1 / 29

Don’t Get Taken

Protecting yourself from scams, malware, and phishing. Don’t Get Taken. Judicial Information Technology Office. How much would you pay?. 4 steps in an Exploit Attack. User is lured to poisoned webpage Profiling malware downloaded

danil
Download Presentation

Don’t Get Taken

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Protecting yourself from scams, malware, and phishing Don’t Get Taken Judicial Information Technology Office

  2. How much would you pay?

  3. 4 steps in an Exploit Attack • User is lured to poisoned webpage • Profiling malware downloaded • A profile of the user’s computer (including weaknesses) is created and sent back to the Exploit server. • A unique package of malware is created and downloaded to the user’s computer. Note: The attack may not trigger any alerts.

  4. Ad Hijacking

  5. CBC.ca • Before • After

  6. Zeus: Financial Theft Malware

  7. Example: Zeus pop-up

  8. Fake Anti-Virus

  9. Pay-up or lose your files

  10. “FBI” Computer Block

  11. The Canadian Version

  12. You Must Protect Yourself Back it up Lock it down Don’t get tricked

  13. Back It Up (inexpensively)

  14. Back It Up (Effortlessly)

  15. Cloud Backup

  16. Lock It Down

  17. Lock It Down

  18. Lock It Down

  19. No More Blue Screens, Ever.

  20. Home Wi-Fi:Lock It Down

  21. Free Wi-Fi:It can cost you more than a Double-Double

  22. Don’t Get Taken

  23. Pop-ups • Never enter passwords or other data into a pop-up.

  24. Pop-Ups • Never click on a pop-up to update a browser plug in (e.g. Adobe Flash). • Download new software directly from the company or the browser website.

  25. Pop-Ups • Always close unexpected pop-ups by clicking the upper right-hand corner:

  26. Malware Exploits Need Your Help They are counting on you • To be lax about security • To fall for their tricks • To pay up when your data is threatened

  27. Don’t Be The Weak Link Back it up Lock it down Don’t get tricked

  28. Links to Checklists and More Information

More Related