SlideShare uma empresa Scribd logo
1 de 10
Avoiding “Shady” Websites By:  Mrs. McGinnis Sept, 2010
What are “shady” websites? Fradulent online shops Sites that distruibute pirated music, videos and software Bogus charity websites Sites that promote worthless investments or get-rich-quick schemes WHY do people take the time to create websites such as these?
Why????    Identity Theft Identity theft happens when someone steals your personal information, such as your social security number, address, phone number, bank account number, credit card numbers and passwords, etc. The person “pretends” to be you and uses your information to steal your money, credit, etc.
That won’t happen to me!! 10 million Americans were the victim of identity theft in 2008 1 in 10 consumers have been the victim of identity theft 1.6 million households experienced fraud NOT related to their credit cards, but in their bank accounts and debit cards 38-48% discover the fraud within 3 months, 9-18%, not for 4 or more years!
What you share online could hurt you…. Criminals get your information from one main place….YOU Social Networking Sites Shady Emails Phishing Websites
Phishing, no its not spelled wrong… Phishing websites are sites that LOOK like real sites, but exist solely to steal your information Spyware  Pop-ups that ask for your information Cloned sites
I’m too smart for this!!! Criminals find many ways to convince you to give them your information What are some ways that you think this can happen?
Watch out for…. Websites that try to scare you into submitting your username and password Emails with links in them-often the link looks ok in the email but when you click on it, it takes you to a different site Misspelled words Gold Padlock (SSL designation) in wrong place Cloned sites-exact copy
Examples of Phishing Phishing Emails Phishing for Passwords Nigerian 419 Scam Cloned Websties
How to recognize a real site.. Phish or No Phish

Mais conteúdo relacionado

Mais de michlmcginnis

My Tundra Report Ulmer
My Tundra Report UlmerMy Tundra Report Ulmer
My Tundra Report Ulmermichlmcginnis
 
My Tundra Report Berding
My Tundra Report BerdingMy Tundra Report Berding
My Tundra Report Berdingmichlmcginnis
 
My Tundra Projecthaley
My Tundra ProjecthaleyMy Tundra Projecthaley
My Tundra Projecthaleymichlmcginnis
 
My Tundra Project Martin
My Tundra Project MartinMy Tundra Project Martin
My Tundra Project Martinmichlmcginnis
 
My Tundra Project Eary
My Tundra Project EaryMy Tundra Project Eary
My Tundra Project Earymichlmcginnis
 
My Tundra Project Acomb
My Tundra Project AcombMy Tundra Project Acomb
My Tundra Project Acombmichlmcginnis
 
My Tundra Biome Essay Deye
My Tundra Biome Essay DeyeMy Tundra Biome Essay Deye
My Tundra Biome Essay Deyemichlmcginnis
 
My Magic Tundra Project!Zent
My Magic Tundra Project!ZentMy Magic Tundra Project!Zent
My Magic Tundra Project!Zentmichlmcginnis
 
Life In The Tundralanzillotta
Life In The TundralanzillottaLife In The Tundralanzillotta
Life In The Tundralanzillottamichlmcginnis
 

Mais de michlmcginnis (9)

My Tundra Report Ulmer
My Tundra Report UlmerMy Tundra Report Ulmer
My Tundra Report Ulmer
 
My Tundra Report Berding
My Tundra Report BerdingMy Tundra Report Berding
My Tundra Report Berding
 
My Tundra Projecthaley
My Tundra ProjecthaleyMy Tundra Projecthaley
My Tundra Projecthaley
 
My Tundra Project Martin
My Tundra Project MartinMy Tundra Project Martin
My Tundra Project Martin
 
My Tundra Project Eary
My Tundra Project EaryMy Tundra Project Eary
My Tundra Project Eary
 
My Tundra Project Acomb
My Tundra Project AcombMy Tundra Project Acomb
My Tundra Project Acomb
 
My Tundra Biome Essay Deye
My Tundra Biome Essay DeyeMy Tundra Biome Essay Deye
My Tundra Biome Essay Deye
 
My Magic Tundra Project!Zent
My Magic Tundra Project!ZentMy Magic Tundra Project!Zent
My Magic Tundra Project!Zent
 
Life In The Tundralanzillotta
Life In The TundralanzillottaLife In The Tundralanzillotta
Life In The Tundralanzillotta
 

Último

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Último (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Shady websites

  • 1. Avoiding “Shady” Websites By: Mrs. McGinnis Sept, 2010
  • 2. What are “shady” websites? Fradulent online shops Sites that distruibute pirated music, videos and software Bogus charity websites Sites that promote worthless investments or get-rich-quick schemes WHY do people take the time to create websites such as these?
  • 3. Why???? Identity Theft Identity theft happens when someone steals your personal information, such as your social security number, address, phone number, bank account number, credit card numbers and passwords, etc. The person “pretends” to be you and uses your information to steal your money, credit, etc.
  • 4. That won’t happen to me!! 10 million Americans were the victim of identity theft in 2008 1 in 10 consumers have been the victim of identity theft 1.6 million households experienced fraud NOT related to their credit cards, but in their bank accounts and debit cards 38-48% discover the fraud within 3 months, 9-18%, not for 4 or more years!
  • 5. What you share online could hurt you…. Criminals get your information from one main place….YOU Social Networking Sites Shady Emails Phishing Websites
  • 6. Phishing, no its not spelled wrong… Phishing websites are sites that LOOK like real sites, but exist solely to steal your information Spyware Pop-ups that ask for your information Cloned sites
  • 7. I’m too smart for this!!! Criminals find many ways to convince you to give them your information What are some ways that you think this can happen?
  • 8. Watch out for…. Websites that try to scare you into submitting your username and password Emails with links in them-often the link looks ok in the email but when you click on it, it takes you to a different site Misspelled words Gold Padlock (SSL designation) in wrong place Cloned sites-exact copy
  • 9. Examples of Phishing Phishing Emails Phishing for Passwords Nigerian 419 Scam Cloned Websties
  • 10. How to recognize a real site.. Phish or No Phish