The Most Dangerous Places on The Web (according to PC World)

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
SECURITY CHECK Protecting Your System and Yourself Source:
Acceptable Use Policy –The Acceptable Use Policy defines the rules of the machine and internet connection you are on. –Specific policies differ by machine.
Investigating Malicious Software Steve Romig The Ohio State University April 2002.
Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.
Computer Maintenance & Safety Spring Internet Safety Keeping your computer safe What is a computer virus? A computer program that can copy itself.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
How It Applies In A Virtual World
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Security for Seniors SeniorNet Help Desk
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Computer Safety Workshop Presented by Roy Coleman April 14, 2015 © 2015 Roy Coleman.
JMU GenCyber Boot Camp Summer, Cyberspace Risks and Defenses Facebook Snapchat P2P filesharing Apps Craigslist Scams JMU GenCyber Boot Camp© 2015.
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
Lions? And Tigers? And Bears? Oh my!. In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
ICT & Crime Viruses & malware. What is a virus? A computer virus is a piece of software that can 'infect' a computer (install itself) and copy itself.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
What is Spam? d min.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
Social Networking Practices. Information Security Purpose is to protect your information’s Confidentiality Integrity Availability.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
A Quick and Easy Crash Course Internet Safety for Everyone.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Computer Security Keeping you and your computer safe in the digital world.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Joseph J. Malone Security for Seniors Joseph J. Malone
An Introduction to Phishing and Viruses
Protect Your Computer Against Harmful Attacks!
Cybersecurity Awareness
Computer Security.
Internet Safety – Social Media
Presentation transcript:

The Most Dangerous Places on The Web (according to PC World)

Websites that use Flash Danger level: Moderate Adobe Flashplayer has many vulnerabilities that are constantly being patched. Flash cookies are another danger; they are like cookies, but used by Flashplayer. Controls:  For Firefox: use an Add on called “Better Privacy”  n/en/flashplayer/help/settings_manager03.html n/en/flashplayer/help/settings_manager03.html Also: keep your flashplayer up to date.

Twitter Danger level: Very high The danger: URL shorteners  Take long addresses and replace them with something shorter  The danger is that a short URL may point to something sinister. Options:  Don't click links :(  Use a twitter client app: tweetdeck/tweetie for Mac  Bit.ly tries to filter out malicious links (manually??)  At tinyurl.com/preview.php you can turn on previews.

Your Inbox Danger level: Moderate Dangers:  Phishing s  Infected attachments The problem: The are getting more sophisticated and harder to detect every day. The remedy: If you are not 100 % sure, do not reply to an , do not click on links. Never, never, never, send account numbers, SSIDs, passwords, etc over .

Torrent and P2P Sites Danger Level: EXTREMELY HIGH The danger: Torrent Sites (and other content sharing sites) are used for sharing music, videos or software, often pirated. You don't really know who placed it there; it may well be somebody intent on taking over your computer with a virus. If you really want to do it: Use a secondary PC: use updated antivirus software, scan downloaded files and wait a couple of days before you scan again and then finally use the files.

Porn Sites Danger level: Moderate In spite of their reputation, many porn sites want to be safe to protect themselves. Having said that: many sites (porn or not) get hacked all the time and may lure victims to attack servers. It is very hard to tell a legitimate porn site from a malware-hosting site that uses porn as a lure. Cautions:  Videos may contain viruses  Video codecs may contain viruses  Use tools like from AVG orhttp:// from McAfee.  Consider using a secondary machine.

Video Download Sites, Peer to Peer Networks Danger level: Very high The Danger:  As mentioned before: trojan horses, disguised as videos or codecs, can infect your PC with Malware. An example is given in Remedies:  Stick to the true and known sites: YouTube, Vimeo, Hulu, TV.com, ABC.com, iTunes, etc.  Keep your video player(s) up to date.  Avoid downloading videos at random

Your Smartphone Danger level: Slight (at present) The threat: “Geolocation”. Most smartphones have a GPS which is aware of its/your location; there are apps out there which will share that information with other parties. Watch out for those apps which are “location aware”; Yelp might be OK, but Foursquare or Facebook Places might not be.

Search Engines Danger level: Very high The threat: “Poisoned' search engine results that go to malware-carrying Websites.  Search engine poisoning consists of building tainted sites designed to rank high in a search on a given topic. Remedy: Watch where you click in the results page: nyt.com is preferable to hackersrus.com;check the name of the website. Use something like wot.com

Malicious PDFs Danger level: Very high The threat: “poisoned” PDF files that have been crafted so that, when viewed, they will trigger vulnerabilities in the PDF viewer, usually Adobe Acrobat. In 2009, 49% of web attacks were of this nature. Defenses: Keep your PDF reader up to date. Use a different PDF reader from Adobe Acrobat Disallow opening non-PDF file attachments in Adobe Reader.

Hacked Legitimate Sites (I) Threat level: Highly unsafe A file can be downloaded and installed in your computer without the user noticing. This download can be started by a hacked website. Defenses:  Keep your OS and your security software up to date  Run regular (at least weekly)malware scans.

Hacked Legitimate Sites (II), your inbox Threat level: Highly unsafe The threat: Fake antivirus software that extorts money and your credit card numbers. Should really be called extortionware Remedy? If you get an alert saying you are infected with malware and it looks fishy to you, stop what you are doing, boot into safe mode and run a legitimate antivirus scan. You may have to call in a professional.

Just about any Ad-supported Website Threat level: Moderate The threat: Fraudulent ads that lead to scams or malware. Remedy?  Be careful where you click  Many places check their ads, but it isn't fail-safe.

Facebook Threat level: Moderate The threat: Questionable Facebook apps.  Who developed them?  What is their privacy policy?  How secure is their data storage? Remedy  Don't run every app or add it to your profile.  Check your privacy settings: 'Applications and Websites' lets you control which apps have access to your data. You can even turn off apps altogether.

Social Networks Threat level: slight The threat: oversharing: exposing too much personal information on your profiles.  A real danger is that enough information might have been shared to make ID theft possible. Remedies:  Watch what you post on the sites: your home address and phone number should not be on facebook.  Check your privacy settings.

5 Tips from the Pros Be sure to keep all the programs you use (specially the Operating System) up to date. Be Password smart. Use security software. If it sounds to good to be true, it is too good to be true. Assume that everyone on the internet is out to get you. No security software is perfect and no file download or link is safe, even if a friend sends it to you.