1. agenda 1. telephone scams 1. my computer scam story 1. common computer scams 1. the trojen virus...

19
1

Upload: avis-morris

Post on 26-Dec-2015

219 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 1. AGENDA 1. TELEPHONE SCAMS 1. MY COMPUTER SCAM STORY 1. COMMON COMPUTER SCAMS 1. THE TROJEN VIRUS 1. LEGAL SCAMS 1. HOW TO STAY SAFE 2

1

Page 2: 1. AGENDA 1. TELEPHONE SCAMS 1. MY COMPUTER SCAM STORY 1. COMMON COMPUTER SCAMS 1. THE TROJEN VIRUS 1. LEGAL SCAMS 1. HOW TO STAY SAFE 2

AGENDA

1. TELEPHONE SCAMS

1. MY COMPUTER SCAM STORY

1. COMMON COMPUTER SCAMS

1. THE TROJEN VIRUS

1. LEGAL SCAMS

1. HOW TO STAY SAFE2

Page 3: 1. AGENDA 1. TELEPHONE SCAMS 1. MY COMPUTER SCAM STORY 1. COMMON COMPUTER SCAMS 1. THE TROJEN VIRUS 1. LEGAL SCAMS 1. HOW TO STAY SAFE 2

3

MALWARE: Short for malicious (or malevolent) software, is software used or created to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software.['Malware' is a general term used to refer to a variety of forms of hostile or intrusive software.

PHISHING Is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.

TROJAN VIRUS A piece of software designed to look like a useful file or software program but performs a possibly nefarious function once installed on a client computer. The virus takes its name from the “Trojan Horse” from Greek mythology setup outside of the city of Troy.

Page 4: 1. AGENDA 1. TELEPHONE SCAMS 1. MY COMPUTER SCAM STORY 1. COMMON COMPUTER SCAMS 1. THE TROJEN VIRUS 1. LEGAL SCAMS 1. HOW TO STAY SAFE 2

AGENDA

1. TELEPHONE SCAMS

1. MY COMPUTER SCAM STORY

1. COMMON COMPUTER SCAMS

1. THE TROJEN VIRUS

1. LEGAL SCAMS

1. HOW TO STAY SAFE4

Page 5: 1. AGENDA 1. TELEPHONE SCAMS 1. MY COMPUTER SCAM STORY 1. COMMON COMPUTER SCAMS 1. THE TROJEN VIRUS 1. LEGAL SCAMS 1. HOW TO STAY SAFE 2

5 5

1. RANSOMWARE

1. THE URGENT MEDICAL COSTS

1. THE GAMBLING STOCK PREDICTION

1. THE DEBT RESCUE OFFER

1. THE COMPETITION YOU NEVER ENTERED

1. THE DISASTER RELIEF APPEAL

1. THE AUCTION OVERPAYMENT OFFER

Page 6: 1. AGENDA 1. TELEPHONE SCAMS 1. MY COMPUTER SCAM STORY 1. COMMON COMPUTER SCAMS 1. THE TROJEN VIRUS 1. LEGAL SCAMS 1. HOW TO STAY SAFE 2

6

Page 7: 1. AGENDA 1. TELEPHONE SCAMS 1. MY COMPUTER SCAM STORY 1. COMMON COMPUTER SCAMS 1. THE TROJEN VIRUS 1. LEGAL SCAMS 1. HOW TO STAY SAFE 2

A particularly cruel form of online scam, this one works by befriending a person online (perhaps via a dating site, chat room or forum). Once the fraudster feels they have won the victim's trust, they will begin an elaborate tale of a seriously ill relative. Eventually, they will claim that a large sum of money is needed urgently to pay for a lifesaving operation or drug. Of course, the relative doesn't exist, and once the money is transferred, the victim never hears from the fraudster again

THE URGENT MEDICAL COSTS

7

Page 8: 1. AGENDA 1. TELEPHONE SCAMS 1. MY COMPUTER SCAM STORY 1. COMMON COMPUTER SCAMS 1. THE TROJEN VIRUS 1. LEGAL SCAMS 1. HOW TO STAY SAFE 2

With this scam, you'll receive on the likely outcome of a sports event or the likely movement of a set of stocks and shares, and be told you have to bet or buy now to cash in. These scams work by instilling a sense of urgency – if you you don't put your money into this NOW, you'll miss out. In reality, though, the scammers stand to profit in some way from where your money ends up. Never trust an unsolicited online 'tip' – it's illegal, and you're likely to lose money.

THE GAMBLING STOCK MARKET

8

Page 9: 1. AGENDA 1. TELEPHONE SCAMS 1. MY COMPUTER SCAM STORY 1. COMMON COMPUTER SCAMS 1. THE TROJEN VIRUS 1. LEGAL SCAMS 1. HOW TO STAY SAFE 2

This scam is a simple one that often preys on the desperation of people in bad debt. It offers a quick, no questions asked loan, without any form of credit check required, so long as you are willing to pay an 'arrangement fee'. Of course, you pay the fee, but the loan cash never arrives.

THE DEBT RESCUE OFFER

9

Page 10: 1. AGENDA 1. TELEPHONE SCAMS 1. MY COMPUTER SCAM STORY 1. COMMON COMPUTER SCAMS 1. THE TROJEN VIRUS 1. LEGAL SCAMS 1. HOW TO STAY SAFE 2

10

We all dream of winning the lottery, and this email could just make you think all your dreams have come true. Of course, it's a scam, and the thieves attempt to get their hands on your money by claiming you need to pay a 'release fee' before the winnings can be released. Real lotteries will never ask you to pay fees, but if in doubt, contact the National Lottery Commission.

Another version is you'll receive an email (or click a banner ad) telling you you have won the latest gadget or a fantastic holiday. Yet again, all you have to do is pay that pesky 'release fee' and the prize is yours. Or not, as you'll find when you're left drained of funds with nothing to show for it.

THE COMPETITION YOU NEVER ENTERED

Page 11: 1. AGENDA 1. TELEPHONE SCAMS 1. MY COMPUTER SCAM STORY 1. COMMON COMPUTER SCAMS 1. THE TROJEN VIRUS 1. LEGAL SCAMS 1. HOW TO STAY SAFE 2

11

This type of scam tends to surface each time there is a disaster such as a flood or earthquake. The fraudsters pose as charities and ask email recipients to donate money which sadly never reaches the victims. If you want to donate to charity, it's always best to avoid clicking any links and visit the Charity Commission website and choose a charity listed there.

DISASTER RELIEF

Page 12: 1. AGENDA 1. TELEPHONE SCAMS 1. MY COMPUTER SCAM STORY 1. COMMON COMPUTER SCAMS 1. THE TROJEN VIRUS 1. LEGAL SCAMS 1. HOW TO STAY SAFE 2

THE AUCTION OVERPAYMENT OFFER

This works much the same as the scam above, but starts when you try to sell a relatively valuable item such as a computer or car online. The winning bidder will offer to pay you more than it's worth if he can send you a bankers draft, and so the Nigerian payment scam begins.

12

Page 13: 1. AGENDA 1. TELEPHONE SCAMS 1. MY COMPUTER SCAM STORY 1. COMMON COMPUTER SCAMS 1. THE TROJEN VIRUS 1. LEGAL SCAMS 1. HOW TO STAY SAFE 2

13

Page 14: 1. AGENDA 1. TELEPHONE SCAMS 1. MY COMPUTER SCAM STORY 1. COMMON COMPUTER SCAMS 1. THE TROJEN VIRUS 1. LEGAL SCAMS 1. HOW TO STAY SAFE 2

14

This is a clever scam that is used to gain access to personal data such as banking passwords and credit card details. Emails will look as though they are from friends ('Are these photos you?') or from a company you trust ('Please check the attached statement'). These files can look harmless, but once clicked, immediately install a type of program known as a Trojan horse when clicked. The Trojan can then record keyboard strokes and transmit the data back to the fraudsters. This is an all too common method that fraudster use to get hold of your data

IF IN DOUBT DELETE

PHISHING PHISHING

MALWARE MALWARE

Page 15: 1. AGENDA 1. TELEPHONE SCAMS 1. MY COMPUTER SCAM STORY 1. COMMON COMPUTER SCAMS 1. THE TROJEN VIRUS 1. LEGAL SCAMS 1. HOW TO STAY SAFE 2

Remote Access Trojan Virus

Password Sending Trojan Virus

Key Logger Trojans

Destructive Trojan Viruses

Denial of Service Attack

Proxy Trojan

FTP Tro

jan Viru

s

15

Page 16: 1. AGENDA 1. TELEPHONE SCAMS 1. MY COMPUTER SCAM STORY 1. COMMON COMPUTER SCAMS 1. THE TROJEN VIRUS 1. LEGAL SCAMS 1. HOW TO STAY SAFE 2

16

COST $14 (£10)

Page 17: 1. AGENDA 1. TELEPHONE SCAMS 1. MY COMPUTER SCAM STORY 1. COMMON COMPUTER SCAMS 1. THE TROJEN VIRUS 1. LEGAL SCAMS 1. HOW TO STAY SAFE 2

17

SPYWARE SYMPTOMS

•If your computer starts to behave strangely, you might have spyware or other unwanted software installed on your computer.

•If you see pop-up ads as soon as you turn on your computer or when you're not even browsing the web, you might have spyware or other unwanted software on your computer.

•Some unwanted software can change your home page or search page settings. Even if you adjust these settings, you might find that they revert back every time you restart your computer.

•Web Browser contains additional components that you don't remember downloading. Spyware can add toolbars to your web browser. Even if you remove these toolbars, they might return each time you restart your computer.

•Computer seems sluggish.. If you notice a sudden increase in the number of times a certain program crashes, or if your computer is slower than normal at performing routine tasks, you may have spyware or other unwanted software on your machine.

Page 18: 1. AGENDA 1. TELEPHONE SCAMS 1. MY COMPUTER SCAM STORY 1. COMMON COMPUTER SCAMS 1. THE TROJEN VIRUS 1. LEGAL SCAMS 1. HOW TO STAY SAFE 2

18

1. BACK UP REGULARLY

1. UPGRADE YOUR OPERATING SYSTEM, FIREWALL AND ANTIVIRUS SOFTWARE TO THE LATEST VERSION AND TURN ON AUTO UPDATES..

1. DO NOT TRUST ANYTHING WITHIN E MAIL OR INTERNET PROGRAM THAT LOOK SUSPECT.

1. USE STRONG PASSWORDS AND CONSIDER KEEPING ELSEWHERE

1. ONLY DOWNLOAD PROGRAMS /ATTACHMENTS THAT YOU TRUST

1. DON’T DOWNLOAD FILES OF UNKNOWN TYPE.

1. BE VERY SUSPICIOUS

Page 19: 1. AGENDA 1. TELEPHONE SCAMS 1. MY COMPUTER SCAM STORY 1. COMMON COMPUTER SCAMS 1. THE TROJEN VIRUS 1. LEGAL SCAMS 1. HOW TO STAY SAFE 2

WWW.GIVEUSYOURMONEY.COM

Being Very Suspicious”

IF IN DOUBT “DELETE”19