SlideShare une entreprise Scribd logo
1  sur  78
IDENTIFYING CYBER THREATS NEAR YOU CYBER CRIME TRAINING PROGRAMME DAY 1
WHO AM I? WILLIAM WARERO MCAFEE CERTIFIED SECURITY ADVOCATE FOCUS IS ON DEPLOYMENT OF MCAFEE ENTERPRISE SECURITY SOLUTIONS AND ADVOCATE OF ENTERPRISE PRODUCTIVITY SOLUTIONS
Primary Online Risks and Threats To Families ,[object Object]
File-sharing abuses
Invasion of privacy
Disturbing content
PredatorsTo Personal Information ,[object Object]
Hoaxes
Identity theft
SpamTo Computers ,[object Object]
Worms
Trojans
Spyware,[object Object]
Primary Online Risks for Children Disturbing Content If kids explore unsupervised, they could stumble upon images or information you may not want them exposed to. File-share Abuse Unauthorized sharing of music, video, and other files may be illegal, and download malicious software. Cyberbullies Both children and adults may use the Internet to harass or intimidate other people. Predators These people use the Internet to trick children into meeting with them in person. Invasion of Privacy If kids fill out online forms, they may share information you don’t want strangers to have about them or your family.
Primary Threats to Personal Online Safety Phishing E-mail sent by online criminals to trick you into going to fake Web sites and revealing personal information Spam Unwanted e-mail, instant messages, and other online communication Identity Theft A crime where con artists get your personal information and access your cash and/or credit Hoaxes E-mail sent by online criminals to trick you into giving them money
What is a phishing scam? Phishing is a type of deception designed to steal your valuable personal data such as credit card numbers, email account details, and other account data and passwords. Phishing is also known as identity theft and is a type of social engineering.
Common phishing scams: Spoofs of businesses that you know and trust. These are e-mail messages that purport to be from companies or services that you know and trust such as your bank and could contain urgent messages with threats of account closures or other alarming consequences.
Common phishing scams: Lottery scams and other advanced fee fraud scams.For example, an e-mail message might request your help in a financial transaction such as the transfer of a large sum of money into your account. Or a message might contain a claim that you have received a large inheritance from someone you do not know or that you have won a lottery that you did not enter. For more information, see Scams that promise money, gifts, or prizes.
Common phishing scams: Rogue security software scams.These are e-mail messages, Web sites, or pop-up windows that tell you that your computer is unsafe. If you download the software they offer so you can receive help, you could damage your system or waste money on software that you don't need.
You might see a phishing scam: In e-mail messages, even if the messages appear to be from a coworker or someone you know. On social networking Web sites. On Web sites that appear to accept donations for charity. On Web sites that spoof familiar sites but that use slightly different Web addresses. In your instant message (IM) program. On your cell phone or other mobile device.
Six signs of a scam Generic greetings such as "Dear Customer," which indicate that the sender does not know you and should not be trusted.
Six signs of a scam Alarming or urgent statements that require you to respond immediately.
Six signs of a scam Requests for personal or financial information, such as user names, passwords, credit card or bank account numbers, social security numbers, dates of birth, or other information that can be used to steal your identity.
Six signs of a scam Misspellings and grammatical errors, including Web addresses. The Web address might look very similar to the address of a legitimate business, but with a minor alteration. For example, instead of www.microsoft.com, the scammer might use www.micrsoft.com.
Six signs of a scam The text of the link in the e-mail message to you is different from the Web address that you are directed to when you click the link. You can identify the actual Web address in a link by hovering over the link without clicking it. The Web address appears in a text box above the link.
Six signs of a scam The "From" line in the original e-mail message to you shows a different Web address than the one that appears when you try to reply to the message
How can I help prevent a scam from happening to me?
Delete Spam Delete spam. Do not open it or reply to it, even to ask to be removed from a mailing list. When you reply, you confirm to the senders that they have reached an active e-mail account and make yourself vulnerable to further abuse
Caution! Use caution when you click links in e-mail messages, text messages, pop-up windows, or instant messages. Instead, type Web addresses in a Web browser, or use your online Favorites or bookmarks.
Attachments and links Do not open e-mail attachments or click instant message download links unless you know who sent the message and you were expecting the attachment or link.
Giving info online Be cautious about providing your personal or financial information online. Do not fill out forms in e-mail messages that ask for personal or financial information.
Passwords Create strong passwords and avoid using the same password for your bank and other important accounts.
Update Update your security settings and operating systems Use web browsers that include an additional layer of protection with sites that use Extended Validation (EV) SSL Certificates.  Update your browser.
Use Filters Turn on filters in Mozilla Firefox, Google, in Internet Explorer  and other providers to help detect unsafe and potentially unsafe Web sites as you browse.  Read the warning messages that you see to decide if you want to proceed to a suspicious Web site or not.
Firewalls and antivirus Make sure your computer's firewall is turned on and that you use antivirus and antispyware software that is updated automatically
Track transactions Check your bank and credit card statements closely to identify and report any transactions that are not legitimate.
Secure Networks Never pay bills, bank, shop, or conduct other financial transactions on a public or shared computer or over a public wireless network. If you do log on to public computers, look for computers on networks that require a password, which increases security.
What should I do with fraudulent e-mail messages?
Delete the message. Do not respond or click links in it. Report any suspicious activity.  If you believe that someone is using your email account, you can reset your password.  Fraudulent e-mail messages sometimes contain unwanted or malicious software (also known as malware). If you think you might have malware on your computer, scan your computer with your security program
What does a phishing e-mail look like? They might appear to come from your bank or financial institution, a company you regularly do business with, such as Microsoft, or from your social networking site.
They might appear to be from someone you know. Spear phishing is a targeted form of phishing in which an e-mail message might look like it comes from your employer, or from a colleague who might send an e-mail message to everyone in the company, such as the head of human resources or IT.
They might ask you to make a phone call. Phone phishing scams direct you to call a customer support phone number. A person or an audio response unit waits to take your account number, personal identification number, password, or other valuable personal data. The phone phisher might claim that your account will be closed or other problems could occur if you don't respond.
They might include official-looking logos and other identifying information taken directly from legitimate Web sites, and they might include convincing details about your personal information that scammers found on your social networking pages.
They might include links to spoofed Web sites where you are asked to enter personal information.
Here is an example :
What do you see?
To make these phishing e-mail messages look even more legitimate, the scam artists may place a link in them that appears to go to the legitimate Web site (1), but actually takes you to a phony scam site (2) or possibly a pop-up window that looks exactly like the official site.
Here are a few phrases to look for if you think an e-mail message is a phishing scam.
"Verify your account." Businesses should not ask you to send passwords, login names, or other personal information through e-mail. If you receive an e-mail message from google asking you to update your credit card information, do not respond: this is a phishing scam.
"You have won the lottery." The lottery scam is a common phishing scam known as advanced fee fraud.  One of the most common forms of advanced fee fraud is a message that claims that you have won a large sum of money, or that a person will pay you a large sum of money for little or no work on your part. The lottery scam often includes references to big companies, such as Coca Cola.  In case you did not know, there is no Coca Cola lottery.
"If you don't respond within 48 hours, your account will be closed." These messages convey a sense of urgency so that you'll respond immediately without thinking. A phishing e-mail message might even claim that your response is required because your account might have been compromised.
What does a phishing link look like?
"Click the link below to gain access to your account." HTML-formatted messages can contain links or forms that you can fill out just as you’d fill out a form on a Web site.
Phishing links that you are urged to click in e-mail messages, on Web sites, or even in instant messages may contain all or part of a real company’s name and are usually masked, meaning that the link you see does not take you to that address but somewhere different, usually an illegitimate Web site.
What do you see?
Example of a masked Web address ("typo-squatting" or "cybersquatting." ) Con artists also use Web addresses that resemble the name of a well-known company but are slightly altered by adding, omitting, or transposing letters. For example, the address “www.yahoo.com" could appear instead as: www.yaho.com www.youryahoo.com  www.verify-yahoo.com
Cybersquatting Scammers register these domain names in order to compete with the popular site or to earn money through advertisements. If you enter the wrong URL you might be taken to a site where you'll see an ad for the site you really wanted.  If you click on that ad, you might get to where you want to go: You've made an extra click and the scammer has earned some money.
Cybersquatting Typo-squatters and cybersquatters can also create more insidious scams, such as downloading malicious software applications and spyware onto unprotected computers that connect to their sites.
Cybersquatting and the Internet Corporation for Assigned Names and Numbers (ICANN) has worked to remedy the situation, but cybersquatters are still out there.
Spoofing Some cyber criminals use phishing scams to set up convincing spoofs of legitimate Web sites. They then try to trick you into visiting these Web sites and disclosing personal information, such as your credit card number.
What is a spoofed Web site? A spoofed site is usually designed to look like the legitimate site, sometimes using components from the legitimate site.
Other Scams: Scams are created daily and these are not all of them. Here are some others: Fake e-cards Fake job opportunities Donation scams
Fake ECards E-cards are created the same way Web sites are; they're built on the Internet just like this page. So when you send someone an e-card, you send them a link to click, which takes them to the online greeting card you created for them.
How to avoid fake e-cards Recognize the sender of the e-card. If you don't know the sender, do not trust the card. Legitimate companies have standard, obvious ways for you to recognize that the e-mail is not a fraud.
How to avoid fake e-cards Make sure you check both the display name and e-mail address of the sender. When in doubt, use alternative viewing methods. Do not click any links when you are not sure of the sender or intent of the e-mail.
How to avoid fake e-cards Never download or click anything from an unknown source. Be wary of an e-mail message or file attachment from someone you don't know or that seems suspicious. Preview a link's Web address before you click it. If the link doesn't show an address, move your mouse pointer over a link without clicking it to see where the link goes. (The address should appear on the bottom bar of your Web browser.) Don't accept an end-user agreement without reading the fine print first; you might inadvertently agree to install spyware or something else you don't want.
Online job-hunting scams Phishing scams might also appear as phony job ads, used to convince job hunters to send them personal information. Scammers post their ads on legitimate job sites and often use familiar-looking or convincing company logos, language, and links to fake Web sites that appear to be those of real organizations.
Online job-hunting scams These sites might also charge fees for services they will never render. Typically, after a few days the thieves close down the scam and disappear.
Best practices for online job hunters Never provide any non-work related personal information such as your social security number, credit card number, date of birth, home address, and marital status online, through e-mail, over the phone, in a fax, or on your resume. List your resume on a job site that allows only verified recruiters to scan them and uses a privacy policy.
Best practices for online job hunters Verify a prospective employer, recruiter, or recruiting agency through another source  and then contact them directly-or better yet, visit them in person at the company location during regular work hours. If a prospective recruiter or employer requests a background check, agree to do so only after you have met with them at their company location during regular work hours
Best practices for online job hunters Beware of anyone who asks you for money up front in exchange for finding work for you. You should never have to pay for "exclusive" job leads or for a job itself. If you are paying for job placement services, don't provide credit card or bank information or engage in any monetary transactions unless done in person, onsite, with a prospective recruiter or job agency.
Best practices for online job hunters Carefully evaluate contact information in job ads or related e-mails, watching out for spelling errors, an e-mail address that does not feature the company's name, and inconsistencies with area or zip codes. Create an exclusive Web-based e-mail address and account for all non-personal communication.
Donation scams Natural disasters, political campaigns, and global health issues are often the focus of donation  Several types of phishing scams promise fantastic financial or other rewards in exchange for just a few small things you have to do…which include turning over your personal information to an identity thief. Advance fee fraud scams Stock tips in e-mail and text messages
Advance fee fraud scams An advance fee fraud is a scam that hooks you with the false promise of large sums of money for little or no effort on your part. After you're deeply involved in the scam, you're asked to pay certain amounts of money to expedite the process. You end up not making a dime, losing your money, and perhaps turning over your personal information to fraudsters.
Advance fee fraud scams The most common form of advance fee fraud is an e-mail message that claims that you have won a large sum of money, or that a person will pay you a large sum of money for little or no work on your part. Advance fee fraud is also known as the Nigerian Letter or the 419 scam, because the scammer often claims to be from Nigeria and 419 is the Nigerian criminal code that this scam violates.
Advance fee fraud scams Here are a few examples of the most popular advance fee frauds: A foreign government official would like your assistance in transferring funds and will pay you a hefty commission if you agree. You stand to inherit millions of dollars from a relative you don't remember. You've won a prize or a lottery (perhaps one from a foreign country) that you don't remember entering.
Help avoid advance fee fraud scams Use spam filtering technology Don't make investment decisions based on anonymous e-mail or text messages you receive. Don't open attachments in unsolicited e-mails. Stock spam usually is sent as an image or as a PDF attachment. Use an Internet service provider (ISP) or e-mail provider that has implemented Sender ID Framework, a technical solution to detect and block spoofed e-mail.
Stock tips in e-mail and text messages The pump-and-dump stock scam is a common form of spam these days. According to the United States Security and Exchange Commission (SEC), spammers send 100 million of these e-mail messages per week!

Contenu connexe

Tendances

Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfBarry Caplin
 
Internet Crime Prevention Tips
Internet Crime Prevention TipsInternet Crime Prevention Tips
Internet Crime Prevention TipsGoose & Gander
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008FinancialCenter
 
Id Theft Seminar 6
Id Theft Seminar 6Id Theft Seminar 6
Id Theft Seminar 6krupp
 
10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet FraudGoose & Gander
 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftDolf Dunn
 
Anonymous email 26 aug14
Anonymous email 26 aug14Anonymous email 26 aug14
Anonymous email 26 aug14Naval OPSEC
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminarronwolfinger
 
Scams and-fraud-presentation
Scams and-fraud-presentationScams and-fraud-presentation
Scams and-fraud-presentationRoel Palmaers
 
All about identity theft
All about identity theftAll about identity theft
All about identity theftMrwilson6
 
All about identity_theft
All about identity_theftAll about identity_theft
All about identity_theftFlora Runyenje
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraudRadiant Minds
 
PhishingandPharming
PhishingandPharmingPhishingandPharming
PhishingandPharmingDawn Hicks
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid Ithewie
 
Lottery scam
Lottery scamLottery scam
Lottery scamBrijeshR3
 

Tendances (20)

Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
Internet Crime Prevention Tips
Internet Crime Prevention TipsInternet Crime Prevention Tips
Internet Crime Prevention Tips
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008
 
e-Fraud ppt
e-Fraud ppte-Fraud ppt
e-Fraud ppt
 
Id Theft Seminar 6
Id Theft Seminar 6Id Theft Seminar 6
Id Theft Seminar 6
 
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
 
10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud
 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity Theft
 
Anonymous email 26 aug14
Anonymous email 26 aug14Anonymous email 26 aug14
Anonymous email 26 aug14
 
Avoiding Online Job Scams
Avoiding Online Job ScamsAvoiding Online Job Scams
Avoiding Online Job Scams
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminar
 
Scams and-fraud-presentation
Scams and-fraud-presentationScams and-fraud-presentation
Scams and-fraud-presentation
 
All about identity theft
All about identity theftAll about identity theft
All about identity theft
 
All about identity_theft
All about identity_theftAll about identity_theft
All about identity_theft
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
PhishingandPharming
PhishingandPharmingPhishingandPharming
PhishingandPharming
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
Phishers
PhishersPhishers
Phishers
 
Lottery scam
Lottery scamLottery scam
Lottery scam
 

En vedette

AFFECTS SOCIAL CLASS HAS ON STUDENTS AND THE IMPORTANCE OF QUALITY EDUCATION
AFFECTS SOCIAL CLASS HAS ON STUDENTS AND THE IMPORTANCE OF QUALITY EDUCATIONAFFECTS SOCIAL CLASS HAS ON STUDENTS AND THE IMPORTANCE OF QUALITY EDUCATION
AFFECTS SOCIAL CLASS HAS ON STUDENTS AND THE IMPORTANCE OF QUALITY EDUCATIONjaimeshipman
 
Comparative study of social media (networking) usage by undergraduates in two...
Comparative study of social media (networking) usage by undergraduates in two...Comparative study of social media (networking) usage by undergraduates in two...
Comparative study of social media (networking) usage by undergraduates in two...Alexander Decker
 
The Dangers of Social Networks
The Dangers of Social NetworksThe Dangers of Social Networks
The Dangers of Social Networkscmpayton30
 
Influence of Social Networks on students
Influence of Social Networks on studentsInfluence of Social Networks on students
Influence of Social Networks on studentsFarhad Shayan
 
Exploring addiction to social networking service among young Chinese adults
Exploring addiction to social networking service among young Chinese adultsExploring addiction to social networking service among young Chinese adults
Exploring addiction to social networking service among young Chinese adultsDigital Society
 
The Effects on Social Networking on Education
The Effects on Social Networking on EducationThe Effects on Social Networking on Education
The Effects on Social Networking on EducationNash Nash
 
Social media addiction
Social media addictionSocial media addiction
Social media addictionAyaelshiwi
 
The Harshad Mehta Scam
The Harshad Mehta ScamThe Harshad Mehta Scam
The Harshad Mehta Scamritesh3383
 
Social media addiction
Social media addictionSocial media addiction
Social media addictionTaimur
 
Effect of online social networking sites on student engagement and achievement
Effect of online social networking sites on student engagement and achievementEffect of online social networking sites on student engagement and achievement
Effect of online social networking sites on student engagement and achievementliz99power
 
THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...
THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...
THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...Kasthuripriya Nanda Kumar
 

En vedette (15)

AFFECTS SOCIAL CLASS HAS ON STUDENTS AND THE IMPORTANCE OF QUALITY EDUCATION
AFFECTS SOCIAL CLASS HAS ON STUDENTS AND THE IMPORTANCE OF QUALITY EDUCATIONAFFECTS SOCIAL CLASS HAS ON STUDENTS AND THE IMPORTANCE OF QUALITY EDUCATION
AFFECTS SOCIAL CLASS HAS ON STUDENTS AND THE IMPORTANCE OF QUALITY EDUCATION
 
Comparative study of social media (networking) usage by undergraduates in two...
Comparative study of social media (networking) usage by undergraduates in two...Comparative study of social media (networking) usage by undergraduates in two...
Comparative study of social media (networking) usage by undergraduates in two...
 
The Dangers of Social Networks
The Dangers of Social NetworksThe Dangers of Social Networks
The Dangers of Social Networks
 
Influence of Social Networks on students
Influence of Social Networks on studentsInfluence of Social Networks on students
Influence of Social Networks on students
 
Abdul kareem telgi (1)
Abdul kareem telgi (1)Abdul kareem telgi (1)
Abdul kareem telgi (1)
 
Exploring addiction to social networking service among young Chinese adults
Exploring addiction to social networking service among young Chinese adultsExploring addiction to social networking service among young Chinese adults
Exploring addiction to social networking service among young Chinese adults
 
speak asia scam
speak asia scam speak asia scam
speak asia scam
 
Cyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells UsCyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells Us
 
The Effects on Social Networking on Education
The Effects on Social Networking on EducationThe Effects on Social Networking on Education
The Effects on Social Networking on Education
 
Social media addiction
Social media addictionSocial media addiction
Social media addiction
 
The Harshad Mehta Scam
The Harshad Mehta ScamThe Harshad Mehta Scam
The Harshad Mehta Scam
 
Social media addiction
Social media addictionSocial media addiction
Social media addiction
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
Effect of online social networking sites on student engagement and achievement
Effect of online social networking sites on student engagement and achievementEffect of online social networking sites on student engagement and achievement
Effect of online social networking sites on student engagement and achievement
 
THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...
THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...
THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...
 

Similaire à IDENTIFYING CYBER THREATS NEAR YOU

IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptxTanvir Amin
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security AwarenessDale Rapp
 
Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You? Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You? The TNS Group
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacksNamik Heydarov
 
Security awareness
Security awarenessSecurity awareness
Security awarenessSanoop Nair
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSedrianrheine
 
Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Alexandru Turcu
 
Is this a scam.pdf
Is this a scam.pdfIs this a scam.pdf
Is this a scam.pdfAvaAmelia
 
S01.L06 - Internet Security
S01.L06 - Internet SecurityS01.L06 - Internet Security
S01.L06 - Internet Securityselcukca84
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is DangerousGihan Dias
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself OnlineGary Wagnon
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitssuser64f8f8
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSlesteraporado16
 

Similaire à IDENTIFYING CYBER THREATS NEAR YOU (20)

IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
Security-Awareness-Training.pptx
Security-Awareness-Training.pptxSecurity-Awareness-Training.pptx
Security-Awareness-Training.pptx
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security Awareness
 
S_A_T.pptx
S_A_T.pptxS_A_T.pptx
S_A_T.pptx
 
Phishing
PhishingPhishing
Phishing
 
Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You? Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You?
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacks
 
Online secuirty
Online secuirtyOnline secuirty
Online secuirty
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 
Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017
 
Is this a scam.pdf
Is this a scam.pdfIs this a scam.pdf
Is this a scam.pdf
 
S01.L06 - Internet Security
S01.L06 - Internet SecurityS01.L06 - Internet Security
S01.L06 - Internet Security
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 

Dernier

Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 

Dernier (20)

Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 

IDENTIFYING CYBER THREATS NEAR YOU

  • 1. IDENTIFYING CYBER THREATS NEAR YOU CYBER CRIME TRAINING PROGRAMME DAY 1
  • 2. WHO AM I? WILLIAM WARERO MCAFEE CERTIFIED SECURITY ADVOCATE FOCUS IS ON DEPLOYMENT OF MCAFEE ENTERPRISE SECURITY SOLUTIONS AND ADVOCATE OF ENTERPRISE PRODUCTIVITY SOLUTIONS
  • 3.
  • 7.
  • 10.
  • 11. Worms
  • 13.
  • 14. Primary Online Risks for Children Disturbing Content If kids explore unsupervised, they could stumble upon images or information you may not want them exposed to. File-share Abuse Unauthorized sharing of music, video, and other files may be illegal, and download malicious software. Cyberbullies Both children and adults may use the Internet to harass or intimidate other people. Predators These people use the Internet to trick children into meeting with them in person. Invasion of Privacy If kids fill out online forms, they may share information you don’t want strangers to have about them or your family.
  • 15. Primary Threats to Personal Online Safety Phishing E-mail sent by online criminals to trick you into going to fake Web sites and revealing personal information Spam Unwanted e-mail, instant messages, and other online communication Identity Theft A crime where con artists get your personal information and access your cash and/or credit Hoaxes E-mail sent by online criminals to trick you into giving them money
  • 16. What is a phishing scam? Phishing is a type of deception designed to steal your valuable personal data such as credit card numbers, email account details, and other account data and passwords. Phishing is also known as identity theft and is a type of social engineering.
  • 17. Common phishing scams: Spoofs of businesses that you know and trust. These are e-mail messages that purport to be from companies or services that you know and trust such as your bank and could contain urgent messages with threats of account closures or other alarming consequences.
  • 18. Common phishing scams: Lottery scams and other advanced fee fraud scams.For example, an e-mail message might request your help in a financial transaction such as the transfer of a large sum of money into your account. Or a message might contain a claim that you have received a large inheritance from someone you do not know or that you have won a lottery that you did not enter. For more information, see Scams that promise money, gifts, or prizes.
  • 19. Common phishing scams: Rogue security software scams.These are e-mail messages, Web sites, or pop-up windows that tell you that your computer is unsafe. If you download the software they offer so you can receive help, you could damage your system or waste money on software that you don't need.
  • 20. You might see a phishing scam: In e-mail messages, even if the messages appear to be from a coworker or someone you know. On social networking Web sites. On Web sites that appear to accept donations for charity. On Web sites that spoof familiar sites but that use slightly different Web addresses. In your instant message (IM) program. On your cell phone or other mobile device.
  • 21. Six signs of a scam Generic greetings such as "Dear Customer," which indicate that the sender does not know you and should not be trusted.
  • 22. Six signs of a scam Alarming or urgent statements that require you to respond immediately.
  • 23. Six signs of a scam Requests for personal or financial information, such as user names, passwords, credit card or bank account numbers, social security numbers, dates of birth, or other information that can be used to steal your identity.
  • 24. Six signs of a scam Misspellings and grammatical errors, including Web addresses. The Web address might look very similar to the address of a legitimate business, but with a minor alteration. For example, instead of www.microsoft.com, the scammer might use www.micrsoft.com.
  • 25. Six signs of a scam The text of the link in the e-mail message to you is different from the Web address that you are directed to when you click the link. You can identify the actual Web address in a link by hovering over the link without clicking it. The Web address appears in a text box above the link.
  • 26. Six signs of a scam The "From" line in the original e-mail message to you shows a different Web address than the one that appears when you try to reply to the message
  • 27. How can I help prevent a scam from happening to me?
  • 28. Delete Spam Delete spam. Do not open it or reply to it, even to ask to be removed from a mailing list. When you reply, you confirm to the senders that they have reached an active e-mail account and make yourself vulnerable to further abuse
  • 29. Caution! Use caution when you click links in e-mail messages, text messages, pop-up windows, or instant messages. Instead, type Web addresses in a Web browser, or use your online Favorites or bookmarks.
  • 30. Attachments and links Do not open e-mail attachments or click instant message download links unless you know who sent the message and you were expecting the attachment or link.
  • 31. Giving info online Be cautious about providing your personal or financial information online. Do not fill out forms in e-mail messages that ask for personal or financial information.
  • 32. Passwords Create strong passwords and avoid using the same password for your bank and other important accounts.
  • 33. Update Update your security settings and operating systems Use web browsers that include an additional layer of protection with sites that use Extended Validation (EV) SSL Certificates. Update your browser.
  • 34. Use Filters Turn on filters in Mozilla Firefox, Google, in Internet Explorer and other providers to help detect unsafe and potentially unsafe Web sites as you browse. Read the warning messages that you see to decide if you want to proceed to a suspicious Web site or not.
  • 35. Firewalls and antivirus Make sure your computer's firewall is turned on and that you use antivirus and antispyware software that is updated automatically
  • 36. Track transactions Check your bank and credit card statements closely to identify and report any transactions that are not legitimate.
  • 37. Secure Networks Never pay bills, bank, shop, or conduct other financial transactions on a public or shared computer or over a public wireless network. If you do log on to public computers, look for computers on networks that require a password, which increases security.
  • 38. What should I do with fraudulent e-mail messages?
  • 39. Delete the message. Do not respond or click links in it. Report any suspicious activity. If you believe that someone is using your email account, you can reset your password. Fraudulent e-mail messages sometimes contain unwanted or malicious software (also known as malware). If you think you might have malware on your computer, scan your computer with your security program
  • 40. What does a phishing e-mail look like? They might appear to come from your bank or financial institution, a company you regularly do business with, such as Microsoft, or from your social networking site.
  • 41. They might appear to be from someone you know. Spear phishing is a targeted form of phishing in which an e-mail message might look like it comes from your employer, or from a colleague who might send an e-mail message to everyone in the company, such as the head of human resources or IT.
  • 42. They might ask you to make a phone call. Phone phishing scams direct you to call a customer support phone number. A person or an audio response unit waits to take your account number, personal identification number, password, or other valuable personal data. The phone phisher might claim that your account will be closed or other problems could occur if you don't respond.
  • 43. They might include official-looking logos and other identifying information taken directly from legitimate Web sites, and they might include convincing details about your personal information that scammers found on your social networking pages.
  • 44. They might include links to spoofed Web sites where you are asked to enter personal information.
  • 45. Here is an example :
  • 46. What do you see?
  • 47. To make these phishing e-mail messages look even more legitimate, the scam artists may place a link in them that appears to go to the legitimate Web site (1), but actually takes you to a phony scam site (2) or possibly a pop-up window that looks exactly like the official site.
  • 48. Here are a few phrases to look for if you think an e-mail message is a phishing scam.
  • 49. "Verify your account." Businesses should not ask you to send passwords, login names, or other personal information through e-mail. If you receive an e-mail message from google asking you to update your credit card information, do not respond: this is a phishing scam.
  • 50. "You have won the lottery." The lottery scam is a common phishing scam known as advanced fee fraud. One of the most common forms of advanced fee fraud is a message that claims that you have won a large sum of money, or that a person will pay you a large sum of money for little or no work on your part. The lottery scam often includes references to big companies, such as Coca Cola. In case you did not know, there is no Coca Cola lottery.
  • 51. "If you don't respond within 48 hours, your account will be closed." These messages convey a sense of urgency so that you'll respond immediately without thinking. A phishing e-mail message might even claim that your response is required because your account might have been compromised.
  • 52. What does a phishing link look like?
  • 53. "Click the link below to gain access to your account." HTML-formatted messages can contain links or forms that you can fill out just as you’d fill out a form on a Web site.
  • 54. Phishing links that you are urged to click in e-mail messages, on Web sites, or even in instant messages may contain all or part of a real company’s name and are usually masked, meaning that the link you see does not take you to that address but somewhere different, usually an illegitimate Web site.
  • 55. What do you see?
  • 56. Example of a masked Web address ("typo-squatting" or "cybersquatting." ) Con artists also use Web addresses that resemble the name of a well-known company but are slightly altered by adding, omitting, or transposing letters. For example, the address “www.yahoo.com" could appear instead as: www.yaho.com www.youryahoo.com www.verify-yahoo.com
  • 57. Cybersquatting Scammers register these domain names in order to compete with the popular site or to earn money through advertisements. If you enter the wrong URL you might be taken to a site where you'll see an ad for the site you really wanted. If you click on that ad, you might get to where you want to go: You've made an extra click and the scammer has earned some money.
  • 58. Cybersquatting Typo-squatters and cybersquatters can also create more insidious scams, such as downloading malicious software applications and spyware onto unprotected computers that connect to their sites.
  • 59. Cybersquatting and the Internet Corporation for Assigned Names and Numbers (ICANN) has worked to remedy the situation, but cybersquatters are still out there.
  • 60. Spoofing Some cyber criminals use phishing scams to set up convincing spoofs of legitimate Web sites. They then try to trick you into visiting these Web sites and disclosing personal information, such as your credit card number.
  • 61. What is a spoofed Web site? A spoofed site is usually designed to look like the legitimate site, sometimes using components from the legitimate site.
  • 62. Other Scams: Scams are created daily and these are not all of them. Here are some others: Fake e-cards Fake job opportunities Donation scams
  • 63. Fake ECards E-cards are created the same way Web sites are; they're built on the Internet just like this page. So when you send someone an e-card, you send them a link to click, which takes them to the online greeting card you created for them.
  • 64. How to avoid fake e-cards Recognize the sender of the e-card. If you don't know the sender, do not trust the card. Legitimate companies have standard, obvious ways for you to recognize that the e-mail is not a fraud.
  • 65. How to avoid fake e-cards Make sure you check both the display name and e-mail address of the sender. When in doubt, use alternative viewing methods. Do not click any links when you are not sure of the sender or intent of the e-mail.
  • 66. How to avoid fake e-cards Never download or click anything from an unknown source. Be wary of an e-mail message or file attachment from someone you don't know or that seems suspicious. Preview a link's Web address before you click it. If the link doesn't show an address, move your mouse pointer over a link without clicking it to see where the link goes. (The address should appear on the bottom bar of your Web browser.) Don't accept an end-user agreement without reading the fine print first; you might inadvertently agree to install spyware or something else you don't want.
  • 67. Online job-hunting scams Phishing scams might also appear as phony job ads, used to convince job hunters to send them personal information. Scammers post their ads on legitimate job sites and often use familiar-looking or convincing company logos, language, and links to fake Web sites that appear to be those of real organizations.
  • 68. Online job-hunting scams These sites might also charge fees for services they will never render. Typically, after a few days the thieves close down the scam and disappear.
  • 69. Best practices for online job hunters Never provide any non-work related personal information such as your social security number, credit card number, date of birth, home address, and marital status online, through e-mail, over the phone, in a fax, or on your resume. List your resume on a job site that allows only verified recruiters to scan them and uses a privacy policy.
  • 70. Best practices for online job hunters Verify a prospective employer, recruiter, or recruiting agency through another source and then contact them directly-or better yet, visit them in person at the company location during regular work hours. If a prospective recruiter or employer requests a background check, agree to do so only after you have met with them at their company location during regular work hours
  • 71. Best practices for online job hunters Beware of anyone who asks you for money up front in exchange for finding work for you. You should never have to pay for "exclusive" job leads or for a job itself. If you are paying for job placement services, don't provide credit card or bank information or engage in any monetary transactions unless done in person, onsite, with a prospective recruiter or job agency.
  • 72. Best practices for online job hunters Carefully evaluate contact information in job ads or related e-mails, watching out for spelling errors, an e-mail address that does not feature the company's name, and inconsistencies with area or zip codes. Create an exclusive Web-based e-mail address and account for all non-personal communication.
  • 73. Donation scams Natural disasters, political campaigns, and global health issues are often the focus of donation Several types of phishing scams promise fantastic financial or other rewards in exchange for just a few small things you have to do…which include turning over your personal information to an identity thief. Advance fee fraud scams Stock tips in e-mail and text messages
  • 74. Advance fee fraud scams An advance fee fraud is a scam that hooks you with the false promise of large sums of money for little or no effort on your part. After you're deeply involved in the scam, you're asked to pay certain amounts of money to expedite the process. You end up not making a dime, losing your money, and perhaps turning over your personal information to fraudsters.
  • 75. Advance fee fraud scams The most common form of advance fee fraud is an e-mail message that claims that you have won a large sum of money, or that a person will pay you a large sum of money for little or no work on your part. Advance fee fraud is also known as the Nigerian Letter or the 419 scam, because the scammer often claims to be from Nigeria and 419 is the Nigerian criminal code that this scam violates.
  • 76. Advance fee fraud scams Here are a few examples of the most popular advance fee frauds: A foreign government official would like your assistance in transferring funds and will pay you a hefty commission if you agree. You stand to inherit millions of dollars from a relative you don't remember. You've won a prize or a lottery (perhaps one from a foreign country) that you don't remember entering.
  • 77. Help avoid advance fee fraud scams Use spam filtering technology Don't make investment decisions based on anonymous e-mail or text messages you receive. Don't open attachments in unsolicited e-mails. Stock spam usually is sent as an image or as a PDF attachment. Use an Internet service provider (ISP) or e-mail provider that has implemented Sender ID Framework, a technical solution to detect and block spoofed e-mail.
  • 78. Stock tips in e-mail and text messages The pump-and-dump stock scam is a common form of spam these days. According to the United States Security and Exchange Commission (SEC), spammers send 100 million of these e-mail messages per week!
  • 79. Stock tips in e-mail and text messages How pump-and-dump scams workScammers buy stock in a small company, often with stock prices of only a few shillings or less per share. Then they send out millions of e-mail or text messages across the globe to encourage recipients to buy that stock. These messages can even be disguised as confidential information that was sent to the recipient by mistake.
  • 80. Stock tips in e-mail and text messages When enough people buy the stock, the price of the stock goes up. When the price is high enough, the spammers sell their shares. The price goes back down, and people who purchased the stock as a result of the tip suffer.
  • 81. Stock tips in e-mail and text messages It can be difficult to find out who's behind pump-and-dump e-mail scams. That’s because spammers can take control of large numbers of computers and turn them into zombies that can work together as powerful 'botnets' to send the spam messages out.
  • 82. What do you do AFTER you are scammed?
  • 83. Step 1: Report the incident Your credit card company, if you have given your credit card information. The sooner an organization knows your account may have been compromised, the easier it will be for them to help protect you. The company that you believe was forged. Remember to contact the organization directly, not through the e-mail message you received
  • 84. Step 2: Change all your passwords Start with passwords that are related to financial institutions or information. Create strong passwords
  • 85. Step 3: Routinely review your statements Review your bank and credit card statements monthly for unexplained charges or inquiries that you didn't initiate.
  • 86. Step 4: Use the most up-to-date tools Update your operating System, Antivirus and other network and administration tools. You must evolve as technology and crime evolve.