![Page 1: Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside](https://reader035.vdocument.in/reader035/viewer/2022071218/604ec4eb5d62ad3d7f082f54/html5/thumbnails/1.jpg)
Computer Hacking, Phishing and Scamming
Presented by Burt StephensJuly 17, 2017
1
![Page 2: Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside](https://reader035.vdocument.in/reader035/viewer/2022071218/604ec4eb5d62ad3d7f082f54/html5/thumbnails/2.jpg)
Hacking and PhishingComputer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside of the designer's original objective.
Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy person or organization.
![Page 3: Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside](https://reader035.vdocument.in/reader035/viewer/2022071218/604ec4eb5d62ad3d7f082f54/html5/thumbnails/3.jpg)
Has Your E-mail account been hacked?
Look out for - • A fake email is circulating which
provides a link to a PDF file • If you click on the link, it takes you to
a fake Gmail login page • Entering your credentials causes
your account to be compromised • The attacker can then look through
your sent messages folder and forward the email on from your account to your friends using your style of writing
![Page 4: Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside](https://reader035.vdocument.in/reader035/viewer/2022071218/604ec4eb5d62ad3d7f082f54/html5/thumbnails/4.jpg)
REPORTING AN INVASION
![Page 5: Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside](https://reader035.vdocument.in/reader035/viewer/2022071218/604ec4eb5d62ad3d7f082f54/html5/thumbnails/5.jpg)
Advised toFirst: Report A Computer
Crime toOCALA POLICE DEPARTMENT GREG GRAHAM,
CHIEF OF POLICE 402 S. PINE AVENUE OCALA, FLORIDA 34471-1174
CONTACT: (352) 369-7000 FAX NUMBERS: (352) 369-7223
EMAIL: [email protected]
BUT Don’t Do it
![Page 6: Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside](https://reader035.vdocument.in/reader035/viewer/2022071218/604ec4eb5d62ad3d7f082f54/html5/thumbnails/6.jpg)
YOU SHOULD REPORT AN INVASION TO THE
INTERNET CRIME COMPLAINT CENTER (IC3) | HOME
(HTTPS://WWW.IC3.GOV/DEFAULT.ASPX)
CALL LOCAL FBI OFFICE: 732-7563
OR GO TO
![Page 7: Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside](https://reader035.vdocument.in/reader035/viewer/2022071218/604ec4eb5d62ad3d7f082f54/html5/thumbnails/7.jpg)
The IC3 accepts online Internet crime complaints from either the actual victim or from a third party to the complainant. You are to provide the following information when filing a complaint: •Victim's name, address, telephone, and email •Financial transaction information (e.g.,
account information, transaction date and amount, who received the money)
•Subject's name, address, telephone, email, website, and IP address
•Specific details on how you were victimized •Email header(s) •Any other relevant information you believe is
necessary to support your complaint
![Page 8: Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside](https://reader035.vdocument.in/reader035/viewer/2022071218/604ec4eb5d62ad3d7f082f54/html5/thumbnails/8.jpg)
1. Connect your Mac to a router, rather than directly to a broadband modem.
2. Use strong password to prevent a hacker from breaking in to your wireless network. For more information SEE (https://mods-n-hacks.gadgethacks.com/
how-to/crack-wi-fi-passwords-for-beginners-0139793/)
3. Configure your Mac to download important system updates automatically.
4. Enable your Mac's built-in software firewall. Open the "System Preferences" menu
How to Make My Mac Safe From Hackers
![Page 9: Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside](https://reader035.vdocument.in/reader035/viewer/2022071218/604ec4eb5d62ad3d7f082f54/html5/thumbnails/9.jpg)
5. Operate your Mac using a limited user account, rather than an administrator account.
6. Run anti-virus software at all times. Scans your downloads for viruses automatically before allowing you to run them
7. Exercise caution using your Mac. Never click links in email messages & look for trusted reviews before downloading unfamiliar software.
How to Make My Mac Safe From Hackers(continued)
![Page 10: Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside](https://reader035.vdocument.in/reader035/viewer/2022071218/604ec4eb5d62ad3d7f082f54/html5/thumbnails/10.jpg)
Block Senders on a Mac
HTTPS://WWW.YOUTUBE.COM/WATCH?V=_DIGLE57QI0
![Page 11: Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside](https://reader035.vdocument.in/reader035/viewer/2022071218/604ec4eb5d62ad3d7f082f54/html5/thumbnails/11.jpg)
Hacking Into Your CellPhone
![Page 12: Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside](https://reader035.vdocument.in/reader035/viewer/2022071218/604ec4eb5d62ad3d7f082f54/html5/thumbnails/12.jpg)
Spy Apps (For more information See https://www.youtube.com/watch?v=XyYY6TzFHsc) Phishing by message (For more information see https://kb.iu.edu/d/arsf) SS7 global phone network vulnerability (For more information see https://www.theguardian.com/technology/2016/apr/19/ss7-hack-explained-mobile-phone-vulnerability-snooping-texts-calls) Snooping via open Wi-Fi networks(For Unauthorized access to iCloud or Google (For more information seehttp://www.vintuitive.com/unauthorized-access-icloud-account/) Malicious charging stations (For more information https://krebsonsecurity.com/2011/08/beware-of-juice-jacking/ FBI’s StingRay (and other fake cellular towers) (For more information https://www.scientificamerican.com/article/what-is-the-big-secret-surrounding-stingray-surveillance/)
![Page 13: Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside](https://reader035.vdocument.in/reader035/viewer/2022071218/604ec4eb5d62ad3d7f082f54/html5/thumbnails/13.jpg)
Hacking Your Password
ALSO SEE HTTPS://WWW.WIRED.COM/2016/05/PASSWORD-TIPS-EXPERTS/
![Page 14: Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside](https://reader035.vdocument.in/reader035/viewer/2022071218/604ec4eb5d62ad3d7f082f54/html5/thumbnails/14.jpg)
Protect Your Computer from being Hacked
CREATE A FIRMWARE PASSWORDTURN OFF REMOTE LOGINCHOOSE A SECURE PASSWORDDON’T GIVE OTHERS PHYSICAL ACCESS
HTTP://WWW.HACKMAC.ORG/TUTORIALS/4-WAYS-TO-PROTECT-YOUR-COMPUTER-FROM-BEING-HACKED/
![Page 15: Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside](https://reader035.vdocument.in/reader035/viewer/2022071218/604ec4eb5d62ad3d7f082f54/html5/thumbnails/15.jpg)
Scams
Scams are schemes to con you out of your money. They can arrive by post, phone call, text message, email, or a scammer may turn up at your home. Computer hackers use computer viruses to gain access to your computer details, to steal your money and identity, then scam you.
![Page 16: Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside](https://reader035.vdocument.in/reader035/viewer/2022071218/604ec4eb5d62ad3d7f082f54/html5/thumbnails/16.jpg)
Worst Scams in 2017Remote PC Repair ScamsFake/Counterfeit ScamFraudulent/Fake Check ScamPets-for-sale ScamGrant ScamCollection Agency ScamHouse/Vacation Property Rental ScamPayday Loan ScamTimeshare Resale ScamWorking From Home Scam
![Page 17: Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside](https://reader035.vdocument.in/reader035/viewer/2022071218/604ec4eb5d62ad3d7f082f54/html5/thumbnails/17.jpg)
Tech Support Scams on the Rise in Florida
![Page 18: Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside](https://reader035.vdocument.in/reader035/viewer/2022071218/604ec4eb5d62ad3d7f082f54/html5/thumbnails/18.jpg)
Facebook Troubles
![Page 19: Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside](https://reader035.vdocument.in/reader035/viewer/2022071218/604ec4eb5d62ad3d7f082f54/html5/thumbnails/19.jpg)
When Traveling Overseas or in Large
U S CitiesDisable Wi-Fi and Bluetooth on your iPhone and iPad. Turn off your computerDo not use ATMs near large gatherings or conventions. Pay for everything with cash.
![Page 20: Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside](https://reader035.vdocument.in/reader035/viewer/2022071218/604ec4eb5d62ad3d7f082f54/html5/thumbnails/20.jpg)
Can you hack it? Hacking DocumentaryFebruary 10, 2015
RECOMMENDED: HTTPS://WWW.YOUTUBE.COM/WATCH?V=GWR5KBHT_2ELENGTH : 1 HR. 26 MIN
![Page 21: Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside](https://reader035.vdocument.in/reader035/viewer/2022071218/604ec4eb5d62ad3d7f082f54/html5/thumbnails/21.jpg)