CYBER SECURITY-PHISHING: DON’T BECOME A VICTIM OF FRAUD

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
Account HIGHJACKING & IDENTITY THEFT GPCE Credit Union has prepared a slide show presentation to examine the most prevalent financial crimes at work today.
1 And Tips to Avoid Becoming a Victim Recent Cyber Crime Cases.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Today’s Agenda… Knowledge Check What is Cyber Crime? Identity Theft Phishing Common Scams inc. online and mobile phone scams Prevention Methods.
1 Identity Theft and Phishing: What You Need to Know.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
What is identity theft, and how can you protect yourself from it?
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Bsharah Presentation Threats to Information Security Protecting Your Personal Information from Phishing Scams.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Phishing – Read Behind The Lines Veljko Pejović
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Phishing, Pharming, and Spam Margaret StewartTuesday, Oct. 21, 2006.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Scams & Schemes Common Sense Media.
IT security By Tilly Gerlack.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Information Security Sharon Welna Information Security Officer.
How Phishing Works Prof. Vipul Chudasama.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
A Matter of Your Personal Security Phishing. Beware of Phishing s Several employees received an that looked legitimate, as if it was being.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
A Matter of Your Personal Security Phishing Revised 11/30/15.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Protecting Your Assets By Preventing Identity Theft 1.
Preventing Identity Theft. PREVENTING IDENTITY THEFT 2 Agenda Introduction What Is Identity Theft? Tips to Protect Yourself What to Do if You Have Been.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
Fall Phishing - attempt to acquire sensitive information, like bank account information or an account password, by posing as a legitimate entity.
Take the Quiz and find out more!
Important Information Provided by Information Technology Center
Objectives Define phishing and identify various types of phishing scams Recognize common baiting tactics used in phishing scams Examine real phishing messages.
ISYM 540 Current Topics in Information System Management
Lesson 3 Safe Computing.
Information Security and Privacy Pertaining to Phishing and Internet Scams Brian Corl COSC 316 Information Security and Privacy.
I S P S loss Prevention.
Phishing is a form of social engineering that attempts to steal sensitive information.
Protect Your Computer Against Harmful Attacks!
Cybersecurity Awareness
Phishing.
HOW DO I KEEP MY COMPUTER SAFE?
9 ways to avoid viruses and spyware
What is Phishing? Pronounced “Fishing”
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

CYBER SECURITY-PHISHING: DON’T BECOME A VICTIM OF EMAIL FRAUD

91% Of Targeted Attacks Start With Spear-phishing Email Did You Know... 91% Of Targeted Attacks Start With Spear-phishing Email The word phishing comes from the analogy that Internet scammers are using e-mail lures to fish for passwords and financial data from the sea of Internet users. The term was coined in 1996 by hackers who were stealing AOL Internet accounts by scamming passwords from unsuspecting users. Since hackers have a tendency to replacing "f" with "ph" the term phishing was derived.

SPEAR PHISHING The Phish appears to be legitimately addressed from someone within that company in a position of trust and request information such as login ID’s and passwords. Spear phishing scams will often appear to be from a company’s own human resources or technical support division and may ask employees to update their username and passwords. Once hackers get this data, they can gain entry into secured networks. Another type of spear phishing attack will ask users to click on a link, which deploys spyware that can steal data.

WHAT IS PHISHING? (fish’ing) (n) The act of sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. directs the user to visit a web site update personal information (passwords, credit card, social security and bank account numbers)

PHISHING TECHNIQUES Official looking and sounding emails Copies legitimate corporate emails with minor URL changes Standard virus/worm attachments to emails IP addresses instead of domain names in hyperlinks Setting up fake web sites that closely mimic the domain name of the target website.

3 THINGS TO REMEMBER YOU have to do something to be attacked! NEVER click on “Click Here” or embedded links! NEVER give personal information over internet!

TIPS TO HELP YOU RECOGNIZE PHISHING SCAMS AND FRAUDULENT EMAIL Generic greeting From and return path don’t match Insecure site-look for https:// Requests personal information Sense of urgency Spelling errors Poor grammar Forged link-beware of the @ symbol in the URL Warns that you’ve been a victim of fraud Rule of thumb: Anytime you are asked for personal information, it is a scam

Source: http://www.sonicwall.com/furl/phishing/phishing-quiz-question.php

Other Phishing Scams The "Nigerian" Scam: Costly Compassion 1997-Secret Service confirmed losses just in the US of over 100 million dollars in 15 months Help! I'm Stuck in London and I've Been Robbed! Fake FBI E-mails Seeking Personal Information Work-From-Home Scams Dormant African Account

“HELP, IT’S ME” -----Original Message----- From: C. McGarrett; cmcgarrettfiveo@yahoo.com to: undisclosed recipients: ; Sent: Fri, Sep 2, 2011 7:25 am Subject: It's urgent, please respond It’s me, I really don't mean to inconvenience you right now. I made a little trip to Scotland, and misplaced my wallet that contains my passport and credit cards. Just hearing from me like this, sounds a little odd, but it all happened very fast. I've just been issued a temporary passport and also my ticket, but I'm short of funds to pay for the bills here. I've also been trying to reach my credit card company, but from the message I just received, I'll need some verifications like answering my home phone, and that will only happen when I'm home. Please, can you lend me some funds to secure the bills? I'll be willing to pay back as soon as I return. Please respond as soon as you get this message, so I can forward my details to send the money via western union or money gram, you can also contact me via the hotel's desk phone. The numbers are, 011448717947613, +448717947613 Looking forward to your response.   In HIS Service and Yours, Christian McGarrett Police Detective Sergeant and State Criminal Investigator http://www.identitytheftsecrets.com/identity-theft-secrets-readers-true-crime-story-traveling-email-scam

Phishing Facts 6.1 Billion - Number of phishing e-mails sent world-wide each month $1,200 - Average loss to each person successfully phished (Federal Trade Commission) 15,451 - Number of unique phishing attacks in January 2006 (Anti-Phishing Working Group) 7,484 - Number of phishing Web sites found in January 2006 (Anti-Phishing Working Group) 27,221 - Number of phishing Web sites found in January 2007 (Anti-Phishing Working Group) Source: http://www.sonicwall.com/furl/phishing/

USE COMMON SENSE – YOU need to do something to be attacked Why would a perfect stranger pick YOU-also a perfect stranger-to share a fortune with and why would you share your personal or business information, including your bank account numbers , with someone you don’t know? If it sounds too good to be true….IT IS!

WHAT CAN I DO TO PREVENT PHISHING? Keep all software updated , especially anti-virus Stay away from shady websites Do not respond to suspicious email and do not click on any links within the email Only open email attachments if you're expecting them If you get ERROR when making purchase-DO NOT CONTINUE LOG OFF – Don’t just close browser If doing private transaction, CLOSE TABS – Every open tab allows access to others. YOU initiate connection /communication – Don’t click on link to get there Call company by phone if you get a suspicious email but DO NOT call the phone number in the email Remove programs you don’t need Reboot occasionally

E-mail client configuration YOU control what you download Do NOT auto execute anything Do NOT automatically download HTML graphics or content Do NOT display graphics in message Do NOT allow executable html content Turn OFF Attachment Preview If NOT sure configure to “WARN ME BEFORE” You can control drive-by scripts running across the screen

DISABLE PASSWORD OPTIONS

WHAT TO DO IF YOU RECEIVE A SUSPICIOUS EMAIL DO NOT respond to the email DO NOT CLICK ON A LINK IN AN EMAIL unless you are sure of the real target address. (Hover mouse over link and compare to email header—very close but does not match.) NEVER reveal personal or financial information in a response to an email request, no matter who appears to have sent it. D-E-L-E-T-E the email

WHAT TO DO IF YOU’VE RESPONDED TO A PHISHING SCAM: Report the incident -FTC, FBI, Secret Service, UNM IT Services Change the passwords on all your online accounts Routinely review your credit card and bank statements Use the latest products and services to help warn and protect you from online scams (Antivirus software can only protect you from known viruses.) protect you from known viruses.)

If you think you have been a victim of a phishing scam or want further information, please contact Deb Kuidis at 277-0732 or dkuidis@unm.edu. http://research.unm.edu/industrialsecurity/