SlideShare une entreprise Scribd logo
1  sur  52
Striking Back!Striking Back!
Don’t Launch Cell Phone Games and Programs
that are “Pushed” to you
Just how gullible are we?
http://www.makeuseof.com/pages/best-windows-software
Best 90 Free Windows Programs toBest 90 Free Windows Programs to
Protect You and Your ComputerProtect You and Your Computer
Cell phone data
charges
Ring tones Vanity fraud
Meet My Children - Sean, Lindsay, Ryan. Each of them was scammed!
““It can’t happen to me!”It can’t happen to me!”
Without protection, its just a crapsWithout protection, its just a craps
game.game.
Really?
What are the
odds?
“You stand a better chance at any given time of loosing your personally
identifiable information than you do of just about any other form of nasty thing
than can happen to a person over their lifetime.”
The National Safety CouncilThe National Safety Council
1 in 146,107,962.00 could potentially win the power ball lottery grand prize
1 in 3,563,608.83 could potentially win the 200,000 dollar prize in the power ball
1 in 3000 will be killed by lighting in any given year
1 in 1,313 chance of being killed by a doctor
1 in 314 chance of being killed by a firearm
1 in 84 chance of being killed in a car crash over your lifetime
1 in 3 has had their personally identifiable1 in 3 has had their personally identifiable
information lost this year!!information lost this year!!
A new, targeted social mediaA new, targeted social media
version of a very old scam -- theversion of a very old scam -- the
“Nigerian,” or “419,” ploy“Nigerian,” or “419,” ploy
WIRE ME MONEY !
FACEBOOK HACK
How did they do that?How did they do that?
Because Facebook regularly contacts its users
through e-mail, and includes links in those e-mails
to login pages, the format is ripe for phishers. It's
easy to imitate Facebook e-mails and simply send
users clicking to a look-a-like login page that steal
passwords.
http://www.youtube.com/watch?v=0zvPEfksbyQ
Punked!
Lots of tools on the net for people who may want to
take advantage of you.
http://www.scambusters.org/
“Who steals my purse steals
trash…But he that filches from me
my good name …... Makes me poor
indeed.”
Othello, Act 3 Scene 3Othello, Act 3 Scene 3
When in doubt about a potential scam check the
Internet Crime Complaint Center
http://www.ic3.gov/about/default.aspx
Don’t let them get away with it.
Get mad or get even!
Report them immediately to:
http://www.ic3.gov/complaint/default.aspx
OR…become a scam baiter
(not really recommended, but some people are just really angry)
Who Scammers HateWho Scammers Hate
http://www.419hell.com/http://www.419hell.com/
We are all victims!We are all victims!
1700 new victims in the course of this meeting.
By the end of the decade someone in your family will be
a victim.
Lowest estimate of projected damage is $5000.
Only 1 in 700 is investigated.
1 year or less in jail.
70 – 80 % involve illegal dugs
FBI reports 30,000 computer a week are taken over.
http://www.youtube.com/watch?v=NF34sqrAPHU
The meteoric rise in social media use has alsoThe meteoric rise in social media use has also
created a launch pad for identity thieves.created a launch pad for identity thieves.
“My prediction for 2010 (and beyond) is that the increase in
social networking activity, along with a user’s failure to
implement security and privacy settings and protocols, will
lead to an increased exposure of not only the user’s personalnot only the user’s personal
information but possibly that of their “friends”.information but possibly that of their “friends”.
Robert Siciliano : CEO of IDTheftSecurity.com
http://www.youtube.com/watch?v=JwFC0jfxTco
A word or two about passwordsA word or two about passwords
and…. hacking Facebookand…. hacking Facebook
 No birthdates or social security numbers
 No mother’s maiden name
 No universal password
 Yes to long passwords (over eight characters)
 Yes to random patterns – first letter of each word in your favorite song with your favorite number.
 Yes to changing it frequently
http://www.onguardonline.gov/games/overview.aspx
Go to this site: Choose at least two games and report your
findings and observations on the Discussion Board.
Three FREEThree FREE “must have” online tools“must have” online tools
to create unique passwords.to create unique passwords.
http://www.passwordchart.com/
http://www.passpack.com/en/home/
http://www.roboform.com/
FTC Video
http://www.youtube.com/watch?v=PVZqNSWvdj8&feature=player_embedded
Who are the bad guys?Who are the bad guys?
Small time crooks
Trans- nationalTrans- national
crime gangs.crime gangs.
Russian "Mafia," Colombian
and Mexican drug cartels,
Asian Triads, Japanese Yakuza,
Nigerian confidence rings,
Hell's Angels, rogue factions of
the St. Regis Mohawk tribe and
the surviving, leaner and
meaner Cosa Nostra
http://www.youtube.com/watch?v=HwtLZV010-M
PhishingPhishing
Why do people fall for it ???Why do people fall for it ???
Beware of the push!!Beware of the push!!
Greed…..Greed…..
Greed = Scam…..Greed = Scam…..
Fear….Fear….
Fear = ScamFear = Scam
MailFrontier recently claimed that over 40% of recipients fell
for the recent Citibank Email Phishing Scam.
Curiosity…..Curiosity…..
Curiosity = ScamCuriosity = Scam
Temptation…..GroomingTemptation…..Grooming
Ref. Number:EGOGHS255125600419
Batch Number: 14/ 01259/ IPD
Ticket Number:113-2471-752-209
Serial Number: 5063-11
Attention
We are pleased to inform you of the result of the Winners
in our UNIVERSAL STAKES Lottery Program held on the 20th
JULY, 2004.Your e-mail address attached to ticket number
27522465896-6453 with serial number 3772-554 drew lucky
numbers 7-14-18-31-45 which consequently won in the 2ND
category, you have therefore been approved for a lump sum
pay out of USD$1,500,000 ( One Million Five Hundred
Dollars) Only .CONGRATULATIONS!
Some Quick FactsSome Quick Facts
FBI 2012 statistics show $3 billion in losses
Median individual loss - $575.
But reported loss is tip of the project iceberg – estimated to
be in the billions. Only 1 in 10 crime reported
What Scammers LoveWhat Scammers Love
Social networking sites
People who click on links
Pictures, blogs
Manually hacking “captcha” registration blocks.
ScaREWAREScaREWARE
Pretends to detect a virus and offers
to help with inexpensive debugging
software (usually around $50) – then..
You give your credit card # for the software fix!You give your credit card # for the software fix!
Watch this!Watch this!
http://www.youtube.com/watch?v=m_bZiEMkd5Y
Hidden terms..Recurring Billing..Shipping & handling
Texting forTexting for
DollarsDollars
Text message from your bank or credit card company to call
right away and verify account information!
OR
You’ve won a free gift from a reputable vendor like Sears or
Macy’s
http://www.youtube.com/watch?v=EtsdK3vLT6k
Bogus LoveBogus Love
“Wire me some money for an airline ticket
so that I can be with you forever.”
1) Fake photos: You may be virtual dating with somebody else.
2) Hidden costs: Sign-up could be free, but everything else requires
you to pay extra fees.
3) Milking your Bank Account: The guy/girl is in distress and urgently
need money, e.g. accidents, trapped at airport, hospitalized, etc.
http://www.youtube.com/watch?v=NyC0EyyuSlc&feature=player_embedded#!
“Make ME your favorite
charity…please :( ”
http://www.youtube.com/watch?v=FyzfdTVvV5k
Their pitch: Speed up relief efforts – wire and send personal info
such as social security and checking account numbers.
Log on here:
The hot-spot Hot seat
“Coming to a location near you.”
http://telkomhell.com/wi-fi-hotspot-security.html
Any Web site or print ad offering free credit reports has to display this
disclosure across the top of each page:
THIS NOTICE IS REQUIRED BY LAW. Read more at FTC.GOV.THIS NOTICE IS REQUIRED BY LAW. Read more at FTC.GOV.
You have the right to a free credit report fromYou have the right to a free credit report from
AAnnualCreditReport.comnnualCreditReport.com
or 877-322-8228, the ONLY authorized source under federal law.or 877-322-8228, the ONLY authorized source under federal law.
Cute ads but
Beware!
Not so free credit reports.
Free Credit Report?
This one may be the one to try.
www.creditkarma.com
I

Contenu connexe

Similaire à Week 5 protect yourself from cyber threats

Protect Yourself From Cyber Threats (v.2.0)
Protect Yourself From Cyber Threats (v.2.0)Protect Yourself From Cyber Threats (v.2.0)
Protect Yourself From Cyber Threats (v.2.0)Ray Brannon
 
Protecting Yourself from Cyber Threats
Protecting Yourself from Cyber ThreatsProtecting Yourself from Cyber Threats
Protecting Yourself from Cyber ThreatsRay Brannon
 
Hum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraudHum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraudRay Brannon
 
Marti digital citizen presentation
Marti digital citizen presentationMarti digital citizen presentation
Marti digital citizen presentationRay Brannon
 
How to Avoid Getting Malware on your Computer
How to Avoid Getting Malware on your ComputerHow to Avoid Getting Malware on your Computer
How to Avoid Getting Malware on your ComputerJillian Stone
 
Becybersmart
BecybersmartBecybersmart
BecybersmartVelma
 
5 scams you can avoid
5 scams you can avoid5 scams you can avoid
5 scams you can avoidTracey Krska
 
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...John Bambenek
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Homejaysonstreet
 
GenericVirusTraining
GenericVirusTrainingGenericVirusTraining
GenericVirusTrainingsbsadminklb
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activitiesYumonomics
 
Computer saftey may 2013
Computer saftey may 2013Computer saftey may 2013
Computer saftey may 2013JimWhite
 
Internet Scams, Identity Theft And
Internet Scams, Identity Theft AndInternet Scams, Identity Theft And
Internet Scams, Identity Theft AndCorey Quinn
 
Things that go bump on the web - Web Application Security
Things that go bump on the web - Web Application SecurityThings that go bump on the web - Web Application Security
Things that go bump on the web - Web Application SecurityChristian Heilmann
 
Port 80 - it's all they need
Port 80 - it's all they needPort 80 - it's all they need
Port 80 - it's all they needSaumil Shah
 

Similaire à Week 5 protect yourself from cyber threats (20)

Protect Yourself From Cyber Threats (v.2.0)
Protect Yourself From Cyber Threats (v.2.0)Protect Yourself From Cyber Threats (v.2.0)
Protect Yourself From Cyber Threats (v.2.0)
 
Protecting Yourself from Cyber Threats
Protecting Yourself from Cyber ThreatsProtecting Yourself from Cyber Threats
Protecting Yourself from Cyber Threats
 
Hum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraudHum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraud
 
Marti digital citizen presentation
Marti digital citizen presentationMarti digital citizen presentation
Marti digital citizen presentation
 
Thisworldofours
ThisworldofoursThisworldofours
Thisworldofours
 
How to Avoid Getting Malware on your Computer
How to Avoid Getting Malware on your ComputerHow to Avoid Getting Malware on your Computer
How to Avoid Getting Malware on your Computer
 
Becybersmart
BecybersmartBecybersmart
Becybersmart
 
5 scams you can avoid
5 scams you can avoid5 scams you can avoid
5 scams you can avoid
 
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
 
GenericVirusTraining
GenericVirusTrainingGenericVirusTraining
GenericVirusTraining
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activities
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 
Hacking
HackingHacking
Hacking
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Computer saftey may 2013
Computer saftey may 2013Computer saftey may 2013
Computer saftey may 2013
 
Internet Scams, Identity Theft And
Internet Scams, Identity Theft AndInternet Scams, Identity Theft And
Internet Scams, Identity Theft And
 
Things that go bump on the web - Web Application Security
Things that go bump on the web - Web Application SecurityThings that go bump on the web - Web Application Security
Things that go bump on the web - Web Application Security
 
Port 80 - it's all they need
Port 80 - it's all they needPort 80 - it's all they need
Port 80 - it's all they need
 
Aimee on cyber safety
Aimee on cyber safetyAimee on cyber safety
Aimee on cyber safety
 

Plus de Ray Brannon

Week 2 Speaking Tips 2019
Week 2   Speaking Tips 2019Week 2   Speaking Tips 2019
Week 2 Speaking Tips 2019Ray Brannon
 
Collectiveactionandchallengesofsocialchange revised dec 18
Collectiveactionandchallengesofsocialchange revised dec 18Collectiveactionandchallengesofsocialchange revised dec 18
Collectiveactionandchallengesofsocialchange revised dec 18Ray Brannon
 
Collectiveactionandchallengesofsocialchange revised
Collectiveactionandchallengesofsocialchange revisedCollectiveactionandchallengesofsocialchange revised
Collectiveactionandchallengesofsocialchange revisedRay Brannon
 
Crime & Punishment sociology
Crime & Punishment sociologyCrime & Punishment sociology
Crime & Punishment sociologyRay Brannon
 
Stratificationchapter7 rev 2 10-14-18
Stratificationchapter7 rev 2 10-14-18Stratificationchapter7 rev 2 10-14-18
Stratificationchapter7 rev 2 10-14-18Ray Brannon
 
Week Three Applied Socoilogy papers and statistics
Week Three  Applied Socoilogy papers and statistics Week Three  Applied Socoilogy papers and statistics
Week Three Applied Socoilogy papers and statistics Ray Brannon
 
Sociology - A new way to think part 2 methods rev 9-10-18
Sociology - A new way to think part 2 methods rev 9-10-18Sociology - A new way to think part 2 methods rev 9-10-18
Sociology - A new way to think part 2 methods rev 9-10-18Ray Brannon
 
Week 2 sociological imagination a new way to think
Week 2  sociological imagination   a new way to thinkWeek 2  sociological imagination   a new way to think
Week 2 sociological imagination a new way to thinkRay Brannon
 
Week1introductiontosociology wccc2018-150823200554-lva1-app6892
Week1introductiontosociology wccc2018-150823200554-lva1-app6892Week1introductiontosociology wccc2018-150823200554-lva1-app6892
Week1introductiontosociology wccc2018-150823200554-lva1-app6892Ray Brannon
 
Sociological Perspectives WCCC rev2018
Sociological Perspectives WCCC rev2018Sociological Perspectives WCCC rev2018
Sociological Perspectives WCCC rev2018Ray Brannon
 
MNL Story Revised
MNL Story RevisedMNL Story Revised
MNL Story RevisedRay Brannon
 
Week 11 Effective Speech and Your Future.
Week 11   Effective Speech and Your Future.Week 11   Effective Speech and Your Future.
Week 11 Effective Speech and Your Future.Ray Brannon
 
Week 10: Special occasion speeches
Week 10: Special occasion speechesWeek 10: Special occasion speeches
Week 10: Special occasion speechesRay Brannon
 
Week 9 Using visuals as body language
Week 9   Using visuals as body languageWeek 9   Using visuals as body language
Week 9 Using visuals as body languageRay Brannon
 
Week3bodylanguageandyourpresentations fall 16
Week3bodylanguageandyourpresentations fall 16Week3bodylanguageandyourpresentations fall 16
Week3bodylanguageandyourpresentations fall 16Ray Brannon
 
Elevator Speech A Case Study
Elevator Speech   A Case Study Elevator Speech   A Case Study
Elevator Speech A Case Study Ray Brannon
 
Week 3 Body Language and Your Presentations
Week 3 Body Language and Your PresentationsWeek 3 Body Language and Your Presentations
Week 3 Body Language and Your PresentationsRay Brannon
 
Week 2 Effective Speech Online Speaking tips
Week 2 Effective Speech Online Speaking tipsWeek 2 Effective Speech Online Speaking tips
Week 2 Effective Speech Online Speaking tipsRay Brannon
 

Plus de Ray Brannon (20)

Week 2 Speaking Tips 2019
Week 2   Speaking Tips 2019Week 2   Speaking Tips 2019
Week 2 Speaking Tips 2019
 
Collectiveactionandchallengesofsocialchange revised dec 18
Collectiveactionandchallengesofsocialchange revised dec 18Collectiveactionandchallengesofsocialchange revised dec 18
Collectiveactionandchallengesofsocialchange revised dec 18
 
Collectiveactionandchallengesofsocialchange revised
Collectiveactionandchallengesofsocialchange revisedCollectiveactionandchallengesofsocialchange revised
Collectiveactionandchallengesofsocialchange revised
 
Crime & Punishment sociology
Crime & Punishment sociologyCrime & Punishment sociology
Crime & Punishment sociology
 
Stratificationchapter7 rev 2 10-14-18
Stratificationchapter7 rev 2 10-14-18Stratificationchapter7 rev 2 10-14-18
Stratificationchapter7 rev 2 10-14-18
 
Stratification
Stratification Stratification
Stratification
 
Week Three Applied Socoilogy papers and statistics
Week Three  Applied Socoilogy papers and statistics Week Three  Applied Socoilogy papers and statistics
Week Three Applied Socoilogy papers and statistics
 
Sociology - A new way to think part 2 methods rev 9-10-18
Sociology - A new way to think part 2 methods rev 9-10-18Sociology - A new way to think part 2 methods rev 9-10-18
Sociology - A new way to think part 2 methods rev 9-10-18
 
Week 2 sociological imagination a new way to think
Week 2  sociological imagination   a new way to thinkWeek 2  sociological imagination   a new way to think
Week 2 sociological imagination a new way to think
 
Week1introductiontosociology wccc2018-150823200554-lva1-app6892
Week1introductiontosociology wccc2018-150823200554-lva1-app6892Week1introductiontosociology wccc2018-150823200554-lva1-app6892
Week1introductiontosociology wccc2018-150823200554-lva1-app6892
 
Sociological Perspectives WCCC rev2018
Sociological Perspectives WCCC rev2018Sociological Perspectives WCCC rev2018
Sociological Perspectives WCCC rev2018
 
MNL Story Revised
MNL Story RevisedMNL Story Revised
MNL Story Revised
 
Week 11 Effective Speech and Your Future.
Week 11   Effective Speech and Your Future.Week 11   Effective Speech and Your Future.
Week 11 Effective Speech and Your Future.
 
Week 10: Special occasion speeches
Week 10: Special occasion speechesWeek 10: Special occasion speeches
Week 10: Special occasion speeches
 
Week 9 Using visuals as body language
Week 9   Using visuals as body languageWeek 9   Using visuals as body language
Week 9 Using visuals as body language
 
Get A Job 2016
Get A Job 2016Get A Job 2016
Get A Job 2016
 
Week3bodylanguageandyourpresentations fall 16
Week3bodylanguageandyourpresentations fall 16Week3bodylanguageandyourpresentations fall 16
Week3bodylanguageandyourpresentations fall 16
 
Elevator Speech A Case Study
Elevator Speech   A Case Study Elevator Speech   A Case Study
Elevator Speech A Case Study
 
Week 3 Body Language and Your Presentations
Week 3 Body Language and Your PresentationsWeek 3 Body Language and Your Presentations
Week 3 Body Language and Your Presentations
 
Week 2 Effective Speech Online Speaking tips
Week 2 Effective Speech Online Speaking tipsWeek 2 Effective Speech Online Speaking tips
Week 2 Effective Speech Online Speaking tips
 

Dernier

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 

Dernier (20)

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 

Week 5 protect yourself from cyber threats

  • 1.
  • 3. Don’t Launch Cell Phone Games and Programs that are “Pushed” to you
  • 5. http://www.makeuseof.com/pages/best-windows-software Best 90 Free Windows Programs toBest 90 Free Windows Programs to Protect You and Your ComputerProtect You and Your Computer
  • 6. Cell phone data charges Ring tones Vanity fraud Meet My Children - Sean, Lindsay, Ryan. Each of them was scammed!
  • 7. ““It can’t happen to me!”It can’t happen to me!”
  • 8. Without protection, its just a crapsWithout protection, its just a craps game.game. Really? What are the odds?
  • 9. “You stand a better chance at any given time of loosing your personally identifiable information than you do of just about any other form of nasty thing than can happen to a person over their lifetime.” The National Safety CouncilThe National Safety Council 1 in 146,107,962.00 could potentially win the power ball lottery grand prize 1 in 3,563,608.83 could potentially win the 200,000 dollar prize in the power ball 1 in 3000 will be killed by lighting in any given year 1 in 1,313 chance of being killed by a doctor 1 in 314 chance of being killed by a firearm 1 in 84 chance of being killed in a car crash over your lifetime 1 in 3 has had their personally identifiable1 in 3 has had their personally identifiable information lost this year!!information lost this year!!
  • 10. A new, targeted social mediaA new, targeted social media version of a very old scam -- theversion of a very old scam -- the “Nigerian,” or “419,” ploy“Nigerian,” or “419,” ploy
  • 11. WIRE ME MONEY ! FACEBOOK HACK
  • 12. How did they do that?How did they do that? Because Facebook regularly contacts its users through e-mail, and includes links in those e-mails to login pages, the format is ripe for phishers. It's easy to imitate Facebook e-mails and simply send users clicking to a look-a-like login page that steal passwords.
  • 13.
  • 14. http://www.youtube.com/watch?v=0zvPEfksbyQ Punked! Lots of tools on the net for people who may want to take advantage of you.
  • 15.
  • 16.
  • 17.
  • 19. “Who steals my purse steals trash…But he that filches from me my good name …... Makes me poor indeed.” Othello, Act 3 Scene 3Othello, Act 3 Scene 3
  • 20. When in doubt about a potential scam check the Internet Crime Complaint Center http://www.ic3.gov/about/default.aspx
  • 21.
  • 22. Don’t let them get away with it. Get mad or get even! Report them immediately to: http://www.ic3.gov/complaint/default.aspx OR…become a scam baiter (not really recommended, but some people are just really angry)
  • 23. Who Scammers HateWho Scammers Hate http://www.419hell.com/http://www.419hell.com/
  • 24. We are all victims!We are all victims! 1700 new victims in the course of this meeting. By the end of the decade someone in your family will be a victim. Lowest estimate of projected damage is $5000. Only 1 in 700 is investigated. 1 year or less in jail. 70 – 80 % involve illegal dugs FBI reports 30,000 computer a week are taken over. http://www.youtube.com/watch?v=NF34sqrAPHU
  • 25. The meteoric rise in social media use has alsoThe meteoric rise in social media use has also created a launch pad for identity thieves.created a launch pad for identity thieves. “My prediction for 2010 (and beyond) is that the increase in social networking activity, along with a user’s failure to implement security and privacy settings and protocols, will lead to an increased exposure of not only the user’s personalnot only the user’s personal information but possibly that of their “friends”.information but possibly that of their “friends”. Robert Siciliano : CEO of IDTheftSecurity.com http://www.youtube.com/watch?v=JwFC0jfxTco
  • 26. A word or two about passwordsA word or two about passwords and…. hacking Facebookand…. hacking Facebook  No birthdates or social security numbers  No mother’s maiden name  No universal password  Yes to long passwords (over eight characters)  Yes to random patterns – first letter of each word in your favorite song with your favorite number.  Yes to changing it frequently
  • 27. http://www.onguardonline.gov/games/overview.aspx Go to this site: Choose at least two games and report your findings and observations on the Discussion Board.
  • 28. Three FREEThree FREE “must have” online tools“must have” online tools to create unique passwords.to create unique passwords. http://www.passwordchart.com/
  • 32. Who are the bad guys?Who are the bad guys? Small time crooks
  • 33. Trans- nationalTrans- national crime gangs.crime gangs. Russian "Mafia," Colombian and Mexican drug cartels, Asian Triads, Japanese Yakuza, Nigerian confidence rings, Hell's Angels, rogue factions of the St. Regis Mohawk tribe and the surviving, leaner and meaner Cosa Nostra http://www.youtube.com/watch?v=HwtLZV010-M
  • 34. PhishingPhishing Why do people fall for it ???Why do people fall for it ??? Beware of the push!!Beware of the push!!
  • 36.
  • 37. Greed = Scam…..Greed = Scam…..
  • 39. Fear = ScamFear = Scam MailFrontier recently claimed that over 40% of recipients fell for the recent Citibank Email Phishing Scam.
  • 42. Temptation…..GroomingTemptation…..Grooming Ref. Number:EGOGHS255125600419 Batch Number: 14/ 01259/ IPD Ticket Number:113-2471-752-209 Serial Number: 5063-11 Attention We are pleased to inform you of the result of the Winners in our UNIVERSAL STAKES Lottery Program held on the 20th JULY, 2004.Your e-mail address attached to ticket number 27522465896-6453 with serial number 3772-554 drew lucky numbers 7-14-18-31-45 which consequently won in the 2ND category, you have therefore been approved for a lump sum pay out of USD$1,500,000 ( One Million Five Hundred Dollars) Only .CONGRATULATIONS!
  • 43. Some Quick FactsSome Quick Facts FBI 2012 statistics show $3 billion in losses Median individual loss - $575. But reported loss is tip of the project iceberg – estimated to be in the billions. Only 1 in 10 crime reported
  • 44. What Scammers LoveWhat Scammers Love Social networking sites People who click on links Pictures, blogs Manually hacking “captcha” registration blocks.
  • 45. ScaREWAREScaREWARE Pretends to detect a virus and offers to help with inexpensive debugging software (usually around $50) – then.. You give your credit card # for the software fix!You give your credit card # for the software fix! Watch this!Watch this! http://www.youtube.com/watch?v=m_bZiEMkd5Y
  • 47. Texting forTexting for DollarsDollars Text message from your bank or credit card company to call right away and verify account information! OR You’ve won a free gift from a reputable vendor like Sears or Macy’s http://www.youtube.com/watch?v=EtsdK3vLT6k
  • 48. Bogus LoveBogus Love “Wire me some money for an airline ticket so that I can be with you forever.” 1) Fake photos: You may be virtual dating with somebody else. 2) Hidden costs: Sign-up could be free, but everything else requires you to pay extra fees. 3) Milking your Bank Account: The guy/girl is in distress and urgently need money, e.g. accidents, trapped at airport, hospitalized, etc. http://www.youtube.com/watch?v=NyC0EyyuSlc&feature=player_embedded#!
  • 49. “Make ME your favorite charity…please :( ” http://www.youtube.com/watch?v=FyzfdTVvV5k Their pitch: Speed up relief efforts – wire and send personal info such as social security and checking account numbers.
  • 50. Log on here: The hot-spot Hot seat “Coming to a location near you.” http://telkomhell.com/wi-fi-hotspot-security.html
  • 51. Any Web site or print ad offering free credit reports has to display this disclosure across the top of each page: THIS NOTICE IS REQUIRED BY LAW. Read more at FTC.GOV.THIS NOTICE IS REQUIRED BY LAW. Read more at FTC.GOV. You have the right to a free credit report fromYou have the right to a free credit report from AAnnualCreditReport.comnnualCreditReport.com or 877-322-8228, the ONLY authorized source under federal law.or 877-322-8228, the ONLY authorized source under federal law. Cute ads but Beware! Not so free credit reports.
  • 52. Free Credit Report? This one may be the one to try. www.creditkarma.com I

Notes de l'éditeur

  1. Some viewers of Gilligan ’s Island apparently took the show seriously in the 1960s. The U.S. Coast Guard received several telegrams from concerned citizens asking why they didn’t rescue the Minnow’s crew. This has been an excellent week. I have received four or five emails from London and Africa announcing that I have been selected to receive, from each of them, sums in eXcess of ten million dollars The quite remarkable fact seems to be that one fellow ’s plane crash, another’s unexpected demise—apparently run over by a herd of elephants— a third’s cruel wife, have all resulted in me being just the right person on the planet to receive millions of dollars which was left in their estates. Not only that: Several lotteries have paid off this week as well, and, just like the poor African ministers who want to share their millions with me, the lottery companies are happy to send money as well. It seems all I have to do is let any one of these secret correspondents know a few details about my bank account and social security number and my life worries will be over.
  2. Starting next week, Verizon will double the early-termination fee for smartphones... ...The phone is designed in such a way that you can almost never avoid getting $1.99 charge on the bill. Around the OK button on a typical flip phone are the up, down, left, right arrows. If you open the flip and accidentally press the up arrow key, you see that the phone starts to connect to the web. So you hit END right away. Well, too late. You will be charged $1.99 for that 0.02 kilobytes of data... ...Every month, the 87 million customers will accidentally hit that key a few times a month! That ’s over $300 million per month in data revenue off a simple mistake!..
  3. Web criminals are getting much more personal in their attacks, using social networking sites and other databases to make their story lines much more believable. Bryan Rutberg's daughter was among the first to notice something odd about her dad's Facebook page. At about 8 p.m. on Jan. 21, she ran into his bedroom and asked why he'd changed his status to: “BRYAN IS IN URGENT NEED OF HELP!!!“ In Rutberg's case, criminals managed to steal his Facebook login password, steal his Facebook identity, and change his page to make it appear he was in trouble. Next, the criminals sent e-mails to dozens of friends, begging them for help.
  4. Don ’t do any banking unless you know it a secure location. How? Look for “https” (not just http) in the URL and the small padlock icon in the lower right hand corner of your browser.
  5. Now, a new site called CreditKarma is offering free daily credit scores. For comparison, FICO ’s own Score Watch program costs $89.95 per year. So what’s the catch? 1. It’s not a real FICO score. This is another FICO-clone, with a score ranging from 300 to 900. (FICO is from 300 to 850.) It also doesn’t say from which bureau this score is based upon, as they say they can pull from any of the big three (Experian, Equifax, Transunion). My guess is that they’ll use whatever is available that is both cheaper than FICO and still reasonably accurate. That’s what I would do… 2. You only get the score. The service is pretty barebones. You don’t get information about who’s pulling your credit, how often they are doing it, or information about your existing credit lines. So the “alerts” feature is missing. Instead, the primary attraction is the ability to see trends - is your score increasing or decreasing over time? 3. They are advertiser-supported, so I guess they are counting on people to obsessively check their score every day. I’ve always been a bit mystified by such behavior, but I don’t check the stock market ticker all day long either. From their privacy policy it seems that they are using your personal information to target ads to you, but aren’t actually sharing your info with others unless you opt-in. I sure hope not! Security and Privacy Concerns Okay, it’s free, so price isn’t a barrier to using this service. But it’s definitely wise to think twice before giving out personal information like my Social Security number to a start-up company. I read through their site, and didn’t see any glaring security holes. They use common third-party systems like ScanAlert Hacker Safe, TRUSTe, and Verisign. If you do notice something fishy, please share in the comments. The CEO will be reading, given that he’s the one that told me about this site.