computer hacking, phishing and scamming · computer hacking is the practice of modifying or...

21
Computer Hacking, Phishing and Scamming Presented by Burt Stephens July 17, 2017 1

Upload: others

Post on 14-Oct-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside

Computer Hacking, Phishing and Scamming

Presented by Burt StephensJuly 17, 2017

1

Page 2: Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside

Hacking and PhishingComputer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside of the designer's original objective.

Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy person or organization.

Page 3: Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside

Has Your E-mail account been hacked?

Look out for - • A fake email is circulating which

provides a link to a PDF file • If you click on the link, it takes you to

a fake Gmail login page • Entering your credentials causes

your account to be compromised • The attacker can then look through

your sent messages folder and forward the email on from your account to your friends using your style of writing

Page 4: Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside

REPORTING AN INVASION

Page 5: Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside

Advised toFirst: Report A Computer

Crime toOCALA POLICE DEPARTMENT GREG GRAHAM,

CHIEF OF POLICE 402 S. PINE AVENUE OCALA, FLORIDA 34471-1174

CONTACT: (352) 369-7000 FAX NUMBERS: (352) 369-7223

EMAIL: [email protected]

BUT Don’t Do it

Page 6: Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside

YOU SHOULD REPORT AN INVASION TO THE

INTERNET CRIME COMPLAINT CENTER (IC3) | HOME

(HTTPS://WWW.IC3.GOV/DEFAULT.ASPX)

CALL LOCAL FBI OFFICE: 732-7563

OR GO TO

Page 7: Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside

The IC3 accepts online Internet crime complaints from either the actual victim or from a third party to the complainant. You are to provide the following information when filing a complaint: •Victim's name, address, telephone, and email •Financial transaction information (e.g.,

account information, transaction date and amount, who received the money)

•Subject's name, address, telephone, email, website, and IP address

•Specific details on how you were victimized •Email header(s) •Any other relevant information you believe is

necessary to support your complaint

Page 8: Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside

1. Connect your Mac to a router, rather than directly to a broadband modem.

2. Use strong password to prevent a hacker from breaking in to your wireless network. For more information SEE (https://mods-n-hacks.gadgethacks.com/

how-to/crack-wi-fi-passwords-for-beginners-0139793/)

3. Configure your Mac to download important system updates automatically.

4. Enable your Mac's built-in software firewall. Open the "System Preferences" menu

How to Make My Mac Safe From Hackers

Page 9: Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside

5. Operate your Mac using a limited user account, rather than an administrator account.

6. Run anti-virus software at all times. Scans your downloads for viruses automatically before allowing you to run them

7. Exercise caution using your Mac. Never click links in email messages & look for trusted reviews before downloading unfamiliar software.

How to Make My Mac Safe From Hackers(continued)

Page 10: Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside

Block Senders on a Mac

HTTPS://WWW.YOUTUBE.COM/WATCH?V=_DIGLE57QI0

Page 11: Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside

Hacking Into Your CellPhone

Page 12: Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside

Spy Apps (For more information See https://www.youtube.com/watch?v=XyYY6TzFHsc) Phishing by message (For more information see https://kb.iu.edu/d/arsf) SS7 global phone network vulnerability (For more information see https://www.theguardian.com/technology/2016/apr/19/ss7-hack-explained-mobile-phone-vulnerability-snooping-texts-calls) Snooping via open Wi-Fi networks(For Unauthorized access to iCloud or Google (For more information seehttp://www.vintuitive.com/unauthorized-access-icloud-account/) Malicious charging stations (For more information https://krebsonsecurity.com/2011/08/beware-of-juice-jacking/ FBI’s StingRay (and other fake cellular towers) (For more information https://www.scientificamerican.com/article/what-is-the-big-secret-surrounding-stingray-surveillance/)

Page 13: Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside

Hacking Your Password

ALSO SEE HTTPS://WWW.WIRED.COM/2016/05/PASSWORD-TIPS-EXPERTS/

Page 14: Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside

Protect Your Computer from being Hacked

CREATE A FIRMWARE PASSWORDTURN OFF REMOTE LOGINCHOOSE A SECURE PASSWORDDON’T GIVE OTHERS PHYSICAL ACCESS

HTTP://WWW.HACKMAC.ORG/TUTORIALS/4-WAYS-TO-PROTECT-YOUR-COMPUTER-FROM-BEING-HACKED/

Page 15: Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside

Scams

Scams are schemes to con you out of your money. They can arrive by post, phone call, text message, email, or a scammer may turn up at your home. Computer hackers use computer viruses to gain access to your computer details, to steal your money and identity, then scam you.

Page 16: Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside

Worst Scams in 2017Remote PC Repair ScamsFake/Counterfeit ScamFraudulent/Fake Check ScamPets-for-sale ScamGrant ScamCollection Agency ScamHouse/Vacation Property Rental ScamPayday Loan ScamTimeshare Resale ScamWorking From Home Scam

Page 17: Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside

Tech Support Scams on the Rise in Florida

Page 18: Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside

Facebook Troubles

Page 19: Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside

When Traveling Overseas or in Large

U S CitiesDisable Wi-Fi and Bluetooth on your iPhone and iPad. Turn off your computerDo not use ATMs near large gatherings or conventions. Pay for everything with cash.

Page 20: Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside

Can you hack it? Hacking DocumentaryFebruary 10, 2015

RECOMMENDED: HTTPS://WWW.YOUTUBE.COM/WATCH?V=GWR5KBHT_2ELENGTH : 1 HR. 26 MIN

Page 21: Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside