SlideShare a Scribd company logo
Gunning	
  for	
  Grandma…	
  
How	
  the	
  Internet	
  targets	
  YOU,	
  and	
  what	
  you	
  can	
  
do	
  to	
  remain	
  safe.	
  
Today’s	
  Focus	
  
  Your	
  Internet:	
  
  My	
  front	
  door	
  
  You,	
  why	
  are	
  you	
  a	
  target?	
  
  Why	
  are	
  we	
  here?	
  	
  
  Some	
  sobering	
  staEsEcs	
  (and	
  why	
  you	
  shouldn’t	
  trust	
  anyone)	
  
  Shoot	
  the	
  microwave,	
  the	
  fridge….and	
  the	
  toaster!	
  
  Fed	
  up	
  of	
  being	
  a	
  staEsEc:	
  
  Minions	
  revoluEon!	
  
  SoluEons	
  
  One	
  through	
  six..	
  
  Scams,	
  the	
  top	
  ones	
  and	
  how	
  to	
  recognize!	
  
  The	
  Government’s	
  soluEon	
  J	
  
  More	
  realisEc	
  opEons…	
  
The	
  ONE	
  Rule	
  
PLEASE	
  ASK	
  QUESTIONS	
  !!	
  
	
  
	
  
We	
  are	
  in	
  this	
  room	
  for	
  2	
  hours…and	
  I’m	
  NOT	
  
doing	
  all	
  the	
  talking.	
  
There	
  are	
  NO	
  stupid	
  quesEons…	
  
	
  
	
  
Why	
  Me	
  ?	
  
  Couple	
  of	
  reasons:	
  
  I’ve	
  got	
  almost	
  as	
  much	
  grey	
  hair	
  as	
  most	
  of	
  you	
  
  It	
  was	
  gained	
  (mostly)	
  in	
  this	
  industry	
  
  Lost	
  the	
  hair	
  ON	
  my	
  head	
  because	
  of	
  this	
  industry	
  
  This	
  is	
  actually	
  more	
  fun	
  than	
  talking	
  with	
  execuEves!	
  
  …and	
  probably	
  more	
  producEve	
  
  Mostly	
  though	
  because	
  Mark	
  though	
  it	
  would	
  be	
  a	
  cool	
  idea	
  
  Thank	
  you	
  Mr.	
  Teter!	
  J	
  
Baseline	
  
Your	
  Internet…	
  
My	
  Internet	
  
Your	
  Data…	
  
  Every	
  month	
  I	
  excavate	
  from	
  the	
  Internet:	
  
  In	
  excess	
  of	
  750,000,000	
  “targets”	
  (IRC/I2P/P2P/FTP/HTTP)	
  
  Over	
  550,000	
  live	
  and	
  usable	
  Credit	
  Cards	
  
  Over	
  500,000	
  usable	
  Healthcare	
  records	
  
  Over	
  150,000	
  live	
  idenEEes	
  (SSN,	
  Passport	
  etc.)	
  
  YOUR	
  INFORMATION	
  
  YOUR	
  IDENTITY	
  
  YOUR	
  Intellectual	
  Property	
  
  YOUR	
  Companies	
  Info…	
  
  Your	
  Info,	
  bought,	
  sold,	
  traded.	
  
Why	
  You?	
  
  You	
  don’t	
  like	
  to	
  ask	
  quesEons	
  
  You	
  don’t	
  like	
  to	
  admit	
  you	
  might	
  be	
  wrong	
  
  You	
  don’t	
  have	
  the	
  “nasEness”	
  that	
  modern	
  society	
  has	
  
  You	
  have	
  money,	
  healthcare	
  history	
  and	
  Eme	
  
  You	
  have	
  credit	
  history	
  
  Technology	
  is	
  moving	
  faster	
  than	
  most	
  of	
  us	
  can	
  track	
  
  You	
  are	
  polite,	
  civilized	
  and	
  trust	
  people	
  
  You	
  make	
  bad	
  witnesses	
  (exploitaEon	
  Emeline	
  etc.)	
  
  You	
  make	
  an	
  aaracEve	
  target	
  (long/fruibul	
  life	
  etc.)	
  
“Not	
  the	
  world	
  I	
  grew	
  up	
  in”	
  
  Correct,	
  but	
  it	
  IS	
  the	
  world	
  you	
  now	
  live	
  in,	
  operate	
  in	
  and	
  
HAVE	
  to	
  deal	
  with:	
  
  You	
  built	
  bombs,	
  we	
  build	
  viruses	
  and	
  malware.	
  
  You	
  built	
  rockets,	
  my	
  iPhone’s	
  got	
  more	
  compuEng	
  power.	
  
  You	
  cured	
  Polio,	
  I	
  can	
  kill	
  you	
  remotely	
  using	
  RFID/Wireless.	
  
  You	
  had	
  ENIAC	
  (Vacuum	
  tubes),	
  we	
  have	
  nanotechnology.	
  
  You	
  put	
  TV	
  in	
  the	
  house,	
  we	
  put	
  it	
  on	
  our	
  watches.	
  
  Your	
  crime	
  was	
  personal,	
  ours	
  reaches	
  from	
  across	
  the	
  globe.	
  
  Your	
  data	
  was	
  in	
  filing	
  cabinets,	
  ours	
  is	
  in	
  the	
  cloud.	
  
  You	
  built	
  Rock	
  n’	
  Roll…	
  that	
  one’s	
  a	
  keeper!!	
  
Shoot	
  the	
  Coffee	
  Machine…	
  
  All	
  your	
  data	
  belongs	
  to:	
  
  Samsung	
  (your	
  TV	
  viewing	
  habits,	
  and	
  regular	
  screenshots)	
  
  Google…yes,	
  preay	
  much	
  anything	
  you	
  do	
  
  Apple…see	
  above	
  
  Your	
  car…welcome	
  to	
  the	
  infotainment	
  systems	
  
  Map	
  Apps….who	
  are	
  working	
  with	
  the	
  adverEsers	
  (and	
  your	
  car)	
  
  Social	
  media…that’s	
  more	
  your	
  fault	
  than	
  anyone	
  else!	
  
  Your	
  toaster…it’s	
  connected	
  to	
  the	
  smart-­‐system	
  in	
  your	
  house	
  J	
  
  Your	
  coffee	
  company…they	
  KNOW	
  you	
  need	
  coffee	
  at	
  8am	
  
  Etc.	
  
  Welcome	
   to	
   the	
   Internet	
   of	
   everything,	
   all	
   your	
   data	
   belongs	
  
to	
  ????	
  
By	
  The	
  Numbers(ish)	
  
Sobering	
  StaEsEcs	
  for	
  2014	
  
  EsEmated	
  $300	
  Billion	
  per	
  year	
  to	
  the	
  economy	
  
  Financial	
  impacts	
  (financial,	
  technology,	
  pharmaceuEcal)	
  
  Data	
  losses	
  (intellectual	
  property	
  etc.)	
  
  Over	
  300	
  “major”	
  breaches	
  	
  
  Major	
  being	
  the	
  Really	
  nasty	
  ones….	
  
  80	
  Million	
  peoples	
  idenEEes	
  lost	
  
  That’s	
  just	
  the	
  ones	
  we	
  know	
  about…	
  
  Millions	
  of	
  new	
  malware	
  programs	
  “found”	
  
  Recycle	
  a	
  good	
  idea	
  and	
  re-­‐use	
  it	
  to	
  target	
  other	
  data…	
  
So	
  Far…2015	
  
153,351,000	
  records	
  lost,	
  stolen,	
  taken	
  or	
  
misplaced.	
  
	
  
YOUR	
  IdenEty	
  
Your	
  Healthcare	
  records	
  
Your	
  credit	
  card,	
  bank	
  account	
  etc.	
  
Healthcare	
  (less)	
  
Since	
  record	
  keeping	
  on	
  breaches	
  started	
  
(around	
  2005):	
  	
  
	
  
Healthcare	
  has	
  managed	
  to	
  lose	
  around	
  
715,000,000	
  records	
  	
  
(Public	
  disclosure	
  and	
  Darknet	
  research)	
  	
  
	
  
That’s	
  EACH	
  of	
  us...Twice!	
  	
  
	
  
Need	
  More?	
  
EvoluEon	
  
The	
  bad	
  guys	
  USED	
  to	
  be	
  easy	
  to	
  spot	
  (clubs,	
  swords,	
  guns	
  etc.)	
  nowadays	
  they	
  are	
  
likely	
  to	
  be	
  simply	
  armed	
  with	
  a	
  keyboard	
  or	
  a	
  USB	
  sEck.	
  
The	
  Future…	
  
Our	
  RevoluEon	
  
Minions	
  RevoluEon!	
  
We	
  are	
  more	
  than	
  JUST	
  a	
  number,	
  a	
  staEsEc	
  or	
  a	
  line	
  item	
  on	
  a	
  
Cyber	
  Liability	
  insurance	
  claim!	
  
The	
  Sharp	
  End	
  
  Simply	
  fed	
  up	
  with	
  the	
  human	
  element	
  and	
  how	
  they	
  handle	
  some	
  
of	
  the	
  basic	
  security	
  issues	
  that	
  are	
  facing	
  them	
  in	
  this	
  day	
  and	
  
age.	
  
  Done	
   dealing	
   with	
   companies,	
   organizaEons,	
   enEEes,	
   and	
  
governments	
  that	
  simply	
  want	
  to	
  carry	
  on	
  going	
  along	
  in	
  the	
  same	
  
manner.	
  	
  
  Frustrated	
  and	
  resenbul	
  of	
  execuEves	
  who	
  don’t	
  care	
  or	
  who	
  feel	
  
that	
  security	
  is	
  a	
  burden	
  or	
  something	
  that’ll	
  eventually	
  disappear.	
  	
  	
  
  Intolerant	
   of	
   humans	
   who	
   think	
   that	
   security	
   is	
   something	
   that	
  
happens	
  to	
  others,	
  who	
  don’t	
  feel	
  they	
  need	
  to	
  be	
  concerned	
  by	
  
it,	
  or	
  who	
  figure	
  that	
  someone	
  else	
  will	
  deal	
  with	
  it.	
  	
  
Horses!	
  
You	
  can	
  lead	
  
a	
  human	
  to	
  
knowledge	
  
but	
  you	
  can’t	
  
make	
  him	
  
think.	
  
SoluEons!	
  
How	
  to	
  Fix?	
  
One:	
  Protect	
  YOUR	
  Data	
  
  We	
  spend	
  our	
  Eme	
  on	
  patching	
  our	
  computers,	
  updaEng	
  our	
  
firewalls	
  and	
  renewing	
  our	
  anE-­‐virus…	
  
  Wrong	
  approach	
  (don’t	
  stop	
  doing	
  this,	
  but	
  it’s	
  not	
  the	
  FOCUS)	
  
  YOUR	
  data:	
  
  Where	
  are	
  your	
  taxes?	
  (paper	
  or	
  online	
  or	
  on	
  the	
  computer?)	
  
  Where	
  do	
  you	
  keep	
  bank	
  records?	
  
  Where	
  do	
  you	
  keep	
  passwords?	
  (how	
  many	
  different	
  ones?)	
  
  Where	
  are	
  your	
  medical	
  records?	
  
  Social	
  Media:	
  
  Facebook	
  is	
  NOT	
  your	
  friend,	
  neither	
  is	
  Google	
  
  Ancestry	
  websites:	
  
  Amazing	
  places	
  to	
  research	
  family	
  AND	
  amazing	
  places	
  to	
  be	
  
researched	
  on!	
  (Scam	
  arEsts	
  love	
  these	
  sites!)	
  
One	
  Airline,	
  One	
  Month	
  
How	
  many	
  of	
  these	
  are	
  encrypted	
  or	
  have	
  some	
  basic	
  “locate	
  	
  
me”	
  enabled?	
  …answer	
  NOT	
  many!	
  
Two:	
  Know	
  Yourself	
  
  What	
  data	
  is	
  out	
  there	
  already	
  about	
  me?	
  
  Social	
  media	
  (Facebook	
  etc.)	
  
  What	
  data	
  do	
  I	
  have	
  stored	
  in	
  electronic	
  format?	
  
  Taxes?	
  
  Bank/Saving/Fidelity	
  accounts?	
  
  Passwords?	
  
  Who	
  has	
  access	
  to	
  my	
  data?	
  
  Friends	
  and	
  family	
  
  Caregivers	
  
  Where	
  IS	
  my	
  data?	
  
  Doctors/healthcare	
  providers	
  
  Shops/stores/Walgreen/CVS/Etc.	
  
Simplifying	
  You	
  
This	
  is	
  you	
  
This	
  is	
  you	
  at	
  home	
  
This	
  is	
  you	
  at	
  your	
  
friends	
  
This	
  is	
  your	
  family	
  
This	
  is	
  you	
  at	
  the	
  
doctors	
  facility	
  
These	
  are	
  your	
  
caregivers	
  
YOU	
  are	
  everywhere.	
  
So	
  am	
  I.	
  
Three:	
  Who’s	
  Already	
  Inside?	
  
  We	
  always	
  focus	
  on	
  who’s	
  “out	
  there”	
  and	
  forget	
  people	
  
already	
  inside	
  our	
  circle	
  of	
  trust.	
  
  Employees	
  	
  
  Caregivers	
  
  Family	
  
  Friends	
  
  Our	
  electronics	
  
  How’s	
  that	
  computer	
  of	
  yours	
  working?	
  
  Phones,	
  iPads,	
  Fitbits	
  and	
  other	
  ways	
  in…	
  
Squirrel!	
  
Grandchildren…	
  
When	
  the	
  liale	
  one	
  wants	
  to	
  “borrow”	
  your	
  computer	
  
When	
  your	
  kids	
  bring	
  their	
  “liale	
  ones”	
  over	
  to	
  spend	
  grandparent	
  
Eme…	
  
When	
  the	
  rugrats	
  are	
  gemng	
  too	
  rambuncEous	
  
	
  
DON’T	
  LET	
  THEM	
  ON	
  YOUR	
  COMPUTER,	
  DON’T	
  LET	
  THEM	
  INSTALL	
  
APPS	
  ON	
  YOUR	
  IPAD!	
  
	
  
Taser	
  them…	
  in	
  the	
  long	
  run	
  it’s	
  simpler.	
  
	
  
OK,	
  Back	
  to	
  serious	
  stuff…	
  
Four:	
  Vigilance	
  
  Increase	
  your	
  awareness	
  
  Do	
  a	
  liale	
  research	
  (you	
  do	
  have	
  the	
  Eme)	
  
  Increase	
  your	
  monitoring	
  
  How	
  onen	
  do	
  you	
  check	
  your	
  accounts?	
  
  Credit	
  monitoring	
  (the	
  good/bad/ugly)	
  
  Increase	
  the	
  quesEons	
  
  Second	
  “factor”	
  of	
  authenEcaEon	
  
  Those	
  patches	
  and	
  that	
  AnEvirus	
  blinky	
  light?	
  
  They	
  are	
  important…not	
  great	
  at	
  protecEon,	
  but	
  beaer	
  than	
  
nothing!	
  
NSA	
  
IF	
  we	
  are	
  being	
  watched,	
  then	
  the	
  least	
  they	
  could	
  do	
  is	
  fix	
  the	
  spam	
  problem!!	
  
Five:	
  It’s	
  a	
  Mobile	
  World…	
  
  A	
  Lot	
  of	
  what	
  we	
  know	
  is	
  going	
  mobile	
  
  Paying	
  for	
  your	
  shopping	
  with	
  your	
  phone	
  or	
  watch	
  
  Online	
  banking	
  right	
  from	
  the	
  phone	
  
  Social	
  media	
  
  A	
  Lot	
  of	
  what’s	
  going	
  mobile	
  is	
  NOT	
  secure	
  
  Password	
  storage	
  
  “handshakes”	
  between	
  systems	
  
  Who	
  made	
  the	
  applicaEon?	
  And	
  where’s	
  my	
  data	
  going?	
  
  We	
  CAN	
  use	
  the	
  mobile	
  world	
  for	
  good	
  
  Response	
  systems	
  
  Healthcare	
  remote	
  capabiliEes	
  (when	
  implemented	
  correctly)	
  
If	
  You	
  Use	
  These…	
  
123456	
  
password	
  
12345	
  
12345678	
  
qwerty	
  
123456789	
  
1234	
  
baseball	
  
dragon	
  
football	
  
monkey	
  
letmein	
  
abc123	
  
111111	
  
mustang	
  
access	
  
shadow	
  
master	
  
michael	
  
superman	
  
696969	
  
123123	
  
batman	
  
trustno1	
  
Don’t	
   use	
   a	
   favorite	
   sport	
   as	
   your	
   password:	
   “baseball”	
   and	
   “football”	
   are	
   in	
   top	
   10,	
   and	
  
“hockey,”	
  “soccer”	
  and	
  “golfer”	
  are	
  in	
  the	
  top	
  100.	
  
	
  
Don’t	
  use	
  a	
  favorite	
  team	
  either:	
  “yankees,”	
  “eagles,”	
  “steelers,”	
  “rangers,”	
  and	
  “lakers”	
  are	
  all	
  in	
  
the	
  top	
  100.	
  
	
  
Don’t	
  use	
  your	
  birthday	
  or	
  especially	
  just	
  your	
  birth	
  year:	
  1989,	
  1990,	
  1991,	
  and	
  1992	
  are	
  all	
  in	
  
the	
  top	
  100.	
  
	
  
Don’t	
   use	
   baby	
   names	
   as	
   sources	
   for	
   picking	
   passwords:	
   “michael,”	
   “jennifer,”	
   “thomas,”	
  
“jordan,”	
  “hunter,”	
  “michelle,”	
  “charlie,”	
  “andrew,”	
  and	
  “daniel”	
  are	
  all	
  in	
  the	
  top	
  50.	
  
	
  
Six:	
  Time…	
  
  Take	
  the	
  Eme	
  to	
  understand	
  this	
  world	
  
  Most	
  of	
  us	
  in	
  it	
  don’t	
  profess	
  to	
  understand	
  it	
  all!	
  
  We	
  rely	
  on	
  friends	
  and	
  colleagues	
  to	
  help	
  us	
  
  Take	
  the	
  Eme	
  to	
  research	
  this	
  world	
  
  Social	
  engineering	
  is	
  defeated	
  9	
  Emes	
  out	
  of	
  10	
  
  Scams	
  and	
  basic	
  aaacks	
  are	
  defeated	
  this	
  way	
  
  Take	
  the	
  Eme	
  to	
  ask	
  quesEons	
  about	
  this	
  world	
  
  Most	
  of	
  us	
  in	
  it	
  are	
  happy	
  to	
  help	
  
  Many	
  of	
  us	
  dedicate	
  Eme	
  to	
  help	
  mentor	
  people	
  
  Many	
  of	
  us	
  work	
  for	
  chariEes,	
  we	
  are	
  happy	
  to	
  help!	
  
  Google	
  can	
  be	
  a	
  friend	
  someEmes…research	
  online.	
  
More?	
  
Scams	
  
Countdown…	
  
  Sweepstake	
  Scams:	
  
  You	
  are	
  ALWAYS	
  a	
  winner…unEl	
  you	
  loose	
  your	
  money	
  because	
  of	
  
the	
  fees	
  or	
  taxes	
  you	
  have	
  to	
  pay	
  in	
  advance	
  
  Click	
  Here!	
  
  Click	
  here	
  to	
  watch	
  “x”…while	
  I	
  download	
  malware	
  to	
  your	
  
computer.	
  
  Robot	
  Calling:	
  
  Hi,	
  I’m	
  from	
  Visa	
  and	
  I	
  can	
  lower	
  your	
  interest	
  rate/help	
  pay	
  off	
  your	
  
card….Oh,	
  and	
  I	
  can	
  steal	
  the	
  number.	
  
  Government	
  Grants:	
  
  You’ve	
  been	
  selected	
  to	
  parEcipate	
  in	
  the	
  grant	
  program,	
  all	
  you	
  
need	
  to	
  do	
  is	
  pay	
  the	
  taxes	
  or	
  fees….and	
  I	
  take	
  your	
  informaEon.	
  
  Family	
  Emergency!	
  
  I’m	
  stuck	
  in	
  Europe	
  because	
  I	
  got	
  robbed,	
  please	
  help…send	
  me	
  
money	
  please…	
  let	
  me	
  rob	
  you	
  while	
  tugging	
  at	
  heartstrings.	
  
Click	
  Bait…	
  
ConEnues...	
  
  Medical	
  Alert:	
  
  Your	
  family	
  is	
  concerned,	
  have	
  this	
  device	
  sent	
  to	
  you,	
  give	
  us	
  your	
  
credit	
  card	
  or	
  bank	
  info…	
  No	
  device	
  and	
  an	
  empty	
  credit	
  card…	
  
  Copycat	
  Website:	
  
  If	
  it’s	
  seems	
  too	
  good	
  to	
  be	
  true…then	
  it	
  	
  probably	
  is!	
  Counterfeit	
  
heaven.	
  
  Fake	
  Caller	
  ID:	
  
  Your	
  number	
  is	
  calling	
  you??	
  Simple	
  way	
  to	
  get	
  you	
  to	
  pick	
  up	
  the	
  
phone…and	
  that’s	
  ½	
  my	
  baale,	
  if	
  I	
  can	
  engage	
  you	
  then	
  I	
  win!	
  
  Technical	
  support:	
  
  Hi	
  I’m	
  from	
  Microson/IBM/CenturyLink	
  your	
  computer	
  is	
  infected,	
  let	
  
me	
  help	
  you…oh	
  and	
  while	
  I’m	
  doing	
  that	
  I’m	
  going	
  to	
  install	
  a	
  back	
  
door.	
  
  ArresEng	
  You!	
  
  IRS,	
  Feds	
  or	
  someone	
  else	
  is	
  coming	
  to	
  serve	
  a	
  warrant	
  unless	
  you	
  pay	
  
the	
  bond/fees/amount	
  due…	
  Pay	
  now	
  over	
  the	
  phone	
  while	
  I	
  steal	
  your	
  
informaEon.	
  
We	
  Call	
  it	
  Social	
  Engineering	
  
  Fake	
  e-­‐mails	
  are	
  more	
  common	
  than	
  ever.	
  
  20%	
  of	
  people	
  will	
  fall	
  for	
  fake	
  E-­‐Mail,	
  75%	
  will	
  fall	
  for	
  fake	
  
websites	
  and	
  fake	
  calls.	
  
  Sites	
  that	
  seem	
  to	
  be	
  legiEmate	
  and	
  “require”	
  the	
  receiver	
  to	
  
enter	
  their	
  username	
  and	
  password.	
  
  Same	
  goes	
  for	
  phone	
  calls	
  by	
  fake	
  federal	
  agents,	
  etc.,	
  asking	
  
for	
  password	
  compliance	
  or	
  informaEon.	
  
	
  
We	
  need	
  beaer	
  communicaEon	
  on	
  how	
  to	
  avoid	
  such	
  scenarios.	
  
The	
  Internet…	
  
There	
  are	
  a	
  few	
  of	
  us	
  who’d	
  like	
  to	
  do	
  this	
  to	
  “some”	
  of	
  
the	
  users	
  of	
  the	
  Internet…	
  
Good	
  Grief	
  More??	
  
  TelemarkeEng	
  Fraud:	
  
  Yes	
  the	
  offer	
  IS	
  great,	
  Yes	
  I’ll	
  act	
  now…here’s	
  me	
  hanging	
  up	
  the	
  phone.	
  
  Nigerian	
  Leaer	
  or	
  “419”	
  Fraud:	
  
  No!	
  The	
  banker	
  in	
  Kenya	
  is	
  NOT	
  simng	
  on	
  $6M	
  and	
  No	
  he	
  won’t	
  share	
  it	
  with	
  you!	
  
  IdenEty	
  Then	
  and	
  Credit	
  Card	
  Fraud:	
  
  Really	
  quesEon	
  EVERY	
  Eme	
  you	
  hand	
  over	
  your	
  credit	
  card!!	
  
  Craigslist	
  schemes:	
  
  Sending	
  me	
  a	
  check	
  for	
  $2000	
  to	
  pay	
  for	
  a	
  $100	
  item	
  is	
  NOT	
  going	
  to	
  get	
  you	
  $1900	
  of	
  MY	
  
money…Goodbye!	
  
  RedempEon	
  /	
  Strawman	
  /	
  Bond	
  Fraud:	
  
  Those	
  bank	
  document	
  or	
  bond	
  documents	
  are	
  probably	
  Photoshopped!	
  
  Internet	
  AucEon	
  Fraud:	
  
  Only	
  thing	
  here	
  is	
  PLEASE	
  do	
  your	
  research!!	
  If	
  in	
  doubt	
  walk	
  away!	
  OR	
  put	
  the	
  money	
  in	
  
the	
  middle	
  unEl	
  ALL	
  parEes	
  are	
  happy.	
  
  Non-­‐Delivery	
  of	
  Merchandise:	
  
  Do	
  your	
  homework	
  and	
  research!	
  “Reach	
  out	
  and	
  touch	
  someone”	
  trust	
  and	
  then	
  
VALIDATE!	
  
Pause!	
  
Ok,	
  Enough	
  Scams	
  (For	
  Now)	
  
What’s	
  the	
  Government	
  got	
  to	
  say	
  about	
  this?	
  
Government’s	
  PosiEon	
  
Robert	
  Mueller,	
  former	
  FBI	
  Director,	
  recently	
  stated:	
  
	
  
“There	
  are	
  only	
  two	
  types	
  of	
  companies:	
  Those	
  that	
  have	
  been	
  
hacked,	
  and	
  those	
  that	
  will	
  be.”	
  
	
  
Even	
  that	
  is	
  merging	
  into	
  one	
  category:	
  	
  
	
  
“Those	
  that	
  have	
  been	
  hacked	
  and	
  will	
  be	
  again”	
  
Our	
  Federal	
  Colleagues	
  
  FBI’s	
  got	
  a	
  scam	
  safety	
  site	
  (PLEASE	
  visit	
  it!)	
  
  Health	
  Care	
  Fraud	
  or	
  Health	
  Insurance	
  Fraud	
  
  Counterfeit	
  PrescripEon	
  Drugs	
  
  Funeral	
  and	
  Cemetery	
  Fraud	
  
  Fraudulent	
  “AnE-­‐Aging”	
  Products	
  
  TelemarkeEng	
  Fraud	
  
  Internet	
  Fraud	
  
  Investment	
  Schemes	
  
  Reverse	
  Mortgage	
  Scams	
  
haps://www.si.gov/scams-­‐safety/	
  
FBI’s	
  Common	
  Denominator?	
  
  Carefully	
  review…	
  
  Be	
  mindful…	
  
  Be	
  an	
  informed	
  consumer…	
  
  Research	
  thoroughly…	
  
  Always	
  ask,	
  always	
  check…	
  
  Be	
  suspicious…	
  
  It	
  ALL	
  comes	
  down	
  to	
  someone	
  being	
  able	
  to	
  FOOL	
  YOU,	
  
please	
  don’t	
  let	
  them	
  win.	
  
Simple	
  SoluEons	
  
We	
  talk	
  about	
  reducing	
  your	
  footprint	
  on	
  the	
  Internet…this	
  is	
  one	
  step,	
  get	
  ON	
  the	
  list	
  
and	
  stop	
  the	
  callers.	
  (This	
  way	
  you	
  get	
  to	
  filter	
  out	
  the	
  scams	
  a	
  LOT	
  more	
  effecEvely)	
  
Simple	
  SoluEons	
  
We	
  talk	
  about	
  watching	
  yourself…this	
  is	
  one	
  step,	
  research	
  the	
  opEons.	
  	
  
(This	
  way	
  you	
  get	
  to	
  have	
  someone	
  else	
  watch	
  YOU	
  24*7)	
  
More	
  SoluEons?	
  
Passwords…	
  
This	
  IS	
  how	
  we	
  feel	
  when	
  you	
  leave	
  your	
  password	
  on	
  a	
  post-­‐it-­‐note,	
  
under	
  the	
  keyboard,	
  taped	
  to	
  the	
  desk,	
  in	
  the	
  draw	
  or	
  use	
  the	
  SAME	
  
one	
  all	
  the	
  Eme…	
  
Thanks	
  XKCD!	
  
Remember	
  the	
  Why	
  You?	
  
  You	
  don’t	
  like	
  to	
  ask	
  quesEons	
  
  You	
  don’t	
  like	
  to	
  admit	
  you	
  might	
  be	
  wrong	
  
  You	
  don’t	
  have	
  the	
  “nasEness”	
  that	
  modern	
  society	
  has	
  
  You	
  have	
  money,	
  healthcare	
  history	
  and	
  Eme	
  
  You	
  have	
  credit	
  history	
  
  Technology	
  is	
  moving	
  faster	
  than	
  most	
  of	
  us	
  can	
  track	
  
  You	
  are	
  polite,	
  civilized	
  and	
  trust	
  people	
  
  You	
  make	
  bad	
  witnesses	
  (exploitaEon	
  Emeline	
  etc.)	
  
  You	
  make	
  an	
  aaracEve	
  target	
  (long/fruibul	
  life	
  etc.)	
  
Why	
  NOT	
  you!	
  
  You	
  now	
  ask	
  a	
  LOT	
  more	
  quesEons…AND	
  YOU	
  RESEARCH!	
  
  You	
  will	
  admit	
  when	
  you’ve	
  goaen	
  it	
  wrong…AND	
  YOU	
  LEARN.	
  
  You	
  are	
  a	
  liale	
  more	
  cynical…TRUST	
  AND	
  VALIDATE.	
  
  You	
  have	
  money	
  and	
  healthcare	
  history…AND	
  YOU	
  PROTECT	
  IT!	
  
  You	
  have	
  credit	
  history…AND	
  YOU	
  MONITOR	
  IT!	
  
  Technology	
  is	
  moving	
  faster…AND	
  YOU	
  ASK	
  QUESTIONS!	
  
  You	
  are	
  polite,	
  civilized	
  and	
  trust	
  people…AND	
  VALIDATE	
  THEM!	
  
  You	
  make	
  bad	
  witnesses…BUT	
  YOU	
  KNOW	
  HOW	
  TO	
  RECORD	
  J	
  
  You	
  make	
  a	
  much	
  LESS	
  ATTRACTIVE	
  TARGET!	
  
Please	
  Remember	
  
I	
  will	
  fail	
  
	
  
We	
  will	
  succeed	
  
	
  
With	
  Thanks	
  To…	
  
  If	
  we’ve	
  goaen	
  this	
  far	
  and	
  we’ve	
  had	
  quesEons…	
  then	
  
THANK	
  YOU!!	
  
  To	
  Mark	
  for	
  inviEng	
  me,	
  thank	
  you!	
  
  To	
  Eddie…for	
  everything!	
  
  Warner	
  Bros.	
  and	
  Chuck	
  Jones	
  for	
  the	
  various	
  images.	
  
  The	
  Minions,	
  the	
  squirrels,	
  the	
  cats	
  and	
  other	
  things	
  doaed	
  
throughout	
  this	
  presentaEon.	
  
“So	
  long	
  and	
  thanks	
  for	
  all	
  the	
  fish”	
  
Douglas	
  Adams,	
  you	
  are	
  missed.	
  
Links!	
  
haps://www.si.gov/scams-­‐safety/fraud/seniors	
  
hap://wjla.com/news/local/top-­‐10-­‐scams-­‐of-­‐the-­‐year-­‐
according-­‐to-­‐the-­‐bbb-­‐111114	
  
haps://campustechnology.com/arEcles/2013/09/25/who-­‐
doesnt-­‐use-­‐the-­‐internet-­‐the-­‐elderly-­‐the-­‐poor-­‐and-­‐the-­‐
uneducated.aspx	
  
hap://www.privacyrights.org/data-­‐breach/new	
  
hap://www.aging.senate.gov/resources	
  
haps://www.donotcall.gov/	
  

More Related Content

What's hot

Postive & Nagetive impacts & Applications of computer
Postive & Nagetive impacts & Applications of computerPostive & Nagetive impacts & Applications of computer
Postive & Nagetive impacts & Applications of computer
manju rani
 
advantage and disadvantage of technology
advantage and disadvantage of technology advantage and disadvantage of technology
advantage and disadvantage of technology
Ziyad Siso
 
CTO Straight Talk Issue 1
CTO Straight Talk Issue 1CTO Straight Talk Issue 1
CTO Straight Talk Issue 1
HCL Technologies
 
advantages and disadvanteges of computer
advantages and disadvanteges  of computeradvantages and disadvanteges  of computer
advantages and disadvanteges of computerJay-R Diacamos
 
Impact of computers on Society
Impact of computers on SocietyImpact of computers on Society
Impact of computers on Society
Ramki M
 
The Programmable Internet of Things
The Programmable Internet of ThingsThe Programmable Internet of Things
The Programmable Internet of Things
Rich Miller
 
Weakness and strengths of computer
Weakness and strengths of computerWeakness and strengths of computer
Weakness and strengths of computerAmanjot_kaur
 
IT impact on health
IT impact on healthIT impact on health
IT impact on health
Arcot Prasad
 
Machine Learning for Non-technical People
Machine Learning for Non-technical PeopleMachine Learning for Non-technical People
Machine Learning for Non-technical People
indico data
 
Cyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networkingCyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networking
YUSRA FERNANDO
 
Positive and Negative Impacts of Computer
Positive and Negative Impacts of ComputerPositive and Negative Impacts of Computer
Positive and Negative Impacts of ComputerHina Anjum
 
Soccnx10 Man versus Machine – A Story About Embracing Innovation
Soccnx10 Man versus Machine – A Story About Embracing Innovation Soccnx10 Man versus Machine – A Story About Embracing Innovation
Soccnx10 Man versus Machine – A Story About Embracing Innovation
Femke Goedhart
 
The future of technology
The future of technologyThe future of technology
Positive and negative impact by m.talha
Positive and negative impact by m.talhaPositive and negative impact by m.talha
Positive and negative impact by m.talha
MuhammedTalha7
 
AI - Artificial Intelligence - Implications for Libraries
AI - Artificial Intelligence - Implications for LibrariesAI - Artificial Intelligence - Implications for Libraries
AI - Artificial Intelligence - Implications for Libraries
Brian Pichman
 
INTERNET
INTERNETINTERNET
INTERNET
yaharamazing
 
C8 -ethics_technology
C8  -ethics_technologyC8  -ethics_technology
C8 -ethics_technologyEzzy Izzuddin
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Mphasis
 
Advantages of disadvantages of using the computer
Advantages of disadvantages of using the computerAdvantages of disadvantages of using the computer
Advantages of disadvantages of using the computer
MissNDuncan
 

What's hot (20)

Postive & Nagetive impacts & Applications of computer
Postive & Nagetive impacts & Applications of computerPostive & Nagetive impacts & Applications of computer
Postive & Nagetive impacts & Applications of computer
 
advantage and disadvantage of technology
advantage and disadvantage of technology advantage and disadvantage of technology
advantage and disadvantage of technology
 
CTO Straight Talk Issue 1
CTO Straight Talk Issue 1CTO Straight Talk Issue 1
CTO Straight Talk Issue 1
 
advantages and disadvanteges of computer
advantages and disadvanteges  of computeradvantages and disadvanteges  of computer
advantages and disadvanteges of computer
 
Impact of computers on Society
Impact of computers on SocietyImpact of computers on Society
Impact of computers on Society
 
The Programmable Internet of Things
The Programmable Internet of ThingsThe Programmable Internet of Things
The Programmable Internet of Things
 
Weakness and strengths of computer
Weakness and strengths of computerWeakness and strengths of computer
Weakness and strengths of computer
 
IT impact on health
IT impact on healthIT impact on health
IT impact on health
 
Machine Learning for Non-technical People
Machine Learning for Non-technical PeopleMachine Learning for Non-technical People
Machine Learning for Non-technical People
 
Cyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networkingCyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networking
 
Positive and Negative Impacts of Computer
Positive and Negative Impacts of ComputerPositive and Negative Impacts of Computer
Positive and Negative Impacts of Computer
 
Soccnx10 Man versus Machine – A Story About Embracing Innovation
Soccnx10 Man versus Machine – A Story About Embracing Innovation Soccnx10 Man versus Machine – A Story About Embracing Innovation
Soccnx10 Man versus Machine – A Story About Embracing Innovation
 
The future of technology
The future of technologyThe future of technology
The future of technology
 
Positive and negative impact by m.talha
Positive and negative impact by m.talhaPositive and negative impact by m.talha
Positive and negative impact by m.talha
 
AI - Artificial Intelligence - Implications for Libraries
AI - Artificial Intelligence - Implications for LibrariesAI - Artificial Intelligence - Implications for Libraries
AI - Artificial Intelligence - Implications for Libraries
 
INTERNET
INTERNETINTERNET
INTERNET
 
Ict And Society
Ict And SocietyIct And Society
Ict And Society
 
C8 -ethics_technology
C8  -ethics_technologyC8  -ethics_technology
C8 -ethics_technology
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Advantages of disadvantages of using the computer
Advantages of disadvantages of using the computerAdvantages of disadvantages of using the computer
Advantages of disadvantages of using the computer
 

Similar to Gunning for granny

Internet 4 Parents
Internet 4 ParentsInternet 4 Parents
Internet 4 Parents
Iwith.org
 
Negative effects-of-technology
Negative effects-of-technologyNegative effects-of-technology
Negative effects-of-technology
Abdur rehman
 
Sample Essay Technology
Sample Essay TechnologySample Essay Technology
Sample Essay Technology
Paper Writer Services
 
The use of internet web 120
The use of internet web 120The use of internet web 120
The use of internet web 120
jram2113
 
Future Kids Future Customers v2
Future Kids Future Customers v2Future Kids Future Customers v2
Future Kids Future Customers v2
Andy Hadfield
 
N3275466 - Final Presentation Advance network (1)
N3275466 - Final Presentation  Advance network (1)N3275466 - Final Presentation  Advance network (1)
N3275466 - Final Presentation Advance network (1)Christopher Lisasi
 
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecuritySpecial Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Michael Rushanan
 
Cybersecurity for the non-technical
Cybersecurity for the non-technicalCybersecurity for the non-technical
Cybersecurity for the non-technical
Stephen Cobb
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
Blake Carver
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
Nader Alkeinay
 
Privacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxPrivacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptx
sadia456189
 
Issues with computers
Issues with computersIssues with computers
Issues with computersayerssaa
 
The internet of things
The internet of thingsThe internet of things
The internet of things
SebastienVandaele
 
Ignite your possibilities ppt
Ignite your possibilities pptIgnite your possibilities ppt
Ignite your possibilities pptRoy Ollis
 
Internet Privacy
Internet PrivacyInternet Privacy
What's digital profiling and its impact on your privacy
What's digital profiling and its impact on your privacyWhat's digital profiling and its impact on your privacy
What's digital profiling and its impact on your privacy
Fabrizio Gramuglio
 

Similar to Gunning for granny (17)

Internet 4 Parents
Internet 4 ParentsInternet 4 Parents
Internet 4 Parents
 
Negative effects-of-technology
Negative effects-of-technologyNegative effects-of-technology
Negative effects-of-technology
 
Sample Essay Technology
Sample Essay TechnologySample Essay Technology
Sample Essay Technology
 
The use of internet web 120
The use of internet web 120The use of internet web 120
The use of internet web 120
 
Future Kids Future Customers v2
Future Kids Future Customers v2Future Kids Future Customers v2
Future Kids Future Customers v2
 
N3275466 - Final Presentation Advance network (1)
N3275466 - Final Presentation  Advance network (1)N3275466 - Final Presentation  Advance network (1)
N3275466 - Final Presentation Advance network (1)
 
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecuritySpecial Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
 
Cybersecurity for the non-technical
Cybersecurity for the non-technicalCybersecurity for the non-technical
Cybersecurity for the non-technical
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 
Privacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxPrivacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptx
 
Issues with computers
Issues with computersIssues with computers
Issues with computers
 
The internet of things
The internet of thingsThe internet of things
The internet of things
 
Ignite your possibilities ppt
Ignite your possibilities pptIgnite your possibilities ppt
Ignite your possibilities ppt
 
Internetsecurity
InternetsecurityInternetsecurity
Internetsecurity
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
What's digital profiling and its impact on your privacy
What's digital profiling and its impact on your privacyWhat's digital profiling and its impact on your privacy
What's digital profiling and its impact on your privacy
 

Recently uploaded

special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 

Recently uploaded (20)

special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 

Gunning for granny

  • 1. Gunning  for  Grandma…   How  the  Internet  targets  YOU,  and  what  you  can   do  to  remain  safe.  
  • 2. Today’s  Focus     Your  Internet:     My  front  door     You,  why  are  you  a  target?     Why  are  we  here?       Some  sobering  staEsEcs  (and  why  you  shouldn’t  trust  anyone)     Shoot  the  microwave,  the  fridge….and  the  toaster!     Fed  up  of  being  a  staEsEc:     Minions  revoluEon!     SoluEons     One  through  six..     Scams,  the  top  ones  and  how  to  recognize!     The  Government’s  soluEon  J     More  realisEc  opEons…  
  • 3. The  ONE  Rule   PLEASE  ASK  QUESTIONS  !!       We  are  in  this  room  for  2  hours…and  I’m  NOT   doing  all  the  talking.   There  are  NO  stupid  quesEons…      
  • 4. Why  Me  ?     Couple  of  reasons:     I’ve  got  almost  as  much  grey  hair  as  most  of  you     It  was  gained  (mostly)  in  this  industry     Lost  the  hair  ON  my  head  because  of  this  industry     This  is  actually  more  fun  than  talking  with  execuEves!     …and  probably  more  producEve     Mostly  though  because  Mark  though  it  would  be  a  cool  idea     Thank  you  Mr.  Teter!  J  
  • 8. Your  Data…     Every  month  I  excavate  from  the  Internet:     In  excess  of  750,000,000  “targets”  (IRC/I2P/P2P/FTP/HTTP)     Over  550,000  live  and  usable  Credit  Cards     Over  500,000  usable  Healthcare  records     Over  150,000  live  idenEEes  (SSN,  Passport  etc.)     YOUR  INFORMATION     YOUR  IDENTITY     YOUR  Intellectual  Property     YOUR  Companies  Info…     Your  Info,  bought,  sold,  traded.  
  • 9. Why  You?     You  don’t  like  to  ask  quesEons     You  don’t  like  to  admit  you  might  be  wrong     You  don’t  have  the  “nasEness”  that  modern  society  has     You  have  money,  healthcare  history  and  Eme     You  have  credit  history     Technology  is  moving  faster  than  most  of  us  can  track     You  are  polite,  civilized  and  trust  people     You  make  bad  witnesses  (exploitaEon  Emeline  etc.)     You  make  an  aaracEve  target  (long/fruibul  life  etc.)  
  • 10. “Not  the  world  I  grew  up  in”     Correct,  but  it  IS  the  world  you  now  live  in,  operate  in  and   HAVE  to  deal  with:     You  built  bombs,  we  build  viruses  and  malware.     You  built  rockets,  my  iPhone’s  got  more  compuEng  power.     You  cured  Polio,  I  can  kill  you  remotely  using  RFID/Wireless.     You  had  ENIAC  (Vacuum  tubes),  we  have  nanotechnology.     You  put  TV  in  the  house,  we  put  it  on  our  watches.     Your  crime  was  personal,  ours  reaches  from  across  the  globe.     Your  data  was  in  filing  cabinets,  ours  is  in  the  cloud.     You  built  Rock  n’  Roll…  that  one’s  a  keeper!!  
  • 11. Shoot  the  Coffee  Machine…     All  your  data  belongs  to:     Samsung  (your  TV  viewing  habits,  and  regular  screenshots)     Google…yes,  preay  much  anything  you  do     Apple…see  above     Your  car…welcome  to  the  infotainment  systems     Map  Apps….who  are  working  with  the  adverEsers  (and  your  car)     Social  media…that’s  more  your  fault  than  anyone  else!     Your  toaster…it’s  connected  to  the  smart-­‐system  in  your  house  J     Your  coffee  company…they  KNOW  you  need  coffee  at  8am     Etc.     Welcome   to   the   Internet   of   everything,   all   your   data   belongs   to  ????  
  • 12.
  • 14. Sobering  StaEsEcs  for  2014     EsEmated  $300  Billion  per  year  to  the  economy     Financial  impacts  (financial,  technology,  pharmaceuEcal)     Data  losses  (intellectual  property  etc.)     Over  300  “major”  breaches       Major  being  the  Really  nasty  ones….     80  Million  peoples  idenEEes  lost     That’s  just  the  ones  we  know  about…     Millions  of  new  malware  programs  “found”     Recycle  a  good  idea  and  re-­‐use  it  to  target  other  data…  
  • 15. So  Far…2015   153,351,000  records  lost,  stolen,  taken  or   misplaced.     YOUR  IdenEty   Your  Healthcare  records   Your  credit  card,  bank  account  etc.  
  • 16. Healthcare  (less)   Since  record  keeping  on  breaches  started   (around  2005):       Healthcare  has  managed  to  lose  around   715,000,000  records     (Public  disclosure  and  Darknet  research)       That’s  EACH  of  us...Twice!      
  • 18. EvoluEon   The  bad  guys  USED  to  be  easy  to  spot  (clubs,  swords,  guns  etc.)  nowadays  they  are   likely  to  be  simply  armed  with  a  keyboard  or  a  USB  sEck.  
  • 21. Minions  RevoluEon!   We  are  more  than  JUST  a  number,  a  staEsEc  or  a  line  item  on  a   Cyber  Liability  insurance  claim!  
  • 22. The  Sharp  End     Simply  fed  up  with  the  human  element  and  how  they  handle  some   of  the  basic  security  issues  that  are  facing  them  in  this  day  and   age.     Done   dealing   with   companies,   organizaEons,   enEEes,   and   governments  that  simply  want  to  carry  on  going  along  in  the  same   manner.       Frustrated  and  resenbul  of  execuEves  who  don’t  care  or  who  feel   that  security  is  a  burden  or  something  that’ll  eventually  disappear.         Intolerant   of   humans   who   think   that   security   is   something   that   happens  to  others,  who  don’t  feel  they  need  to  be  concerned  by   it,  or  who  figure  that  someone  else  will  deal  with  it.    
  • 23. Horses!   You  can  lead   a  human  to   knowledge   but  you  can’t   make  him   think.  
  • 26. One:  Protect  YOUR  Data     We  spend  our  Eme  on  patching  our  computers,  updaEng  our   firewalls  and  renewing  our  anE-­‐virus…     Wrong  approach  (don’t  stop  doing  this,  but  it’s  not  the  FOCUS)     YOUR  data:     Where  are  your  taxes?  (paper  or  online  or  on  the  computer?)     Where  do  you  keep  bank  records?     Where  do  you  keep  passwords?  (how  many  different  ones?)     Where  are  your  medical  records?     Social  Media:     Facebook  is  NOT  your  friend,  neither  is  Google     Ancestry  websites:     Amazing  places  to  research  family  AND  amazing  places  to  be   researched  on!  (Scam  arEsts  love  these  sites!)  
  • 27. One  Airline,  One  Month   How  many  of  these  are  encrypted  or  have  some  basic  “locate     me”  enabled?  …answer  NOT  many!  
  • 28. Two:  Know  Yourself     What  data  is  out  there  already  about  me?     Social  media  (Facebook  etc.)     What  data  do  I  have  stored  in  electronic  format?     Taxes?     Bank/Saving/Fidelity  accounts?     Passwords?     Who  has  access  to  my  data?     Friends  and  family     Caregivers     Where  IS  my  data?     Doctors/healthcare  providers     Shops/stores/Walgreen/CVS/Etc.  
  • 29. Simplifying  You   This  is  you   This  is  you  at  home   This  is  you  at  your   friends   This  is  your  family   This  is  you  at  the   doctors  facility   These  are  your   caregivers   YOU  are  everywhere.   So  am  I.  
  • 30. Three:  Who’s  Already  Inside?     We  always  focus  on  who’s  “out  there”  and  forget  people   already  inside  our  circle  of  trust.     Employees       Caregivers     Family     Friends     Our  electronics     How’s  that  computer  of  yours  working?     Phones,  iPads,  Fitbits  and  other  ways  in…  
  • 32. Grandchildren…   When  the  liale  one  wants  to  “borrow”  your  computer   When  your  kids  bring  their  “liale  ones”  over  to  spend  grandparent   Eme…   When  the  rugrats  are  gemng  too  rambuncEous     DON’T  LET  THEM  ON  YOUR  COMPUTER,  DON’T  LET  THEM  INSTALL   APPS  ON  YOUR  IPAD!     Taser  them…  in  the  long  run  it’s  simpler.    
  • 33. OK,  Back  to  serious  stuff…  
  • 34. Four:  Vigilance     Increase  your  awareness     Do  a  liale  research  (you  do  have  the  Eme)     Increase  your  monitoring     How  onen  do  you  check  your  accounts?     Credit  monitoring  (the  good/bad/ugly)     Increase  the  quesEons     Second  “factor”  of  authenEcaEon     Those  patches  and  that  AnEvirus  blinky  light?     They  are  important…not  great  at  protecEon,  but  beaer  than   nothing!  
  • 35. NSA   IF  we  are  being  watched,  then  the  least  they  could  do  is  fix  the  spam  problem!!  
  • 36. Five:  It’s  a  Mobile  World…     A  Lot  of  what  we  know  is  going  mobile     Paying  for  your  shopping  with  your  phone  or  watch     Online  banking  right  from  the  phone     Social  media     A  Lot  of  what’s  going  mobile  is  NOT  secure     Password  storage     “handshakes”  between  systems     Who  made  the  applicaEon?  And  where’s  my  data  going?     We  CAN  use  the  mobile  world  for  good     Response  systems     Healthcare  remote  capabiliEes  (when  implemented  correctly)  
  • 37. If  You  Use  These…   123456   password   12345   12345678   qwerty   123456789   1234   baseball   dragon   football   monkey   letmein   abc123   111111   mustang   access   shadow   master   michael   superman   696969   123123   batman   trustno1   Don’t   use   a   favorite   sport   as   your   password:   “baseball”   and   “football”   are   in   top   10,   and   “hockey,”  “soccer”  and  “golfer”  are  in  the  top  100.     Don’t  use  a  favorite  team  either:  “yankees,”  “eagles,”  “steelers,”  “rangers,”  and  “lakers”  are  all  in   the  top  100.     Don’t  use  your  birthday  or  especially  just  your  birth  year:  1989,  1990,  1991,  and  1992  are  all  in   the  top  100.     Don’t   use   baby   names   as   sources   for   picking   passwords:   “michael,”   “jennifer,”   “thomas,”   “jordan,”  “hunter,”  “michelle,”  “charlie,”  “andrew,”  and  “daniel”  are  all  in  the  top  50.    
  • 38. Six:  Time…     Take  the  Eme  to  understand  this  world     Most  of  us  in  it  don’t  profess  to  understand  it  all!     We  rely  on  friends  and  colleagues  to  help  us     Take  the  Eme  to  research  this  world     Social  engineering  is  defeated  9  Emes  out  of  10     Scams  and  basic  aaacks  are  defeated  this  way     Take  the  Eme  to  ask  quesEons  about  this  world     Most  of  us  in  it  are  happy  to  help     Many  of  us  dedicate  Eme  to  help  mentor  people     Many  of  us  work  for  chariEes,  we  are  happy  to  help!     Google  can  be  a  friend  someEmes…research  online.  
  • 41. Countdown…     Sweepstake  Scams:     You  are  ALWAYS  a  winner…unEl  you  loose  your  money  because  of   the  fees  or  taxes  you  have  to  pay  in  advance     Click  Here!     Click  here  to  watch  “x”…while  I  download  malware  to  your   computer.     Robot  Calling:     Hi,  I’m  from  Visa  and  I  can  lower  your  interest  rate/help  pay  off  your   card….Oh,  and  I  can  steal  the  number.     Government  Grants:     You’ve  been  selected  to  parEcipate  in  the  grant  program,  all  you   need  to  do  is  pay  the  taxes  or  fees….and  I  take  your  informaEon.     Family  Emergency!     I’m  stuck  in  Europe  because  I  got  robbed,  please  help…send  me   money  please…  let  me  rob  you  while  tugging  at  heartstrings.  
  • 43. ConEnues...     Medical  Alert:     Your  family  is  concerned,  have  this  device  sent  to  you,  give  us  your   credit  card  or  bank  info…  No  device  and  an  empty  credit  card…     Copycat  Website:     If  it’s  seems  too  good  to  be  true…then  it    probably  is!  Counterfeit   heaven.     Fake  Caller  ID:     Your  number  is  calling  you??  Simple  way  to  get  you  to  pick  up  the   phone…and  that’s  ½  my  baale,  if  I  can  engage  you  then  I  win!     Technical  support:     Hi  I’m  from  Microson/IBM/CenturyLink  your  computer  is  infected,  let   me  help  you…oh  and  while  I’m  doing  that  I’m  going  to  install  a  back   door.     ArresEng  You!     IRS,  Feds  or  someone  else  is  coming  to  serve  a  warrant  unless  you  pay   the  bond/fees/amount  due…  Pay  now  over  the  phone  while  I  steal  your   informaEon.  
  • 44. We  Call  it  Social  Engineering     Fake  e-­‐mails  are  more  common  than  ever.     20%  of  people  will  fall  for  fake  E-­‐Mail,  75%  will  fall  for  fake   websites  and  fake  calls.     Sites  that  seem  to  be  legiEmate  and  “require”  the  receiver  to   enter  their  username  and  password.     Same  goes  for  phone  calls  by  fake  federal  agents,  etc.,  asking   for  password  compliance  or  informaEon.     We  need  beaer  communicaEon  on  how  to  avoid  such  scenarios.  
  • 45. The  Internet…   There  are  a  few  of  us  who’d  like  to  do  this  to  “some”  of   the  users  of  the  Internet…  
  • 46. Good  Grief  More??     TelemarkeEng  Fraud:     Yes  the  offer  IS  great,  Yes  I’ll  act  now…here’s  me  hanging  up  the  phone.     Nigerian  Leaer  or  “419”  Fraud:     No!  The  banker  in  Kenya  is  NOT  simng  on  $6M  and  No  he  won’t  share  it  with  you!     IdenEty  Then  and  Credit  Card  Fraud:     Really  quesEon  EVERY  Eme  you  hand  over  your  credit  card!!     Craigslist  schemes:     Sending  me  a  check  for  $2000  to  pay  for  a  $100  item  is  NOT  going  to  get  you  $1900  of  MY   money…Goodbye!     RedempEon  /  Strawman  /  Bond  Fraud:     Those  bank  document  or  bond  documents  are  probably  Photoshopped!     Internet  AucEon  Fraud:     Only  thing  here  is  PLEASE  do  your  research!!  If  in  doubt  walk  away!  OR  put  the  money  in   the  middle  unEl  ALL  parEes  are  happy.     Non-­‐Delivery  of  Merchandise:     Do  your  homework  and  research!  “Reach  out  and  touch  someone”  trust  and  then   VALIDATE!  
  • 48. Ok,  Enough  Scams  (For  Now)   What’s  the  Government  got  to  say  about  this?  
  • 49. Government’s  PosiEon   Robert  Mueller,  former  FBI  Director,  recently  stated:     “There  are  only  two  types  of  companies:  Those  that  have  been   hacked,  and  those  that  will  be.”     Even  that  is  merging  into  one  category:       “Those  that  have  been  hacked  and  will  be  again”  
  • 50. Our  Federal  Colleagues     FBI’s  got  a  scam  safety  site  (PLEASE  visit  it!)     Health  Care  Fraud  or  Health  Insurance  Fraud     Counterfeit  PrescripEon  Drugs     Funeral  and  Cemetery  Fraud     Fraudulent  “AnE-­‐Aging”  Products     TelemarkeEng  Fraud     Internet  Fraud     Investment  Schemes     Reverse  Mortgage  Scams   haps://www.si.gov/scams-­‐safety/  
  • 51. FBI’s  Common  Denominator?     Carefully  review…     Be  mindful…     Be  an  informed  consumer…     Research  thoroughly…     Always  ask,  always  check…     Be  suspicious…     It  ALL  comes  down  to  someone  being  able  to  FOOL  YOU,   please  don’t  let  them  win.  
  • 52. Simple  SoluEons   We  talk  about  reducing  your  footprint  on  the  Internet…this  is  one  step,  get  ON  the  list   and  stop  the  callers.  (This  way  you  get  to  filter  out  the  scams  a  LOT  more  effecEvely)  
  • 53. Simple  SoluEons   We  talk  about  watching  yourself…this  is  one  step,  research  the  opEons.     (This  way  you  get  to  have  someone  else  watch  YOU  24*7)  
  • 55. Passwords…   This  IS  how  we  feel  when  you  leave  your  password  on  a  post-­‐it-­‐note,   under  the  keyboard,  taped  to  the  desk,  in  the  draw  or  use  the  SAME   one  all  the  Eme…  
  • 57.
  • 58. Remember  the  Why  You?     You  don’t  like  to  ask  quesEons     You  don’t  like  to  admit  you  might  be  wrong     You  don’t  have  the  “nasEness”  that  modern  society  has     You  have  money,  healthcare  history  and  Eme     You  have  credit  history     Technology  is  moving  faster  than  most  of  us  can  track     You  are  polite,  civilized  and  trust  people     You  make  bad  witnesses  (exploitaEon  Emeline  etc.)     You  make  an  aaracEve  target  (long/fruibul  life  etc.)  
  • 59. Why  NOT  you!     You  now  ask  a  LOT  more  quesEons…AND  YOU  RESEARCH!     You  will  admit  when  you’ve  goaen  it  wrong…AND  YOU  LEARN.     You  are  a  liale  more  cynical…TRUST  AND  VALIDATE.     You  have  money  and  healthcare  history…AND  YOU  PROTECT  IT!     You  have  credit  history…AND  YOU  MONITOR  IT!     Technology  is  moving  faster…AND  YOU  ASK  QUESTIONS!     You  are  polite,  civilized  and  trust  people…AND  VALIDATE  THEM!     You  make  bad  witnesses…BUT  YOU  KNOW  HOW  TO  RECORD  J     You  make  a  much  LESS  ATTRACTIVE  TARGET!  
  • 60. Please  Remember   I  will  fail     We  will  succeed    
  • 61. With  Thanks  To…     If  we’ve  goaen  this  far  and  we’ve  had  quesEons…  then   THANK  YOU!!     To  Mark  for  inviEng  me,  thank  you!     To  Eddie…for  everything!     Warner  Bros.  and  Chuck  Jones  for  the  various  images.     The  Minions,  the  squirrels,  the  cats  and  other  things  doaed   throughout  this  presentaEon.  
  • 62. “So  long  and  thanks  for  all  the  fish”   Douglas  Adams,  you  are  missed.  
  • 63. Links!   haps://www.si.gov/scams-­‐safety/fraud/seniors   hap://wjla.com/news/local/top-­‐10-­‐scams-­‐of-­‐the-­‐year-­‐ according-­‐to-­‐the-­‐bbb-­‐111114   haps://campustechnology.com/arEcles/2013/09/25/who-­‐ doesnt-­‐use-­‐the-­‐internet-­‐the-­‐elderly-­‐the-­‐poor-­‐and-­‐the-­‐ uneducated.aspx   hap://www.privacyrights.org/data-­‐breach/new   hap://www.aging.senate.gov/resources   haps://www.donotcall.gov/