1 / 33

Staying Safe

Staying Safe. How to Identify and Avoid Bad Things. Malware: Spyware, Virus, etc. Fake web sites that want to steal your info. Useless software: Bloatware, Crapware. Phishing Emails. SPAM: Different Types of SPAM and what to do about it. Malware: Spyware, Virus, etc.

gwylan
Download Presentation

Staying Safe

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Staying Safe How to Identify and Avoid Bad Things

  2. Malware: Spyware, Virus, etc. • Fake web sites that want to steal your info • Useless software: Bloatware, Crapware • Phishing Emails • SPAM: Different Types of SPAM and what to do about it

  3. Malware: Spyware, Virus, etc. • Fake web sites that want to steal your info • Useless software: Bloatware, Crapware • Phishing Emails • SPAM: Different Types of SPAM and what to do about it

  4. Any program that downloads without your knowledge. • Corrupts and interferes with using your computer. • May ask or demand money, but not always.

  5. Fake security products • Ransomware that locks up and hijacks your computer. • RAT: Remote Access Tool

  6. Fake Security Product

  7. Ransomware

  8. Runs totally invisibly, doesn’t demand money. • Adds your computer to the hacker’s “Bot Net”. • Causes your computer to crank out SPAM. • Makes your computer participate in targeted and coordinated DDoS attacks on web sites. • Runs a hidden web server, such as a fake PayPal site, designed to scam other people.

  9. Googling for free stuff, employment, song lyrics, celebrity gossip, gambling, pornography. • Downloading software such as Screen savers, Wallpaper, Games from untrusted sources. • Attachments in email, regardless of type.Picture, Video, Programs, etc.

  10. Make sure Windows Update runs every night. • Remove any and all software you don’t need. • Keep your web browser updated. • Keep add-ons updated: Java, Flash, Reader, Media Player, Quicktime, Shockwave, etc.

  11. Keep your anti-virus program current. • Don’t let kids, especially teens, use your computer. They should have their own. • Use “sandboxing” software to isolate your web browser, especially for risky online behavior.

  12. • Malware: Spyware, Virus, etc. • Fake web sites that want to steal your info • Useless software: Bloatware, Crapware • Phishing Emails • SPAM: Different Types of SPAM and what to do about it

  13. What are fake web site login pages?Facebook, Gmail, HTTPS vs HTTP: What does that really mean? • Web sites with IP address only, such as http://64.231.122.12/homepage.html • Closely misspelled domain names: ebau instead of ebay, etc. • Web address displayed on status line doesn’t match link shown on main page body.

  14. • Malware: Spyware, Virus, etc.  • Fake web sites that want to steal your info • Useless software: Bloatware, Crapware • Phishing Emails • SPAM: Different Types of SPAM and what to do about it

  15. Crapware that installs automatically while you are installing or updating something else. • Java • Reader • Flash • Shockwave • Anything with “toolbar” in it’s name. • Tune-up, speed-up, registry cleaners, we-care, coupon printers, weather, etc.

  16. • Malware: Spyware, Virus, etc.  • Fake web sites that want to steal your info  Useless software: Bloatware, Crapware • Phishing Emails • SPAM: Different Types of SPAM and what to do about it

  17. “Phone” already begins with PH. “Phreaking” is spelled with a PH instead of an F to lend it a hacker cachet. And it fits with the PH in PHone, making a nice two-letter alliteration. It’s the same with PHishing, a hacker version of FISHING

  18. From: FedEx Shipping Notification Subject: Ship NotificationDate: June 17, 2013 Dear Client,  Your parcel has arrived at June 02. Courier was unable to deliver the parcel to you. To receive your parcel, print this label and go to the nearest office. Click Here to Print Shipment Label Customer Service Team 1995-2013 FRAUD

  19. FRAUD

  20. NEVER click a link in an email that involves your bank, broker, PayPal, or any other financial institution. NEVER click on a link in an email from a friend that seems out of character for that person. ALWAYS open a separate browser window, go to the web site in question using a bookmark or by Googling the name, then clicking on legitimate links.

  21. Caller says he’s from …

  22. • Malware: Spyware, Virus, etc.  • Fake web sites that want to steal your info  • Useless software: Bloatware, Crapware  • Phishing Emails • SPAM: Different Types of SPAM and what to do about it

  23. Types of Spam • Fake Rolexs, Prescriptions, Mortgage offers, Wives from Russia, Stock tips, Male enhancements, etc. • Fraud • Email from legitimate retailers like Home Depot, Amazon.com, etc. • Promo

  24. • Malware: Spyware, Virus, etc.  • Fake web sites that want to steal your info  • Useless software: Bloatware, Crapware  • Phishing Emails  • SPAM: Different Types of SPAM and what to do …

More Related