SlideShare uma empresa Scribd logo
1 de 52
Striking Back!Striking Back!
Don’t Launch Cell Phone Games and Programs
that are “Pushed” to you
Just how gullible are we?
http://www.makeuseof.com/pages/best-windows-software
Best 90 Free Windows Programs toBest 90 Free Windows Programs to
Protect You and Your ComputerProtect You and Your Computer
Cell phone data
charges
Ring tones Vanity fraud
Meet My Children - Sean, Lindsay, Ryan. Each of them was scammed!
““It can’t happen to me!”It can’t happen to me!”
Without protection, its just a crapsWithout protection, its just a craps
game.game.
Really?
What are the
odds?
“You stand a better chance at any given time of loosing your personally
identifiable information than you do of just about any other form of nasty thing
than can happen to a person over their lifetime.”
The National Safety CouncilThe National Safety Council
1 in 146,107,962.00 could potentially win the power ball lottery grand prize
1 in 3,563,608.83 could potentially win the 200,000 dollar prize in the power ball
1 in 3000 will be killed by lighting in any given year
1 in 1,313 chance of being killed by a doctor
1 in 314 chance of being killed by a firearm
1 in 84 chance of being killed in a car crash over your lifetime
1 in 3 has had their personally identifiable1 in 3 has had their personally identifiable
information lost this year!!information lost this year!!
A new, targeted social mediaA new, targeted social media
version of a very old scam -- theversion of a very old scam -- the
“Nigerian,” or “419,” ploy“Nigerian,” or “419,” ploy
WIRE ME MONEY !
FACEBOOK HACK
How did they do that?How did they do that?
Because Facebook regularly contacts its users
through e-mail, and includes links in those e-mails
to login pages, the format is ripe for phishers. It's
easy to imitate Facebook e-mails and simply send
users clicking to a look-a-like login page that steal
passwords.
http://www.youtube.com/watch?v=0zvPEfksbyQ
Punked!
Lots of tools on the net for people who may want to
take advantage of you.
http://www.scambusters.org/
“Who steals my purse steals
trash…But he that filches from me
my good name …... Makes me poor
indeed.”
Othello, Act 3 Scene 3Othello, Act 3 Scene 3
When in doubt about a potential scam check the
Internet Crime Complaint Center
http://www.ic3.gov/about/default.aspx
Don’t let them get away with it.
Get mad or get even!
Report them immediately to:
http://www.ic3.gov/complaint/default.aspx
OR…become a scam baiter
(not really recommended, but some people are just really angry)
Who Scammers HateWho Scammers Hate
http://www.419hell.com/http://www.419hell.com/
We are all victims!We are all victims!
1700 new victims in the course of this meeting.
By the end of the decade someone in your family will be
a victim.
Lowest estimate of projected damage is $5000.
Only 1 in 700 is investigated.
1 year or less in jail.
70 – 80 % involve illegal dugs
FBI reports 30,000 computer a week are taken over.
http://www.youtube.com/watch?v=NF34sqrAPHU
The meteoric rise in social media use has alsoThe meteoric rise in social media use has also
created a launch pad for identity thieves.created a launch pad for identity thieves.
“My prediction for 2010 (and beyond) is that the increase in
social networking activity, along with a user’s failure to
implement security and privacy settings and protocols, will
lead to an increased exposure of not only the user’s personalnot only the user’s personal
information but possibly that of their “friends”.information but possibly that of their “friends”.
Robert Siciliano : CEO of IDTheftSecurity.com
http://www.youtube.com/watch?v=JwFC0jfxTco
A word or two about passwordsA word or two about passwords
and…. hacking Facebookand…. hacking Facebook
 No birthdates or social security numbers
 No mother’s maiden name
 No universal password
 Yes to long passwords (over eight characters)
 Yes to random patterns – first letter of each word in your favorite song with your favorite number.
 Yes to changing it frequently
http://www.onguardonline.gov/games/overview.aspx
Go to this site: Choose at least two games and report your
findings and observations on the Discussion Board.
Three FREE “must have” online toolsThree FREE “must have” online tools
to create unique passwords.to create unique passwords.http://www.passwordchart.com/
http://www.passpack.com/en/home/
http://www.roboform.com/
FTC Video
http://www.youtube.com/watch?v=PVZqNSWvdj8&feature=player_embedded
Who are the bad guys?Who are the bad guys?
Small time crooks
Trans- nationalTrans- national
crime gangs.crime gangs.
Russian "Mafia," Colombian
and Mexican drug cartels,
Asian Triads, Japanese Yakuza,
Nigerian confidence rings,
Hell's Angels, rogue factions of
the St. Regis Mohawk tribe and
the surviving, leaner and
meaner Cosa Nostra
http://www.youtube.com/watch?v=HwtLZV010-M
PhishingPhishing
Why do people fall for it ???Why do people fall for it ???
Beware of the push!!Beware of the push!!
Greed…..Greed…..
Greed = Scam…..Greed = Scam…..
Fear….Fear….
Fear = ScamFear = Scam
MailFrontier recently claimed that over 40% of recipients fell
for the recent Citibank Email Phishing Scam.
Curiosity…..Curiosity…..
Curiosity = ScamCuriosity = Scam
Temptation…..GroomingTemptation…..Grooming
Ref. Number:EGOGHS255125600419
Batch Number: 14/ 01259/ IPD
Ticket Number:113-2471-752-209
Serial Number: 5063-11
Attention
We are pleased to inform you of the result of the Winners
in our UNIVERSAL STAKES Lottery Program held on the 20th
JULY, 2004.Your e-mail address attached to ticket number
27522465896-6453 with serial number 3772-554 drew lucky
numbers 7-14-18-31-45 which consequently won in the 2ND
category, you have therefore been approved for a lump sum
pay out of USD$1,500,000 ( One Million Five Hundred
Dollars) Only .CONGRATULATIONS!
Some Quick FactsSome Quick Facts
FBI 2012 statistics show $3 billion in losses
Median individual loss - $575.
But reported loss is tip of the project iceberg – estimated to
be in the billions. Only 1 in 10 crime reported
What Scammers LoveWhat Scammers Love
Social networking sites
People who click on links
Pictures, blogs
Manually hacking “captcha” registration blocks.
ScaREWAREScaREWARE
Pretends to detect a virus and offers
to help with inexpensive debugging
software (usually around $50) – then..
You give your credit card # for the software fix!You give your credit card # for the software fix!
Watch this!Watch this!
http://www.youtube.com/watch?v=m_bZiEMkd5Y
Hidden terms..Recurring Billing..Shipping & handling
Texting forTexting for
DollarsDollars
Text message from your bank or credit card company to call
right away and verify account information!
OR
You’ve won a free gift from a reputable vendor like Sears or
Macy’s
http://www.youtube.com/watch?v=EtsdK3vLT6k
Bogus LoveBogus Love
“Wire me some money for an airline ticket
so that I can be with you forever.”
1) Fake photos: You may be virtual dating with somebody else.
2) Hidden costs: Sign-up could be free, but everything else requires
you to pay extra fees.
3) Milking your Bank Account: The guy/girl is in distress and urgently
need money, e.g. accidents, trapped at airport, hospitalized, etc.
http://www.youtube.com/watch?v=NyC0EyyuSlc&feature=player_embedded#!
“Make ME your favorite
charity…please :( ”
http://www.youtube.com/watch?v=FyzfdTVvV5k
Their pitch: Speed up relief efforts – wire and send personal info
such as social security and checking account numbers.
Log on here:
The hot-spot Hot seat
“Coming to a location near you.”
http://telkomhell.com/wi-fi-hotspot-security.html
Any Web site or print ad offering free credit reports has to display this
disclosure across the top of each page:
THIS NOTICE IS REQUIRED BY LAW. Read more at FTC.GOV.THIS NOTICE IS REQUIRED BY LAW. Read more at FTC.GOV.
You have the right to a free credit report fromYou have the right to a free credit report from
AAnnualCreditReport.comnnualCreditReport.com
or 877-322-8228, the ONLY authorized source under federal law.or 877-322-8228, the ONLY authorized source under federal law.
Cute ads but
Beware!
Not so free credit reports.
Free Credit Report?
This one may be the one to try.
www.creditkarma.com
I

Mais conteúdo relacionado

Destaque

Chapter 3 culture and media
Chapter 3  culture and mediaChapter 3  culture and media
Chapter 3 culture and mediaRay Brannon
 
Week1introductiontosociology 2013
Week1introductiontosociology 2013Week1introductiontosociology 2013
Week1introductiontosociology 2013Ray Brannon
 
Examples of research methods h ighschool movies - preschool in three cultur...
Examples of research methods   h ighschool movies - preschool in three cultur...Examples of research methods   h ighschool movies - preschool in three cultur...
Examples of research methods h ighschool movies - preschool in three cultur...Ray Brannon
 
Poverty chapter 10
Poverty chapter 10Poverty chapter 10
Poverty chapter 10Ray Brannon
 
Chapter18 collective action part 1
Chapter18 collective action part 1Chapter18 collective action part 1
Chapter18 collective action part 1Ray Brannon
 
Stratification Chapter 7
Stratification Chapter 7Stratification Chapter 7
Stratification Chapter 7Ray Brannon
 
07 definicao da meta e dos objetivos toni reis
07 definicao da meta e dos objetivos toni reis07 definicao da meta e dos objetivos toni reis
07 definicao da meta e dos objetivos toni reisasical2009
 
Metodos de busqueda en interned
Metodos de busqueda en internedMetodos de busqueda en interned
Metodos de busqueda en internedfeliandres12
 
Aplicaciones móviles
Aplicaciones móvilesAplicaciones móviles
Aplicaciones móvilesEstefi López
 
Apresentação greenbelieve
Apresentação greenbelieveApresentação greenbelieve
Apresentação greenbelieverodrigotejana
 
Las tics
Las ticsLas tics
Las ticsarm_d
 
5 temas específicos de
5 temas específicos de5 temas específicos de
5 temas específicos defeliandres12
 
EDEN - Pps2 26 04 2007
EDEN - Pps2 26 04 2007EDEN - Pps2 26 04 2007
EDEN - Pps2 26 04 2007h2portugal
 

Destaque (20)

Chapter 3 culture and media
Chapter 3  culture and mediaChapter 3  culture and media
Chapter 3 culture and media
 
Week1introductiontosociology 2013
Week1introductiontosociology 2013Week1introductiontosociology 2013
Week1introductiontosociology 2013
 
Examples of research methods h ighschool movies - preschool in three cultur...
Examples of research methods   h ighschool movies - preschool in three cultur...Examples of research methods   h ighschool movies - preschool in three cultur...
Examples of research methods h ighschool movies - preschool in three cultur...
 
Poverty chapter 10
Poverty chapter 10Poverty chapter 10
Poverty chapter 10
 
Chapter18 collective action part 1
Chapter18 collective action part 1Chapter18 collective action part 1
Chapter18 collective action part 1
 
Stratification Chapter 7
Stratification Chapter 7Stratification Chapter 7
Stratification Chapter 7
 
Erasmus Gent
Erasmus GentErasmus Gent
Erasmus Gent
 
Capítulo 8
Capítulo 8Capítulo 8
Capítulo 8
 
07 definicao da meta e dos objetivos toni reis
07 definicao da meta e dos objetivos toni reis07 definicao da meta e dos objetivos toni reis
07 definicao da meta e dos objetivos toni reis
 
Capítulo 9
Capítulo 9Capítulo 9
Capítulo 9
 
Metodos de busqueda en interned
Metodos de busqueda en internedMetodos de busqueda en interned
Metodos de busqueda en interned
 
Aplicaciones móviles
Aplicaciones móvilesAplicaciones móviles
Aplicaciones móviles
 
Una mujer
Una mujerUna mujer
Una mujer
 
EWFComp
EWFCompEWFComp
EWFComp
 
Audiencia segunda semana abril a3
Audiencia segunda semana abril a3Audiencia segunda semana abril a3
Audiencia segunda semana abril a3
 
Apresentação greenbelieve
Apresentação greenbelieveApresentação greenbelieve
Apresentação greenbelieve
 
Las tics
Las ticsLas tics
Las tics
 
5 temas específicos de
5 temas específicos de5 temas específicos de
5 temas específicos de
 
Inteligencia artificial
Inteligencia artificialInteligencia artificial
Inteligencia artificial
 
EDEN - Pps2 26 04 2007
EDEN - Pps2 26 04 2007EDEN - Pps2 26 04 2007
EDEN - Pps2 26 04 2007
 

Semelhante a Week 5 protect yourself from cyber threats

Protect Yourself From Cyber Threats (v.2.0)
Protect Yourself From Cyber Threats (v.2.0)Protect Yourself From Cyber Threats (v.2.0)
Protect Yourself From Cyber Threats (v.2.0)Ray Brannon
 
Protecting Yourself from Cyber Threats
Protecting Yourself from Cyber ThreatsProtecting Yourself from Cyber Threats
Protecting Yourself from Cyber ThreatsRay Brannon
 
Hum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraudHum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraudRay Brannon
 
Marti digital citizen presentation
Marti digital citizen presentationMarti digital citizen presentation
Marti digital citizen presentationRay Brannon
 
How to Avoid Getting Malware on your Computer
How to Avoid Getting Malware on your ComputerHow to Avoid Getting Malware on your Computer
How to Avoid Getting Malware on your ComputerJillian Stone
 
Becybersmart
BecybersmartBecybersmart
BecybersmartVelma
 
5 scams you can avoid
5 scams you can avoid5 scams you can avoid
5 scams you can avoidTracey Krska
 
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...John Bambenek
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Homejaysonstreet
 
GenericVirusTraining
GenericVirusTrainingGenericVirusTraining
GenericVirusTrainingsbsadminklb
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activitiesYumonomics
 
Computer saftey may 2013
Computer saftey may 2013Computer saftey may 2013
Computer saftey may 2013JimWhite
 
Internet Scams, Identity Theft And
Internet Scams, Identity Theft AndInternet Scams, Identity Theft And
Internet Scams, Identity Theft AndCorey Quinn
 
Things that go bump on the web - Web Application Security
Things that go bump on the web - Web Application SecurityThings that go bump on the web - Web Application Security
Things that go bump on the web - Web Application SecurityChristian Heilmann
 
Port 80 - it's all they need
Port 80 - it's all they needPort 80 - it's all they need
Port 80 - it's all they needSaumil Shah
 

Semelhante a Week 5 protect yourself from cyber threats (20)

Protect Yourself From Cyber Threats (v.2.0)
Protect Yourself From Cyber Threats (v.2.0)Protect Yourself From Cyber Threats (v.2.0)
Protect Yourself From Cyber Threats (v.2.0)
 
Protecting Yourself from Cyber Threats
Protecting Yourself from Cyber ThreatsProtecting Yourself from Cyber Threats
Protecting Yourself from Cyber Threats
 
Hum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraudHum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraud
 
Marti digital citizen presentation
Marti digital citizen presentationMarti digital citizen presentation
Marti digital citizen presentation
 
Thisworldofours
ThisworldofoursThisworldofours
Thisworldofours
 
How to Avoid Getting Malware on your Computer
How to Avoid Getting Malware on your ComputerHow to Avoid Getting Malware on your Computer
How to Avoid Getting Malware on your Computer
 
Becybersmart
BecybersmartBecybersmart
Becybersmart
 
5 scams you can avoid
5 scams you can avoid5 scams you can avoid
5 scams you can avoid
 
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
 
GenericVirusTraining
GenericVirusTrainingGenericVirusTraining
GenericVirusTraining
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activities
 
Hacking
HackingHacking
Hacking
 
Computer saftey may 2013
Computer saftey may 2013Computer saftey may 2013
Computer saftey may 2013
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Scams, Identity Theft And
Internet Scams, Identity Theft AndInternet Scams, Identity Theft And
Internet Scams, Identity Theft And
 
Things that go bump on the web - Web Application Security
Things that go bump on the web - Web Application SecurityThings that go bump on the web - Web Application Security
Things that go bump on the web - Web Application Security
 
Port 80 - it's all they need
Port 80 - it's all they needPort 80 - it's all they need
Port 80 - it's all they need
 
Aimee on cyber safety
Aimee on cyber safetyAimee on cyber safety
Aimee on cyber safety
 

Mais de Ray Brannon

Week 2 Speaking Tips 2019
Week 2   Speaking Tips 2019Week 2   Speaking Tips 2019
Week 2 Speaking Tips 2019Ray Brannon
 
Collectiveactionandchallengesofsocialchange revised dec 18
Collectiveactionandchallengesofsocialchange revised dec 18Collectiveactionandchallengesofsocialchange revised dec 18
Collectiveactionandchallengesofsocialchange revised dec 18Ray Brannon
 
Collectiveactionandchallengesofsocialchange revised
Collectiveactionandchallengesofsocialchange revisedCollectiveactionandchallengesofsocialchange revised
Collectiveactionandchallengesofsocialchange revisedRay Brannon
 
Crime & Punishment sociology
Crime & Punishment sociologyCrime & Punishment sociology
Crime & Punishment sociologyRay Brannon
 
Stratificationchapter7 rev 2 10-14-18
Stratificationchapter7 rev 2 10-14-18Stratificationchapter7 rev 2 10-14-18
Stratificationchapter7 rev 2 10-14-18Ray Brannon
 
Week Three Applied Socoilogy papers and statistics
Week Three  Applied Socoilogy papers and statistics Week Three  Applied Socoilogy papers and statistics
Week Three Applied Socoilogy papers and statistics Ray Brannon
 
Sociology - A new way to think part 2 methods rev 9-10-18
Sociology - A new way to think part 2 methods rev 9-10-18Sociology - A new way to think part 2 methods rev 9-10-18
Sociology - A new way to think part 2 methods rev 9-10-18Ray Brannon
 
Week 2 sociological imagination a new way to think
Week 2  sociological imagination   a new way to thinkWeek 2  sociological imagination   a new way to think
Week 2 sociological imagination a new way to thinkRay Brannon
 
Week1introductiontosociology wccc2018-150823200554-lva1-app6892
Week1introductiontosociology wccc2018-150823200554-lva1-app6892Week1introductiontosociology wccc2018-150823200554-lva1-app6892
Week1introductiontosociology wccc2018-150823200554-lva1-app6892Ray Brannon
 
Sociological Perspectives WCCC rev2018
Sociological Perspectives WCCC rev2018Sociological Perspectives WCCC rev2018
Sociological Perspectives WCCC rev2018Ray Brannon
 
MNL Story Revised
MNL Story RevisedMNL Story Revised
MNL Story RevisedRay Brannon
 
Week 11 Effective Speech and Your Future.
Week 11   Effective Speech and Your Future.Week 11   Effective Speech and Your Future.
Week 11 Effective Speech and Your Future.Ray Brannon
 
Week 10: Special occasion speeches
Week 10: Special occasion speechesWeek 10: Special occasion speeches
Week 10: Special occasion speechesRay Brannon
 
Week 9 Using visuals as body language
Week 9   Using visuals as body languageWeek 9   Using visuals as body language
Week 9 Using visuals as body languageRay Brannon
 
Week3bodylanguageandyourpresentations fall 16
Week3bodylanguageandyourpresentations fall 16Week3bodylanguageandyourpresentations fall 16
Week3bodylanguageandyourpresentations fall 16Ray Brannon
 
Elevator Speech A Case Study
Elevator Speech   A Case Study Elevator Speech   A Case Study
Elevator Speech A Case Study Ray Brannon
 
Week 3 Body Language and Your Presentations
Week 3 Body Language and Your PresentationsWeek 3 Body Language and Your Presentations
Week 3 Body Language and Your PresentationsRay Brannon
 
Week 2 Effective Speech Online Speaking tips
Week 2 Effective Speech Online Speaking tipsWeek 2 Effective Speech Online Speaking tips
Week 2 Effective Speech Online Speaking tipsRay Brannon
 

Mais de Ray Brannon (20)

Week 2 Speaking Tips 2019
Week 2   Speaking Tips 2019Week 2   Speaking Tips 2019
Week 2 Speaking Tips 2019
 
Collectiveactionandchallengesofsocialchange revised dec 18
Collectiveactionandchallengesofsocialchange revised dec 18Collectiveactionandchallengesofsocialchange revised dec 18
Collectiveactionandchallengesofsocialchange revised dec 18
 
Collectiveactionandchallengesofsocialchange revised
Collectiveactionandchallengesofsocialchange revisedCollectiveactionandchallengesofsocialchange revised
Collectiveactionandchallengesofsocialchange revised
 
Crime & Punishment sociology
Crime & Punishment sociologyCrime & Punishment sociology
Crime & Punishment sociology
 
Stratificationchapter7 rev 2 10-14-18
Stratificationchapter7 rev 2 10-14-18Stratificationchapter7 rev 2 10-14-18
Stratificationchapter7 rev 2 10-14-18
 
Stratification
Stratification Stratification
Stratification
 
Week Three Applied Socoilogy papers and statistics
Week Three  Applied Socoilogy papers and statistics Week Three  Applied Socoilogy papers and statistics
Week Three Applied Socoilogy papers and statistics
 
Sociology - A new way to think part 2 methods rev 9-10-18
Sociology - A new way to think part 2 methods rev 9-10-18Sociology - A new way to think part 2 methods rev 9-10-18
Sociology - A new way to think part 2 methods rev 9-10-18
 
Week 2 sociological imagination a new way to think
Week 2  sociological imagination   a new way to thinkWeek 2  sociological imagination   a new way to think
Week 2 sociological imagination a new way to think
 
Week1introductiontosociology wccc2018-150823200554-lva1-app6892
Week1introductiontosociology wccc2018-150823200554-lva1-app6892Week1introductiontosociology wccc2018-150823200554-lva1-app6892
Week1introductiontosociology wccc2018-150823200554-lva1-app6892
 
Sociological Perspectives WCCC rev2018
Sociological Perspectives WCCC rev2018Sociological Perspectives WCCC rev2018
Sociological Perspectives WCCC rev2018
 
MNL Story Revised
MNL Story RevisedMNL Story Revised
MNL Story Revised
 
Week 11 Effective Speech and Your Future.
Week 11   Effective Speech and Your Future.Week 11   Effective Speech and Your Future.
Week 11 Effective Speech and Your Future.
 
Week 10: Special occasion speeches
Week 10: Special occasion speechesWeek 10: Special occasion speeches
Week 10: Special occasion speeches
 
Week 9 Using visuals as body language
Week 9   Using visuals as body languageWeek 9   Using visuals as body language
Week 9 Using visuals as body language
 
Get A Job 2016
Get A Job 2016Get A Job 2016
Get A Job 2016
 
Week3bodylanguageandyourpresentations fall 16
Week3bodylanguageandyourpresentations fall 16Week3bodylanguageandyourpresentations fall 16
Week3bodylanguageandyourpresentations fall 16
 
Elevator Speech A Case Study
Elevator Speech   A Case Study Elevator Speech   A Case Study
Elevator Speech A Case Study
 
Week 3 Body Language and Your Presentations
Week 3 Body Language and Your PresentationsWeek 3 Body Language and Your Presentations
Week 3 Body Language and Your Presentations
 
Week 2 Effective Speech Online Speaking tips
Week 2 Effective Speech Online Speaking tipsWeek 2 Effective Speech Online Speaking tips
Week 2 Effective Speech Online Speaking tips
 

Último

ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 

Último (20)

ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 

Week 5 protect yourself from cyber threats

  • 1.
  • 3. Don’t Launch Cell Phone Games and Programs that are “Pushed” to you
  • 5. http://www.makeuseof.com/pages/best-windows-software Best 90 Free Windows Programs toBest 90 Free Windows Programs to Protect You and Your ComputerProtect You and Your Computer
  • 6. Cell phone data charges Ring tones Vanity fraud Meet My Children - Sean, Lindsay, Ryan. Each of them was scammed!
  • 7. ““It can’t happen to me!”It can’t happen to me!”
  • 8. Without protection, its just a crapsWithout protection, its just a craps game.game. Really? What are the odds?
  • 9. “You stand a better chance at any given time of loosing your personally identifiable information than you do of just about any other form of nasty thing than can happen to a person over their lifetime.” The National Safety CouncilThe National Safety Council 1 in 146,107,962.00 could potentially win the power ball lottery grand prize 1 in 3,563,608.83 could potentially win the 200,000 dollar prize in the power ball 1 in 3000 will be killed by lighting in any given year 1 in 1,313 chance of being killed by a doctor 1 in 314 chance of being killed by a firearm 1 in 84 chance of being killed in a car crash over your lifetime 1 in 3 has had their personally identifiable1 in 3 has had their personally identifiable information lost this year!!information lost this year!!
  • 10. A new, targeted social mediaA new, targeted social media version of a very old scam -- theversion of a very old scam -- the “Nigerian,” or “419,” ploy“Nigerian,” or “419,” ploy
  • 11. WIRE ME MONEY ! FACEBOOK HACK
  • 12. How did they do that?How did they do that? Because Facebook regularly contacts its users through e-mail, and includes links in those e-mails to login pages, the format is ripe for phishers. It's easy to imitate Facebook e-mails and simply send users clicking to a look-a-like login page that steal passwords.
  • 13.
  • 14. http://www.youtube.com/watch?v=0zvPEfksbyQ Punked! Lots of tools on the net for people who may want to take advantage of you.
  • 15.
  • 16.
  • 17.
  • 19. “Who steals my purse steals trash…But he that filches from me my good name …... Makes me poor indeed.” Othello, Act 3 Scene 3Othello, Act 3 Scene 3
  • 20. When in doubt about a potential scam check the Internet Crime Complaint Center http://www.ic3.gov/about/default.aspx
  • 21.
  • 22. Don’t let them get away with it. Get mad or get even! Report them immediately to: http://www.ic3.gov/complaint/default.aspx OR…become a scam baiter (not really recommended, but some people are just really angry)
  • 23. Who Scammers HateWho Scammers Hate http://www.419hell.com/http://www.419hell.com/
  • 24. We are all victims!We are all victims! 1700 new victims in the course of this meeting. By the end of the decade someone in your family will be a victim. Lowest estimate of projected damage is $5000. Only 1 in 700 is investigated. 1 year or less in jail. 70 – 80 % involve illegal dugs FBI reports 30,000 computer a week are taken over. http://www.youtube.com/watch?v=NF34sqrAPHU
  • 25. The meteoric rise in social media use has alsoThe meteoric rise in social media use has also created a launch pad for identity thieves.created a launch pad for identity thieves. “My prediction for 2010 (and beyond) is that the increase in social networking activity, along with a user’s failure to implement security and privacy settings and protocols, will lead to an increased exposure of not only the user’s personalnot only the user’s personal information but possibly that of their “friends”.information but possibly that of their “friends”. Robert Siciliano : CEO of IDTheftSecurity.com http://www.youtube.com/watch?v=JwFC0jfxTco
  • 26. A word or two about passwordsA word or two about passwords and…. hacking Facebookand…. hacking Facebook  No birthdates or social security numbers  No mother’s maiden name  No universal password  Yes to long passwords (over eight characters)  Yes to random patterns – first letter of each word in your favorite song with your favorite number.  Yes to changing it frequently
  • 27. http://www.onguardonline.gov/games/overview.aspx Go to this site: Choose at least two games and report your findings and observations on the Discussion Board.
  • 28. Three FREE “must have” online toolsThree FREE “must have” online tools to create unique passwords.to create unique passwords.http://www.passwordchart.com/
  • 32. Who are the bad guys?Who are the bad guys? Small time crooks
  • 33. Trans- nationalTrans- national crime gangs.crime gangs. Russian "Mafia," Colombian and Mexican drug cartels, Asian Triads, Japanese Yakuza, Nigerian confidence rings, Hell's Angels, rogue factions of the St. Regis Mohawk tribe and the surviving, leaner and meaner Cosa Nostra http://www.youtube.com/watch?v=HwtLZV010-M
  • 34. PhishingPhishing Why do people fall for it ???Why do people fall for it ??? Beware of the push!!Beware of the push!!
  • 36.
  • 37. Greed = Scam…..Greed = Scam…..
  • 39. Fear = ScamFear = Scam MailFrontier recently claimed that over 40% of recipients fell for the recent Citibank Email Phishing Scam.
  • 42. Temptation…..GroomingTemptation…..Grooming Ref. Number:EGOGHS255125600419 Batch Number: 14/ 01259/ IPD Ticket Number:113-2471-752-209 Serial Number: 5063-11 Attention We are pleased to inform you of the result of the Winners in our UNIVERSAL STAKES Lottery Program held on the 20th JULY, 2004.Your e-mail address attached to ticket number 27522465896-6453 with serial number 3772-554 drew lucky numbers 7-14-18-31-45 which consequently won in the 2ND category, you have therefore been approved for a lump sum pay out of USD$1,500,000 ( One Million Five Hundred Dollars) Only .CONGRATULATIONS!
  • 43. Some Quick FactsSome Quick Facts FBI 2012 statistics show $3 billion in losses Median individual loss - $575. But reported loss is tip of the project iceberg – estimated to be in the billions. Only 1 in 10 crime reported
  • 44. What Scammers LoveWhat Scammers Love Social networking sites People who click on links Pictures, blogs Manually hacking “captcha” registration blocks.
  • 45. ScaREWAREScaREWARE Pretends to detect a virus and offers to help with inexpensive debugging software (usually around $50) – then.. You give your credit card # for the software fix!You give your credit card # for the software fix! Watch this!Watch this! http://www.youtube.com/watch?v=m_bZiEMkd5Y
  • 47. Texting forTexting for DollarsDollars Text message from your bank or credit card company to call right away and verify account information! OR You’ve won a free gift from a reputable vendor like Sears or Macy’s http://www.youtube.com/watch?v=EtsdK3vLT6k
  • 48. Bogus LoveBogus Love “Wire me some money for an airline ticket so that I can be with you forever.” 1) Fake photos: You may be virtual dating with somebody else. 2) Hidden costs: Sign-up could be free, but everything else requires you to pay extra fees. 3) Milking your Bank Account: The guy/girl is in distress and urgently need money, e.g. accidents, trapped at airport, hospitalized, etc. http://www.youtube.com/watch?v=NyC0EyyuSlc&feature=player_embedded#!
  • 49. “Make ME your favorite charity…please :( ” http://www.youtube.com/watch?v=FyzfdTVvV5k Their pitch: Speed up relief efforts – wire and send personal info such as social security and checking account numbers.
  • 50. Log on here: The hot-spot Hot seat “Coming to a location near you.” http://telkomhell.com/wi-fi-hotspot-security.html
  • 51. Any Web site or print ad offering free credit reports has to display this disclosure across the top of each page: THIS NOTICE IS REQUIRED BY LAW. Read more at FTC.GOV.THIS NOTICE IS REQUIRED BY LAW. Read more at FTC.GOV. You have the right to a free credit report fromYou have the right to a free credit report from AAnnualCreditReport.comnnualCreditReport.com or 877-322-8228, the ONLY authorized source under federal law.or 877-322-8228, the ONLY authorized source under federal law. Cute ads but Beware! Not so free credit reports.
  • 52. Free Credit Report? This one may be the one to try. www.creditkarma.com I

Notas do Editor

  1. Some viewers of Gilligan’s Island apparently took the show seriously in the 1960s. The U.S. Coast Guard received several telegrams from concerned citizens asking why they didn’t rescue the Minnow’s crew. This has been an excellent week. I have received four or five emails from London and Africa announcing that I have been selected to receive, from each of them, sums in eXcess of ten million dollars The quite remarkable fact seems to be that one fellow’s plane crash, another’s unexpected demise—apparently run over by a herd of elephants— a third’s cruel wife, have all resulted in me being just the right person on the planet to receive millions of dollars which was left in their estates. Not only that: Several lotteries have paid off this week as well, and, just like the poor African ministers who want to share their millions with me, the lottery companies are happy to send money as well. It seems all I have to do is let any one of these secret correspondents know a few details about my bank account and social security number and my life worries will be over.
  2. Starting next week, Verizon will double the early-termination fee for smartphones... ...The phone is designed in such a way that you can almost never avoid getting $1.99 charge on the bill. Around the OK button on a typical flip phone are the up, down, left, right arrows. If you open the flip and accidentally press the up arrow key, you see that the phone starts to connect to the web. So you hit END right away. Well, too late. You will be charged $1.99 for that 0.02 kilobytes of data... ...Every month, the 87 million customers will accidentally hit that key a few times a month! That’s over $300 million per month in data revenue off a simple mistake!..
  3. Web criminals are getting much more personal in their attacks, using social networking sites and other databases to make their story lines much more believable. Bryan Rutberg's daughter was among the first to notice something odd about her dad's Facebook page. At about 8 p.m. on Jan. 21, she ran into his bedroom and asked why he'd changed his status to: “BRYAN IS IN URGENT NEED OF HELP!!!“ In Rutberg's case, criminals managed to steal his Facebook login password, steal his Facebook identity, and change his page to make it appear he was in trouble. Next, the criminals sent e-mails to dozens of friends, begging them for help.
  4. Don’t do any banking unless you know it a secure location. How? Look for “https” (not just http) in the URL and the small padlock icon in the lower right hand corner of your browser.
  5. Now, a new site called CreditKarma is offering free daily credit scores. For comparison, FICO’s own Score Watch program costs $89.95 per year. So what’s the catch? 1. It’s not a real FICO score. This is another FICO-clone, with a score ranging from 300 to 900. (FICO is from 300 to 850.) It also doesn’t say from which bureau this score is based upon, as they say they can pull from any of the big three (Experian, Equifax, Transunion). My guess is that they’ll use whatever is available that is both cheaper than FICO and still reasonably accurate. That’s what I would do… 2. You only get the score. The service is pretty barebones. You don’t get information about who’s pulling your credit, how often they are doing it, or information about your existing credit lines. So the “alerts” feature is missing. Instead, the primary attraction is the ability to see trends - is your score increasing or decreasing over time? 3. They are advertiser-supported, so I guess they are counting on people to obsessively check their score every day. I’ve always been a bit mystified by such behavior, but I don’t check the stock market ticker all day long either. From their privacy policy it seems that they are using your personal information to target ads to you, but aren’t actually sharing your info with others unless you opt-in. I sure hope not! Security and Privacy Concerns Okay, it’s free, so price isn’t a barrier to using this service. But it’s definitely wise to think twice before giving out personal information like my Social Security number to a start-up company. I read through their site, and didn’t see any glaring security holes. They use common third-party systems like ScanAlert Hacker Safe, TRUSTe, and Verisign. If you do notice something fishy, please share in the comments. The CEO will be reading, given that he’s the one that told me about this site.