Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Week 5 protect yourself from cyber threats


Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Week 5 protect yourself from cyber threats

  1. 1. Striking Back!Striking Back!
  2. 2. Don’t Launch Cell Phone Games and Programs that are “Pushed” to you
  3. 3. Just how gullible are we?
  4. 4. Best 90 Free Windows Programs toBest 90 Free Windows Programs to Protect You and Your ComputerProtect You and Your Computer
  5. 5. Cell phone data charges Ring tones Vanity fraud Meet My Children - Sean, Lindsay, Ryan. Each of them was scammed!
  6. 6. ““It can’t happen to me!”It can’t happen to me!”
  7. 7. Without protection, its just a crapsWithout protection, its just a craps Really? What are the odds?
  8. 8. “You stand a better chance at any given time of loosing your personally identifiable information than you do of just about any other form of nasty thing than can happen to a person over their lifetime.” The National Safety CouncilThe National Safety Council 1 in 146,107,962.00 could potentially win the power ball lottery grand prize 1 in 3,563,608.83 could potentially win the 200,000 dollar prize in the power ball 1 in 3000 will be killed by lighting in any given year 1 in 1,313 chance of being killed by a doctor 1 in 314 chance of being killed by a firearm 1 in 84 chance of being killed in a car crash over your lifetime 1 in 3 has had their personally identifiable1 in 3 has had their personally identifiable information lost this year!!information lost this year!!
  9. 9. A new, targeted social mediaA new, targeted social media version of a very old scam -- theversion of a very old scam -- the “Nigerian,” or “419,” ploy“Nigerian,” or “419,” ploy
  11. 11. How did they do that?How did they do that? Because Facebook regularly contacts its users through e-mail, and includes links in those e-mails to login pages, the format is ripe for phishers. It's easy to imitate Facebook e-mails and simply send users clicking to a look-a-like login page that steal passwords.
  12. 12.  Punked! Lots of tools on the net for people who may want to take advantage of you.
  13. 13.
  14. 14. “Who steals my purse steals trash…But he that filches from me my good name …... Makes me poor indeed.” Othello, Act 3 Scene 3Othello, Act 3 Scene 3
  15. 15. When in doubt about a potential scam check the Internet Crime Complaint Center
  16. 16. Don’t let them get away with it. Get mad or get even! Report them immediately to: OR…become a scam baiter (not really recommended, but some people are just really angry)
  17. 17. Who Scammers HateWho Scammers Hate
  18. 18. We are all victims!We are all victims! 1700 new victims in the course of this meeting. By the end of the decade someone in your family will be a victim. Lowest estimate of projected damage is $5000. Only 1 in 700 is investigated. 1 year or less in jail. 70 – 80 % involve illegal dugs FBI reports 30,000 computer a week are taken over.
  19. 19. The meteoric rise in social media use has alsoThe meteoric rise in social media use has also created a launch pad for identity thieves.created a launch pad for identity thieves. “My prediction for 2010 (and beyond) is that the increase in social networking activity, along with a user’s failure to implement security and privacy settings and protocols, will lead to an increased exposure of not only the user’s personalnot only the user’s personal information but possibly that of their “friends”.information but possibly that of their “friends”. Robert Siciliano : CEO of
  20. 20. A word or two about passwordsA word or two about passwords and…. hacking Facebookand…. hacking Facebook  No birthdates or social security numbers  No mother’s maiden name  No universal password  Yes to long passwords (over eight characters)  Yes to random patterns – first letter of each word in your favorite song with your favorite number.  Yes to changing it frequently
  21. 21. Go to this site: Choose at least two games and report your findings and observations on the Discussion Board.
  22. 22. Three FREEThree FREE “must have” online tools“must have” online tools to create unique create unique passwords.
  23. 23.
  24. 24.
  25. 25. FTC Video
  26. 26. Who are the bad guys?Who are the bad guys? Small time crooks
  27. 27. Trans- nationalTrans- national crime gangs.crime gangs. Russian "Mafia," Colombian and Mexican drug cartels, Asian Triads, Japanese Yakuza, Nigerian confidence rings, Hell's Angels, rogue factions of the St. Regis Mohawk tribe and the surviving, leaner and meaner Cosa Nostra
  28. 28. PhishingPhishing Why do people fall for it ???Why do people fall for it ??? Beware of the push!!Beware of the push!!
  29. 29. Greed…..Greed…..
  30. 30. Greed = Scam…..Greed = Scam…..
  31. 31. Fear….Fear….
  32. 32. Fear = ScamFear = Scam MailFrontier recently claimed that over 40% of recipients fell for the recent Citibank Email Phishing Scam.
  33. 33. Curiosity…..Curiosity…..
  34. 34. Curiosity = ScamCuriosity = Scam
  35. 35. Temptation…..GroomingTemptation…..Grooming Ref. Number:EGOGHS255125600419 Batch Number: 14/ 01259/ IPD Ticket Number:113-2471-752-209 Serial Number: 5063-11 Attention We are pleased to inform you of the result of the Winners in our UNIVERSAL STAKES Lottery Program held on the 20th JULY, 2004.Your e-mail address attached to ticket number 27522465896-6453 with serial number 3772-554 drew lucky numbers 7-14-18-31-45 which consequently won in the 2ND category, you have therefore been approved for a lump sum pay out of USD$1,500,000 ( One Million Five Hundred Dollars) Only .CONGRATULATIONS!
  36. 36. Some Quick FactsSome Quick Facts FBI 2012 statistics show $3 billion in losses Median individual loss - $575. But reported loss is tip of the project iceberg – estimated to be in the billions. Only 1 in 10 crime reported
  37. 37. What Scammers LoveWhat Scammers Love Social networking sites People who click on links Pictures, blogs Manually hacking “captcha” registration blocks.
  38. 38. ScaREWAREScaREWARE Pretends to detect a virus and offers to help with inexpensive debugging software (usually around $50) – then.. You give your credit card # for the software fix!You give your credit card # for the software fix! Watch this!Watch this!
  39. 39. Hidden terms..Recurring Billing..Shipping & handling
  40. 40. Texting forTexting for DollarsDollars Text message from your bank or credit card company to call right away and verify account information! OR You’ve won a free gift from a reputable vendor like Sears or Macy’s
  41. 41. Bogus LoveBogus Love “Wire me some money for an airline ticket so that I can be with you forever.” 1) Fake photos: You may be virtual dating with somebody else. 2) Hidden costs: Sign-up could be free, but everything else requires you to pay extra fees. 3) Milking your Bank Account: The guy/girl is in distress and urgently need money, e.g. accidents, trapped at airport, hospitalized, etc.!
  42. 42. “Make ME your favorite charity…please :( ” Their pitch: Speed up relief efforts – wire and send personal info such as social security and checking account numbers.
  43. 43. Log on here: The hot-spot Hot seat “Coming to a location near you.”
  44. 44. Any Web site or print ad offering free credit reports has to display this disclosure across the top of each page: THIS NOTICE IS REQUIRED BY LAW. Read more at FTC.GOV.THIS NOTICE IS REQUIRED BY LAW. Read more at FTC.GOV. You have the right to a free credit report fromYou have the right to a free credit report from or 877-322-8228, the ONLY authorized source under federal law.or 877-322-8228, the ONLY authorized source under federal law. Cute ads but Beware! Not so free credit reports.
  45. 45. Free Credit Report? This one may be the one to try. I