SlideShare uma empresa Scribd logo
1 de 1
Baixar para ler offline
Simple Safeguards:                                                         Presented by Retired
                                                                                                FBI Special Agent
           Preventing Social Media Fraud                                                                Jeff Lanza

 Keep your guard up on sites like Facebook, LinkedIn and Twitter. Scammers are exploiting the trust we
        have of our connections on these sites to gain access to your accounts and commit fraud.

                    Current Threats                                        Specific Actions to Avoid
Fake Notification E-mails                                             1.    Don’t click on a message that seems
Look out for fake emails that look like they came from                      weird. If it seems unusual for a friend to
Facebook. These typically include links to phony pages that                 write on your Wall and post a link, that
attempt to steal your login information or prompt you to                    friend may have gotten phished.
download malware. Never click on links in suspicious                  2.    Don’t enter your password through a
emails. Log-in to a site directly.                                          link. Just because a page on the Internet
                                                                            looks like Facebook, it doesn't mean it is.
Suspicious Posts and Messages                                               It is best to go the Facebook log-in page
Wall posts or messages that appear to come from a friend                    through your browser.
asking you to click on a link to check out a new photo or             3.    Don't use the same password on
video that doesn't actually exist. The link is typically for a              Facebook that you use in other places
phony login page or a site that will put a virus on your                    on the web. If you do this, phishers or
computer to steal your passwords.                                           hackers who gain access to one of your
Money Transfer Scams                                                        accounts will easily be able to access
Messages that appear to come from friends or others                         your others as well, including your bank.
claiming to be stranded and asking for money. These                   4.    Don’t share your password with
messages are typically from scammers. Ask them a                            anyone. Social sites will never ask for
question that only they would be able to answer. Or                         your password through any form of
contact the person by phone to verify the situation,                        communication.
even if they say not to call them.                                    5.    Don't click on links or open
                                                                            attachments in suspicious emails. Fake
                                                                            emails can be very convincing, and
                General Online Safety Rules                                 hackers can spoof the "From:" address so
       Be wary of strangers - The internet makes it easy for               the email looks like it's from a social site.
        people to misrepresent their identities and motives. If             If the e-mail looks weird, don't trust it,
        you interact with strangers, be cautious about the
                                                                            and delete it from your inbox.
        amount of information you reveal or agreeing to meet
        them in person.                                               6.    Don’t send money anywhere unless
       Be skeptical - People may post false or misleading                  you have verified the story of someone
        information about various topics, including their own. Try          who says they are your friend or relative.
        to verify the authenticity of any information before taking   7.    Don’t provide your cell phone number
        any action.
                                                                            to verify the results of a Facebook
       Evaluate your settings - Use privacy settings. The
        default settings for some sites may allow anyone to see             game or survey without reading the
        your profile. Even private information could be exposed,            terms and conditions. It may result in
        so don't post anything that you wouldn't want the public            recurring charges on your cell phone bill.
        to see.
       Use strong passwords - Protect your account with                      More resource Information:
        passwords that cannot easily be guessed. If your
        password is compromised, someone else may be able to          www.us-cert.gov or www.fbi.gov
        access your account and pretend to be you.
                                                                                 Speaker Information:
       Security Information For Social Networking Sites                                Jeff Lanza
                  www.facebook.com/security                                       Phone: 816-853-3929
         www.twitip.com/twitter-security-dos-and-donts                     Email:jefflanza@thelanzagroup.com
                www.linkedin.com/secure/settings                           Web Site: www.thelanzagroup.com

Mais conteúdo relacionado

Mais procurados

Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpumajcullishpum
 
Internet saftey
Internet safteyInternet saftey
Internet safteyryanbud
 
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)Celia Bandelier
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Parenting & Education
 
Social Networking Safety
Social Networking SafetySocial Networking Safety
Social Networking Safetyguestd5e1d2
 
The Basics Of Internet Safety
The Basics Of Internet SafetyThe Basics Of Internet Safety
The Basics Of Internet SafetyBobbi Newman
 
Facebook Password Sniper
Facebook Password SniperFacebook Password Sniper
Facebook Password Sniperhellishyard9256
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety PresentationLJ Henshell
 
Slideshow - Lil Rat
Slideshow - Lil RatSlideshow - Lil Rat
Slideshow - Lil Ratmegg16
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parentssafetyseminar
 
How to keep your digital identity safe
How to keep your digital identity safeHow to keep your digital identity safe
How to keep your digital identity safeTSageer
 
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersRajesh Soundararajan
 

Mais procurados (17)

Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpuma
 
Internet saftey
Internet safteyInternet saftey
Internet saftey
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental Control
 
Social Networking Safety
Social Networking SafetySocial Networking Safety
Social Networking Safety
 
The Basics Of Internet Safety
The Basics Of Internet SafetyThe Basics Of Internet Safety
The Basics Of Internet Safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Facebook Password Sniper
Facebook Password SniperFacebook Password Sniper
Facebook Password Sniper
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
 
Slideshow - Lil Rat
Slideshow - Lil RatSlideshow - Lil Rat
Slideshow - Lil Rat
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parents
 
How to keep your digital identity safe
How to keep your digital identity safeHow to keep your digital identity safe
How to keep your digital identity safe
 
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and Beginners
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
Online Security
Online SecurityOnline Security
Online Security
 

Destaque

Destaque (7)

ICD- 10 is coming -Brenda Edwards
ICD- 10 is coming -Brenda EdwardsICD- 10 is coming -Brenda Edwards
ICD- 10 is coming -Brenda Edwards
 
Polozhenie o konkurse__moya_malaya_rodina
Polozhenie o konkurse__moya_malaya_rodinaPolozhenie o konkurse__moya_malaya_rodina
Polozhenie o konkurse__moya_malaya_rodina
 
Social networking fraud handout june 2011
Social networking fraud handout june 2011Social networking fraud handout june 2011
Social networking fraud handout june 2011
 
Glrb2010 auvi
Glrb2010 auviGlrb2010 auvi
Glrb2010 auvi
 
Lawrence mm june 2011
Lawrence mm june 2011Lawrence mm june 2011
Lawrence mm june 2011
 
Medical identity theft handout june 2011
Medical identity theft handout june 2011Medical identity theft handout june 2011
Medical identity theft handout june 2011
 
Jeff lanza id theft handout business march 2011
Jeff lanza id theft handout business march 2011Jeff lanza id theft handout business march 2011
Jeff lanza id theft handout business march 2011
 

Semelhante a Social networking fraud handout june 2011

IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptxTanvir Amin
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2JayMarkBandoy1
 
Facebook Hacked, Protect Your Facebook Account
Facebook Hacked, Protect Your Facebook AccountFacebook Hacked, Protect Your Facebook Account
Facebook Hacked, Protect Your Facebook AccountKANKIPATI KISHORE
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxNoelBuctot1
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxvdgtkhdh
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUBilly Warero
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxamby3
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacksNamik Heydarov
 
phishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptxphishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptxErrorError22
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxDominicCaling
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social mediasanjeev kumar
 

Semelhante a Social networking fraud handout june 2011 (20)

IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
S_A_T.pptx
S_A_T.pptxS_A_T.pptx
S_A_T.pptx
 
Facebook Hacked, Protect Your Facebook Account
Facebook Hacked, Protect Your Facebook AccountFacebook Hacked, Protect Your Facebook Account
Facebook Hacked, Protect Your Facebook Account
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Online privacy
Online privacy Online privacy
Online privacy
 
Online privacy
Online privacyOnline privacy
Online privacy
 
Security-Awareness-Training.pptx
Security-Awareness-Training.pptxSecurity-Awareness-Training.pptx
Security-Awareness-Training.pptx
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
Heads up!
Heads up!Heads up!
Heads up!
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacks
 
Cyberbullying and Cybercrime
Cyberbullying and CybercrimeCyberbullying and Cybercrime
Cyberbullying and Cybercrime
 
phishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptxphishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptx
 
Phishing
PhishingPhishing
Phishing
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
 

Mais de Lawrence Medical Managers

Mais de Lawrence Medical Managers (11)

Accountable care organizations lawrence 101211
Accountable care organizations lawrence 101211Accountable care organizations lawrence 101211
Accountable care organizations lawrence 101211
 
Cms aco information
Cms aco informationCms aco information
Cms aco information
 
Social networking fraud handout june 2011
Social networking fraud handout june 2011Social networking fraud handout june 2011
Social networking fraud handout june 2011
 
Id theft handout individual june 2011
Id theft handout individual june 2011Id theft handout individual june 2011
Id theft handout individual june 2011
 
Presentation by Sheila Richmeier
Presentation by Sheila RichmeierPresentation by Sheila Richmeier
Presentation by Sheila Richmeier
 
Software vendor 5010 checklist
Software vendor 5010 checklistSoftware vendor 5010 checklist
Software vendor 5010 checklist
 
Clearinghouse payer 5010 checklist
Clearinghouse payer 5010 checklistClearinghouse payer 5010 checklist
Clearinghouse payer 5010 checklist
 
ICD-10 action plan-revised
ICD-10 action plan-revisedICD-10 action plan-revised
ICD-10 action plan-revised
 
ICD-10, Brenda Edwards 07.14.2010
ICD-10, Brenda Edwards 07.14.2010ICD-10, Brenda Edwards 07.14.2010
ICD-10, Brenda Edwards 07.14.2010
 
Disaster Planning Local state-federal roles and responsibilities
Disaster Planning Local state-federal roles and responsibilities  Disaster Planning Local state-federal roles and responsibilities
Disaster Planning Local state-federal roles and responsibilities
 
Secretary Rod Bremby Presentation
Secretary Rod  Bremby  PresentationSecretary Rod  Bremby  Presentation
Secretary Rod Bremby Presentation
 

Último

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Último (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Social networking fraud handout june 2011

  • 1. Simple Safeguards: Presented by Retired FBI Special Agent Preventing Social Media Fraud Jeff Lanza Keep your guard up on sites like Facebook, LinkedIn and Twitter. Scammers are exploiting the trust we have of our connections on these sites to gain access to your accounts and commit fraud. Current Threats Specific Actions to Avoid Fake Notification E-mails 1. Don’t click on a message that seems Look out for fake emails that look like they came from weird. If it seems unusual for a friend to Facebook. These typically include links to phony pages that write on your Wall and post a link, that attempt to steal your login information or prompt you to friend may have gotten phished. download malware. Never click on links in suspicious 2. Don’t enter your password through a emails. Log-in to a site directly. link. Just because a page on the Internet looks like Facebook, it doesn't mean it is. Suspicious Posts and Messages It is best to go the Facebook log-in page Wall posts or messages that appear to come from a friend through your browser. asking you to click on a link to check out a new photo or 3. Don't use the same password on video that doesn't actually exist. The link is typically for a Facebook that you use in other places phony login page or a site that will put a virus on your on the web. If you do this, phishers or computer to steal your passwords. hackers who gain access to one of your Money Transfer Scams accounts will easily be able to access Messages that appear to come from friends or others your others as well, including your bank. claiming to be stranded and asking for money. These 4. Don’t share your password with messages are typically from scammers. Ask them a anyone. Social sites will never ask for question that only they would be able to answer. Or your password through any form of contact the person by phone to verify the situation, communication. even if they say not to call them. 5. Don't click on links or open attachments in suspicious emails. Fake emails can be very convincing, and General Online Safety Rules hackers can spoof the "From:" address so  Be wary of strangers - The internet makes it easy for the email looks like it's from a social site. people to misrepresent their identities and motives. If If the e-mail looks weird, don't trust it, you interact with strangers, be cautious about the and delete it from your inbox. amount of information you reveal or agreeing to meet them in person. 6. Don’t send money anywhere unless  Be skeptical - People may post false or misleading you have verified the story of someone information about various topics, including their own. Try who says they are your friend or relative. to verify the authenticity of any information before taking 7. Don’t provide your cell phone number any action. to verify the results of a Facebook  Evaluate your settings - Use privacy settings. The default settings for some sites may allow anyone to see game or survey without reading the your profile. Even private information could be exposed, terms and conditions. It may result in so don't post anything that you wouldn't want the public recurring charges on your cell phone bill. to see.  Use strong passwords - Protect your account with More resource Information: passwords that cannot easily be guessed. If your password is compromised, someone else may be able to www.us-cert.gov or www.fbi.gov access your account and pretend to be you. Speaker Information: Security Information For Social Networking Sites Jeff Lanza www.facebook.com/security Phone: 816-853-3929 www.twitip.com/twitter-security-dos-and-donts Email:jefflanza@thelanzagroup.com www.linkedin.com/secure/settings Web Site: www.thelanzagroup.com