SlideShare a Scribd company logo
1 of 27
12 Holiday
             Shopping
               Scams
              Greater Cleveland PC
                  Users Group
                November 2011
Basic information from MSNBC / McAfee
Many of us are already shopping
online, or will be soon, for the
holidays. "Cyber-criminals rub their
hands with glee when they think of
the holidays," said Gary
Davis, director of consumer product
marketing at McAfee.
“Consumers are making
travel plans, shopping
for gifts and bargains,
updating Facebook and
connecting with friends.”
However, the vast majority have no
security protection for their
smartphones or tablets, despite using
them heavily during the holiday
season.
Consumers need to stay one step
ahead of this season's cyber-
scrooges, and make sure they have
protection for all of their internet-
enabled devices. Otherwise, they
could risk giving the bad guys the
biggest gift of all - their own personal
and financial information."
Mobile Malware
More of us are using our
phones for shopping, to
research products or to
redeem coupons. McAfee
says Android phones are
"most at risk," citing "a 76
percent increase in malware
targeted at Android devices in
the second quarter of 011 over the first,
making it the most targeted smartphone
platform."
Mobile Malware
McAfee also says
new malware "has
recently been found
that targets QR codes,
a digital barcode that
consumers might scan
with their smartphone to find good deals on
Black Friday and Cyber Monday, or just to
learn about products they want to buy."
Malicious Mobile Apps
These are mobile apps
designed to steal infor-
mation from smartphones,
or send out expensive
text messages without
a user’s consent. Dangerous apps are
usually offered for free, and masquerade
as fun applications, such as games.
Malicious Mobile Apps
For example, last year,
4.6 million Android smart-
phone users downloaded
a suspicious wallpaper app
that collected and trans-
mitted user data to a site
in China.
Phony Facebook
          Promotions
"Who doesn’t want to win
some free prizes or get a
great deal around the
Holidays?" One recent
scam promised two free
airline tickets — something that sounds
appealing at this time of year especially —
"but required participants to fill out multiple
surveys requesting personal information."
Scareware: Fake Antivirus /
     Security Update
"Scareware is the
fake antivirus
software that
tricks someone
into believing that
their computer is
at risk or already
infected — so they agree to download and
pay for phony software.”
Scareware: Fake Antivirus /
     Security Update
McAfee says it's
one of "the most
common and
dangerous Internet
threats today, with
an estimated 1 mill
victims falling for
this scam each day."
Holiday Screensavers
Ah yes, we love our screensavers for
special times of the years like Christmas.
But some of the free ones are loaded with
more than holiday cheer. "A recent search
for a Santa screensaver that promises to
let you 'fly with Santa
in 3D' is malicious,“
 McAfee says.
"Holiday ringtones &
e-cards have been
known to be malicious
too."
Mac Malware
Those two words wouldn't
have even been put to-
gether in the same
sentence a few years ago.
But, as McAfee correctly
says, "with the growing
popularity of Apple products,
for both business and personal use, cyber
criminals have designed a new wave of
malware directed squarely at Mac users."
Mac Malware
McAfee Labs says
as of a year ago,
there were "5,000
pieces of malware
targeting Macs, and
this number is in-
creasing by 10
percent month on month."
Holiday Phishing Scams
"Cyber scammers
know that most
people are busy
around the holidays
so they tailor their
emails and social
messages with holiday themes in the
hopes of tricking recipients into revealing
personal information.“
Holiday Phishing Scams
 A "common holiday
phishing scam is a
phony notice from UPS,
saying you have a
package and need to
fill out an attached form
to get it delivered. The
form may ask for personal or financial
details that will go straight into the hands
of the cyber scammer."
Online Coupon Scams
Whether you're
an extreme
couponer or an
occasional one,
the season is
rife with good on
line offers and
malicious ones. "Scammers know that by
offering an irresistible online coupon, they
can get people to hand over some of their
personal information," McAfee says.
Online Coupon Scams
"One popular scam is
to lure consumers with
the hope of winning a
'free' iPad. Consumers
click on a 'phishing' site, which can result
in email spam." Another
is that "consumers are offered an online
coupon code and once they agree, are
asked to provide personal
information, including credit-card
details, passwords and other financial
data."
Mystery Shopper Scams
"There have been
reports of scammers
sending text messages
to victims, offering to
pay them $50 an hour
to be a mystery shopper,
and instructing them to call a number if
they are interested. Once the victim
calls, they are asked for their personal
information, including credit card and bank
account numbers."
Hotel Wrong Transaction
"In one recent example, a
scammer sent out emails
that appeared to be from a
hotel, claiming that a
'wrong transaction' had
been discovered on the
recipient’s credit card. It then asked them
to fill out an attached refund form. Once
opened, the attachment downloads
malware onto their machine."
“It” Gift Scams
"When a gift is hot, not only
do sellers mark up the
price, but scammers will
also start advertising these
gifts on rogue websites &
social networks, even if they don’t have
them," says McAfee. "So,
consumers could wind up paying for an
item and giving away credit card details
only to receive nothing in return."
“I’m away from home”
You know this by now, or
should: "Posting infor-
mation about a vacation
on social networking sites
could be dangerous. If
someone is connected with people they
don’t know on Facebook or other social
networking sites, they could see their post
& decide that it may be a good time to rob
them. Furthermore, a quick online search
can easily turn up their home address."
Protecting Yourself
Aside from buying McAfee's products, or
those from another security vendor, here
are some of McAfee's tips on staying safe
in general, but especially in the weeks
ahead:
 "Only download mobile apps from
   official app stores, such as iTunes and
   the Android Market, and read user
   reviews before downloading them.“
Protecting Yourself
 "Be extra vigilant when reviewing and
  responding to emails."
 "Watch out for too-good-to-be-true offers
  on social networks (free airline tickets).
  Never agree to reveal your information
  just to participate in a promotion."
 "Don’t accept requests on social
  networks from people you don’t know in
  real life. Wait to post pictures and
  comments about your vacation until
  you’ve already returned home."
Protecting Yourself
 If you are asked to copy and paste
  some code into your web browser to get
  a prize or special offer, do NOT do it.
  The code is usually a javascript which
  WILL create all kinds of havoc for you.
 Have a current anti-virus program that
  you keep up to date. There are ones
  you can buy & free ones which are very
  good. See http://gcpcug.org/antivirus for
  more details.
Protecting Yourself
 Run an anti-maleware program like
  MalwareBytes on a regular basis. See
  http://gcpcug.org/antivirus for more
  details.
 Download programs, especially anti-
  virus and anti-malware, from reputable
  websites not websites or warning
  messages that pop up on your screen.
 Be aware and be on guard.
Credits
   Elmo is a trademark of Sesame Workshop
   Android is a trademark of Google Inc.
   iPad is a trademark of Apple Inc.
   Original MSNBC article http://technolog.msnbc.msn.com/_news/2011/11/09/8720555-12-
    online-holiday-scams-to-avoid
   Original McAfee Blog Post http://blogs.mcafee.com/consumer/recipe-for-spoiling-holiday-cheer-
    top-holiday-viruses-scams
   The pictures you have seen came from the following sites. Do not automatically go to those
    sites as some of them may be bogus sites.
     www.mcafee.com
     www.the-social-feed.com/
     blog.uspsoig.gov/
     www.hyper6.com/
     www.trendmicro.com/
     www.landingpagewebdesign.com
     www.datarescuetools.com/
     www.winfreestuffdaily.com/
     justincaseyouwerewondering.com/
     www.joelbuckland.com/
     www.crazythemes.com/
     www.freebies-freestuff-freesamples.com
     www.screensaverfine.com/
     www.macrumors.com/
     office.microsoft.com/en-us/images/?CTT=97

More Related Content

What's hot

Users and Behaviors- Social Internet
Users and Behaviors- Social InternetUsers and Behaviors- Social Internet
Users and Behaviors- Social InternetKenie Moses
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalResham Acharya
 
Users and behaviors social internet: Safety & Security
Users and behaviors social internet: Safety & SecurityUsers and behaviors social internet: Safety & Security
Users and behaviors social internet: Safety & SecurityDr. V Vorvoreanu
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial CrimesRaj Goel
 
Social Networking Threats
Social Networking ThreatsSocial Networking Threats
Social Networking Threatsejhilbert
 
50 Amazing Facts About Mobile
50 Amazing Facts About Mobile 50 Amazing Facts About Mobile
50 Amazing Facts About Mobile SIXTY
 
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-ThreatsThe Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats- Mark - Fullbright
 
Takehomequiz4
Takehomequiz4Takehomequiz4
Takehomequiz4jkarl2
 
14 cyber threats
14 cyber threats14 cyber threats
14 cyber threatsmahesh43211
 

What's hot (13)

Securityguide
SecurityguideSecurityguide
Securityguide
 
Users and Behaviors- Social Internet
Users and Behaviors- Social InternetUsers and Behaviors- Social Internet
Users and Behaviors- Social Internet
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in Nepal
 
Users and behaviors social internet: Safety & Security
Users and behaviors social internet: Safety & SecurityUsers and behaviors social internet: Safety & Security
Users and behaviors social internet: Safety & Security
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes
 
Social Networking Threats
Social Networking ThreatsSocial Networking Threats
Social Networking Threats
 
50 Amazing Facts About Mobile
50 Amazing Facts About Mobile 50 Amazing Facts About Mobile
50 Amazing Facts About Mobile
 
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-ThreatsThe Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
 
Emp tech las-week-2
Emp tech las-week-2Emp tech las-week-2
Emp tech las-week-2
 
Takehomequiz4
Takehomequiz4Takehomequiz4
Takehomequiz4
 
14 cyber threats
14 cyber threats14 cyber threats
14 cyber threats
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 

Viewers also liked

A Facebook Page for Your Organization
A Facebook Page for Your OrganizationA Facebook Page for Your Organization
A Facebook Page for Your OrganizationJim Evans
 
LinkedIn - The Power of the 2nd Degree
LinkedIn - The Power of the 2nd DegreeLinkedIn - The Power of the 2nd Degree
LinkedIn - The Power of the 2nd DegreeJim Evans
 
CDPUG LinkedIn Presentation - The Power of The 2nd Degree
CDPUG LinkedIn Presentation - The Power of The 2nd DegreeCDPUG LinkedIn Presentation - The Power of The 2nd Degree
CDPUG LinkedIn Presentation - The Power of The 2nd DegreeJim Evans
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionIn a Rocket
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting PersonalKirsty Hulse
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanPost Planner
 

Viewers also liked (6)

A Facebook Page for Your Organization
A Facebook Page for Your OrganizationA Facebook Page for Your Organization
A Facebook Page for Your Organization
 
LinkedIn - The Power of the 2nd Degree
LinkedIn - The Power of the 2nd DegreeLinkedIn - The Power of the 2nd Degree
LinkedIn - The Power of the 2nd Degree
 
CDPUG LinkedIn Presentation - The Power of The 2nd Degree
CDPUG LinkedIn Presentation - The Power of The 2nd DegreeCDPUG LinkedIn Presentation - The Power of The 2nd Degree
CDPUG LinkedIn Presentation - The Power of The 2nd Degree
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
 

Similar to 12 Holiday Tech Shopping Scams

Symantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec
 
CYREN 2013년 인터넷 위협 보고서_영문
CYREN 2013년 인터넷 위협 보고서_영문CYREN 2013년 인터넷 위협 보고서_영문
CYREN 2013년 인터넷 위협 보고서_영문Jiransoft Korea
 
Chapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcChapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcRay Brannon
 
RSA Online Fraud Report - August 2014
RSA Online Fraud Report - August 2014RSA Online Fraud Report - August 2014
RSA Online Fraud Report - August 2014EMC
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfKALPITKALPIT1
 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Ronak Jain
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdfMohanPandey31
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?VISTA InfoSec
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 

Similar to 12 Holiday Tech Shopping Scams (20)

Avoid These Two Popular Computer Scams in 2022.pptx
Avoid These Two Popular Computer Scams in 2022.pptxAvoid These Two Popular Computer Scams in 2022.pptx
Avoid These Two Popular Computer Scams in 2022.pptx
 
Symantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec Report On Rogue Security Software
Symantec Report On Rogue Security Software
 
CYREN 2013년 인터넷 위협 보고서_영문
CYREN 2013년 인터넷 위협 보고서_영문CYREN 2013년 인터넷 위협 보고서_영문
CYREN 2013년 인터넷 위협 보고서_영문
 
Chapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcChapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated Communicationcmc
 
RSA Online Fraud Report - August 2014
RSA Online Fraud Report - August 2014RSA Online Fraud Report - August 2014
RSA Online Fraud Report - August 2014
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018
 
09 09 2014
09 09 201409 09 2014
09 09 2014
 
Cybercrime blog
Cybercrime blogCybercrime blog
Cybercrime blog
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdf
 
Cybercriminals Are Lurking
Cybercriminals Are LurkingCybercriminals Are Lurking
Cybercriminals Are Lurking
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
Smartphone Security Article
Smartphone Security ArticleSmartphone Security Article
Smartphone Security Article
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Phishing
PhishingPhishing
Phishing
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 

Recently uploaded

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

12 Holiday Tech Shopping Scams

  • 1. 12 Holiday Shopping Scams Greater Cleveland PC Users Group November 2011 Basic information from MSNBC / McAfee
  • 2. Many of us are already shopping online, or will be soon, for the holidays. "Cyber-criminals rub their hands with glee when they think of the holidays," said Gary Davis, director of consumer product marketing at McAfee.
  • 3. “Consumers are making travel plans, shopping for gifts and bargains, updating Facebook and connecting with friends.” However, the vast majority have no security protection for their smartphones or tablets, despite using them heavily during the holiday season.
  • 4. Consumers need to stay one step ahead of this season's cyber- scrooges, and make sure they have protection for all of their internet- enabled devices. Otherwise, they could risk giving the bad guys the biggest gift of all - their own personal and financial information."
  • 5. Mobile Malware More of us are using our phones for shopping, to research products or to redeem coupons. McAfee says Android phones are "most at risk," citing "a 76 percent increase in malware targeted at Android devices in the second quarter of 011 over the first, making it the most targeted smartphone platform."
  • 6. Mobile Malware McAfee also says new malware "has recently been found that targets QR codes, a digital barcode that consumers might scan with their smartphone to find good deals on Black Friday and Cyber Monday, or just to learn about products they want to buy."
  • 7. Malicious Mobile Apps These are mobile apps designed to steal infor- mation from smartphones, or send out expensive text messages without a user’s consent. Dangerous apps are usually offered for free, and masquerade as fun applications, such as games.
  • 8. Malicious Mobile Apps For example, last year, 4.6 million Android smart- phone users downloaded a suspicious wallpaper app that collected and trans- mitted user data to a site in China.
  • 9. Phony Facebook Promotions "Who doesn’t want to win some free prizes or get a great deal around the Holidays?" One recent scam promised two free airline tickets — something that sounds appealing at this time of year especially — "but required participants to fill out multiple surveys requesting personal information."
  • 10. Scareware: Fake Antivirus / Security Update "Scareware is the fake antivirus software that tricks someone into believing that their computer is at risk or already infected — so they agree to download and pay for phony software.”
  • 11. Scareware: Fake Antivirus / Security Update McAfee says it's one of "the most common and dangerous Internet threats today, with an estimated 1 mill victims falling for this scam each day."
  • 12. Holiday Screensavers Ah yes, we love our screensavers for special times of the years like Christmas. But some of the free ones are loaded with more than holiday cheer. "A recent search for a Santa screensaver that promises to let you 'fly with Santa in 3D' is malicious,“ McAfee says. "Holiday ringtones & e-cards have been known to be malicious too."
  • 13. Mac Malware Those two words wouldn't have even been put to- gether in the same sentence a few years ago. But, as McAfee correctly says, "with the growing popularity of Apple products, for both business and personal use, cyber criminals have designed a new wave of malware directed squarely at Mac users."
  • 14. Mac Malware McAfee Labs says as of a year ago, there were "5,000 pieces of malware targeting Macs, and this number is in- creasing by 10 percent month on month."
  • 15. Holiday Phishing Scams "Cyber scammers know that most people are busy around the holidays so they tailor their emails and social messages with holiday themes in the hopes of tricking recipients into revealing personal information.“
  • 16. Holiday Phishing Scams A "common holiday phishing scam is a phony notice from UPS, saying you have a package and need to fill out an attached form to get it delivered. The form may ask for personal or financial details that will go straight into the hands of the cyber scammer."
  • 17. Online Coupon Scams Whether you're an extreme couponer or an occasional one, the season is rife with good on line offers and malicious ones. "Scammers know that by offering an irresistible online coupon, they can get people to hand over some of their personal information," McAfee says.
  • 18. Online Coupon Scams "One popular scam is to lure consumers with the hope of winning a 'free' iPad. Consumers click on a 'phishing' site, which can result in email spam." Another is that "consumers are offered an online coupon code and once they agree, are asked to provide personal information, including credit-card details, passwords and other financial data."
  • 19. Mystery Shopper Scams "There have been reports of scammers sending text messages to victims, offering to pay them $50 an hour to be a mystery shopper, and instructing them to call a number if they are interested. Once the victim calls, they are asked for their personal information, including credit card and bank account numbers."
  • 20. Hotel Wrong Transaction "In one recent example, a scammer sent out emails that appeared to be from a hotel, claiming that a 'wrong transaction' had been discovered on the recipient’s credit card. It then asked them to fill out an attached refund form. Once opened, the attachment downloads malware onto their machine."
  • 21. “It” Gift Scams "When a gift is hot, not only do sellers mark up the price, but scammers will also start advertising these gifts on rogue websites & social networks, even if they don’t have them," says McAfee. "So, consumers could wind up paying for an item and giving away credit card details only to receive nothing in return."
  • 22. “I’m away from home” You know this by now, or should: "Posting infor- mation about a vacation on social networking sites could be dangerous. If someone is connected with people they don’t know on Facebook or other social networking sites, they could see their post & decide that it may be a good time to rob them. Furthermore, a quick online search can easily turn up their home address."
  • 23. Protecting Yourself Aside from buying McAfee's products, or those from another security vendor, here are some of McAfee's tips on staying safe in general, but especially in the weeks ahead:  "Only download mobile apps from official app stores, such as iTunes and the Android Market, and read user reviews before downloading them.“
  • 24. Protecting Yourself  "Be extra vigilant when reviewing and responding to emails."  "Watch out for too-good-to-be-true offers on social networks (free airline tickets). Never agree to reveal your information just to participate in a promotion."  "Don’t accept requests on social networks from people you don’t know in real life. Wait to post pictures and comments about your vacation until you’ve already returned home."
  • 25. Protecting Yourself  If you are asked to copy and paste some code into your web browser to get a prize or special offer, do NOT do it. The code is usually a javascript which WILL create all kinds of havoc for you.  Have a current anti-virus program that you keep up to date. There are ones you can buy & free ones which are very good. See http://gcpcug.org/antivirus for more details.
  • 26. Protecting Yourself  Run an anti-maleware program like MalwareBytes on a regular basis. See http://gcpcug.org/antivirus for more details.  Download programs, especially anti- virus and anti-malware, from reputable websites not websites or warning messages that pop up on your screen.  Be aware and be on guard.
  • 27. Credits  Elmo is a trademark of Sesame Workshop  Android is a trademark of Google Inc.  iPad is a trademark of Apple Inc.  Original MSNBC article http://technolog.msnbc.msn.com/_news/2011/11/09/8720555-12- online-holiday-scams-to-avoid  Original McAfee Blog Post http://blogs.mcafee.com/consumer/recipe-for-spoiling-holiday-cheer- top-holiday-viruses-scams  The pictures you have seen came from the following sites. Do not automatically go to those sites as some of them may be bogus sites. www.mcafee.com www.the-social-feed.com/ blog.uspsoig.gov/ www.hyper6.com/ www.trendmicro.com/ www.landingpagewebdesign.com www.datarescuetools.com/ www.winfreestuffdaily.com/ justincaseyouwerewondering.com/ www.joelbuckland.com/ www.crazythemes.com/ www.freebies-freestuff-freesamples.com www.screensaverfine.com/ www.macrumors.com/ office.microsoft.com/en-us/images/?CTT=97