Marshal Graham January 16, 2012

Slides:



Advertisements
Similar presentations
Phishing Scams use spoofed s and websites as lures to prompt people to voluntarily hand over sensitive information Phishing s may contain.
Advertisements

Hurricane Katrina Avoid Falling Prey to Donation Scams - Click to Proceed - Brought to you by The Louisiana State Fire Marshal.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Kimberly Siebott Lynn Yip. Definition  A crime in which the perpetrator develops a scheme using one or more elements of the Internet to deprive a person.
Scams awareness month.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
Scams Stevie's Scam School videos
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Bell Ringer10/22/2013 Who are crime Victims? Briefly identify who they are and who they assault.
E safety. Ads It’s always best to not click on ads when you see them, and it’s always a good idea to ignore them, but if there are too many you can always.
Investing 101 – Part 3 Spotting Frauds and Scams.
Reliability & Desirability of Data
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
CCT355H5 F Presentation: Phishing November Jennifer Li.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Phishing and online fraud What parents need to know.
SCHEMES, SCAMS, AND PLOYS Deconstructing the Hoax 1.
Marshal Graham January 16, A confidence trick is an attempt to defraud a person or group by gaining their confidence. A confidence artist is an.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN Protecting Yourself and Your Family Online.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Scams Awareness Month July Did you know? A scam is a scheme to con people out of their money. Other names for a scam include fraud, hoax, con, swindle,
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt Category.
Scams Awareness Month July 2016
Objectives Define phishing and identify various types of phishing scams Recognize common baiting tactics used in phishing scams Examine real phishing messages.
#scamaware.
Internet Safety.
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Protecting Your Assets By Preventing Identity Theft
INTERNET SAFETY FOR EVERYONE
Computer Security Fundamentals
Cyber Info Gathering Techniques
One of the most popular forms of credit
Fraud Protection.
Identifying and Avoiding Scams
Fraud protection.
Learn how to protect yourself against common attacks
Fraud and Scams.
What are the different ways you could pay for a car?
Unit 4 IT Security.
Lesson 3 Safe Computing.
Phishing, what you should know
Internet Fraud By (NAMES).
Protect Your Computer Against Harmful Attacks!
Passwords & Behavioral Ads
Cybersecurity Awareness
IT Security awareness Training.
Information is at the heart of any University, and Harvard is no exception. We create it, analyze it, share it, and apply it. As you would imagine, we.
Protecting Your Personal Information
Risk of the Internet At Home
Scams Awareness Month 2016 How to identify tell tale signs of scams.
Internet Safety for Everyone
Shopping experience! Avoiding online fraud Ian Ramsey C of E School
KnowBe4 is the world's most popular integrated platform for awareness training combined with simulated phishing attacks.
If I’d only known then what I know now about phishing…
Internet Safety for Everyone
9 ways to avoid viruses and spyware
Security Hardening through Awareness August 2018
Internet Safety – Social Media
Internet Safety for Everyone
Internet Safety for Everyone
Social Engineering Humans are often the weakest point in security
What is Phishing? Pronounced “Fishing”
It’s a Scam Prepared by Lamanda Weston
Internet Safety for Everyone
Internet Safety for Everyone
Where can you put your trust?
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Marshal Graham January 16, 2012 How to Spot a Scam Marshal Graham January 16, 2012

Scam A confidence trick is an attempt to defraud a person or group by gaining their confidence. A confidence artist is an individual working alone or in concert with others who exploits characteristics of the human psyche such as dishonesty and honesty, vanity, compassion, credulity, irresponsibility, naivety and greed. A confidence trick is also (non-exhaustively) known as a con game, con, scam, grift, hustle, bunko, bunco, swindle, flimflam, gaffle, or bamboozle. The intended victim(s) are known as marks. The perpetrator of a confidence trick is often referred to as a confidence man/woman, con man/woman, con artist or grifter. When accomplices are employed, they are known as shills. https://en.wikipedia.org/wiki/Confidence_trick

Scam Enablers People are the weakest link in computer security

Scam Enablers People are the weakest link in computer security. Bad guys use social engineering to exploit our natural curiosity, desire to be helpful, and other traits to their advantage.

Scam Enablers People are the weakest link in computer security. Bad guys use social engineering to exploit our natural curiosity, desire to be helpful, and other traits to their advantage. The bad guys only need to get it right once to profit.

419 Scams 419 scams or Advance Fee Fraud has existed for decades An Ultrascan Advanced Global Investigations report from 2009 suggests less than 1% of 419 scams are successful This amounts to an estimated $9.3 billion lost in 2009.

Scam Enablers People are the weakest link in computer security. Bad guys use social engineering to exploit our natural curiosity, desire to be helpful, and other traits to their advantage. The bad guys only need to get it right once to profit. Everyone has something of value online.

The Trail Always Leads to Money Personal Work Bank accounts Retirement accounts Investment accounts Email Facebook PII Student records Email Bank accounts PII To the bad guys, all of these represent money or an avenue to gain money.

Scam Enablers People are the weakest link in computer security. Bad guys use social engineering to exploit our natural curiosity, desire to be helpful, and other traits to their advantage. The bad guys only need to get it right once to profit. Everyone has something of value online.

Scam Characteristics Urgency

Act Now!!! Before It’s Too Late!!!

Scam Characteristics The scam will convey some sense of Urgency. Make a bad decision, fast! Online scams historically have bad grammar.

You wouldn’t buy these crackers. Don’t buy from the bad grammar scammer!

Scam Characteristics The scam will convey some sense of Urgency. Make a bad decision, fast! Scammers typically have bad grammar. The offer is too good to be true.

Apple is NOT giving away free iPads.

Scam Characteristics The scam will convey some sense of Urgency. Make a bad decision, fast! Scammers typically have bad grammar. The offer is too good to be true. Something is just not quite right.

Something Stinks? You are told you have won a prize, but you must pay for something before you can receive it. This payment can either be a requirement to purchase a minimum order, or it can be a shipping/handling charge or a processing fee. You are told to make an immediate decision. You are told you are one of the few people eligible for an offer. You are told you won a drawing, yet you do not remember entering the contest.

Sometimes, the best thing is to walk away Scam Characteristics The scam will convey some sense of Urgency. Make a bad decision, fast! Scammers typically have bad grammar. The offer is too good to be true. Something is just not quite right. Sometimes, the best thing is to walk away

Avoid Becoming A Victim Be a vigilant at all times.

Vigilance Do not risk becoming a victim just to get something for free. You did not need that iPad before it was free. You do not need to risk becoming a victim to get it now. Vigilance is like Scam Repellent.

Avoid Becoming A Victim Be a vigilant at all times. Pay attention to the details.

Avoid Becoming A Victim Be a vigilant at all times. Pay attention to the details. Use a good password passphrase, never reuse a passphrase, and change your passphrase regularly. Never click on links. Always type the URL into your browser.

URL Links Hyperlinks are trivial to spoof. If you get an email claiming to be from your bank, do not click the link. Instead, visit the bank’s site to ensure you do not become a victim. This is difficult to train yourself to do! <a href="http://myfakebankingsite.com">https://www.cbthomebank.com/</a>

Avoid Becoming A Victim Be a vigilant at all times. Pay attention to the details. Use a good password passphrase, never reuse a passphrase, and change your passphrase regularly. Never click on links. Always type the URL into your browser. Always read the fine print and the bold print too!

Is your PC virus-free? Get it infected here! If you do not understand what you are seeing, ask for help!

Avoid Becoming A Victim Be a vigilant at all times. Pay attention to the details. Use a good password passphrase, never reuse a passphrase, and change your passphrase regularly. Never click on links. Always type the URL into your browser. Always read the fine print and the bold print too! Talk to a human.

Hello, how may I help you?

Avoid Becoming A Victim Be a vigilant at all times. Pay attention to the details. Use a good password passphrase, never reuse a passphrase, and change your passphrase regularly. Never click on links. Always type the URL into your browser. Always read the fine print and the bold print too! Talk to a human.

We have only scratched the surface! E-cards Phishing Work at home Donations Alarmists or threats Lottery Fake AntiVirus And even more! There is a scam for everyone!

Future Scammers will get better. Technology will improve. The stakes will increase. Scams will never end. My six rules will still give you an advantage!

Thank You! Be a vigilant at all times. Pay attention to the details. Use a good password passphrase, never reuse a passphrase, and change your passphrase regularly. Never click on links. Always type the URL into your browser. Always read the fine print and the bold print too! Talk to a human. http://marshalgraham.com @marshalgraham https://www.opendns.com/phishing-quiz/ http://www.microsoft.com/security/online-privacy/phishing-scams.aspx http://www.microsoft.com/security/online-privacy/msname.aspx http://www.microsoft.com/security/online-privacy/phishing-interests.aspx