1 / 13

Teach a man (person) to Phish

High Tea at IT, Summer, 2013. Teach a man (person) to Phish. Recognizing email scams, spams and other personal security attacks July 17 th , 2013. How to Know it’s Fake. Alarmist or dire warnings of account closures Promises of money from complete strangers

quiana
Download Presentation

Teach a man (person) to Phish

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. High Tea at IT, Summer, 2013 Teach a man (person) to Phish Recognizing email scams, spams and other personal security attacks July 17th, 2013

  2. How to Know it’s Fake • Alarmist or dire warnings of account closures • Promises of money from complete strangers • If it sounds too good to be true . . . • Misspellings or bad grammar • URLs that have no connection to sender • Sender return addresses that have no relation to subject

  3. Top Ten Email Scams* • The Nigerian scam, also known as 419 • Advanced fees paid for a guaranteed loan or credit card • Lottery scams • Phishing emails and phony web pages • Items for sale overpayment scam • Employment search overpayment scam • Disaster relief scams • Travel scams • Make Money Fast” chain emails • "Turn Your Computer Into a Money-Making Machine!" http://netforbeginners.about.com/od/scamsandidentitytheft/ss/top10inetscams.htm

  4. What does a Phishing Email look like?

  5. Beware of links! • If you “hover” your mouse over the link without touching it, the URL the link will take you to should be displayed in your browser.* * Will vary from browser to browser, operating system to operating system

  6. Protect yourself from cybersquatting and fake web addresses • What is cybersquatting? • Cybercriminals sometimes register web addresses (also called "domain names" or "URLs") that are similar to the web addresses of popular websites or are common misspellings of popular websites. • Scammers register these web addresses in order to compete with popular sites or to earn money through advertisements. • If you enter an incorrect web address, you might be taken to a place where you'll see an ad for the site you really wanted. But if you click that ad, you might get to where you want to go, but you might also help scammers earn money, which in turn might increase the cost of merchandise from the scammed company. • In addition to getting others to make money for them, typosquatters and cybersquatters can download malicious software programs and spyware onto the unprotected computers of people who visit their site

  7. Beware of phishing phone calls • Cybercriminals might call you on the phone and offer to help solve your computer problems or sell you a software license. • Once they've gained your trust, cybercriminals might ask for your user name and password or ask you to go to a website to install software that will let them access your computer to fix it. Once you do this, your computer and your personal information is vulnerable. • Treat all unsolicited phone calls with skepticism. Do not provide any personal information.

  8. go to www.snopes.com If you aren’t sure,

  9. Help protect your privacy in online communities • Email distribution lists • Message boards and newsgroups • Instant message (IM) services • Chat rooms • Blogging sites • Social networking sites • Online communities require you to provide personal information. • Profiles are public. • Comments you post are permanently recorded • You might even mention when you plan to be out of town. Even if you've been involved with a community for a long time, don't be lulled into a false sense of security. • Stay aware of how such information might be used by scammers of all kinds, both online and off, and refrain from sharing too much. • Email and phishing scammers count on the appealing sense of trust that is often fostered in online communities to steal your personal information.

  10. How does a computer get infected with a virus or spyware? • Accepting without reading • Opening e-mail attachments • Not running the latest updates • Pirating software, music, or movies • No antivirus spyware scanner • Downloading infected software

  11. How to report SPAM • Open the message into its own window. • Click on the Other Actions: button and select Forward as Attachment. • In the new message window that opens, address the message to SPAM@pomona.edu. • Click the Send button. Instructions are for Outlook on a PC. For more details, go to kb.pomona.edu, log in with your user account and password and search for “Spam”. Finding answers will be covered in next week’s High Tea!

More Related