IT’S A JUNGLE OUT THERE!
description
Transcript of IT’S A JUNGLE OUT THERE!
IT’S A JUNGLEIT’S A JUNGLEOUTOUT
THERE!THERE!
How to keep you, your money How to keep you, your money and your computer safeand your computer safe
Ray HamiltonRay Hamilton
Director of Technology Director of Technology Instruction and TrainingInstruction and Training
Merrillville Community School Merrillville Community School CorporationCorporation
So what’s lurking in the bush?So what’s lurking in the bush?
Just about everything!Just about everything!
VirusesViruses SpammersSpammers SpywareSpyware Phishing schemesPhishing schemes Pharming schemesPharming schemes
VirusesViruses
Generally enter your system through Generally enter your system through Emails with .exe attachments.Emails with .exe attachments.
They can also be present in They can also be present in downloaded files.downloaded files.
They can also come from a diskette They can also come from a diskette or CD.or CD.
Viruses can Viruses can
Be playful Be playful Erase dataErase data Take over your systemTake over your system Require reformatting the hard driveRequire reformatting the hard drive
What can you do?What can you do?
Be sure you have virus protectionBe sure you have virus protection
Norton Norton
McAfeeMcAfee
Keep it updated and current – payKeep it updated and current – pay
your bills on time! your bills on time! Do not open Emails from those you Do not open Emails from those you
do not knowdo not know
Do not download programs (.exe Do not download programs (.exe files) from Email.files) from Email.
Run a virus scan on diskettes and Run a virus scan on diskettes and CD-Roms if from an unknown source.CD-Roms if from an unknown source.
and finallyand finally
Monitor those who are using your Monitor those who are using your machine, especially kids!machine, especially kids!
SpammingSpamming
Why do they do that?Why do they do that?
One word:One word:
To make money!To make money!
Every time you open a spam you are Every time you open a spam you are putting money in someone’s pocket.putting money in someone’s pocket.
Here’s an example of a typical Here’s an example of a typical spamspam
Generally a lot of nonsense words and phrases. Here’s what it really is:
Phishing?Phishing?
Look Familiar?
Looks official, doesn’t Looks official, doesn’t it?it?
You’re a trusting soul. You You’re a trusting soul. You would like to think that would like to think that
everyone is as honest as everyone is as honest as you.you.
They aren’t!They aren’t!Here’s the address of the REAL CharterOne Bank
http://www.charteronebank.com/home/default.aspHere’s the address of the FAKE CharterOne Bank in the letter
https://www.charteronebank.com/login.aspx?ReturnUrl=%2fdefault.aspx
Notice that the real one starts with http while the fake starts with https. That’s one of your first tip-offs!
And here’s where it’s REALLY And here’s where it’s REALLY going!going!
http://www.china-cas.com/zonghe/.w/charteronesecureonlinebankingcheck.com/
Since when is Charter Bank in China??
What is What is Phishing?Phishing?
Dishonest folks gain access to Dishonest folks gain access to millions of Email addresses millions of Email addresses and send bogus messages and send bogus messages purporting to be legitimate purporting to be legitimate
business.business.
Where do they come from?Where do they come from?
Like fishing, they figure if they Like fishing, they figure if they throw out enough bait throw out enough bait
eventually someone will bite.eventually someone will bite.
Even if you aren’t a customer of that bank, eventually the message will reach someone who is. Our innate trust and sometimes ignorance leads us to send them the requested information. The result?
Big Trouble!Big Trouble!
With secure information such With secure information such as your social security as your social security number, checking and number, checking and
savings account numbers, savings account numbers, they can rob you from they can rob you from
thousands of miles away.thousands of miles away.
In addition by clicking on an In addition by clicking on an Internet siteInternet site
You are telling the phisher that you are a You are telling the phisher that you are a legitimate address.legitimate address.
You can open yourself up to viruses orYou can open yourself up to viruses or Become a victim of spoofing where yourBecome a victim of spoofing where your
address is used to send out more bogusaddress is used to send out more bogus
Emails.Emails.
PharmingPharming
Like phishing, pharming is a Like phishing, pharming is a method used by unscrupulous method used by unscrupulous folks to separate you from your folks to separate you from your
money.money.
What do I do if I get a phishing What do I do if I get a phishing letter?letter?
No company ever asks for personal No company ever asks for personal information through Emails information through Emails
Do not open it. Opening it makes Do not open it. Opening it makes money for the spammer.money for the spammer. It can also It can also open you up to be “spoofed.”open you up to be “spoofed.”
Delete itDelete it If it is your bank, go to the official If it is your bank, go to the official
web site to see if there is a place to web site to see if there is a place to inform them of the scam.inform them of the scam.
PharmingPharming
Pharming is even more dangerous!Pharming is even more dangerous!
It doesn’t need to use a ruse to get It doesn’t need to use a ruse to get to your personal informationto your personal information
It creates web pages to collect It creates web pages to collect confidential information related to confidential information related to online banking.online banking.
You think you are working with a You think you are working with a legitimate business, but you are legitimate business, but you are really feeding your information to really feeding your information to criminals.criminals.
http://www.http://www.millersmilesmillersmiles.co..co.ukuk/index./index.phpphp
This is a great site to see This is a great site to see what phishing sites are out what phishing sites are out
there.there.
What can you do?What can you do?
Be sure you have virus protectionBe sure you have virus protection Make sure it is current and updatedMake sure it is current and updated Have a firewallHave a firewall Have a good anti-spyware program Have a good anti-spyware program
such as Spysweeper, Ad-Aware, such as Spysweeper, Ad-Aware, SpyBot.SpyBot.
Helpful ResourcesHelpful Resources
Norton Anti-Virus at Norton Anti-Virus at www.norton.comwww.norton.com McAfee Anti-Virus at McAfee Anti-Virus at
http://us.mcafee.comhttp://us.mcafee.com Spysweeper at Spysweeper at www.webroot.comwww.webroot.com Ad-Aware (free) Ad-Aware (free)
www.lavasoftusa.comwww.lavasoftusa.com
Contact InformationContact Information
Ray Hamilton, Director of Ray Hamilton, Director of Technology Technology
Instruction/TrainingInstruction/Training
199 E. 70199 E. 70thth Pl. Pl.
Merrillville, IN 46410Merrillville, IN 46410
Write or request to be on the Write or request to be on the tip list:tip list:
[email protected]@mvsc.k12.in.us
Useful information atUseful information at
www.mvsc.k12.in.us/trainingwww.mvsc.k12.in.us/training