IT’S A JUNGLE OUT THERE!

Post on 07-Jan-2016

26 views 0 download

Tags:

description

IT’S A JUNGLE OUT THERE!. How to keep you, your money and your computer safe. Ray Hamilton. Director of Technology Instruction and Training Merrillville Community School Corporation. So what’s lurking in the bush?. Just about everything!. Viruses Spammers Spyware Phishing schemes - PowerPoint PPT Presentation

Transcript of IT’S A JUNGLE OUT THERE!

IT’S A JUNGLEIT’S A JUNGLEOUTOUT

THERE!THERE!

How to keep you, your money How to keep you, your money and your computer safeand your computer safe

Ray HamiltonRay Hamilton

Director of Technology Director of Technology Instruction and TrainingInstruction and Training

Merrillville Community School Merrillville Community School CorporationCorporation

So what’s lurking in the bush?So what’s lurking in the bush?

Just about everything!Just about everything!

VirusesViruses SpammersSpammers SpywareSpyware Phishing schemesPhishing schemes Pharming schemesPharming schemes

VirusesViruses

Generally enter your system through Generally enter your system through Emails with .exe attachments.Emails with .exe attachments.

They can also be present in They can also be present in downloaded files.downloaded files.

They can also come from a diskette They can also come from a diskette or CD.or CD.

Viruses can Viruses can

Be playful Be playful Erase dataErase data Take over your systemTake over your system Require reformatting the hard driveRequire reformatting the hard drive

What can you do?What can you do?

Be sure you have virus protectionBe sure you have virus protection

Norton Norton

McAfeeMcAfee

Keep it updated and current – payKeep it updated and current – pay

your bills on time! your bills on time! Do not open Emails from those you Do not open Emails from those you

do not knowdo not know

Do not download programs (.exe Do not download programs (.exe files) from Email.files) from Email.

Run a virus scan on diskettes and Run a virus scan on diskettes and CD-Roms if from an unknown source.CD-Roms if from an unknown source.

and finallyand finally

Monitor those who are using your Monitor those who are using your machine, especially kids!machine, especially kids!

SpammingSpamming

Why do they do that?Why do they do that?

One word:One word:

To make money!To make money!

Every time you open a spam you are Every time you open a spam you are putting money in someone’s pocket.putting money in someone’s pocket.

Here’s an example of a typical Here’s an example of a typical spamspam

Generally a lot of nonsense words and phrases. Here’s what it really is:

Phishing?Phishing?

Look Familiar?

Looks official, doesn’t Looks official, doesn’t it?it?

You’re a trusting soul. You You’re a trusting soul. You would like to think that would like to think that

everyone is as honest as everyone is as honest as you.you.

They aren’t!They aren’t!Here’s the address of the REAL CharterOne Bank

http://www.charteronebank.com/home/default.aspHere’s the address of the FAKE CharterOne Bank in the letter

https://www.charteronebank.com/login.aspx?ReturnUrl=%2fdefault.aspx

Notice that the real one starts with http while the fake starts with https. That’s one of your first tip-offs!

And here’s where it’s REALLY And here’s where it’s REALLY going!going!

http://www.china-cas.com/zonghe/.w/charteronesecureonlinebankingcheck.com/

Since when is Charter Bank in China??

What is What is Phishing?Phishing?

Dishonest folks gain access to Dishonest folks gain access to millions of Email addresses millions of Email addresses and send bogus messages and send bogus messages purporting to be legitimate purporting to be legitimate

business.business.

Where do they come from?Where do they come from?

Like fishing, they figure if they Like fishing, they figure if they throw out enough bait throw out enough bait

eventually someone will bite.eventually someone will bite.

Even if you aren’t a customer of that bank, eventually the message will reach someone who is. Our innate trust and sometimes ignorance leads us to send them the requested information. The result?

Big Trouble!Big Trouble!

With secure information such With secure information such as your social security as your social security number, checking and number, checking and

savings account numbers, savings account numbers, they can rob you from they can rob you from

thousands of miles away.thousands of miles away.

In addition by clicking on an In addition by clicking on an Internet siteInternet site

You are telling the phisher that you are a You are telling the phisher that you are a legitimate address.legitimate address.

You can open yourself up to viruses orYou can open yourself up to viruses or Become a victim of spoofing where yourBecome a victim of spoofing where your

address is used to send out more bogusaddress is used to send out more bogus

Emails.Emails.

PharmingPharming

Like phishing, pharming is a Like phishing, pharming is a method used by unscrupulous method used by unscrupulous folks to separate you from your folks to separate you from your

money.money.

What do I do if I get a phishing What do I do if I get a phishing letter?letter?

No company ever asks for personal No company ever asks for personal information through Emails information through Emails

Do not open it. Opening it makes Do not open it. Opening it makes money for the spammer.money for the spammer. It can also It can also open you up to be “spoofed.”open you up to be “spoofed.”

Delete itDelete it If it is your bank, go to the official If it is your bank, go to the official

web site to see if there is a place to web site to see if there is a place to inform them of the scam.inform them of the scam.

PharmingPharming

Pharming is even more dangerous!Pharming is even more dangerous!

It doesn’t need to use a ruse to get It doesn’t need to use a ruse to get to your personal informationto your personal information

It creates web pages to collect It creates web pages to collect confidential information related to confidential information related to online banking.online banking.

You think you are working with a You think you are working with a legitimate business, but you are legitimate business, but you are really feeding your information to really feeding your information to criminals.criminals.

http://www.http://www.millersmilesmillersmiles.co..co.ukuk/index./index.phpphp

This is a great site to see This is a great site to see what phishing sites are out what phishing sites are out

there.there.

What can you do?What can you do?

Be sure you have virus protectionBe sure you have virus protection Make sure it is current and updatedMake sure it is current and updated Have a firewallHave a firewall Have a good anti-spyware program Have a good anti-spyware program

such as Spysweeper, Ad-Aware, such as Spysweeper, Ad-Aware, SpyBot.SpyBot.

Helpful ResourcesHelpful Resources

Norton Anti-Virus at Norton Anti-Virus at www.norton.comwww.norton.com McAfee Anti-Virus at McAfee Anti-Virus at

http://us.mcafee.comhttp://us.mcafee.com Spysweeper at Spysweeper at www.webroot.comwww.webroot.com Ad-Aware (free) Ad-Aware (free)

www.lavasoftusa.comwww.lavasoftusa.com

Contact InformationContact Information

Ray Hamilton, Director of Ray Hamilton, Director of Technology Technology

Instruction/TrainingInstruction/Training

199 E. 70199 E. 70thth Pl. Pl.

Merrillville, IN 46410Merrillville, IN 46410

Write or request to be on the Write or request to be on the tip list:tip list:

rdhamilt@mvsc.k12.in.usrdhamilt@mvsc.k12.in.us

Useful information atUseful information at

www.mvsc.k12.in.us/trainingwww.mvsc.k12.in.us/training