SlideShare a Scribd company logo
1 of 50
The Mos t Dangerous
 Places on the Web

  A presentation by J. Joel May
Threat Levels
Your E mail Inbox
              • Moderately Dangerous
• Email attachments carrying malware are the most
  common way attackers get into your computer.
   –   Viruses
   –   Worms
   –   Trojan Horses
   –   Rootkits
• Phishing:      The act of sending an email to a user
  falsely claiming to be an established legitimate
  enterprise in an attempt to scam the user into
  surrendering private information that will be used
  for identity theft. 
Your E mail Inbox
              If you have to go there:
• Delete suspicious emails with attachments
• Be sure that your anti-virus software is
  configured to scan incoming email
• Update your virus definitions files “regularly”
• Look for spelling and grammar errors
• Look for faked or numerical URLs
   – www.warstaw.ly/www.citibank.com
   – http://200.215.16.194/
• Call the company that sent you the message, but
  don’t use the phone number in the email
Video Download S ites
           • Moderately Dangerous


• Hackers exploit flaws in video players like
  QuickTime and Windows Media Player
• These can trigger bugs that let attackers in to
  spy on your computer activity, plant other
  malware, and more
• Or you may be prompted to install an additional
  codec which could be infected
Video Download S ites
           If you have to go there:


• Keep your player software up to date
• Avoid downloading videos at random
• Stick to well-known video sites such as YouTube
  or to download services like iTunes
Webs ites that Us e Flas h
          • Moderately Dangerous


• Adobe’s Flash is widely used to display video
• Flash cookies can track the sites you visit
• When you delete your browser cookies, Flash
  cookies get left behind
Webs ites that Us e Flas h
           If you have to go there:



• Keep your Flash browser plug-ins up to date
  with get.adobe.com/flashplayer/
Webs ites that Us e Flas h
            If you have to go there:

• If you use Firefox as your browser, download
  Better Privacy at
  www.pcworld.com/downloads/file/fid,80462/description


• If not, go to
  www.macromedia.com/support/documentation/en/flashp
   and follow the instructions there
S oc ial Networks
         • Moderately Dangerous


• Way too much sharing of information
• Information stays on the Web
  permanently
S oc ial Networks
          If you have to go there:


• This threat is easy to avoid with just a
  little common sense
• Be mindful of what you post
• Be certain to check your privacy settings
J us t A bout A ny A d-S upported S ite
           • Moderately Dangerous

• Cybercriminals have taken out ads on popular
  web sites to lure in victims
• Even the NY Times web site has been affected
• As has Google’s Sponsored Link ad program
• Ads that look like links to major companies’
  websites redirect you to sites containing
  malware
J us t A bout A ny A d-S upported S ite
             If you have to go there:


• Move your mouse pointer to the link and hover
  over it. In the lower right corner of the
  screen you will see the URL of the site to
  which a click would take you
• Inspect it carefully, and if it looks suspicious,
  don’t go there
Twitter
              • Very Dangerous

• Because of the 140 word limit on a “tweet,”
  Twitter relies heavily on shortened URLs

• It is very simple to hide malware or scams
  behind shortened URLs
Twitter
               If you have to go there:
• Simply don’t click on shortened links
  (but that takes all the fun out of it!)
• Use a Twitter client app. Tweet Deck (
  http://www.tweetdeck.com/desktop/) has a preview
  feature that lets you see the full URL

• Another alternative is http://www.expandmyurl.com/
S earc h E ngines
               • Very Dangerous

• “Search engine poisoning” is the practice of
  building tainted sites that are designed to rank
  high in a search for a given topic
• Breaking news topics, facebook, and female
  rock, tv and movie stars are frequent examples
S earc h E ngines
      If you have to go there (and you do)


• Pick and choose which search results to click on
• Check each URL first to make sure that it
  really leads you to the site you want
• Use tools like
  AVG’s Link Scanner (linkscanner.avg.com),
  McAfee’s SiteAdvisor (www.siteadvisor.com),
  or Web of Trust (www.mywot.com)
  to help identify malicious sites
Downloaded PDF Files
                 • Very Dangerous
• PDF files can be crafted so that they trigger bugs in
  Adobe Reader and Adobe Acrobat
• Downloaded, they can let an attacker commandeer
  your PC and access your files and personal
  information
• A newer variant can take an otherwise innocent PDF
  and insert malware into it
• According to security firm Symantec, in 2009
  attacks using malicious PDFs made up 49% of all
  Web-based attacks
Downloaded PDF Files
            If you have to go there:
• Make sure you always have the latest version of
  Adobe Reader
• Better still, use a different PDF reader
  – Foxit
    (http://www.foxitsoftware.com/pdf/reader/)
  – Sumatra (
    http://blog.kowalczyk.info/software/sumatrapdf/free-pdf-re
    )
  – Nuance
    (
    http://www.nuance.com/for-business/by-product/pdf/pdfread
    )
Hacked Legitimate S ites
             • Downright Unsafe


• In a common attack method, criminals will hack
  a Web page, often on a legitimate site, and
  insert code that will download malware to your
  computer
Hacked Legitimate S ites
             If you have to go there:

• Keep your security software up to date
• Run regular malware scans
• Try a program like WinPatrol that takes snapshot of
  your critical system resources and alerts you to any
  changes that may occur without your knowledge. (
  http://www.winpatrol.com/)
Fake A nti-Virus Programs
              • Downright Unsafe

• Fake anti-virus programs are contained in pop-
  up windows on legitimate web sites
• They typically report finding a virus, even
  though your computer is actually clean.
• The software might also fail to report viruses
  when your computer is infected.
• Sometimes, when you download rogue security
  software, it will install a virus or other
  malicious software on your computer so that the
  software has something to detect
Fake A nti-Virus Programs
             • Downright Unsafe




• Once downloaded, the trial version will nag you
  for a purchase
• When you buy, the criminals will steal your
  credit information
Fake A nti-Virus Programs
                 • Downright Unsafe
• Rogue security software might also:
   – Lure you into a fraudulent transaction (for
     example, upgrading to a non-existent paid version
     of a program).
   – Install malware that can go undetected as it steals
     your data.
   – Launch pop-up windows with false or misleading
     alerts.
   – Slow your computer or corrupt files.
   – Disable Windows updates or disable updates to
     legitimate antivirus software.
   – Prevent you from visiting antivirus vendor websites.
Fake A nti-Virus Programs
                If you have to go there:

• If you get an alert saying you’re infected with
  malware, but it didn’t come from software you
  knowingly installed:
   – Immediately stop what you are doing
   – Close the browser (end the task) using Task
     Manager. Don’t click on the close button!
   – Try booting into Safe Mode and running a scan
   – In no case should you download the suggested
     software or run the suggested system check
Torrent S ites
            • Downright Unsafe

• Most often used for sharing pirated music,
  videos, or software
• Which can easily contain malware
• By comparison, many porn sites are
  deemed trustworthy
Torrent S ites
             If you have to go there:


•   Don’t use your primary computer
•   Use anti-virus software and keep it updated
•   Scan downloaded files
•   Wait a couple of days before opening them;
    scan again before opening
S ome Tips for
S taying Out Of Trouble
Tip #1
• Ensure that you have antivirus software
  installed and that it is updated at least
  once a week, either manually or
  automatically.  Check occasionally to
  ensure that it really is up to date.  If
  your antivirus software subscription has
  expired, renew it as a matter of
  urgency.
Tip #2
• Never click on a link within an email
  message, or download an attachment
  linked to an email message, unless you
  are 100% confident that the source can
  be trusted.  If in doubt, just delete the
  message.  Remember, banks never email
  you to ask you to log in to your account.
Tip #3

• If you haven't turned on the firewall in
  Windows, do so. To learn how to do this,
  click on Start, then Help and Support.
  Type “firewall” (no quotes) in the search
  box and press Enter.
Tip #4
• Ensure that you have enabled the
  Automatic Updates feature in Windows.
  To learn how to do this, click on Start,
  then Help and Support. Type “windows
  updates” (no quotes) in the search box
  and press Enter.
Tip #5
• If you have a broadband or cable router
  that is providing wifi access, you must
  enable encryption. Without encryption,
  neighbours and strangers can access your
  internet connection and, possibly, the
  files on your PC.  WEP encryption is an
  older standard and is not as strong  as
  WPA, but is better than nothing if your
  router doesn't support WPA.  
Tip #6
• If you are using your computer for online
  shopping, always buy from sites run by
  reputable companies that you trust.

• If you use online banking, or other online
  services where security is paramount,
  always use a different password for each
  bank or site.
Tip #7
• Before entering personal information such
  as a password or your credit card
  number into a web site, check that the
  address of the site starts with https
  (sometimes accompanied by a picture of
  a padlock).

• An example:
Tip #8
• If you have confidential documents
  stored on your PC you should therefore
  consider the use of an encryption
  program, or look up details on how to use
  the EFS (Encrypting File System) feature
  built into Windows.
• (I use lockdir.exe available at
  http://www.filecluster.com/downloads/KaKa-Fo
   )
Tip #9
• Make copies of all the important files
  that are on your computer, such as
  documents, emails, photographs, music
  tracks, video clips, and so on.  The most
  convenient way to do this is to use an
  external USB hard drive or a “flash
  drive", depending on how much data you
  have.  Never keep your backup near your
  computer.
Keeping S oftware Up to Date

   Secunia is a FREE security tool designed to
   detect vulnerable and out-dated programs and
   plug-ins which expose your PC to attacks. 

 http://secunia.com/vulnerability_scanning/online

http://secunia.com/vulnerability_scanning/personal/
S ummary
    • Keep up on patches and version updates
    • Be password smart
    • Use security software
    • Back up your data regularly
    • If it sounds too good to be true. . .well, you
      know the rest
    • Assume that everyone is out to get you

Stay up-to-date, Stay paranoid, Stay protected
S ome S ites that Make it Worthwhile

• YouTube (www.youtube.com)

• The Drudge Report (www.drudgereport.com)

• The Art Project (www.googleartproject.com)

• Government Made Easy (www.usa.gov)

• US1 Events Search (princetoninfo.com/index.php?option
  =com_us1event&Itemid=2)
This presentation is available on the Web at
        www.joelmay.org/presentations




               The E nd

More Related Content

What's hot

Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014B2BPlanner Ltd.
 
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin AhmedBackup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin AhmedMazin Ahmed
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self DefenseBarry Caplin
 
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...Security Weekly
 
Syafiqah slideshare of security measures
Syafiqah slideshare of security measuresSyafiqah slideshare of security measures
Syafiqah slideshare of security measuresSyafiqah Akemi
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Homejaysonstreet
 
Surfing with Sharks KS ED TECH 2012
Surfing with Sharks   KS ED TECH 2012Surfing with Sharks   KS ED TECH 2012
Surfing with Sharks KS ED TECH 2012inf8nity
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antivirusesSarhad Baez
 
Jailbreaking iOS
Jailbreaking iOSJailbreaking iOS
Jailbreaking iOSMihir Patel
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businessesB2BPlanner Ltd.
 
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Tom Eston
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awarenessMichel Bitter
 

What's hot (18)

Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Spyware
SpywareSpyware
Spyware
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 
Safe_IT
Safe_ITSafe_IT
Safe_IT
 
Pwn phone2014 jrs
Pwn phone2014 jrsPwn phone2014 jrs
Pwn phone2014 jrs
 
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin AhmedBackup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
 
Open Source Software
Open Source SoftwareOpen Source Software
Open Source Software
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...
 
Syafiqah slideshare of security measures
Syafiqah slideshare of security measuresSyafiqah slideshare of security measures
Syafiqah slideshare of security measures
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
 
Surfing with Sharks KS ED TECH 2012
Surfing with Sharks   KS ED TECH 2012Surfing with Sharks   KS ED TECH 2012
Surfing with Sharks KS ED TECH 2012
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antiviruses
 
Jailbreaking iOS
Jailbreaking iOSJailbreaking iOS
Jailbreaking iOS
 
Computer security
Computer securityComputer security
Computer security
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
 
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 

Viewers also liked

File storage medium and technology
File storage medium and technologyFile storage medium and technology
File storage medium and technologykyoshitaf
 
Removeable Storage
Removeable StorageRemoveable Storage
Removeable StorageJoel May
 
Trabajofinaltitulacion
TrabajofinaltitulacionTrabajofinaltitulacion
Trabajofinaltitulacioncarlos vidales
 
كتاب محاسبة شركات السياحة
كتاب محاسبة شركات السياحةكتاب محاسبة شركات السياحة
كتاب محاسبة شركات السياحةHany Atef
 
Tendencias del consumidor del +2020
Tendencias del consumidor del +2020Tendencias del consumidor del +2020
Tendencias del consumidor del +2020Rogelio Pozo
 

Viewers also liked (11)

pres
prespres
pres
 
Diego7c
Diego7cDiego7c
Diego7c
 
File storage medium and technology
File storage medium and technologyFile storage medium and technology
File storage medium and technology
 
Yashwanth_CV[1]
Yashwanth_CV[1]Yashwanth_CV[1]
Yashwanth_CV[1]
 
Paper_Formatted_Content_3
Paper_Formatted_Content_3Paper_Formatted_Content_3
Paper_Formatted_Content_3
 
Removeable Storage
Removeable StorageRemoveable Storage
Removeable Storage
 
Trabajofinaltitulacion
TrabajofinaltitulacionTrabajofinaltitulacion
Trabajofinaltitulacion
 
AKF USA Reference
AKF USA ReferenceAKF USA Reference
AKF USA Reference
 
Usability design for pleasure
Usability  design for pleasureUsability  design for pleasure
Usability design for pleasure
 
كتاب محاسبة شركات السياحة
كتاب محاسبة شركات السياحةكتاب محاسبة شركات السياحة
كتاب محاسبة شركات السياحة
 
Tendencias del consumidor del +2020
Tendencias del consumidor del +2020Tendencias del consumidor del +2020
Tendencias del consumidor del +2020
 

Similar to The Most Dangerous Places on the Web: A Guide to Staying Safe Online

Adult Internet Safety
Adult Internet SafetyAdult Internet Safety
Adult Internet Safetyreidcollins42
 
Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threatswardjo
 
Cyber Crime and how to prevent it?
Cyber Crime and how to prevent it?Cyber Crime and how to prevent it?
Cyber Crime and how to prevent it?Mujeeb Riaz
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From MalwareINFONAUTICS GmbH
 
Security-Web Vulnerabilities-Browser Attacks
Security-Web Vulnerabilities-Browser AttacksSecurity-Web Vulnerabilities-Browser Attacks
Security-Web Vulnerabilities-Browser AttacksRaghu Addanki
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
Phish training final
Phish training finalPhish training final
Phish training finalJen Ruhman
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)Zara Nawaz
 
Securing Yourself in the Cyber World
Securing Yourself in the Cyber WorldSecuring Yourself in the Cyber World
Securing Yourself in the Cyber WorldEmil Tan
 

Similar to The Most Dangerous Places on the Web: A Guide to Staying Safe Online (20)

Adult Internet Safety
Adult Internet SafetyAdult Internet Safety
Adult Internet Safety
 
Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threats
 
Cyber Crime and how to prevent it?
Cyber Crime and how to prevent it?Cyber Crime and how to prevent it?
Cyber Crime and how to prevent it?
 
Basic Computer Security for Doctors
Basic Computer Security for DoctorsBasic Computer Security for Doctors
Basic Computer Security for Doctors
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Lesson 5 protecting yourself on the internet
Lesson 5 protecting yourself on the internetLesson 5 protecting yourself on the internet
Lesson 5 protecting yourself on the internet
 
Security-Web Vulnerabilities-Browser Attacks
Security-Web Vulnerabilities-Browser AttacksSecurity-Web Vulnerabilities-Browser Attacks
Security-Web Vulnerabilities-Browser Attacks
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Internet security
Internet securityInternet security
Internet security
 
Spyware
SpywareSpyware
Spyware
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
anti_virus
anti_virusanti_virus
anti_virus
 
Phish training final
Phish training finalPhish training final
Phish training final
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
 
spyware
spyware spyware
spyware
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Online reputation
Online reputationOnline reputation
Online reputation
 
12990739.ppt
12990739.ppt12990739.ppt
12990739.ppt
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
 
Securing Yourself in the Cyber World
Securing Yourself in the Cyber WorldSecuring Yourself in the Cyber World
Securing Yourself in the Cyber World
 

More from Joel May

Organize, edit and share your photos
Organize, edit and share your photosOrganize, edit and share your photos
Organize, edit and share your photosJoel May
 
Organize, edit and share your photos
Organize, edit and share your photosOrganize, edit and share your photos
Organize, edit and share your photosJoel May
 
101 ways to use a flash drive
101 ways to use a flash drive101 ways to use a flash drive
101 ways to use a flash driveJoel May
 
Free and easy website creation
Free and easy website creationFree and easy website creation
Free and easy website creationJoel May
 
Top Ten Reasons to use Gmail
Top Ten Reasons to use GmailTop Ten Reasons to use Gmail
Top Ten Reasons to use GmailJoel May
 
Free software
Free softwareFree software
Free softwareJoel May
 
Cell phones demystified
Cell phones demystifiedCell phones demystified
Cell phones demystifiedJoel May
 
So you took some great pictures, now what?
So you took some great pictures, now what?So you took some great pictures, now what?
So you took some great pictures, now what?Joel May
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Joel May
 
Planning Travel on the Web
Planning Travel on the WebPlanning Travel on the Web
Planning Travel on the WebJoel May
 
Optimizing Your Computer
Optimizing Your ComputerOptimizing Your Computer
Optimizing Your ComputerJoel May
 
The Many Faces of Google
The Many Faces of GoogleThe Many Faces of Google
The Many Faces of GoogleJoel May
 
Introduction to Word
Introduction to WordIntroduction to Word
Introduction to WordJoel May
 
Excel tips&tricks
Excel tips&tricksExcel tips&tricks
Excel tips&tricksJoel May
 
Introduction to Excel
Introduction to ExcelIntroduction to Excel
Introduction to ExcelJoel May
 
Configuring the desktop
Configuring the desktopConfiguring the desktop
Configuring the desktopJoel May
 
Audio on the web
Audio on the webAudio on the web
Audio on the webJoel May
 
Your family legacy
Your family legacyYour family legacy
Your family legacyJoel May
 
Mastering your hard drive
Mastering your hard driveMastering your hard drive
Mastering your hard driveJoel May
 
The battle for safety
The battle for safetyThe battle for safety
The battle for safetyJoel May
 

More from Joel May (20)

Organize, edit and share your photos
Organize, edit and share your photosOrganize, edit and share your photos
Organize, edit and share your photos
 
Organize, edit and share your photos
Organize, edit and share your photosOrganize, edit and share your photos
Organize, edit and share your photos
 
101 ways to use a flash drive
101 ways to use a flash drive101 ways to use a flash drive
101 ways to use a flash drive
 
Free and easy website creation
Free and easy website creationFree and easy website creation
Free and easy website creation
 
Top Ten Reasons to use Gmail
Top Ten Reasons to use GmailTop Ten Reasons to use Gmail
Top Ten Reasons to use Gmail
 
Free software
Free softwareFree software
Free software
 
Cell phones demystified
Cell phones demystifiedCell phones demystified
Cell phones demystified
 
So you took some great pictures, now what?
So you took some great pictures, now what?So you took some great pictures, now what?
So you took some great pictures, now what?
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
 
Planning Travel on the Web
Planning Travel on the WebPlanning Travel on the Web
Planning Travel on the Web
 
Optimizing Your Computer
Optimizing Your ComputerOptimizing Your Computer
Optimizing Your Computer
 
The Many Faces of Google
The Many Faces of GoogleThe Many Faces of Google
The Many Faces of Google
 
Introduction to Word
Introduction to WordIntroduction to Word
Introduction to Word
 
Excel tips&tricks
Excel tips&tricksExcel tips&tricks
Excel tips&tricks
 
Introduction to Excel
Introduction to ExcelIntroduction to Excel
Introduction to Excel
 
Configuring the desktop
Configuring the desktopConfiguring the desktop
Configuring the desktop
 
Audio on the web
Audio on the webAudio on the web
Audio on the web
 
Your family legacy
Your family legacyYour family legacy
Your family legacy
 
Mastering your hard drive
Mastering your hard driveMastering your hard drive
Mastering your hard drive
 
The battle for safety
The battle for safetyThe battle for safety
The battle for safety
 

Recently uploaded

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

The Most Dangerous Places on the Web: A Guide to Staying Safe Online

  • 1. The Mos t Dangerous Places on the Web A presentation by J. Joel May
  • 3.
  • 4. Your E mail Inbox • Moderately Dangerous • Email attachments carrying malware are the most common way attackers get into your computer. – Viruses – Worms – Trojan Horses – Rootkits • Phishing: The act of sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. 
  • 5. Your E mail Inbox If you have to go there: • Delete suspicious emails with attachments • Be sure that your anti-virus software is configured to scan incoming email • Update your virus definitions files “regularly” • Look for spelling and grammar errors • Look for faked or numerical URLs – www.warstaw.ly/www.citibank.com – http://200.215.16.194/ • Call the company that sent you the message, but don’t use the phone number in the email
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. Video Download S ites • Moderately Dangerous • Hackers exploit flaws in video players like QuickTime and Windows Media Player • These can trigger bugs that let attackers in to spy on your computer activity, plant other malware, and more • Or you may be prompted to install an additional codec which could be infected
  • 11. Video Download S ites If you have to go there: • Keep your player software up to date • Avoid downloading videos at random • Stick to well-known video sites such as YouTube or to download services like iTunes
  • 12. Webs ites that Us e Flas h • Moderately Dangerous • Adobe’s Flash is widely used to display video • Flash cookies can track the sites you visit • When you delete your browser cookies, Flash cookies get left behind
  • 13. Webs ites that Us e Flas h If you have to go there: • Keep your Flash browser plug-ins up to date with get.adobe.com/flashplayer/
  • 14. Webs ites that Us e Flas h If you have to go there: • If you use Firefox as your browser, download Better Privacy at www.pcworld.com/downloads/file/fid,80462/description • If not, go to www.macromedia.com/support/documentation/en/flashp and follow the instructions there
  • 15. S oc ial Networks • Moderately Dangerous • Way too much sharing of information • Information stays on the Web permanently
  • 16. S oc ial Networks If you have to go there: • This threat is easy to avoid with just a little common sense • Be mindful of what you post • Be certain to check your privacy settings
  • 17. J us t A bout A ny A d-S upported S ite • Moderately Dangerous • Cybercriminals have taken out ads on popular web sites to lure in victims • Even the NY Times web site has been affected • As has Google’s Sponsored Link ad program • Ads that look like links to major companies’ websites redirect you to sites containing malware
  • 18. J us t A bout A ny A d-S upported S ite If you have to go there: • Move your mouse pointer to the link and hover over it. In the lower right corner of the screen you will see the URL of the site to which a click would take you • Inspect it carefully, and if it looks suspicious, don’t go there
  • 19.
  • 20. Twitter • Very Dangerous • Because of the 140 word limit on a “tweet,” Twitter relies heavily on shortened URLs • It is very simple to hide malware or scams behind shortened URLs
  • 21. Twitter If you have to go there: • Simply don’t click on shortened links (but that takes all the fun out of it!) • Use a Twitter client app. Tweet Deck ( http://www.tweetdeck.com/desktop/) has a preview feature that lets you see the full URL • Another alternative is http://www.expandmyurl.com/
  • 22. S earc h E ngines • Very Dangerous • “Search engine poisoning” is the practice of building tainted sites that are designed to rank high in a search for a given topic • Breaking news topics, facebook, and female rock, tv and movie stars are frequent examples
  • 23. S earc h E ngines If you have to go there (and you do) • Pick and choose which search results to click on • Check each URL first to make sure that it really leads you to the site you want • Use tools like AVG’s Link Scanner (linkscanner.avg.com), McAfee’s SiteAdvisor (www.siteadvisor.com), or Web of Trust (www.mywot.com) to help identify malicious sites
  • 24.
  • 25. Downloaded PDF Files • Very Dangerous • PDF files can be crafted so that they trigger bugs in Adobe Reader and Adobe Acrobat • Downloaded, they can let an attacker commandeer your PC and access your files and personal information • A newer variant can take an otherwise innocent PDF and insert malware into it • According to security firm Symantec, in 2009 attacks using malicious PDFs made up 49% of all Web-based attacks
  • 26. Downloaded PDF Files If you have to go there: • Make sure you always have the latest version of Adobe Reader • Better still, use a different PDF reader – Foxit (http://www.foxitsoftware.com/pdf/reader/) – Sumatra ( http://blog.kowalczyk.info/software/sumatrapdf/free-pdf-re ) – Nuance ( http://www.nuance.com/for-business/by-product/pdf/pdfread )
  • 27.
  • 28. Hacked Legitimate S ites • Downright Unsafe • In a common attack method, criminals will hack a Web page, often on a legitimate site, and insert code that will download malware to your computer
  • 29. Hacked Legitimate S ites If you have to go there: • Keep your security software up to date • Run regular malware scans • Try a program like WinPatrol that takes snapshot of your critical system resources and alerts you to any changes that may occur without your knowledge. ( http://www.winpatrol.com/)
  • 30. Fake A nti-Virus Programs • Downright Unsafe • Fake anti-virus programs are contained in pop- up windows on legitimate web sites • They typically report finding a virus, even though your computer is actually clean. • The software might also fail to report viruses when your computer is infected. • Sometimes, when you download rogue security software, it will install a virus or other malicious software on your computer so that the software has something to detect
  • 31. Fake A nti-Virus Programs • Downright Unsafe • Once downloaded, the trial version will nag you for a purchase • When you buy, the criminals will steal your credit information
  • 32. Fake A nti-Virus Programs • Downright Unsafe • Rogue security software might also: – Lure you into a fraudulent transaction (for example, upgrading to a non-existent paid version of a program). – Install malware that can go undetected as it steals your data. – Launch pop-up windows with false or misleading alerts. – Slow your computer or corrupt files. – Disable Windows updates or disable updates to legitimate antivirus software. – Prevent you from visiting antivirus vendor websites.
  • 33. Fake A nti-Virus Programs If you have to go there: • If you get an alert saying you’re infected with malware, but it didn’t come from software you knowingly installed: – Immediately stop what you are doing – Close the browser (end the task) using Task Manager. Don’t click on the close button! – Try booting into Safe Mode and running a scan – In no case should you download the suggested software or run the suggested system check
  • 34. Torrent S ites • Downright Unsafe • Most often used for sharing pirated music, videos, or software • Which can easily contain malware • By comparison, many porn sites are deemed trustworthy
  • 35. Torrent S ites If you have to go there: • Don’t use your primary computer • Use anti-virus software and keep it updated • Scan downloaded files • Wait a couple of days before opening them; scan again before opening
  • 36. S ome Tips for S taying Out Of Trouble
  • 37. Tip #1 • Ensure that you have antivirus software installed and that it is updated at least once a week, either manually or automatically.  Check occasionally to ensure that it really is up to date.  If your antivirus software subscription has expired, renew it as a matter of urgency.
  • 38. Tip #2 • Never click on a link within an email message, or download an attachment linked to an email message, unless you are 100% confident that the source can be trusted.  If in doubt, just delete the message.  Remember, banks never email you to ask you to log in to your account.
  • 39. Tip #3 • If you haven't turned on the firewall in Windows, do so. To learn how to do this, click on Start, then Help and Support. Type “firewall” (no quotes) in the search box and press Enter.
  • 40. Tip #4 • Ensure that you have enabled the Automatic Updates feature in Windows. To learn how to do this, click on Start, then Help and Support. Type “windows updates” (no quotes) in the search box and press Enter.
  • 41. Tip #5 • If you have a broadband or cable router that is providing wifi access, you must enable encryption. Without encryption, neighbours and strangers can access your internet connection and, possibly, the files on your PC.  WEP encryption is an older standard and is not as strong  as WPA, but is better than nothing if your router doesn't support WPA.  
  • 42. Tip #6 • If you are using your computer for online shopping, always buy from sites run by reputable companies that you trust. • If you use online banking, or other online services where security is paramount, always use a different password for each bank or site.
  • 43. Tip #7 • Before entering personal information such as a password or your credit card number into a web site, check that the address of the site starts with https (sometimes accompanied by a picture of a padlock). • An example:
  • 44.
  • 45. Tip #8 • If you have confidential documents stored on your PC you should therefore consider the use of an encryption program, or look up details on how to use the EFS (Encrypting File System) feature built into Windows. • (I use lockdir.exe available at http://www.filecluster.com/downloads/KaKa-Fo )
  • 46. Tip #9 • Make copies of all the important files that are on your computer, such as documents, emails, photographs, music tracks, video clips, and so on.  The most convenient way to do this is to use an external USB hard drive or a “flash drive", depending on how much data you have.  Never keep your backup near your computer.
  • 47. Keeping S oftware Up to Date Secunia is a FREE security tool designed to detect vulnerable and out-dated programs and plug-ins which expose your PC to attacks.  http://secunia.com/vulnerability_scanning/online http://secunia.com/vulnerability_scanning/personal/
  • 48. S ummary • Keep up on patches and version updates • Be password smart • Use security software • Back up your data regularly • If it sounds too good to be true. . .well, you know the rest • Assume that everyone is out to get you Stay up-to-date, Stay paranoid, Stay protected
  • 49. S ome S ites that Make it Worthwhile • YouTube (www.youtube.com) • The Drudge Report (www.drudgereport.com) • The Art Project (www.googleartproject.com) • Government Made Easy (www.usa.gov) • US1 Events Search (princetoninfo.com/index.php?option =com_us1event&Itemid=2)
  • 50. This presentation is available on the Web at www.joelmay.org/presentations The E nd

Editor's Notes

  1. Antivirus software stops viruses and trojans getting onto your computer. Such "malware" could allow remote hackers to access your files and see what you're typing.  Obsolete software won't protect you from new viruses, or new strains of existing viruses.
  2. Viruses, trojans, password stealers and other types of "malware" often spread by automatically emailing themselves to potential victims.  Clicking on an untrustworthy attachment is like inviting a burglar through your front door - it bypasses any protection offered by your firewall.
  3. It will help to protect you from hackers on the internet.  It will also help to prevent any rogue software which finds its way onto your PC from making contact with outside hackers.
  4. .  This will ensure that security patches issued by Microsoft will be downloaded and installed automatically on your computer.
  5. If you provide your credit card details to a company that you haven't heard of, there's a chance that the company might be fraudulent and might misuse your information. If someone discovers or guesses your password, that password is only valid for one site rather than multiple sites.
  6. The https prefix and the closed padlock symbol means that all the information which you type into the web site will be encrypted before being sent to the site, thus ensuring that hackers can't intercept it.  Also, companies which use https sites are easier to trace should anything go wrong.
  7. If someone were to steal your computer, they could read all the files stored on it, even if you have configured Windows to ask for a username and password for each user.  Encrypting the files prevents this.
  8. If your computer breaks, or is lost or stolen, you risk losing all of the information stored on it.  If you have backup copies of that information you can easily copy it to your new machine.  By ensuring that you don't keep the backups near the computer, disasters such as a fire or a burglary won't result in you losing both the computer and the backup.