SlideShare a Scribd company logo
1 of 41
A
Presentation
On
Social media threats and their
prevention
Presented by
Mr :-Ayush Undale
Mr :-Rohit Nadimetla
Mr :-Suraj Gurushetti
Mr :-Sumit Kshirsagar
For the partial fulfillment of SY (AI & DS) curriculum of Sem 3
at
VIKAS PRATISHTHAN INSTITUTE OF ENGINEERING &
TECHNOLOGY ,SOLAPUR
 Contents
1. Introduction
2. Social media threats and methods of Scammers.
3. Prevention from social media threats

1. Introduction
Social media refers to a variety of
technologies that facilitate the sharing of
ideas and information among their users.
From Facebook and Instagram to X
platform (formerly Twitter) and YouTube,
more than 4.7 billion people use social
media, equal to roughly 60% of the
world's population.
Social networks are websites and apps that
allow users and organizations to connect,
communicate, share information
2. Social media threats and methods by
scammers
1. Social engineering
2. Phishing
3. Brand impersonation
4. Site compromise and data theft
5. Spread malware
6. Data breach
3. Prevention from social media
threats
1. Avoid using social media sites on public Wi-Fi
hotspots.
2. users should also be encouraged to change their
own private social media account passwords.
3. Use ad blockers on corporate devices. If ad
blockers are not feasible, instruct employees to
avoid clicking ads etc.
4. Conclusion
The conclusion of this 1`st presentation is that we have a lot social media threats as
well as it`s preventions the thing is we all have to be aware of those threats and
preventions.
 Contents
 Some dangerous sub type social media threats
1. Catfishing
2. Cyberbullying
3. Identity theft
 How do scammers generate scamming links
1. How it works

 Some dangerous sub type social
media threats
1. Catfishing
Catfishing refers to when a person takes information and images,
typically from other people, and uses them to create a new
identity for themselves. In some cases, a catfisher steals another
individual’s complete identity including their image, date of
birth, and geographical location and pretends that it is their own.
The catfisher then uses this identity to trick other people into
associating with them or doing business online.
2. Cyberbullying
It is the use of technology to harass, threaten, embarrass, or target another person. Online threats and
mean, aggressive, or rude texts, tweets, posts, or messages all count. So does posting personal
information, pictures, or videos designed to hurt or embarrass someone else.
3. Identity Theft?
Identity theft is the crime of obtaining the personal or financial
information of another person to use their identity to commit
fraud, such as making unauthorized transactions or purchases.
Identity theft is committed in many different ways and it`s
victims are typically left with damage to their credit, finances,
and reputation.
 How do scammers generate scamming
links
There are a lot of ways to generate the scamming links
but here I have one of the methods (tool) how
scammers create fishing links.
Blackeye is an open-source pen-testing tool
intended for simulating credential harvesting
phishing attacks. The goal is to show how easily
this type of attack can be done by someone with
little to no technical experience as well as make
others more aware of this type of attack.
How it works:-
Blackeye has 39 templates for hosting
a fake website. These templates span
many of the most popular services on
the internet such as social media,
banking, etc. Each template contains
everything needed to host the fake
website. This includes the necessary
HTML files as well as scripts to run on
the hosted site. The screenshots below
show the scripts that grab the victim’s
IP address, user agent, and credentials
(in this case the scripts are for the fake
Snapchat website template).
 Conclusion
The conclusion of this presentation is there are a lot of threats like cyberbullying,
catfishing, identify theft and fishy link scam the users should be aware of these
threats and their preventions
 Contents
1. Working diagram of blackeye tool
2. Basic software information about Scamming process

Templet
choosing
Generating
URL And
waits for
Data
Crafting a
phising
message in a
Email etc.
By
Scammer
Sending IP
address to
scammer (after
link clicked )
Sends the
user
information if
got through
Ngork
Shortens the
URL to not
look
Suspicious.
1. Working Diagram of Blackeye
Internal program
Displaying output on blackeye
2. Basic software information about Phishing link scam
Front-end Development: The front-end is the
visible part of the website or web application
responsible for the user interactions. And, you
only interact with the front part of the web
application using web browsers.
Back-end Development: The back-end focuses on
how the website works. It runs queries and
presents you with the desired data.
There are verities of programming languages used
for the front end and back end web developing but
mostly Python and PHP is used for backend web
developing and for front end developing HTML
and CSS.
 Conclusion
There are a lot of ways to scam people that we saw only one of them today with a
bit of software explanation as of all we should be aware of these threats, methods
of scamming around us.
 Contents
1. What is Artificial Intelligence
2. How artificial intelligence is used as a social threats
 Abuse of data and loss and control
 Privacy, security and deepfakes
3. Cases of Artifical intelligence threats Occurred

2. How artificial intelligence is used as
a social threats
Abuse of data is a huge possibility since both data
and AI tools are in the hands of a select few.
Unless values and ethics are built into digital
systems, decisions made by AI algorithms will
favor only selected parties. Privacy and power are
being handed over to digital tools over which very
few people have any control.
for an example I`ll just give few examples that
when we like create G-mails or create social
accounts on different apps our data is in hands of
that Ai of application or web that is controlled by a
person or an organization.
 Abuse of data and loss of control
 Privacy, security and deepfakes
Audio and video deepfakes are already gaining ground.
Video deepfakes are being successfully used in the
advertising world, making it difficult to differentiate
between real and virtual. Social media personalities could
be easily engineered to influence sections of society.
Similarly, audio clips of influential people can be
manipulated and misused.
 Kerala man loses ₹40k to AI-enabled deep-
fake fraud
3. Cases of Artificial intelligence threats Occurred
A 73-year-old man in India fell victim to a deepfake scam
after receiving a call from someone impersonating his
former colleague and asking for money. The scammer
used deepfake technology to create a video call in which
the impersonator's face and voice matched the victim's
former colleague. The victim transferred money before
realizing he had been tricked. Police have traced the
money to an account in Maharashtra and are investigating
further. This is the first reported case of a deepfake scam
in India.
 Conclusion
So from this presentation we conclude that Artificial intelligence is also a social threat to our
society and we should use or Share our information with precautions.
 Contents
1. How AI creates deepfakes of audio and video
2. Example of Audio Deepfake
3. How to prevent ourselves from these scams

1. How AI creates deepfakes of audio and video
 Usually we all know that The voiced speech of
a typical adult male will have a fundamental
frequency from 85 to 155 Hz, and that of a
typical adult female from 165 to 255 Hz. So
what happens is the ai takes an audio input
anylizies it`s frequency like (pitch of an audio)
and at our command it generates similar type
frequency voice that given as input.
 As for fake video generating the AI focuses on
the facial structural of the input given and
visualizes it as an output video the output may
be different depending upon the algorithms
provided.
Real Voice Note
of Rishik
AI generated Voice note (Deepfake)
Real Voice Note
of Rishik
AI generated Voice note (Deepfake)
 Awkward facial positioning
 Unnatural body movement
 Unnatural coloring
 Misalignment
 Images that look unnatural as you zoom in or slow down
 Inconsistent audio
 Absence of blinking
1. How to prevent ourselves from these scams
 Conclusion
In this presentation we conclude the Role of artificial intelligence as social media threats with
different methods and some preventions.
Contents
1. A different method of using fishing links
2. What is CamPhish ?
2. 6 signs someone is watching you through your webcam
3. Need of awareness of social media threats

1. A different method of using fishing links
Webcams are everywhere: in our laptops, in our security systems, and in our phones wherever we go. Yet
webcam security is often a blind spot for even the most secure systems, leaving most webcams vulnerable to
hacking. Let`s see how to tell if your webcam is hacked, and find out how to improve your webcam security
and protect your privacy.
2. What is CamPhish ?

CamPhish is techniques to take cam shots of target's phone front camera or PC webcam. CamPhish Hosts a
fake website on in built PHP server and uses Ngrok & server to generate a link which we will forward to
the target, which can be used on over internet. website asks for camera permission and if the target allows it,
this tool grab cam shots of target's device.
 Conclusion
With the increase of social media and technology there are a lot of different methods of threats
as we see in this world we should be aware about the threats around social media and other
technologies.
Contents
1. What is cybersecurity ?
2. Top cybersecurity Threats
3. Importance of cybersecurity

3. Importance of Cybersecurity:-
 Protecting Sensitive Data
 Prevention of Cyber Attacks
 Safeguarding Critical Infrastructure
 Maintaining Business Continuity
 Compliance with Regulations
 Protecting National Security
 Preserving Privacy
 Conclusion
Cybersecurity plays major role that tries to solve threats around social networking and social
media as it helps us to be aware of threats around us and protects us.

More Related Content

Similar to pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr

Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Ronak Jain
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)Kolluru N Rao
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)CA.Kolluru Narayanarao
 
cyber crime technology
cyber crime technologycyber crime technology
cyber crime technologyBinu p jayan
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingmentAswani34
 
Awareness Against Cyber Crime
Awareness Against Cyber CrimeAwareness Against Cyber Crime
Awareness Against Cyber CrimeNithin Raj
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security riskK. A. M Lutfullah
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1Abdelfatah hegazy
 
Societal impacts PART2
Societal impacts PART2Societal impacts PART2
Societal impacts PART2AVISHITYAGI
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?FarjanaMitu3
 

Similar to pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr (20)

Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Phishing
PhishingPhishing
Phishing
 
cyber crime technology
cyber crime technologycyber crime technology
cyber crime technology
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
Awareness Against Cyber Crime
Awareness Against Cyber CrimeAwareness Against Cyber Crime
Awareness Against Cyber Crime
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
cyber crime
cyber crimecyber crime
cyber crime
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Societal impacts PART2
Societal impacts PART2Societal impacts PART2
Societal impacts PART2
 
Spyware
SpywareSpyware
Spyware
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 

Recently uploaded

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 

Recently uploaded (20)

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 

pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr

  • 1. A Presentation On Social media threats and their prevention Presented by Mr :-Ayush Undale Mr :-Rohit Nadimetla Mr :-Suraj Gurushetti Mr :-Sumit Kshirsagar For the partial fulfillment of SY (AI & DS) curriculum of Sem 3 at VIKAS PRATISHTHAN INSTITUTE OF ENGINEERING & TECHNOLOGY ,SOLAPUR
  • 2.  Contents 1. Introduction 2. Social media threats and methods of Scammers. 3. Prevention from social media threats 
  • 3. 1. Introduction Social media refers to a variety of technologies that facilitate the sharing of ideas and information among their users. From Facebook and Instagram to X platform (formerly Twitter) and YouTube, more than 4.7 billion people use social media, equal to roughly 60% of the world's population. Social networks are websites and apps that allow users and organizations to connect, communicate, share information
  • 4. 2. Social media threats and methods by scammers 1. Social engineering 2. Phishing 3. Brand impersonation 4. Site compromise and data theft 5. Spread malware 6. Data breach
  • 5. 3. Prevention from social media threats 1. Avoid using social media sites on public Wi-Fi hotspots. 2. users should also be encouraged to change their own private social media account passwords. 3. Use ad blockers on corporate devices. If ad blockers are not feasible, instruct employees to avoid clicking ads etc.
  • 6. 4. Conclusion The conclusion of this 1`st presentation is that we have a lot social media threats as well as it`s preventions the thing is we all have to be aware of those threats and preventions.
  • 7.  Contents  Some dangerous sub type social media threats 1. Catfishing 2. Cyberbullying 3. Identity theft  How do scammers generate scamming links 1. How it works 
  • 8.  Some dangerous sub type social media threats 1. Catfishing Catfishing refers to when a person takes information and images, typically from other people, and uses them to create a new identity for themselves. In some cases, a catfisher steals another individual’s complete identity including their image, date of birth, and geographical location and pretends that it is their own. The catfisher then uses this identity to trick other people into associating with them or doing business online.
  • 9. 2. Cyberbullying It is the use of technology to harass, threaten, embarrass, or target another person. Online threats and mean, aggressive, or rude texts, tweets, posts, or messages all count. So does posting personal information, pictures, or videos designed to hurt or embarrass someone else.
  • 10. 3. Identity Theft? Identity theft is the crime of obtaining the personal or financial information of another person to use their identity to commit fraud, such as making unauthorized transactions or purchases. Identity theft is committed in many different ways and it`s victims are typically left with damage to their credit, finances, and reputation.
  • 11.
  • 12.  How do scammers generate scamming links There are a lot of ways to generate the scamming links but here I have one of the methods (tool) how scammers create fishing links. Blackeye is an open-source pen-testing tool intended for simulating credential harvesting phishing attacks. The goal is to show how easily this type of attack can be done by someone with little to no technical experience as well as make others more aware of this type of attack.
  • 13. How it works:- Blackeye has 39 templates for hosting a fake website. These templates span many of the most popular services on the internet such as social media, banking, etc. Each template contains everything needed to host the fake website. This includes the necessary HTML files as well as scripts to run on the hosted site. The screenshots below show the scripts that grab the victim’s IP address, user agent, and credentials (in this case the scripts are for the fake Snapchat website template).
  • 14.  Conclusion The conclusion of this presentation is there are a lot of threats like cyberbullying, catfishing, identify theft and fishy link scam the users should be aware of these threats and their preventions
  • 15.  Contents 1. Working diagram of blackeye tool 2. Basic software information about Scamming process 
  • 16. Templet choosing Generating URL And waits for Data Crafting a phising message in a Email etc. By Scammer Sending IP address to scammer (after link clicked ) Sends the user information if got through Ngork Shortens the URL to not look Suspicious. 1. Working Diagram of Blackeye
  • 18. 2. Basic software information about Phishing link scam Front-end Development: The front-end is the visible part of the website or web application responsible for the user interactions. And, you only interact with the front part of the web application using web browsers. Back-end Development: The back-end focuses on how the website works. It runs queries and presents you with the desired data. There are verities of programming languages used for the front end and back end web developing but mostly Python and PHP is used for backend web developing and for front end developing HTML and CSS.
  • 19.
  • 20.  Conclusion There are a lot of ways to scam people that we saw only one of them today with a bit of software explanation as of all we should be aware of these threats, methods of scamming around us.
  • 21.  Contents 1. What is Artificial Intelligence 2. How artificial intelligence is used as a social threats  Abuse of data and loss and control  Privacy, security and deepfakes 3. Cases of Artifical intelligence threats Occurred 
  • 22.
  • 23. 2. How artificial intelligence is used as a social threats Abuse of data is a huge possibility since both data and AI tools are in the hands of a select few. Unless values and ethics are built into digital systems, decisions made by AI algorithms will favor only selected parties. Privacy and power are being handed over to digital tools over which very few people have any control. for an example I`ll just give few examples that when we like create G-mails or create social accounts on different apps our data is in hands of that Ai of application or web that is controlled by a person or an organization.  Abuse of data and loss of control
  • 24.  Privacy, security and deepfakes Audio and video deepfakes are already gaining ground. Video deepfakes are being successfully used in the advertising world, making it difficult to differentiate between real and virtual. Social media personalities could be easily engineered to influence sections of society. Similarly, audio clips of influential people can be manipulated and misused.
  • 25.  Kerala man loses ₹40k to AI-enabled deep- fake fraud 3. Cases of Artificial intelligence threats Occurred A 73-year-old man in India fell victim to a deepfake scam after receiving a call from someone impersonating his former colleague and asking for money. The scammer used deepfake technology to create a video call in which the impersonator's face and voice matched the victim's former colleague. The victim transferred money before realizing he had been tricked. Police have traced the money to an account in Maharashtra and are investigating further. This is the first reported case of a deepfake scam in India.
  • 26.  Conclusion So from this presentation we conclude that Artificial intelligence is also a social threat to our society and we should use or Share our information with precautions.
  • 27.  Contents 1. How AI creates deepfakes of audio and video 2. Example of Audio Deepfake 3. How to prevent ourselves from these scams 
  • 28. 1. How AI creates deepfakes of audio and video  Usually we all know that The voiced speech of a typical adult male will have a fundamental frequency from 85 to 155 Hz, and that of a typical adult female from 165 to 255 Hz. So what happens is the ai takes an audio input anylizies it`s frequency like (pitch of an audio) and at our command it generates similar type frequency voice that given as input.  As for fake video generating the AI focuses on the facial structural of the input given and visualizes it as an output video the output may be different depending upon the algorithms provided.
  • 29. Real Voice Note of Rishik AI generated Voice note (Deepfake)
  • 30. Real Voice Note of Rishik AI generated Voice note (Deepfake)  Awkward facial positioning  Unnatural body movement  Unnatural coloring  Misalignment  Images that look unnatural as you zoom in or slow down  Inconsistent audio  Absence of blinking 1. How to prevent ourselves from these scams
  • 31.  Conclusion In this presentation we conclude the Role of artificial intelligence as social media threats with different methods and some preventions.
  • 32. Contents 1. A different method of using fishing links 2. What is CamPhish ? 2. 6 signs someone is watching you through your webcam 3. Need of awareness of social media threats 
  • 33. 1. A different method of using fishing links Webcams are everywhere: in our laptops, in our security systems, and in our phones wherever we go. Yet webcam security is often a blind spot for even the most secure systems, leaving most webcams vulnerable to hacking. Let`s see how to tell if your webcam is hacked, and find out how to improve your webcam security and protect your privacy.
  • 34. 2. What is CamPhish ?  CamPhish is techniques to take cam shots of target's phone front camera or PC webcam. CamPhish Hosts a fake website on in built PHP server and uses Ngrok & server to generate a link which we will forward to the target, which can be used on over internet. website asks for camera permission and if the target allows it, this tool grab cam shots of target's device.
  • 35.
  • 36.  Conclusion With the increase of social media and technology there are a lot of different methods of threats as we see in this world we should be aware about the threats around social media and other technologies.
  • 37. Contents 1. What is cybersecurity ? 2. Top cybersecurity Threats 3. Importance of cybersecurity 
  • 38.
  • 39.
  • 40. 3. Importance of Cybersecurity:-  Protecting Sensitive Data  Prevention of Cyber Attacks  Safeguarding Critical Infrastructure  Maintaining Business Continuity  Compliance with Regulations  Protecting National Security  Preserving Privacy
  • 41.  Conclusion Cybersecurity plays major role that tries to solve threats around social networking and social media as it helps us to be aware of threats around us and protects us.