SlideShare a Scribd company logo
1 of 7
5 MOST INSANE
INTERNET CRIMES
BROUGHT TO YOU BY ‘YOU HAVE A VERY SOFT VOICE, SUSAN’ BY SUSAN
FENSTEN
wbp.bz/susana
Andy Greenberg, a senior writer at Wired, took part in a
groundbreaking experiment to test car-hacking. In turn his
car was remotely hacked when he was behind the wheel. The
hackers turned on his airbag and windshield wipers, and
turned off his transmission and cut his brakes!
HACKED CAR DRIVEN OFF
ROAD
wbp.bz/susana
Justin was trying to find a cheap flight in
2007. He was scammed by two separate
people…both claiming to sell him frequent
flyer miles.
SCAM CAUSES MAN TO LOSE
$1000+, TWICE
wbp.bz/susana
Justin was trying to find a cheap flight in
2007. He was scammed by two separate
people…both claiming to sell him frequent
flyer miles.
SCAM CAUSES MAN TO LOSE
$1000+, TWICE
wbp.bz/susana
Laura was contacted by her credit card
company as someone tried to obtain a card
in her name. She found out that this person
had over 50 accounts in her name…
LAURA HAD SOMEONE ELSE STTEAL
HER IDENTITY
wbp.bz/susana
In 2014, Sony was hacked and no one
understood the magnitude of the situation.
Half of the companies 6800 computers
were rendered dead and their records/info
were all deleted.
SONY WAS HACKED IN 2014…
wbp.bz/susana
For an unforgettable tale of
stalking for today’s digital
world, you won’t want to
miss this cyber crime book.
READ ‘YOU HAVE A VERY SOFT
VOICE, SUSAN’
BY SUSAN FENSTEN
wbp.bz/susana

More Related Content

What's hot

Who would be the audience for your media
Who would be the audience for your mediaWho would be the audience for your media
Who would be the audience for your media
kiamocheddah
 
articles-orlandosentinel-com
articles-orlandosentinel-comarticles-orlandosentinel-com
articles-orlandosentinel-com
They Call Me Q
 
Raunch culture in music videos
Raunch culture in music videosRaunch culture in music videos
Raunch culture in music videos
ddoggart
 

What's hot (20)

BrightEdge Share15 - 20: Content Performance Marketing: Blueprint - Matt Lawson
BrightEdge Share15 - 20: Content Performance Marketing: Blueprint - Matt LawsonBrightEdge Share15 - 20: Content Performance Marketing: Blueprint - Matt Lawson
BrightEdge Share15 - 20: Content Performance Marketing: Blueprint - Matt Lawson
 
Aks
AksAks
Aks
 
Grupo 90021 a 425
Grupo 90021 a 425Grupo 90021 a 425
Grupo 90021 a 425
 
Group Project Humanities
Group Project HumanitiesGroup Project Humanities
Group Project Humanities
 
Negotiation in Erin Brockovich (Movie)
Negotiation in Erin Brockovich (Movie)Negotiation in Erin Brockovich (Movie)
Negotiation in Erin Brockovich (Movie)
 
Who would be the audience for your media
Who would be the audience for your mediaWho would be the audience for your media
Who would be the audience for your media
 
articles-orlandosentinel-com
articles-orlandosentinel-comarticles-orlandosentinel-com
articles-orlandosentinel-com
 
150-moviereview
150-moviereview150-moviereview
150-moviereview
 
Lynx Bullet Regulation
Lynx Bullet RegulationLynx Bullet Regulation
Lynx Bullet Regulation
 
Raunch culture in music videos
Raunch culture in music videosRaunch culture in music videos
Raunch culture in music videos
 
Aaaron Draplin - Tall Tales From a Large Man
Aaaron Draplin - Tall Tales From a Large ManAaaron Draplin - Tall Tales From a Large Man
Aaaron Draplin - Tall Tales From a Large Man
 
Task 2
Task 2Task 2
Task 2
 
Keynote - Tall Tales from a Large Man (Aaron Draplin)
Keynote - Tall Tales from a Large Man (Aaron Draplin)Keynote - Tall Tales from a Large Man (Aaron Draplin)
Keynote - Tall Tales from a Large Man (Aaron Draplin)
 
Round 3
Round 3Round 3
Round 3
 
The history of the Simpsons
The history of the SimpsonsThe history of the Simpsons
The history of the Simpsons
 
Why Hamilton's Leslie Odom Jr. Almost Walked Out On The Movie
Why Hamilton's Leslie Odom Jr. Almost Walked Out On The MovieWhy Hamilton's Leslie Odom Jr. Almost Walked Out On The Movie
Why Hamilton's Leslie Odom Jr. Almost Walked Out On The Movie
 
Audience profile
Audience profileAudience profile
Audience profile
 
Poverty in City of God - Worksheet
Poverty in City of God - WorksheetPoverty in City of God - Worksheet
Poverty in City of God - Worksheet
 
Disstracks
DisstracksDisstracks
Disstracks
 
THE PURSUIT OF HAPPYNESS
THE PURSUIT OF HAPPYNESSTHE PURSUIT OF HAPPYNESS
THE PURSUIT OF HAPPYNESS
 

More from Adam Buongiovanni

War...Murder...AND JUSTICE
War...Murder...AND JUSTICEWar...Murder...AND JUSTICE
War...Murder...AND JUSTICE
Adam Buongiovanni
 
An Infected Creature is Loose in the Alaskan Wilderness...
An Infected Creature is Loose in the Alaskan Wilderness...An Infected Creature is Loose in the Alaskan Wilderness...
An Infected Creature is Loose in the Alaskan Wilderness...
Adam Buongiovanni
 
Corporate Superpower by Oleg Konovalov
Corporate Superpower by Oleg KonovalovCorporate Superpower by Oleg Konovalov
Corporate Superpower by Oleg Konovalov
Adam Buongiovanni
 

More from Adam Buongiovanni (17)

Leviathan by James Byron Huggins
Leviathan by James Byron HugginsLeviathan by James Byron Huggins
Leviathan by James Byron Huggins
 
Happenstance by Phil Sheehan
Happenstance by Phil SheehanHappenstance by Phil Sheehan
Happenstance by Phil Sheehan
 
Raven's Ridge by William Florence
Raven's Ridge by William FlorenceRaven's Ridge by William Florence
Raven's Ridge by William Florence
 
5 THINGS YOU DIDN'T KNOW ABOUT TED BUNDY
5 THINGS YOU DIDN'T KNOW ABOUT TED BUNDY5 THINGS YOU DIDN'T KNOW ABOUT TED BUNDY
5 THINGS YOU DIDN'T KNOW ABOUT TED BUNDY
 
Race to Justice by Margie Porter and Larry Sells
Race to Justice by Margie Porter and Larry SellsRace to Justice by Margie Porter and Larry Sells
Race to Justice by Margie Porter and Larry Sells
 
The Most Despicable Political Prosecution in American Military History
The Most Despicable Political Prosecution in American Military HistoryThe Most Despicable Political Prosecution in American Military History
The Most Despicable Political Prosecution in American Military History
 
5 of the WORST Wrongful Convictions
5 of the WORST Wrongful Convictions5 of the WORST Wrongful Convictions
5 of the WORST Wrongful Convictions
 
What People Are Saying About Bamboo Strong by David Clive Price
What People Are Saying About Bamboo Strong by David Clive PriceWhat People Are Saying About Bamboo Strong by David Clive Price
What People Are Saying About Bamboo Strong by David Clive Price
 
Get To Know James Byron Huggins
Get To Know James Byron HugginsGet To Know James Byron Huggins
Get To Know James Byron Huggins
 
5 Crazy Custody Cases
5 Crazy Custody Cases5 Crazy Custody Cases
5 Crazy Custody Cases
 
War...Murder...AND JUSTICE
War...Murder...AND JUSTICEWar...Murder...AND JUSTICE
War...Murder...AND JUSTICE
 
An Infected Creature is Loose in the Alaskan Wilderness...
An Infected Creature is Loose in the Alaskan Wilderness...An Infected Creature is Loose in the Alaskan Wilderness...
An Infected Creature is Loose in the Alaskan Wilderness...
 
WORLD'S MOST PROLIFIC PYROMANIAC
WORLD'S MOST PROLIFIC PYROMANIACWORLD'S MOST PROLIFIC PYROMANIAC
WORLD'S MOST PROLIFIC PYROMANIAC
 
The Beast I Loved by Robert Davidson
The Beast I Loved by Robert DavidsonThe Beast I Loved by Robert Davidson
The Beast I Loved by Robert Davidson
 
Corporate Superpower by Oleg Konovalov
Corporate Superpower by Oleg KonovalovCorporate Superpower by Oleg Konovalov
Corporate Superpower by Oleg Konovalov
 
The Shawcross Letters - Brian Whitney
The Shawcross Letters - Brian WhitneyThe Shawcross Letters - Brian Whitney
The Shawcross Letters - Brian Whitney
 
What You Don't Know About North and South Korea?
What You Don't Know About North and South Korea?What You Don't Know About North and South Korea?
What You Don't Know About North and South Korea?
 

Recently uploaded

Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
Overkill Security
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
Wonjun Hwang
 

Recently uploaded (20)

AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi Daparthi
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 

5 MOST INSANE INTERNET CRIMES!

  • 1. 5 MOST INSANE INTERNET CRIMES BROUGHT TO YOU BY ‘YOU HAVE A VERY SOFT VOICE, SUSAN’ BY SUSAN FENSTEN wbp.bz/susana
  • 2. Andy Greenberg, a senior writer at Wired, took part in a groundbreaking experiment to test car-hacking. In turn his car was remotely hacked when he was behind the wheel. The hackers turned on his airbag and windshield wipers, and turned off his transmission and cut his brakes! HACKED CAR DRIVEN OFF ROAD wbp.bz/susana
  • 3. Justin was trying to find a cheap flight in 2007. He was scammed by two separate people…both claiming to sell him frequent flyer miles. SCAM CAUSES MAN TO LOSE $1000+, TWICE wbp.bz/susana
  • 4. Justin was trying to find a cheap flight in 2007. He was scammed by two separate people…both claiming to sell him frequent flyer miles. SCAM CAUSES MAN TO LOSE $1000+, TWICE wbp.bz/susana
  • 5. Laura was contacted by her credit card company as someone tried to obtain a card in her name. She found out that this person had over 50 accounts in her name… LAURA HAD SOMEONE ELSE STTEAL HER IDENTITY wbp.bz/susana
  • 6. In 2014, Sony was hacked and no one understood the magnitude of the situation. Half of the companies 6800 computers were rendered dead and their records/info were all deleted. SONY WAS HACKED IN 2014… wbp.bz/susana
  • 7. For an unforgettable tale of stalking for today’s digital world, you won’t want to miss this cyber crime book. READ ‘YOU HAVE A VERY SOFT VOICE, SUSAN’ BY SUSAN FENSTEN wbp.bz/susana