SlideShare uma empresa Scribd logo
1 de 10
Avoiding “Shady” Websites By:  Mrs. McGinnis Sept, 2010
What are “shady” websites? Fradulent online shops Sites that distruibute pirated music, videos and software Bogus charity websites Sites that promote worthless investments or get-rich-quick schemes WHY do people take the time to create websites such as these?
Why????    Identity Theft Identity theft happens when someone steals your personal information, such as your social security number, address, phone number, bank account number, credit card numbers and passwords, etc. The person “pretends” to be you and uses your information to steal your money, credit, etc.
That won’t happen to me!! 10 million Americans were the victim of identity theft in 2008 1 in 10 consumers have been the victim of identity theft 1.6 million households experienced fraud NOT related to their credit cards, but in their bank accounts and debit cards 38-48% discover the fraud within 3 months, 9-18%, not for 4 or more years!
What you share online could hurt you…. Criminals get your information from one main place….YOU Social Networking Sites Shady Emails Phishing Websites
Phishing, no its not spelled wrong… Phishing websites are sites that LOOK like real sites, but exist solely to steal your information Spyware  Pop-ups that ask for your information Cloned sites
I’m too smart for this!!! Criminals find many ways to convince you to give them your information What are some ways that you think this can happen?
Watch out for…. Websites that try to scare you into submitting your username and password Emails with links in them-often the link looks ok in the email but when you click on it, it takes you to a different site Misspelled words Gold Padlock (SSL designation) in wrong place Cloned sites-exact copy
Examples of Phishing Phishing Emails Phishing for Passwords Nigerian 419 Scam Cloned Websties
How to recognize a real site.. Phish or No Phish

Mais conteúdo relacionado

Mais de michlmcginnis

My Tundra Report Ulmer
My Tundra Report UlmerMy Tundra Report Ulmer
My Tundra Report Ulmer
michlmcginnis
 
My Tundra Report Berding
My Tundra Report BerdingMy Tundra Report Berding
My Tundra Report Berding
michlmcginnis
 
My Tundra Projecthaley
My Tundra ProjecthaleyMy Tundra Projecthaley
My Tundra Projecthaley
michlmcginnis
 
My Tundra Project Martin
My Tundra Project MartinMy Tundra Project Martin
My Tundra Project Martin
michlmcginnis
 
My Tundra Project Eary
My Tundra Project EaryMy Tundra Project Eary
My Tundra Project Eary
michlmcginnis
 
My Tundra Project Acomb
My Tundra Project AcombMy Tundra Project Acomb
My Tundra Project Acomb
michlmcginnis
 
My Tundra Biome Essay Deye
My Tundra Biome Essay DeyeMy Tundra Biome Essay Deye
My Tundra Biome Essay Deye
michlmcginnis
 
My Magic Tundra Project!Zent
My Magic Tundra Project!ZentMy Magic Tundra Project!Zent
My Magic Tundra Project!Zent
michlmcginnis
 
Life In The Tundralanzillotta
Life In The TundralanzillottaLife In The Tundralanzillotta
Life In The Tundralanzillotta
michlmcginnis
 

Mais de michlmcginnis (9)

My Tundra Report Ulmer
My Tundra Report UlmerMy Tundra Report Ulmer
My Tundra Report Ulmer
 
My Tundra Report Berding
My Tundra Report BerdingMy Tundra Report Berding
My Tundra Report Berding
 
My Tundra Projecthaley
My Tundra ProjecthaleyMy Tundra Projecthaley
My Tundra Projecthaley
 
My Tundra Project Martin
My Tundra Project MartinMy Tundra Project Martin
My Tundra Project Martin
 
My Tundra Project Eary
My Tundra Project EaryMy Tundra Project Eary
My Tundra Project Eary
 
My Tundra Project Acomb
My Tundra Project AcombMy Tundra Project Acomb
My Tundra Project Acomb
 
My Tundra Biome Essay Deye
My Tundra Biome Essay DeyeMy Tundra Biome Essay Deye
My Tundra Biome Essay Deye
 
My Magic Tundra Project!Zent
My Magic Tundra Project!ZentMy Magic Tundra Project!Zent
My Magic Tundra Project!Zent
 
Life In The Tundralanzillotta
Life In The TundralanzillottaLife In The Tundralanzillotta
Life In The Tundralanzillotta
 

Último

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 

Último (20)

Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 

Shady websites

  • 1. Avoiding “Shady” Websites By: Mrs. McGinnis Sept, 2010
  • 2. What are “shady” websites? Fradulent online shops Sites that distruibute pirated music, videos and software Bogus charity websites Sites that promote worthless investments or get-rich-quick schemes WHY do people take the time to create websites such as these?
  • 3. Why???? Identity Theft Identity theft happens when someone steals your personal information, such as your social security number, address, phone number, bank account number, credit card numbers and passwords, etc. The person “pretends” to be you and uses your information to steal your money, credit, etc.
  • 4. That won’t happen to me!! 10 million Americans were the victim of identity theft in 2008 1 in 10 consumers have been the victim of identity theft 1.6 million households experienced fraud NOT related to their credit cards, but in their bank accounts and debit cards 38-48% discover the fraud within 3 months, 9-18%, not for 4 or more years!
  • 5. What you share online could hurt you…. Criminals get your information from one main place….YOU Social Networking Sites Shady Emails Phishing Websites
  • 6. Phishing, no its not spelled wrong… Phishing websites are sites that LOOK like real sites, but exist solely to steal your information Spyware Pop-ups that ask for your information Cloned sites
  • 7. I’m too smart for this!!! Criminals find many ways to convince you to give them your information What are some ways that you think this can happen?
  • 8. Watch out for…. Websites that try to scare you into submitting your username and password Emails with links in them-often the link looks ok in the email but when you click on it, it takes you to a different site Misspelled words Gold Padlock (SSL designation) in wrong place Cloned sites-exact copy
  • 9. Examples of Phishing Phishing Emails Phishing for Passwords Nigerian 419 Scam Cloned Websties
  • 10. How to recognize a real site.. Phish or No Phish