Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or...
Transcript of Computer Hacking, Phishing and Scamming · Computer hacking is the practice of modifying or...
Computer Hacking, Phishing and Scamming
Presented by Burt StephensJuly 17, 2017
1
Hacking and PhishingComputer hacking is the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside of the designer's original objective.
Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy person or organization.
Has Your E-mail account been hacked?
Look out for - • A fake email is circulating which
provides a link to a PDF file • If you click on the link, it takes you to
a fake Gmail login page • Entering your credentials causes
your account to be compromised • The attacker can then look through
your sent messages folder and forward the email on from your account to your friends using your style of writing
REPORTING AN INVASION
Advised toFirst: Report A Computer
Crime toOCALA POLICE DEPARTMENT GREG GRAHAM,
CHIEF OF POLICE 402 S. PINE AVENUE OCALA, FLORIDA 34471-1174
CONTACT: (352) 369-7000 FAX NUMBERS: (352) 369-7223
EMAIL: [email protected]
BUT Don’t Do it
YOU SHOULD REPORT AN INVASION TO THE
INTERNET CRIME COMPLAINT CENTER (IC3) | HOME
(HTTPS://WWW.IC3.GOV/DEFAULT.ASPX)
CALL LOCAL FBI OFFICE: 732-7563
OR GO TO
The IC3 accepts online Internet crime complaints from either the actual victim or from a third party to the complainant. You are to provide the following information when filing a complaint: •Victim's name, address, telephone, and email •Financial transaction information (e.g.,
account information, transaction date and amount, who received the money)
•Subject's name, address, telephone, email, website, and IP address
•Specific details on how you were victimized •Email header(s) •Any other relevant information you believe is
necessary to support your complaint
1. Connect your Mac to a router, rather than directly to a broadband modem.
2. Use strong password to prevent a hacker from breaking in to your wireless network. For more information SEE (https://mods-n-hacks.gadgethacks.com/
how-to/crack-wi-fi-passwords-for-beginners-0139793/)
3. Configure your Mac to download important system updates automatically.
4. Enable your Mac's built-in software firewall. Open the "System Preferences" menu
How to Make My Mac Safe From Hackers
5. Operate your Mac using a limited user account, rather than an administrator account.
6. Run anti-virus software at all times. Scans your downloads for viruses automatically before allowing you to run them
7. Exercise caution using your Mac. Never click links in email messages & look for trusted reviews before downloading unfamiliar software.
How to Make My Mac Safe From Hackers(continued)
Block Senders on a Mac
HTTPS://WWW.YOUTUBE.COM/WATCH?V=_DIGLE57QI0
Hacking Into Your CellPhone
Spy Apps (For more information See https://www.youtube.com/watch?v=XyYY6TzFHsc) Phishing by message (For more information see https://kb.iu.edu/d/arsf) SS7 global phone network vulnerability (For more information see https://www.theguardian.com/technology/2016/apr/19/ss7-hack-explained-mobile-phone-vulnerability-snooping-texts-calls) Snooping via open Wi-Fi networks(For Unauthorized access to iCloud or Google (For more information seehttp://www.vintuitive.com/unauthorized-access-icloud-account/) Malicious charging stations (For more information https://krebsonsecurity.com/2011/08/beware-of-juice-jacking/ FBI’s StingRay (and other fake cellular towers) (For more information https://www.scientificamerican.com/article/what-is-the-big-secret-surrounding-stingray-surveillance/)
Hacking Your Password
ALSO SEE HTTPS://WWW.WIRED.COM/2016/05/PASSWORD-TIPS-EXPERTS/
Protect Your Computer from being Hacked
CREATE A FIRMWARE PASSWORDTURN OFF REMOTE LOGINCHOOSE A SECURE PASSWORDDON’T GIVE OTHERS PHYSICAL ACCESS
HTTP://WWW.HACKMAC.ORG/TUTORIALS/4-WAYS-TO-PROTECT-YOUR-COMPUTER-FROM-BEING-HACKED/
Scams
Scams are schemes to con you out of your money. They can arrive by post, phone call, text message, email, or a scammer may turn up at your home. Computer hackers use computer viruses to gain access to your computer details, to steal your money and identity, then scam you.
Worst Scams in 2017Remote PC Repair ScamsFake/Counterfeit ScamFraudulent/Fake Check ScamPets-for-sale ScamGrant ScamCollection Agency ScamHouse/Vacation Property Rental ScamPayday Loan ScamTimeshare Resale ScamWorking From Home Scam
Tech Support Scams on the Rise in Florida
Facebook Troubles
When Traveling Overseas or in Large
U S CitiesDisable Wi-Fi and Bluetooth on your iPhone and iPad. Turn off your computerDo not use ATMs near large gatherings or conventions. Pay for everything with cash.
Can you hack it? Hacking DocumentaryFebruary 10, 2015
RECOMMENDED: HTTPS://WWW.YOUTUBE.COM/WATCH?V=GWR5KBHT_2ELENGTH : 1 HR. 26 MIN