Recognizing Spam. IT Computer Technical Support Newsletter



Similar documents
Advice about online security

Protecting your business from fraud

Protect yourself online

Online Security Information. Tips for staying safe online

Phishing Scams Security Update Best Practices for General User

Cyber Security. Securing Your Mobile and Online Banking Transactions

Protection from Fraud and Identity Theft

Information Security Field Guide to Identifying Phishing and Scams

OIG Fraud Alert Phishing

Malware & Botnets. Botnets

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Computer Security Self-Test: Questions & Scenarios

What are the common online dangers?

Retail/Consumer Client. Internet Banking Awareness and Education Program

How to Identify Phishing s

DON T BE FOOLED BY SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam FREE GUIDE. December 2014 Oliver James Enterprise

Don t Fall Victim to Cybercrime:

Computer Protection. Computer Protection. Computer Protection 5/1/2013. Classic Battle of Good vs Evil. David Watterson & Ross Cavazos

Tips for Banking Online Safely

Cyber Security. Maintaining Your Identity on the Net

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

How to stay safe online

How To Protect Yourself Online

How to Spot and Combat a Phishing Attack Webinar

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

Introduction to Webmail. Apache County Library District April 2011

When you are prompted to enroll, you will be asked to enter a Security Phrase and select/answer three different Challenge Questions.

Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about:

Microsoft Phishing Filter: A New Approach to Building Trust in E-Commerce Content

WHITEPAPER. V12 Group West Front Street, Suite 410 Red Bank, NJ

Learn to protect yourself from Identity Theft. First National Bank can help.

FAKE ANTIVIRUS MALWARE This information has come from - a very useful resource if you are having computer issues.

Avoid completing forms in messages that ask for personal financial information.

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

Everyone s online, but not everyone s secure. It s up to you to make sure that your family is.

Phishing Past, Present and Future

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

eprism Security Suite

Internet basics 2.3 Protecting your computer

Corporate Account Takeover & Information Security Awareness. Customer Training

& INTERNET FRAUD

Internet Basics. Meg Wempe, Adult Services Librarian ABOUT THIS CLASS. P a g e 1

Payment Fraud and Risk Management

BE SAFE ONLINE: Lesson Plan

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

A new fake Citibank phishing scam using advanced techniques to manipulate users into surrendering online banking access has emerged.

Social Media and Cyber Safety

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May TrustInAds.org. Keeping people safe from bad online ads

Saheel KHOYRATTY. Partner Technology Advisor

Introduction. Tips for Success Etiquette and Safety. Page 1

Fighting spam in Australia. A consumer guide

Common Cyber Threats. Common cyber threats include:

Remote Deposit Quick Start Guide

Class 3: Identify Tricks and Scams Online

Contents. McAfee Internet Security 3

ModusMail Software Instructions.

Information Security. Louis Morgan, CISSP Information Security Officer

Online Cash Manager Security Guide

More Details About Your Spam Digest & Dashboard

Think Before You Click. UH Information Security Team

1. Any requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

When registering on a jobsite, first ensure that the site is reputable and has a physical address and landline phone number.

Information Security Awareness

The information contained in this session may contain privileged and confidential information. This presentation is for information purposes only.

User Guide for the Identity Shield

How to Use Red Condor Spam Filtering

Cyber Security Survival Guide

Fraud Detection and Prevention. Timothy P. Minahan Vice President Government Banking TD Bank

Client Security Guide

Transcription:

IT Computer Technical Support Newsletter March 23, 2015 Vol.1, No.22 Recognizing Spam Spam messages are messages that are unwanted. If you have received an e-mail from the Internal Revenue Service or the Federal Deposit Insurance Corporation, chances are it was a phishing attempt. If you received e-mail from your bank, PayPal, or Facebook urging you to immediately verify information or risk having your account suspended, it was undoubtedly phishing. TABLE OF CONTENTS Recognizing spam.. 1 Identifying spam..2 Examples of spam..4 Avoiding spam..... 5 Phishing email messages, websites, and phone calls are designed to steal money. Cybercriminals can do this by installing malicious software on your computer or stealing personal information off of your computer. Cybercriminals also use social engineering to convince you to install malicious software or hand over your personal information under false pretenses. They might email you, call you on the phone, or convince you to download something off of a website. The IT Computer Technical Support Newsletter is complements of Pejman Kamkarian 1

How to idenfity spam Here is an example of what a phishing scam in an email message might look like. Spelling and bad grammar: Cybercriminals are not known for their grammar and spelling. Professional companies or organizations usually have a staff of copy editors that will not allow a mass email like this to go out to its users. Some have an urgent tone and they seek sensitive information that legitimate companies don't typically ask for via e-mail. If you notice these mistakes in an email, it might be a scam. 2 IT Computer Technical Support Newsletter

Beware of links in email: If you see a link in a suspicious email message, don't click on it. Rest your mouse (but don't click) on the link to see if the address matches the link that was typed in the message. In the example below the link reveals the real web address, as shown in the box with the yellow background. The string of cryptic numbers looks nothing like the company's web address. Links might also lead you to.exe files. These kinds of file are known to spread malicious software. Threats: Have you ever received a threat that your account would be closed if you didn't respond to an email message? The email message shown above is an example of the same trick. Cybercriminals often use threats that your security has been compromised. For more information, see Watch out for fake alerts. Spoofing popular websites or companies: Scam artists use graphics in email that appear to be connected to legitimate websites but actually take you to phony scam sites or legitimate-looking pop-up windows. For more information, see Avoid scams that use the Microsoft name fraudulently. IT Computer Technical Support Newsletter 3

Other examples of spam mail A recent e-mail scam asks PayPal customers to provide additional information or risk getting their account deleted because of changes in the service agreement. Recipients are urged to click on a hyperlink that says "Get Verified!" E-mails that look like they come from the FDIC include a subject line that says "check your Bank Deposit Insurance Coverage" or "FDIC has officially named your bank a failed bank." The e-mails include a link to a fake FDIC site where visitors are prompted to open forms to fill out. Clicking on the form links downloads the Zeus virus, which is designed to steal bank passwords and other information. E-mails that look like they come from the IRS tell recipients that they are eligible to receive a tax refund and that the money could be claimed by clicking on a link in the email. The link directs visitors to a fake IRS site that prompts for personal and financial information. A legitimate-looking Facebook e-mail asks people to provide information to help the social network update its log-in system. Clicking the "update" button in the e-mail takes users to a fake Facebook log-in screen where the user name is filled in and visitors are prompted to provide their password. When the password is typed in, people end up on a page that offers an "Update Tool," but which is actually a Trojan 4 IT Computer Technical Support Newsletter

Avoiding spam and phishing attacks Try to stay off spam lists. Don't post your e-mail address on public sites. If an e-mail looks reasonable contact the company directly if you receive an e-mail asking you to verify information. Type the address of the company into the address bar directly rather than click on a link. Or call them, but don't use any phone number provided in the e-mail. Don't give out personal information requested via e-mail. Legitimate companies and agencies will use regular mail for important communications and never ask customers to confirm log-in or passwords by clicking on links in e-mail. IT Computer Technical Support Newsletter 5

Look carefully at the Web address a link directs to and type in addresses in the browser for businesses if you are uncertain. Don't open e-mail attachments that you did not expect to receive. Similarly, don't open download links in IM. 6 IT Computer Technical Support Newsletter

Make sure you are using a secure Web site when submitting financial and sensitive information. Look for the green padlock icon on the address bar. Change passwords frequently. Don't use the same password on multiple sites. Regularly log into online accounts to monitor the activity and check statements. Keep your antivirus software and your operating system and applications up-to-date. IT Computer Technical Support Newsletter 7