dangerous Internet
threats today, with
an estimated 1 mill
victims falling for
this scam each day."
Holiday Screensavers
Ah yes, we love our screensavers for
special times of the years like Christmas.
But some of the free ones are loaded with
more than holiday cheer. "A recent search
for a Santa screensaver that promises to
let you 'fly with Santa
in 3D' is malicious,“
 McAfee says.
"Holiday ringtones &
e-cards have been
known to be malicious
too."
Mac Malware
Those two words wouldn't
have even been put to-
gether in the same
sentence a few years ago.
But, as McAfee correctly
says, "with the growing
popularity of Apple products,
for both business and personal use, cyber
criminals have designed a new wave of
malware directed squarely at Mac users."
Mac Malware
McAfee Labs says
as of a year ago,
there were "5,000
pieces of malware
targeting Macs, and
this number is in-
creasing by 10
percent month on month."
Holiday Phishing Scams
"Cyber scammers
know that most
people are busy
around the holidays
so they tailor their
emails and social
messages with holiday themes in the
hopes of tricking recipients into revealing
personal information.“
Holiday Phishing Scams
 A "common holiday
phishing scam is a
phony notice from UPS,
saying you have a
package and need to
fill out an attached form
to get it delivered. The
form may ask for personal or financial
details that will go straight into the hands
of the cyber scammer."
Online Coupon Scams
Whether you're
an extreme
couponer or an
occasional one,
the season is
rife with good on
line offers and
malicious ones. "Scammers know that by
offering an irresistible online coupon, they
can get people to hand over some of their
personal information," McAfee says.
Online Coupon Scams
"One popular scam is
to lure consumers with
the hope of winning a
'free' iPad. Consumers
click on a 'phishing' site, which can result
in email spam." Another
is that "consumers are offered an online
coupon code and once they agree, are
asked to provide personal
information, including credit-card
details, passwords and other financial
data."
Mystery Shopper Scams
"There have been
reports of scammers
sending text messages
to victims, offering to
pay them $50 an hour
to be a mystery shopper,
and instructing them to call a number if
they are interested. Once the victim
calls, they are asked for their personal
information, including credit card and bank
account numbers."
Hotel Wrong Transaction
"In one recent example, a
scammer sent out emails
that appeared to be from a
hotel, claiming that a
'wrong transaction' had
been discovered on the
recipient’s credit card. It then asked them
to fill out an attached refund form. Once
opened, the attachment downloads
malware onto their machine."
“It” Gift Scams
"When a gift is hot, not only
do sellers mark up the
price, but scammers will
also start advertising these
gifts on rogue websites &
social networks, even if they don’t have
them," says McAfee. "So,
consumers could wind up paying for an
item and giving away credit card details
only to receive nothing in return."
“I’m away from home”
You know this by now, or
should: "Posting infor-
mation about a vacation
on social networking sites
could be dangerous. If
someone is connected with people they
don’t know on Facebook or other social
networking sites, they could see their post
& decide that it may be a good time to rob
them. Furthermore, a quick online search
can easily turn up their home address."
Protecting Yourself
Aside from buying McAfee's products, or
those from another security vendor, here
are some of McAfee's tips on staying safe
in general, but especially in the weeks
ahead:
 "Only download mobile apps from
   official app stores, such as iTunes and
   the Android Market, and read user
   reviews before downloading them.“
Protecting Yourself
 "Be extra vigilant when reviewing and
  responding to emails."
 "Watch out for too-good-to-be-true offers
  on social networks (free airline tickets).
  Never agree to reveal your information
  just to participate in a promotion."
 "Don’t accept requests on social
  networks from people you don’t know in
  real life. Wait to post pictures and
  comments about your vacation until
  you’ve already returned home."
Protecting Yourself
 If you are asked to copy and paste
  some code into your web browser to get
  a prize or special offer, do NOT do it.
  The code is usually a javascript which
  WILL create all kinds of havoc for you.
 Have a current anti-virus program that
  you keep up to date. There are ones
  you can buy & free ones which are very
  good. See http://gcpcug.org/antivirus for
  more details.
Protecting Yourself
 Run an anti-maleware program like
  MalwareBytes on a regular basis. See
  http://gcpcug.org/antivirus for more
  details.
 Download programs, especially anti-
  virus and anti-malware, from reputable
  websites not websites or warning
  messages that pop up on your screen.
 Be aware and be on guard.
Credits
   Elmo is a trademark of Sesame Workshop
   Android is a trademark of Google Inc.
   iPad is a trademark of Apple Inc.
   Original MSNBC article http://technolog.msnbc.msn.com/_news/2011/11/09/8720555-12-
    online-holiday-scams-to-avoid
   Original McAfee Blog Post http://blogs.mcafee.com/consumer/recipe-for-spoiling-holiday-cheer-
    top-holiday-viruses-scams
   The pictures you have seen came from the following sites. Do not automatically go to those
    sites as some of them may be bogus sites.
     www.mcafee.com
     www.the-social-feed.com/
     blog.uspsoig.gov/
     www.hyper6.com/
     www.trendmicro.com/
     www.landingpagewebdesign.com
     www.datarescuetools.com/
     www.winfreestuffdaily.com/
     justincaseyouwerewondering.com/
     www.joelbuckland.com/
     www.crazythemes.com/
     www.freebies-freestuff-freesamples.com
     www.screensaverfine.com/
     www.macrumors.com/
     office.microsoft.com/en-us/images/?CTT=97

More Related Content

What's hot

Users and Behaviors- Social Internet
Users and Behaviors- Social InternetUsers and Behaviors- Social Internet
Users and Behaviors- Social InternetKenie Moses
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalResham Acharya
 
Users and behaviors social internet: Safety & Security
Users and behaviors social internet: Safety & SecurityUsers and behaviors social internet: Safety & Security
Users and behaviors social internet: Safety & SecurityDr. V Vorvoreanu
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial CrimesRaj Goel
 
Social Networking Threats
Social Networking ThreatsSocial Networking Threats
Social Networking Threatsejhilbert
 
50 Amazing Facts About Mobile
50 Amazing Facts About Mobile 50 Amazing Facts About Mobile
50 Amazing Facts About Mobile SIXTY
 
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-ThreatsThe Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats- Mark - Fullbright
 
Takehomequiz4
Takehomequiz4Takehomequiz4
Takehomequiz4jkarl2
 
14 cyber threats
14 cyber threats14 cyber threats
14 cyber threatsmahesh43211
 

What's hot (13)

Securityguide
SecurityguideSecurityguide
Securityguide
 
Users and Behaviors- Social Internet
Users and Behaviors- Social InternetUsers and Behaviors- Social Internet
Users and Behaviors- Social Internet
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in Nepal
 
Users and behaviors social internet: Safety & Security
Users and behaviors social internet: Safety & SecurityUsers and behaviors social internet: Safety & Security
Users and behaviors social internet: Safety & Security
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes
 
Social Networking Threats
Social Networking ThreatsSocial Networking Threats
Social Networking Threats
 
50 Amazing Facts About Mobile
50 Amazing Facts About Mobile 50 Amazing Facts About Mobile
50 Amazing Facts About Mobile
 
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-ThreatsThe Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
 
Emp tech las-week-2
Emp tech las-week-2Emp tech las-week-2
Emp tech las-week-2
 
Takehomequiz4
Takehomequiz4Takehomequiz4
Takehomequiz4
 
14 cyber threats
14 cyber threats14 cyber threats
14 cyber threats
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 

Viewers also liked

A Facebook Page for Your Organization
A Facebook Page for Your OrganizationA Facebook Page for Your Organization
A Facebook Page for Your OrganizationJim Evans
 
LinkedIn - The Power of the 2nd Degree
LinkedIn - The Power of the 2nd DegreeLinkedIn - The Power of the 2nd Degree
LinkedIn - The Power of the 2nd DegreeJim Evans
 
CDPUG LinkedIn Presentation - The Power of The 2nd Degree
CDPUG LinkedIn Presentation - The Power of The 2nd DegreeCDPUG LinkedIn Presentation - The Power of The 2nd Degree
CDPUG LinkedIn Presentation - The Power of The 2nd DegreeJim Evans
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionIn a Rocket
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting PersonalKirsty Hulse
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanPost Planner
 

Viewers also liked (6)

A Facebook Page for Your Organization
A Facebook Page for Your OrganizationA Facebook Page for Your Organization
A Facebook Page for Your Organization
 
LinkedIn - The Power of the 2nd Degree
LinkedIn - The Power of the 2nd DegreeLinkedIn - The Power of the 2nd Degree
LinkedIn - The Power of the 2nd Degree
 
CDPUG LinkedIn Presentation - The Power of The 2nd Degree
CDPUG LinkedIn Presentation - The Power of The 2nd DegreeCDPUG LinkedIn Presentation - The Power of The 2nd Degree
CDPUG LinkedIn Presentation - The Power of The 2nd Degree
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
 

Similar to 12 Holiday Tech Shopping Scams

Symantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec
 
CYREN 2013년 인터넷 위협 보고서_영문
CYREN 2013년 인터넷 위협 보고서_영문CYREN 2013년 인터넷 위협 보고서_영문
CYREN 2013년 인터넷 위협 보고서_영문Jiransoft Korea
 
Chapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcChapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcRay Brannon
 
RSA Online Fraud Report - August 2014
RSA Online Fraud Report - August 2014RSA Online Fraud Report - August 2014
RSA Online Fraud Report - August 2014EMC
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfKALPITKALPIT1
 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Ronak Jain
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdfMohanPandey31
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?VISTA InfoSec
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 

Similar to 12 Holiday Tech Shopping Scams (20)

Avoid These Two Popular Computer Scams in 2022.pptx
Avoid These Two Popular Computer Scams in 2022.pptxAvoid These Two Popular Computer Scams in 2022.pptx
Avoid These Two Popular Computer Scams in 2022.pptx
 
Symantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec Report On Rogue Security Software
Symantec Report On Rogue Security Software
 
CYREN 2013년 인터넷 위협 보고서_영문
CYREN 2013년 인터넷 위협 보고서_영문CYREN 2013년 인터넷 위협 보고서_영문
CYREN 2013년 인터넷 위협 보고서_영문
 
Chapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcChapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated Communicationcmc
 
RSA Online Fraud Report - August 2014
RSA Online Fraud Report - August 2014RSA Online Fraud Report - August 2014
RSA Online Fraud Report - August 2014
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018
 
09 09 2014
09 09 201409 09 2014
09 09 2014
 
Cybercrime blog
Cybercrime blogCybercrime blog
Cybercrime blog
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdf
 
Cybercriminals Are Lurking
Cybercriminals Are LurkingCybercriminals Are Lurking
Cybercriminals Are Lurking
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
Smartphone Security Article
Smartphone Security ArticleSmartphone Security Article
Smartphone Security Article
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Phishing
PhishingPhishing
Phishing
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 

Recently uploaded

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

12 Holiday Tech Shopping Scams

  • 1. 12 Holiday Shopping Scams Greater Cleveland PC Users Group November 2011 Basic information from MSNBC / McAfee
  • 2. Many of us are already shopping online, or will be soon, for the holidays. "Cyber-criminals rub their hands with glee when they think of the holidays," said Gary Davis, director of consumer product marketing at McAfee.
  • 3. “Consumers are making travel plans, shopping for gifts and bargains, updating Facebook and connecting with friends.” However, the vast majority have no security protection for their smartphones or tablets, despite using them heavily during the holiday season.
  • 4. Consumers need to stay one step ahead of this season's cyber- scrooges, and make sure they have protection for all of their internet- enabled devices. Otherwise, they could risk giving the bad guys the biggest gift of all - their own personal and financial information."
  • 5. Mobile Malware More of us are using our phones for shopping, to research products or to redeem coupons. McAfee says Android phones are "most at risk," citing "a 76 percent increase in malware targeted at Android devices in the second quarter of 011 over the first, making it the most targeted smartphone platform."
  • 6. Mobile Malware McAfee also says new malware "has recently been found that targets QR codes, a digital barcode that consumers might scan with their smartphone to find good deals on Black Friday and Cyber Monday, or just to learn about products they want to buy."
  • 7. Malicious Mobile Apps These are mobile apps designed to steal infor- mation from smartphones, or send out expensive text messages without a user’s consent. Dangerous apps are usually offered for free, and masquerade as fun applications, such as games.
  • 8. Malicious Mobile Apps For example, last year, 4.6 million Android smart- phone users downloaded a suspicious wallpaper app that collected and trans- mitted user data to a site in China.
  • 9. Phony Facebook Promotions "Who doesn’t want to win some free prizes or get a great deal around the Holidays?" One recent scam promised two free airline tickets — something that sounds appealing at this time of year especially — "but required participants to fill out multiple surveys requesting personal information."
  • 10. Scareware: Fake Antivirus / Security Update "Scareware is the fake antivirus software that tricks someone into believing that their computer is at risk or already infected — so they agree to download and pay for phony software.”
  • 11. Scareware: Fake Antivirus / Security Update McAfee says it's one of "the most common and dangerous Internet threats today, with an estimated 1 mill victims falling for this scam each day."
  • 12. Holiday Screensavers Ah yes, we love our screensavers for special times of the years like Christmas. But some of the free ones are loaded with more than holiday cheer. "A recent search for a Santa screensaver that promises to let you 'fly with Santa in 3D' is malicious,“ McAfee says. "Holiday ringtones & e-cards have been known to be malicious too."
  • 13. Mac Malware Those two words wouldn't have even been put to- gether in the same sentence a few years ago. But, as McAfee correctly says, "with the growing popularity of Apple products, for both business and personal use, cyber criminals have designed a new wave of malware directed squarely at Mac users."
  • 14. Mac Malware McAfee Labs says as of a year ago, there were "5,000 pieces of malware targeting Macs, and this number is in- creasing by 10 percent month on month."
  • 15. Holiday Phishing Scams "Cyber scammers know that most people are busy around the holidays so they tailor their emails and social messages with holiday themes in the hopes of tricking recipients into revealing personal information.“
  • 16. Holiday Phishing Scams A "common holiday phishing scam is a phony notice from UPS, saying you have a package and need to fill out an attached form to get it delivered. The form may ask for personal or financial details that will go straight into the hands of the cyber scammer."
  • 17. Online Coupon Scams Whether you're an extreme couponer or an occasional one, the season is rife with good on line offers and malicious ones. "Scammers know that by offering an irresistible online coupon, they can get people to hand over some of their personal information," McAfee says.
  • 18. Online Coupon Scams "One popular scam is to lure consumers with the hope of winning a 'free' iPad. Consumers click on a 'phishing' site, which can result in email spam." Another is that "consumers are offered an online coupon code and once they agree, are asked to provide personal information, including credit-card details, passwords and other financial data."
  • 19. Mystery Shopper Scams "There have been reports of scammers sending text messages to victims, offering to pay them $50 an hour to be a mystery shopper, and instructing them to call a number if they are interested. Once the victim calls, they are asked for their personal information, including credit card and bank account numbers."
  • 20. Hotel Wrong Transaction "In one recent example, a scammer sent out emails that appeared to be from a hotel, claiming that a 'wrong transaction' had been discovered on the recipient’s credit card. It then asked them to fill out an attached refund form. Once opened, the attachment downloads malware onto their machine."
  • 21. “It” Gift Scams "When a gift is hot, not only do sellers mark up the price, but scammers will also start advertising these gifts on rogue websites & social networks, even if they don’t have them," says McAfee. "So, consumers could wind up paying for an item and giving away credit card details only to receive nothing in return."
  • 22. “I’m away from home” You know this by now, or should: "Posting infor- mation about a vacation on social networking sites could be dangerous. If someone is connected with people they don’t know on Facebook or other social networking sites, they could see their post & decide that it may be a good time to rob them. Furthermore, a quick online search can easily turn up their home address."
  • 23. Protecting Yourself Aside from buying McAfee's products, or those from another security vendor, here are some of McAfee's tips on staying safe in general, but especially in the weeks ahead:  "Only download mobile apps from official app stores, such as iTunes and the Android Market, and read user reviews before downloading them.“
  • 24. Protecting Yourself  "Be extra vigilant when reviewing and responding to emails."  "Watch out for too-good-to-be-true offers on social networks (free airline tickets). Never agree to reveal your information just to participate in a promotion."  "Don’t accept requests on social networks from people you don’t know in real life. Wait to post pictures and comments about your vacation until you’ve already returned home."
  • 25. Protecting Yourself  If you are asked to copy and paste some code into your web browser to get a prize or special offer, do NOT do it. The code is usually a javascript which WILL create all kinds of havoc for you.  Have a current anti-virus program that you keep up to date. There are ones you can buy & free ones which are very good. See http://gcpcug.org/antivirus for more details.
  • 26. Protecting Yourself  Run an anti-maleware program like MalwareBytes on a regular basis. See http://gcpcug.org/antivirus for more details.  Download programs, especially anti- virus and anti-malware, from reputable websites not websites or warning messages that pop up on your screen.  Be aware and be on guard.
  • 27. Credits  Elmo is a trademark of Sesame Workshop  Android is a trademark of Google Inc.  iPad is a trademark of Apple Inc.  Original MSNBC article http://technolog.msnbc.msn.com/_news/2011/11/09/8720555-12- online-holiday-scams-to-avoid  Original McAfee Blog Post http://blogs.mcafee.com/consumer/recipe-for-spoiling-holiday-cheer- top-holiday-viruses-scams  The pictures you have seen came from the following sites. Do not automatically go to those sites as some of them may be bogus sites. www.mcafee.com www.the-social-feed.com/ blog.uspsoig.gov/ www.hyper6.com/ www.trendmicro.com/ www.landingpagewebdesign.com www.datarescuetools.com/ www.winfreestuffdaily.com/ justincaseyouwerewondering.com/ www.joelbuckland.com/ www.crazythemes.com/ www.freebies-freestuff-freesamples.com www.screensaverfine.com/ www.macrumors.com/ office.microsoft.com/en-us/images/?CTT=97