Transcript
Page 1: Protecting Yourself from Cyber Threats
Page 2: Protecting Yourself from Cyber Threats

Striking Back!Striking Back!

Page 3: Protecting Yourself from Cyber Threats

http://www.makeuseof.com/pages/best-windows-software

Best 90 Free Windows Programs to Best 90 Free Windows Programs to Protect You and Your ComputerProtect You and Your Computer

Page 4: Protecting Yourself from Cyber Threats

Don’t Launch Cell Phone Games and Programs that are “Pushed” to you

Page 5: Protecting Yourself from Cyber Threats

Just how gullible are we?

Page 6: Protecting Yourself from Cyber Threats

Cell phone data charges

Ring tones Vanity fraud

Meet My Children - Sean, Lindsay, Ryan. Each of them was scammed!

Page 7: Protecting Yourself from Cyber Threats

““It canIt can’’t happen to me!t happen to me!””

Page 8: Protecting Yourself from Cyber Threats

Click on this link

Page 9: Protecting Yourself from Cyber Threats

Without protection, its just a craps Without protection, its just a craps game.game.

Really?What are the odds?

Page 10: Protecting Yourself from Cyber Threats

“You stand a better chance at any given time of loosing your personally identifiable information than you do of just about any other form of nasty thing

than can happen to a person over their lifetime.” The National Safety CouncilThe National Safety Council

1 in 146,107,962.00 could potentially win the power ball lottery grand prize

1 in 3,563,608.83 could potentially win the 200,000 dollar prize in the power ball

1 in 3000 will be killed by lighting in any given year

1 in 1,313 chance of being killed by a doctor

1 in 314 chance of being killed by a firearm

1 in 84 chance of being killed in a car crash over your lifetime

1 in 3 has had their personally identifiable 1 in 3 has had their personally identifiable

information lost this year!! information lost this year!!

Page 11: Protecting Yourself from Cyber Threats

A new, targeted social media A new, targeted social media version of a very old scam -- the version of a very old scam -- the

““Nigerian,Nigerian,”” or or ““419,419,”” ploy ploy

Page 12: Protecting Yourself from Cyber Threats

WIRE ME MONEY !FACEBOOK HACK

Page 13: Protecting Yourself from Cyber Threats

How did they do that?How did they do that? Because Facebook regularly contacts its users

through e-mail, and includes links in those e-mails to login pages, the format is ripe for phishers. It's easy to imitate Facebook e-mails and simply send users clicking to a look-a-like login page that steal passwords.

Page 14: Protecting Yourself from Cyber Threats
Page 15: Protecting Yourself from Cyber Threats
Page 16: Protecting Yourself from Cyber Threats

http://www.youtube.com/watch?v=0zvPEfksbyQ

Punked! Lots of tools on the net for people who may want to

take advantage of you.

Page 17: Protecting Yourself from Cyber Threats

Symantic and Sperling’s Best Places 2010 Report

Americas Riskiest Cities for CybercrimeAmericas Riskiest Cities for Cybercrime

"I look at it like driving a car," said Dan Nadir, the director of product management for Symantec. "Your risk of an accident is going to be greater the more you drive. If you're online more, you need to be more cautious, just like the more you're on the road, the more you should wear your seatbelt, have airbags and rotate your tires."

Page 18: Protecting Yourself from Cyber Threats

Not Proud of this High Ranking

Page 19: Protecting Yourself from Cyber Threats

Variables In Study Sins of Commission: risky online activities, including online

banking and online shopping.

Sins of Omission: Also factored into the rankings was the number of free WiFi hotspots per capita. "WiFi is a big concern," acknowledged Nadir, "because it's something most people don't understand, and most don't know who is behind that hotspot, or if it's even legitimate.“

What counters the risk? Awareness through education!!What counters the risk? Awareness through education!!

Page 20: Protecting Yourself from Cyber Threats
Page 21: Protecting Yourself from Cyber Threats
Page 22: Protecting Yourself from Cyber Threats

http://www.scambusters.org/

Page 23: Protecting Yourself from Cyber Threats

“Who steals my purse steals trash…But he that filches from me

my good name …... Makes me poor indeed.”

Othello, Act 3 Scene 3Othello, Act 3 Scene 3

Page 24: Protecting Yourself from Cyber Threats

When in doubt about a potential scam check the Internet Crime Complaint Centerhttp://www.ic3.gov/about/default.aspx

Page 25: Protecting Yourself from Cyber Threats

We are all victims!We are all victims!1700 new victims in the course of this meeting.

By the end of the decade someone in your family will be a victim.

Lowest estimate of projected damage is $5000.

Only 1 in 700 is investigated.

1 year or less in jail.

70 – 80 % involve illegal dugs

FBI reports 30,000 computer a week are taken over.

http://www.youtube.com/watch?v=NF34sqrAPHU

Page 26: Protecting Yourself from Cyber Threats
Page 27: Protecting Yourself from Cyber Threats

Don’t let them get away with it.

Get mad or get even!

Report them immediately to:http://www.ic3.gov/complaint/default.aspx

OR…become a scam baiter

(not really recommended, but some people are just really angry)

Page 28: Protecting Yourself from Cyber Threats

Who Scammers HateWho Scammers Hatehttp://www.419hell.com/

Page 29: Protecting Yourself from Cyber Threats

The meteoric rise in social media use has also The meteoric rise in social media use has also created a launch pad for identity thieves. created a launch pad for identity thieves.

“My prediction for 2010 (and beyond) is that the increase in social networking activity, along with a user’s failure to

implement security and privacy settings and protocols, will lead to an increased exposure of not only the usernot only the user’’s personal s personal

information but possibly that of their information but possibly that of their ““friendsfriends””..Robert Siciliano : CEO of IDTheftSecurity.com

http://www.youtube.com/watch?v=JwFC0jfxTco

Page 30: Protecting Yourself from Cyber Threats

A word or two about passwordsA word or two about passwordsand…. hacking Facebookand…. hacking Facebook

((the following presentation is a bit scary, but you can the following presentation is a bit scary, but you can protect yourself with the steps that follow)protect yourself with the steps that follow)

http://www.youtube.com/watch?v=V_kvQC5DH34&feature=related No birthdates or social security numbers

No mother’s maiden name

No universal password

Yes to long passwords (over eight characters)

Yes to random patterns – first letter of each word in your favorite song with your favorite number.

Yes to changing it frequently

Page 31: Protecting Yourself from Cyber Threats

http://www.passpack.com/en/home/

Page 32: Protecting Yourself from Cyber Threats

Three FREE Three FREE ““must havemust have”” online online tool to create unique passwords.tool to create unique passwords.

http://www.passwordchart.com/

Page 33: Protecting Yourself from Cyber Threats

http://www.roboform.com/

Page 34: Protecting Yourself from Cyber Threats

http://www.onguardonline.gov/games/overview.aspx

Go to this site: Choose at least two games and report your findings and observations on the Discussion Board.

Page 35: Protecting Yourself from Cyber Threats

FTC Videohttp://www.youtube.com/watch?v=PVZqNSWvdj8&feature=player_embedded

Page 36: Protecting Yourself from Cyber Threats

Who are the bad guys?Who are the bad guys?Small time crooks

Page 37: Protecting Yourself from Cyber Threats

Trans- national Trans- national crime gangs.crime gangs.

Russian "Mafia," Colombian and Mexican drug cartels,

Asian Triads, Japanese Yakuza, Nigerian confidence rings,

Hell's Angels, rogue factions of the St. Regis Mohawk tribe and

the surviving, leaner and meaner Cosa Nostra

http://www.youtube.com/watch?v=HwtLZV010-M

Page 38: Protecting Yourself from Cyber Threats

PhishingPhishing

Why do people fall for it ???Why do people fall for it ???

Beware of the push!!Beware of the push!!

Page 39: Protecting Yourself from Cyber Threats

Greed…..Greed…..

Page 40: Protecting Yourself from Cyber Threats
Page 41: Protecting Yourself from Cyber Threats

Greed = Scam…..Greed = Scam…..

Page 42: Protecting Yourself from Cyber Threats

Fear….Fear….

Page 43: Protecting Yourself from Cyber Threats

Fear = ScamFear = Scam

MailFrontier recently claimed that over 40% of recipients fell for the recent Citibank Email Phishing Scam.

Page 44: Protecting Yourself from Cyber Threats

Curiosity…..Curiosity…..

Page 45: Protecting Yourself from Cyber Threats

Curiosity = ScamCuriosity = Scam

Page 46: Protecting Yourself from Cyber Threats

Temptation…..GroomingTemptation…..GroomingRef. Number:EGOGHS255125600419   Batch Number: 14/ 01259/ IPD   Ticket Number:113-2471-752-209   Serial Number: 5063-11

  Attention

  We are pleased to inform you of the result of the Winners   in our UNIVERSAL STAKES Lottery Program held on the 20th   JULY, 2004.Your e-mail address attached to ticket number   27522465896-6453 with serial number 3772-554 drew lucky   numbers 7-14-18-31-45 which consequently won in the 2ND   category, you have therefore been approved for a lump sum   pay out of USD$1,500,000 ( One Million Five Hundred   Dollars) Only .CONGRATULATIONS!

Page 47: Protecting Yourself from Cyber Threats

Some Quick FactsSome Quick FactsFBI 2009 statistics show $560 million in losses – over double

the figure from 2008.

Median individual loss - $575.

But reported loss is tip of the project iceberg – estimated to be in the billions. Only 1 in 10 crime reported

Page 48: Protecting Yourself from Cyber Threats

What Scammers LoveWhat Scammers Love

Social networking sites

People who click on links

Pictures, blogs

Manually hacking “captcha” registration blocks.

Page 49: Protecting Yourself from Cyber Threats

SCaREWARESCaREWAREPretends to detect a virus and offers

to help with inexpensive debugging

software (usually around $50) – then..

You give your credit card # for the software fix!You give your credit card # for the software fix!http://www.youtube.com/watch?v=m_bZiEMkd5Y

Page 50: Protecting Yourself from Cyber Threats

Hidden terms..Recurring Billing..Shipping & handling

Page 51: Protecting Yourself from Cyber Threats

Texting for Texting for DollarsDollars

Text message from your bank or credit card company to call right away and verify account information!

OR

You’ve won a free gift from a reputable vendor like Sears or Macy’s

http://www.youtube.com/watch?v=EtsdK3vLT6k

Page 52: Protecting Yourself from Cyber Threats

Bogus LoveBogus Love“Wire me some money for an airline ticket

so that I can be with you forever.”

1) Fake photos: You may be virtual dating with somebody else.

2) Hidden costs: Sign-up could be free, but everything else requires you to pay extra fees.

3) Milking your Bank Account: The guy/girl is in distress and urgently need money, e.g. accidents, trapped at airport, hospitalized, etc.

http://www.youtube.com/watch?v=NyC0EyyuSlc&feature=player_embedded#!

Page 53: Protecting Yourself from Cyber Threats

“Make ME your favorite charity…please :( ”

http://www.youtube.com/watch?v=FyzfdTVvV5k

Their pitch: Speed up relief efforts – wire and send personal info such as social security and checking account numbers.

Page 54: Protecting Yourself from Cyber Threats

Log on here:The hot-spot Hot seat

“Coming to a location near you.”

http://telkomhell.com/wi-fi-hotspot-security.html

Page 55: Protecting Yourself from Cyber Threats

Any Web site or print ad offering free credit reports has to display this disclosure across the top of each page:

THIS NOTICE IS REQUIRED BY LAW. Read more at FTC.GOV.THIS NOTICE IS REQUIRED BY LAW. Read more at FTC.GOV.You have the right to a free credit report from You have the right to a free credit report from

AAnnualCreditReport.comnnualCreditReport.com or 877-322-8228, the ONLY authorized source under federal law.or 877-322-8228, the ONLY authorized source under federal law.

In September 2010 the rules will go into effect for TV and radio ads.

Beware!Not so free credit reports.

Page 56: Protecting Yourself from Cyber Threats

Free Credit Report?www.creditkarma.com

Invitation CodeIt’s currently in Beta now like any good start-up, so you’ll need a special promo code to get in. Use CKFRND


Top Related