SlideShare ist ein Scribd-Unternehmen logo
1 von 119
Staying Safe on the Computer
and Online
You can also use cotton or foam swabs
More on cleaning a computer
https://www.computerhope.com/cleaning.htm
https://www.gcflearnfree.org/computerbasics/keeping-your-computer-clean/1/
• Record your keyboard strokes (Keylogger)
• Steal private information such as passwords, credit card numbers,
etc. (Spyware)
• Hold your files hostage (Ransomware)
• Use your processing power and internet for nefarious purposes
(Worm)
• Masquerade as a normal program which then installs a virus (Trojan
Horse)
• Erase your hard drive, cause your computer to malfunction, crash
and become non-responsive (Malware)
• Help infect other computers or attack the internet (bot or zombie
computer)
For windows, use windows update. You can go to http://windows.microsoft.com/en-
us/windows/windows-update for more information. Set up for automatic updates.
For a Mac, you can access updates through the app store. For more information go
to https://support.apple.com/en-us/HT201541
For Android and Apple devices go to Settings then go to About Device - Software Update for
Android devices and General – About – Software update for Apple Devices.
Avoid using unsupported Operating system (example: Windows XP, Windows Vista,
Mac OS X Leopard)
Upgrade to the newest operating system available for your device when possible
This is also called patching.
https://www.gcflearnfree.org/internetsafety/installing-and-updating-browser-plugins/1/
Make sure you download programs and plug-ins from their websites or use the
following services.
https://ninite.com/
http://filehippo.com/
Make sure the drivers for the devices attached to your computer are up to date
as well (printers, scanners, cameras, etc.)
Also make sure you update the apps on your device through Google Play Store
or Apple’s App Store.
A common trick these days is to hide 3rd party software inside utility programs like Java or within
printer programs during the installation process.
The best way to keep junk programs out and prevent other unnecessary changes to your computer is
by paying close attention to what is happening while you are installing any program.
Most companies count on you to not pay attention and rely on users to tap on next, next, I agree.
Another trick to sneak junk software into your computer is by convincing you that the "standard
installation" is best and of course the recommended one.
They may make it sound like you have to be a rocket scientist to go with the "custom installation", but
when you do choose it, you’ll see what they are trying to sneak past you.
Start making it a point to click the custom or advanced option when installing anything new on your
system so you can avoid the junk before it sneaks in.
This tip is the key to avoiding attempts by software companies to take over your browser with
additional toolbars, switching the default search engine or changing your start page.
https://www.datadoctors.com/media/tips/1307
Make sure you keep these up to date as well.
https://www.commoncraft.com/video/computer-viruses-and-threats
What to do if your computer gets a virus
https://www.gcflearnfree.org/internetsafety/what-to-do-if-your-computer-gets-a-
virus/1/
Windows 7
Windows 10
1. Go to settings
2. Click on Apps
3. Click on the app
You want to uninstall
4. Click on Uninstall
https://www.gcflearnfree.org/basic-computer-skills/uninstalling-software-from-your-
mac/1/
https://www.piriform.com/
Or use Windows Disk Cleanup Utility
Before getting rid of your computer /laptop, remove files etc. that you
want to keep then wipe or remove the hard drive
Before getting rid of your mobile device or gaming console, do a factory
reset.
https://howsecureismypassword.net/ to see how secure
your password is.
Paper is the best.
Password Managers
http://www.datadoctors.com/help/kenscolumns/22107-Are-Password-Managers-Safe-to-
Use/
Lastpass
https://www.lastpass.com/business/home
Keepass
http://keepass.info/
Roboform
http://www.roboform.com/
Dashlane
https://www.dashlane.com/
Password Passphrase generators
Xkpasswd.net
https://xkpasswd.net/s/
Diceware
http://world.std.com/~reinhold/diceware.html
Avoid the temptation to use the same user name and password for every
account. Whenever possible, change your passwords every six months.
Whenever possible, use a “pass-phrase” as your answer to account security
questions – such as "Youllneverguessmybrotherinlawsmiddlename"
https://ssd.eff.org/en/module/how-enable-two-factor-authentication
Increases your security by texting you a code to access your account
Greatly increases security of any account
You know if your account was hacked right away
https://twofactorauth.org/
AKA Two-Step Verification
9. Baits: Do not take any free offers lightly. Think twice before responding to
unsolicited offers such as free screensavers, free downloads such as pirated
software and pornographic images, icons or even virus and spyware protection.
Along with the promised goodies, you may also get ―Adware‖ or ―Spyware‖
that monitors your online activities and floods your screen with pop-ups. If
someone invites you to share the fortune of a Nigerian prince or redeem
winnings from a contest you’ve never entered, don’t do it! Finally, beware of
messages urging you to ―update‖ or ―validate‖your account information online.
No legitimate company will ever request your account number and password via
e-mail. When in doubt, call the company involved on the phone.
Ignore this email!
https://www.datadoctors.com/help/question/22272-Beware-of-
this-Sextortion-Scam/
Frequent random popups. Popular sign that
you've been hacked is also one of the more
annoying ones. When you're getting random
browser pop-ups from websites that don't
normally generate them, your system has been
compromised.
https://www.consumer.ftc.gov/scam-alerts
Support Scam Alert
http://www.datadoctors.com/media/tips/1148
http://www.datadoctors.com/media/tips/1148
Windows 10 expiration scam – Someone calls and says your
copy of Windows 10 has expired.
https://www.datadoctors.com/help/kenscolumns/22279-
Beware-of-Windows-10-Expiration-Scams/
http://www.azfamily.com/story/38514042/ftc-says-beware-of-tech-support-
calls?autostart=true
Tech support calls from someone claiming to be Microsoft or one if it’s
representatives.
https://www.aarp.org/money/scams-fraud/info-2019/tech-support.html
https://www.consumer.ftc.gov/features/pass-it-on/imposter-scams/tech-
support-scams
Fake Antivirus Messages. The fake scan, which always finds tons of "viruses," is a
lure to buy scammer product. Clicking on the provided link sends you to a
professional-looking website, complete with glowing letters of recommendation.
There, they ask you for your credit card number and billing information.
Unwanted browser toolbars. Common sign of exploitation: Your browser has
multiple new toolbars with names that seem to indicate the toolbar is supposed to
help you.
Redirected Internet searches. Many hackers make their living by redirecting your
browser somewhere other than you want to go. The hacker gets paid by getting
your clicks to appear on someone else's website, often those who don't know that
the clicks to their site are from malicious redirection
Ransomware (AKA Digital Extortion)
https://www.coloradovirtuallibrary.org/technology/ransomware-bag-of-tricks/
https://www.coloradovirtuallibrary.org/technology/have-you-been-pwned-bag-of-tricks/
AARP’s The Perfect Scam Podcast
https://www.aarp.org/podcasts/the-perfect-scam/
How to protect yourself from scams in Google Search
https://www.azfamily.com/news/features/how-to-protect-
yourself-from-scams-in-google-search-
results/article_18c26420-baeb-11e9-8164-27d21964efd9.html
Consumers getting duped by smart device 'Activation Scam'
https://www.azfamily.com/news/investigations/3_on_your_sid
e/originals/consumers-getting-duped-by-smart-device-
activation-scam/article_a88c4f84-f5e8-11e9-b26a-
270e8a2c5150.html
Keeping Kids Safe Online
https://www.komando.com/news/parents-check-your-
childs-phone-for-these-15-apps-frequented-by-
predators/699468/
http://krq.iheart.com/articles/jbs-feed-501625/beware-of-this-text-scam-that-
15786934/?cmp=managed_social
The “Lucky” Phone Call (or You’ve Won!) : How fortunate! You’ve won a free gift, an
exclusive service, or a great deal on a trip to Las Vegas. Must hurry because this is a
“limited time offer”.
https://www.consumer.ftc.gov/features/pass-it-on/youve-won-scams
809 Area Code Scam: Callers lured into placing calls to the 809 area code (Bahama)
charged large long-distance fees. If you call from the US, you will apparently be charged
$2,425 per-minute
Emergency scam: Be cautious if you get a call from a family member or friend claiming
to be in an accident, arrested, or hospitalized while traveling in another country. Never
send money unless you confirm with another family member that it’s true.
https://www.consumer.ftc.gov/features/pass-it-on/imposter-scams/grandkid-scams
https://www.usatoday.com/story/tech/columnist/saltzman/2017/07/03/delete-
suspicious-text-messages-on-your-smartphone/439647001/
https://seniorplanet.org/scam-alert-cellphone-identity-theft/
https://seniorplanet.org/scam-alert-can-you-hear-me/
https://seniorplanet.org/scam-alert-watch-out-for-this-phone-call/
Robocalls
National Do Not Call Registry
https://www.donotcall.gov/
Check with cell phone provider to see what they offer.
Third party blocker : Nomorobo, YouMail, Truecaller, RoboKiller.
https://www.consumer.ftc.gov/topics/limiting-unwanted-calls-
emails?sort=popular
https://www.consumer.ftc.gov/features/pass-it-on/unwanted-calls
Neighbor Spoofing
https://www.bbb.org/article/news-releases/16670-a-new-kind-of-
phone-scam-neighbor-spoofing
Credit Report
https://www.annualcreditreport.com/index.action
Check Kids as well. If kids start getting credit card offers etc. they
have been scammed.
Hidden URLs: You'll see them everywhere on Twitter, but you never know where
you're going to go since the URL ("Uniform Resource Locator," the Web address)
hides the full location. Clicking on such a link could direct you to your intended site,
or one that installs all sorts of malware on your computer. (Bitly, Goo.gl, Ow.ly, etc.).
So always put your cursor over the link and read the address that comes up at the
bottom of the browser. You can tell if it is a bad address or not.
http://www.datadoctors.com/help/kenscolumns/22156-Beware-of-Typosquatting/
Account Takeover Fraud - Financial identity theft in the form of account takeover
fraud generally means using another person's account information (e.g., a credit
card number) to obtain products and services using that person's existing accounts.
https://www.aarp.org/money/scams-fraud/info-2018/identity-theft-social-security-
benefits.html?intcmp=AE-MON-CP-EOA1
https://blog.ssa.gov/category/fraud-2/
https://www.medicare.gov/forms-help-resources/help-fight-medicare-fraud
https://www.consumer.ftc.gov/features/pass-it-on/health-care-scams
https://seniorplanet.org/its-irs-tax-scam-season/
https://www.irs.gov/newsroom/irs-wraps-up-dirty-dozen-list-of-tax-scams-for-2018-
encourages-taxpayers-to-remain-vigilant
https://www.irs.gov/newsroom/taxpayer-guide-to-identity-theft
https://www.consumer.ftc.gov/features/pass-it-on/imposter-scams/irs-imposter-scams
IRS will never call or email with problems. Will always mail through USPS. Same with
Medicare and Social Security.
https://www.aarp.org/money/scams-fraud/info-2019/shimon-richmond-interview-
medicare.html?intcmp=AE-FRDSC-MOR-R2-POS3
Nanny/Caregiver Scams
https://www.consumer.ftc.gov/blog/2018/07/staying-away-nanny-and-caregiving-job-
scams
1. The Fake Utility Company
You're behind on your bill, and you'll lose power if you don't
provide cash now.
4. DNA Cancer Screening
People like you have died because they didn't take the DNA
test we're offering.
5. Missed Jury Duty Scam
There's a warrant for your arrest because you didn't show up for
your jury duty assignment
Job scams -https://www.consumer.ftc.gov/articles/0243-
job-scams
Amazon Scams- Caller says you owe for an item or for
Amazon Prime membership renewal even though you
don’t
•Social media: Scams on social platforms are also on the rise. Victims do the work of the
cybercriminals by sharing videos or stories with their friends that include links to
sketchy sites. Spread rapidly because people are more likely to click on something
posted by a friend. https://www.datadoctors.com/media/tips/1433
•You now even need to be careful when it comes to friend requests. Some scammers
are stealing photos and pretending to be people you may know. And you may just
blindly click on accept.
•Your friends receive social media invitations from you that you didn’t send. Either you
or your friends receive invitations to “be a friend” when you are already connected
friends on that social media site. Your friend may contact you to find out why you are
sending out new friend requests. The hacker either controls your social media site, has
created a second near-look-alike bogus page, or you or friend has installed a rogue
social media application.
•Likejacking: Using fake "like" buttons, hackers trick people into clicking on website
buttons that install malware and may post updates on a user's news feed, spreading the
attack.
•Facebook “Like” Farming - Someone will post to Facebook and people will like that
post. Then they will like the page it’s on. Then the person changes the page to
something like an ad for a bogus business or a too-good-to-be-true product you can buy
online. Make your page only so Friends can see what you post. That way people don’t
get info about you that they can use against you for id theft.
•Social media gift exchange: It sounds like a great deal; buy one gift and get 36 in return.
But it’s just a variation on a pyramid scheme and it’s illegal.
Other Scams
https://www.aarp.org/money/scams-fraud/info-2019/scams-on-social-media-
Student Loan Scams
https://studentaid.ed.gov/sa/repay-loans/avoiding-loan-scams
https://studentaid.ed.gov/sa/resources#consumer-protection
Online Dating Scams
https://www.consumer.ftc.gov/features/pass-it-on/imposter-scams/online-
dating-scams
Military Families
https://www.militaryconsumer.gov/
Census Scams
https://www.census.gov/programs-surveys/surveyhelp/fraudulent-activity-and-
scams.html
Do not pay scammers with gift cards.
https://www.consumer.ftc.gov/articles/paying-scammers-gift-cards
Debit Collector Scams
https://www.consumerfinance.gov/about-us/blog/how-tell-difference-
between-legitimate-debt-collector-and-scammers/
Debit Relief Scams
https://www.aarp.org/money/scams-fraud/info-2019/debt-relief.html
What do these scams all have in common?
1. Sense of urgency
2. Odd payment requests
3. Voice/images of authority
4. Playing on emotions/fears
SIM Hijacking
The popularity of using 2-factor authentication with smartphones has led to various
exploits to usurp this extra layer of protection including SIM swapping or SIM
hijacking. By taking over control of your phone number, hackers can have the
special code sent to a phone that they have in their possession.
https://www.datadoctors.com/help/kenscolumns/22225-Preventing-SIM-Hijacking/
Pretexting
They’ve also become very good at fooling victims by calling them posing as an organization
that claims to have detected a break in that wants to verify that the victim is the actual
owner of the account.
They’ll tell the victim that they will be getting a special code on their smartphone that
they need them to read back to ‘verify’ that they are the authentic owner. Of course,
reading back the code allows the remote hacker into the account because they are at the
screen that is asking for the code on their computer.
USB Security Keys
Since the bad guys have found easy ways to side step the security that
smartphone based 2-factor authentication offers, another form of higher level of
security has surfaced in the form of the USB key.
Instead of using a smartphone as the 2nd form of authentication, you would use a
special USB key on your computer, smartphone or tablet that costs $20 to $50.
Once you set them up, a USB security key connected to your device is required in
order to gain access to the protected accounts. There are backup methods to
allow you in, should you lose your USB key, so be sure to set one up if you plan on
using them.
To get more of an understanding of your options, checkout the various models from
YubiKey (https://goo.gl/cGQzPY) or Google’s offering called ‘Titan’
(https://goo.gl/iDc5uj).
https://www.datadoctors.com/help/kenscolumns/22227-Should-I-Use-a-USB-
Security-Key/
Social Media and Facebook Privacy Basics
http://www.gcflearnfree.org/internetsafety/social-media-privacy-basics/1/
https://techboomers.com/t/facebook-privacy
http://www.gcflearnfree.org/facebook101/adjusting-your-privacy-settings/1/
What you put in the internet stays there
forever! Think before you post.
Wifi Security
https://www.gcflearnfree.org/internetsafety/wifi-security/1/
When connecting to wifi in a public place make sure of the name of the business’ wifi. If a connection
name looks strange don’t connect to it!
Don’t leave your laptop or mobile device unattended. Protect usb drives and external hard drives.
Lock your computer before you leave it. Enable automatic screenlock on your devices.
Evil Twin Attack or Pharming: Hacker sets up a Wi-Fi access point with the same name as a legitimate
network you have connected to previously and compels your computer or phone to connect to it
automatically without your consent. .
A mobile hotspot is more secure than public Wi-Fi, and it prevents an Internet service
provider from selling your information and online activity to a third party. (In many cases,
companies are legally allowed to do this.)
7. Never plug your devices (mobile phone, tablet and/or laptop) into an
electrical outlet in an airport or any other public place. Doing so will make you
more susceptible to being hacked. Instead, travel with an external battery
charger to keep your devices charged.
https://www.lonelyplanet.com/articles/smartphone-risk-public-usb-port
Juice Jacking - when the device you connect to for a charge actually attempts to
connect to your device to access data.
https://www.datadoctors.com/media/tips/1698
https://www.howtogeek.com/166497/htg-explains-what-is-juice-jacking-and-
how-worried-should-you-be/
War Driving: War driving is a term used to describe the process of a hacker who,
armed with a laptop, smartphone or tablet, uses commonly available software
to troll neighborhoods via a car, bicycle, or even drone to find open or poorly
protected WiFi networks
What is cache and browsing history?
https://techboomers.com/t/what-is-cache-browsing-history
What are Cookies
https://techboomers.com/t/what-are-cookies
IP address: When your computer connects to the Internet, it's given a unique number
that distinguishes it from every other computer on the Internet. Websites that you
connect to can see this address, and can use parts of it to figure out what country,
region, or even city you live in.
User-agent strings: These are lines of computer code that identify what program
you're using to connect to the Internet or World Wide Web. Using these, trackers can
tell what type of browser you're using (e.g. Chrome, Firefox, Internet Explorer, and so
on).
https://techboomers.com/t/privacy-policies
Data Flow​, the way digital information moves in a given process.
http://www.dataprivacyproject.org/wp-content/uploads/2017/02/Handout-Data-
Flows-Handout.pdf
What Is Data Mining?
In recent news, you've probably heard something about Big Data and data mining. Data
mining means searching for patterns and relationships in large collections of data—often
called Big Data. Data has always been analyzed for patterns, but computers have made
collecting, storing, and analyzing data far more efficient and commonplace. Through the
process of automatic inference, these patterns are used to find trends, draw conclusions,
and sometimes even predict future patterns.
Your Data Is a Valuable Commodity
Data aggregators, also known as data brokers, specialize in learning everything they can
about consumers. There are few limits on what data brokers can do with this this
information, though they don't generally make it publicly available for free. Data brokers
combine information from companies you do business with, online tracking data, and public
records from government websites to make a consumer profile with a unique ID, which may
in turn be sold to an advertising company. These profiles may or may not be linked with
your name—but even an "anonymous" profile compiled by a data broker probably has
enough information to uniquely identify you. The more advertisers know about you, the
better they can predict your future behavior.
Everyone has an information (digital) footprint—a trail of information you leave behind
as you use technology.
Limiting Who Sees Your Footprint
You can limit who sees your information footprint by talking to your service providers,
being selective when you share information online, and adjusting your device and app
settings to optimize privacy. Your footprint may still be large, but it will be significantly
more private.​
Lastly, Paige says that even with verified, legitimate nonprofits, it's always important to
take a moment and ask yourself, "Do I want to extend my digital footprint to this
organization?" Be mindful of which personal information you are sharing. Make
decisions with care when signing up for newsletters or giving out information needed
for the purposes of a tax write-off.
"You might not want to be part of their email database. You need to take control of
where your information is being stored," she says.
Give only information that is required on websites. Be careful what you post on social
media.
https://www.digitalliteracyassessment.org/external-resources#standards-slide-digital-
footprint
Browser Blocking Tools
https://techboomers.com/t/finding-your-information-online
https://www.komando.com/tips/391215/how-to-opt-out-of-the-
most-popular-people-search-sites/all
These search engines do not…
Track your browsing info
Save your searches
No ad targeting
No bias search results
Encryption
https://www.leblibrary.com/online-self-defense?qt-online_self_defense=3#qt-
online_self_defense
https://ssd.eff.org/en/module/what-encryption
FULL DISK ENCRYPTION
Filevault (OS X): https://support.apple.com/en-us/HT204837
Bitlocker (Windows): http://windows.microsoft.com/en-US/windows-vista/BitLocker-
Drive-Encryption-Overview
LUKS (GNU/Linux): https://gitlab.com/cryptsetup/cryptsetup/blob/master/README.md
Veracrypt: https://veracrypt.codeplex.com/
https://www.cyberghostvpn.com/en_us
https://kproxy.com/
Electronic Payment Apps
If purchasing items online, consider using a
secured payment app, such as those below
PayPal Apple
Pay
Google Wallet
Or use gift cards
4. Don’t use a debit card to shop online it can compromise your checking account . Use only one credit card. If
you don't feel safe using a credit card, explore alternative payment options.
Online Shopping
•Purchase gift cards from behind the customer-service desk.
•Choose cards with packaging that covers the card number and security code.
•Choose a card with loss or theft protection.
•Watch for any signs that a card has been tampered with, such as a scratched-off pin number.
•Avoid purchasing gift cards from an online auction.
•If a card is preloaded, ask for the card to be scanned to verify its value.
•Keep the receipt from a gift-card purchase.
•Protect your card: Some gift cards can be registered as credit cards on websites listed on the card, which can
protect them against theft or loss. Also take photos of the front and back of the card or write down card details as
some companies will replace lost or stolen cards if you can provide specifics. Receipts with card information are
good to hold on too.
•Free gift cards: Pop-up ads or email offering free gift cards are often just a ploy to get your personal information
that can later be used for identity theft. Only buy gift cards from brick and mortar stores or directly from their
official website.
Unusual forms of payment: Be wary of anyone who asks you to pay for holiday purchases using prepaid debit
cards, gift cards, wire transfers, third parties, bitcoin, etc. These payments cannot be traced and cannot be
undone.
1. Never click on links in external emails. If you want to shop at a site, enter that
site address in your browser. There are thousands of fake sites that look almost identical
to the real thing. Don't fall for evil-twin shopping sites.
4. Beware of e-skimmers. This is a new one. Do you know that bad guys sometimes
skim your credit card at gas stations or ATMs? Well, there is a new flavor of that, the
shopping website you order from might be infected with a "e-skimmer" and they steal
your card data when you check out. You can prevent that by using PayPal or Amazon.
1. Keep a close eye on your credit card and bank accounts. During this season, unexpected
and strange charges might appear which could very well be the first sign your card or
even your whole identity has been stolen. If you think you might have been scammed,
stay calm and call your credit card company, nix that card and get a new one.
2. Read the ratings and reviews on items and sellers. Beware of fake reviews.
https://www.scambusters.org/fakereviews.html
3. Before you buy an item, read its returns and refunds policy carefully.
Also, read safety tips on websites like ebay and craigslist.
6. Don’t use public wifi to shop unless you use a VPN
Fake retail site or look a like sites scam You come across the item you want at a super low price being sold at a website
you never heard of. To make your purchase you need to input your credit card information. You could be giving your
number to a crook who will in turn use it to make bogus charges or even sell your number.
Do look twice at URLs and app names. Misplaced or transposed
letters are a scam giveaway but easy to miss.
Do research an unfamiliar product or brand. Search for its name with
terms like “scam” or “complaint,” and look for reviews.
Don’t provide more information than a retailer needs. That should be
only your billing information and the shipping address.
Don’t use sites that require you to download software or enter personal
information to access coupons or discount codes.
https://www.aarp.org/money/scams-fraud/info-2019/online-
shopping.html
Avoid getting your packages stolen (aka Porch Pirates)
Pick-up your packages promptly
Pick up at brick and mortar store if possible
Ship to Another Location (Work, Family, Friend, Neighbor, etc. or have them delivered to a pickup location operated by the carrier
or vendor Ex Amazon. )
Leave special instructions for delivery (either with a note or while ordering the item) direct the delivery company to place
packages somewhere which makes it harder to see from the street
Require a Signature
Track your package
Install a camera with feed to the porch
Shipping confirmation ploy You get an email or phone call from the US Postal service or major carrier. You’re told that you have a
package waiting for you or that it was delivered to someone else by mistake. In order to make sure you are the correct recipient,
you’re asked to submit personal information including your name, address, date of birth, and social security number. Crooks can
use this information to steal your identity and open accounts in your name.
Fake shipping notifications: These can have attachments or links to sites that will download malware on your computer to steal
your identity and your passwords. Don’t be fooled by a holiday phishing scam.
Fake purchase confirmation: If you get an email from a retailer, but didn’t make the purchase it mentions, “don’t click on anything
in that email.”
Opt out of credit card offers
https://www.optoutprescreen.com/?rf=t
Informed Delivery from USPS. Shows what will be in your mailbox in a day or two.
https://informeddelivery.usps.com/
https://www.azfamily.com/news/investigations/3_on_your_side/originals/mesa-woman-loses-thousands-of-dollars-in-microsoft-
scam/article_1308356e-862a-11e9-bcb2-a360f6c1ab64.html
https://www.aarp.org/money/scams-fraud/info-2019/gift-card.html
https://www.aarp.org/money/scams-fraud/info-2019/gift-card-fraud.html
https://www.abc15.com/news/let-joe-know/amazon-sending-you-an-email-what-not-to-do
Charity Cons: Unless you dialed the call, don't provide a credit card number over the phone. And before donating, verify an
organization's legitimacy at Charity Navigator or Give.org, or through your state's agency that regulates charities.
https://www.consumer.ftc.gov/features/pass-it-on/charity-fraud
Classified ad come-on You find the perfect gift, but it is not being sold in a store. Instead it’s listed in a classified ad on a site such
as Craigslist or Backpage. In order to buy it the vendor asks you to make a wire transfer, use an online escrow service, or pay
through Venmo. You place the order, but the item never arrives. You send emails to the seller, but they go unanswered.
E-cards: Electronic cards can be great fun, but be careful. Two red flags to watch out for are: the sender’s name is not apparent;
you are required to share additional information to get the card.
Letters from Santa: Several trusted companies offer charming and personalized letters from Santa, but scammers mimic them to
get personal information from unsuspecting parents. Check with bbb.org to find out which ones are legitimate.
Phony charities: Everyone is in a generous mood at the holidays, so scammers take advantage of that with fake charity
solicitations in email, on social media sites, and even by text. Check out charities at give.org before donating.
Temporary holiday jobs: Retailers and delivery services need extra help at the holidays, but beware of solicitations that require
you to share personal information online or pay for a job lead. Apply in person or go to retailers’ main websites to find out who is
hiring.
Faux Freebies From iPhones to cruises, the holidays are the time for emails, text messages and social media posts that promise
free merchandise. Many of them are a ploy to install malware once you click on a link for details. Others lead to online surveys
designed to steal personal information for possible identity theft or to set you up as a future target for scammers. Some bogus
offers for freebies require your credit card, saying it is necessary to cover shipping costs or a deposit. That often leads to
unnecessary charges on your bill. Before taking the bait, check the manufacturer’s or provider’s website. If the offer isn’t touted
there, assume it’s the work of thieves.
And think twice before downloading free holiday-themed entertainment, screen savers or mobile apps. Some are specifically
designed to hack personal information, passwords and files from your device.
• Don't open attachments with special offers. It's a classic scam. The offer should be in the email and you should be able to
see it right away.
• Watch for malicious ads and popups. Do not click on ads that sound too good to be true, and ignore popups that might
propose the "best deal ever".
Survey Swindles: These unexpected emails, text messages and social media posts promise a generous gift card, coupon or actual
products for sharing your opinions about planned purchases or a “recent shopping experience.” But beware: Links that are
supposed to lead you to a survey often hide computer malware. And “questions” about personal or financial information —
including bank and credit accounts for supposed reward deposits — could be a setup for future identity theft
White Label Ticket Scams - Purchase tickets to shows, sporting events,
concerts, from the venue itself or from websites like Ticketmaster. This way you
know the tickets will be legitimate and not fake.
Home repairs and security checks - Emails, phone calls, or in person. People will
tell you they are a contractor or from a security firm. Ignore them.
https://www.consumer.ftc.gov/features/pass-it-on/home-improvement-scams
Rental Listing Scams https://www.consumer.ftc.gov/articles/0079-rental-listing-
scams
https://www.abc15.com/news/let-joe-know/renting-a-
vacation-home-you-could-be-sending-money-to-a-scammer
Lotteries and sweepstakes – If you have to send money in to get your winnings
from a lottery or sweepstakes, it’s a scam.
Jury Scam – You get a call saying that you missed jury duty and you will be
arrested for it.
https://superiorcourt.maricopa.gov/jury/jury-scam/
http://www.azd.uscourts.gov/jury/juror-scams
https://scambusters.org/juryduty.html
• Car Scams https://www.consumer.ftc.gov/articles/0525-deceptive-
auto-scams-infographic
• Job Scams https://www.consumer.gov/jobs#!what-to-do
• Weather Scams https://www.consumer.ftc.gov/features/dealing-
weather-emergencies
• https://www.fcc.gov/consumers/guides/one-ring-phone-scam
• Do not call person back. Will likely be a toll call.
• Cryptojacking is the hijacking of Internet connected devices to
secretly make use of the processor for the mining of crypto
currency.
Shimmer Scams – the shims contain a microchip that can read and
transmit information from your card. Though your chip cannot be cloned
in the same way a chip can, bad guys can glean enough information to
make purchases using the extracted data.
Work from home scams
https://www.consumer.ftc.gov/features/pass-it-on/work-at-home-scams
Money Mule Scams
https://www.consumer.ftc.gov/features/pass-it-on/money-mule-scams
Don’t post on social media that you are on vacation. Post
pictures etc. after you get back.
You don’t have to give out your social security number.
Your SSN has been used in crimes, and you're going to be arrested unless
…
Data breach
https://identitytheft.gov/databreach
3 dangers to kids on the internet : strangers, friends, and themselves
Talk to your kids about strangers, posting things (info they share can affect kids in future) etc. Tell kids to
be careful who they talk to, don’t post personal info. Encourage kids that they can come talk to parents.
Dedicated pc for kids in public high traffic area. Set ground rules for using internet, what they can and
can’t do online, and post them by the computer.. Use parental controls and filtering. Familiarize yourself
with your child’s online activities and maintain a dialogue with them about what applications they are
using. Put mobile devices in parent’s room at night (central charging station).
Signs a Child Is Being Bullied
Look for changes in the child. However, be aware that not all children who are bullied exhibit warning
signs.
Unexplainable injuries
Lost or destroyed clothing, books, electronics, or jewelry
Frequent headaches or stomach aches, feeling sick or faking illness
Changes in eating habits, like suddenly skipping meals or binge eating. Kids may come home from school
hungry because they did not eat lunch.
Difficulty sleeping or frequent nightmares
Declining grades, loss of interest in schoolwork, or not wanting to go to school
Sudden loss of friends or avoidance of social situations
Feelings of helplessness or decreased self esteem
Self-destructive behaviors such as running away from home, harming themselves, or talking about
suicide
http://www.datadoctors.com/help/kenscolumns/22129-Apps-for-Managing-a-Childs-Smartphone/
http://www.datadoctors.com/help/kenscolumns/22135-Are-Smart-Devices-Safe-to-Use/
Change the default username and password that comes with your IOT connected device.
https://www.datadoctors.com/help/kenscolumns/22169-What-Exactly-is-the-Deep-Web/
https://wtop.com/consumer-news/2017/11/hackable-holidays-six-steps-to-protect-
your-smart-home-from-spies/
Change your password to your devices and your accounts regularly. Make sure the
software is up to date. Enable two factor authentication. Add a shared user.
https://www.datadoctors.com/help/kenscolumns/22275-Ring-Doorbell-Security-
Warning/
https://www.vice.com/en_us/article/3a88k5/how-hackers-are-breaking-into-ring-cameras?
http://denverlibrary.org/files/Backing%20Up%20Your%20Data%20handout%205-19-
2014.pdf
http://denverlibrary.org/files/Clean%20Up%20and%20Speed%20Up%20your%20Co
mputer%20handout%206-30-2014.pdf
http://denverlibrary.org/files/Protecting%20Your%20Privacy%20Online%20handout%
202-27-14_0.pdf
http://denverlibrary.org/files/StayingSafeOnline_Handout_11-20-13.pdf
http://denverlibrary.org/files/Viruses%20and%20Malware%20101%20handout%2012
-26-13.pdf
https://sites.google.com/a/nypl.org/techconnect/course-
materials/protectingyourprivacysecurity
http://www.gcflearnfree.org/onlinesafety/internetsafety
http://www.gcflearnfree.org/techsavvy/password-tips
http://www.gcflearnfree.org/techsavvy/backing-up-your-files
http://www.gcflearnfree.org/techsavvy/browsing-privately
http://www.gcflearnfree.org/internet-tips/installing-and-updating-browser-plug-ins
http://www.gcflearnfree.org/computerbasics/14/full
http://lifehacker.com/the-best-privacy-and-security-focused-web-browsers-1672758270
https://www.aarp.org/home-family/personal-technology/info-2019/privacy-for-seniors.html
https://www.azfamily.com/news/investigations/3_on_your_side/originals/how-to-protect-
yourself-from-identity-theft/article_1de2442a-df35-11e9-a7bf-8f6094fa7330.html
https://www.consumer.ftc.gov/features/pass-it-on/identity-theft
http://www.akronlibrary.org/training/pdf/Computer%20Security%20Windows%207.pdf
http://www.lexpublib.org/sites/default/files/attachments/computer_security_0.docx
http://houstonlibrary.org/sites/default/files/module4_computersecurity1.ppt
http://houstonlibrary.org/sites/default/files/module4_computersecurity2.ppt
http://www.provlib.org/sites/default/files/Protecting%20your%20computer.pdf
http://aarptek.aarp.org/online-safety/
http://member.aarp.org/home-family/personal-technology/info-2014/create-password-
avoid-hacks-kirchheimer.html
https://www.aarp.org/podcasts/the-perfect-scam/
https://techboomers.com/c/internet-courses
https://www.commoncraft.com/videolist?qt-cc_video_quicktab=2#qt-cc_video_quicktab
http://computer.howstuffworks.com/security-channel.htm
http://lifehacker.com/top-10-tech-security-basics-every-person-should-follow-1767148925
https://www.digitallearn.org/courses/online-scams
https://www.digitallearn.org/courses/accounts-passwords
https://www.digitallearn.org/courses/internet-privacy
http://lifehacker.com/unlock-ransomed-files-with-avasts-four-free-ransomware-1789577598
http://www.datadoctors.com/help/kenscolumns/22115-Ransomware-Victim-Options/
https://sites.google.com/a/nypl.org/techconnect/course-materials/protectingyourprivacysecurity
https://sites.google.com/a/nypl.org/techconnect/course-materials/computersafetymaintenance
https://sites.google.com/a/nypl.org/techconnect/course-materials/savingandrecoveringdata
http://www.trilogycomputerclub.com/uploads/6/8/9/9/6899335/cyber_awareness_.pdf
https://applieddigitalskills.withgoogle.com/c/middle-and-high-school/en/avoid-online-
scams/overview.html
https://www.gailstoolkit.com/basics
https://duckduckgo.com/newsletter
https://spreadprivacy.com/tag/privacy-newsletter/
https://www.sjpl.org/privacy
https://www.leblibrary.com/online-self-defense
https://libraryfreedomproject.org/
http://www.dataprivacyproject.org/curriculum/
https://www.stopthinkconnect.org/
https://www.bbb.org/avoidscams/
https://www.connectsafely.org
http://www.onguardonline.gov/
https://www.staysafeonline.org
http://www.dhs.gov/publication/stopthinkconnect-older-american-resources
http://www.dhs.gov/stopthinkconnect
https://www.scamadviser.com
https://www.scambusters.org/
https://www.consumer.ftc.gov/scam-alerts
https://www.consumer.ftc.gov/features/feature-0014-identity-theft
https://www.azag.gov/identity-theft
https://www.identitytheft.gov
https://www.idtheftcenter.org/
donotcall.gov,
consumerfinance.gov/complaint
ic3.gov/complaint
https://www.fbi.gov/scams-and-safety
postalinspectors.uspis.gov
http://www.aarp.org/money/scams-fraud/info-2016/how-to-report-fraud-file-
complaints.html
https://www.google.com/transparencyreport/safebrowsing/diagnostic
http://www.aarp.org/money/scams-fraud/info-2017/fraud-protection-ultimate-
guide.html
https://www.aarp.org/money/scams-fraud/info-2017/holiday-season-scams-
photo.html
https://catalog.fdic.gov/system/files/MSOA_RG_180828.pdf
https://about.usps.com/publications/pub310.pdf
http://www.piriform.com/
http://www.revouninstaller.com/revo_uninstaller_free_download.html
https://www.comodo.com/home/browsers-toolbars/internet-products.php
https://disconnect.me/
https://adblockplus.org/
https://www.eff.org/https-everywhere
https://www.ghostery.com/
http://www.dropbox.com
http://www.onedrive.com
http://drive.google.com
http://www.crashplan.com
http://www.backblaze.com
https://ninite.com/
http://filehippo.com/
https://www.malwarebytes.org/
http://portableapps.com/
https://tails.boum.org/index.en.html
http://www.lifeacker.com
http://www.komando.com/
http://recode.net/author/walt-mossberg/
http://www.datadoctors.com/index.cfm
http://askabbystokes.com/2015/10/how-to-detect-an-email-scam/
https://applieddigitalskills.withgoogle.com/c/middle-and-high-
school/en/avoid-online-scams/overview.html
Quiz
https://www.digitalliteracyassessment.org/go/?module=26
Slides
rebrand.ly/ga6wjj
Adware—type of malware that allows popup ads on a computer system, ultimately taking over a user’s Internet browsing.
Antivirus program - software that helps detect and destroy viruses
Botnet—a network of private computers, each of which is called a “bot,” infected with malicious software (malware) and controlled as a group
without the owners' knowledge for nefarious and, often, criminal purposes; computers are typically infected when users open up an
infected attachment or visit an infected website.
Catfish - Someone who creates a fake online profile to intentionally deceive you.
Cyberbullying—bullying that takes place using electronic technology, including the Internet, and related technologies to harm other people, in
a deliberate, repeated, and hostile manner; may involve text messages or emails, rumors sent by email or posted on social networking
sites, and embarrassing pictures, videos, Web sites, or fake profiles.
Cyberstalking—a criminal offense that involves using the Internet or other technology to stalk or harass an individual, a group of individuals, or
an organization; it may include false accusations, monitoring, making threats, identity theft, damage to data or equipment, or harassment.
Computer virus—a software program that is designed to replicate itself, spread from one computer to another, and interfere with computer
operation; a computer virus may corrupt or delete data on a user’s computer, use an email program to spread itself to other computers, or
even erase everything on a user’s hard disk. Computer viruses can be spread by attachments in email messages or instant messaging
messages; disguised as attachments of images, greeting cards, or audio and video files, and hidden in illicit software or programs that are
downloaded to a computer.
Cookie—also referred to as an “HTTP cookie,” is a small text file that contains a unique ID tag placed on the user’s computer by a Web site to
track pages visited on the site and other information; “tracking cookies” and “third-party tracking cookies” are used to compile long-term
records of individuals’ browsing histories.
Denial of Service Attack—type of online computer attack designed to deprive user or groups of users normally accessible online services;
generally involves effort by hackers to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet.
Encryption—the conversion of digital information into a format unreadable to anyone except those possessing a “key” through which the
encrypted information is converted back into its original form (decryption), making it readable again.
Evil Twin Attack - Hacker sets up a Wi-Fi access point with the same name as a legitimate network you have connected to previously and
compels your computer or phone to connect to it automatically without your consent. .
.
Firewall—software or hardware that, after checking information coming into a computer from the Internet or an external network, either blocks
the transmission or allows it to pass through, depending on the pre-set firewall settings, preventing access by hackers and malicious
software ; often offered through computer operating systems.
Geotagging—the process of adding geographical location, or label, to photographs, videos, website, SMS messages, QR Codes, or RSS
feeds; a geotag usually consists of latitude and longitude coordinates, altitude, distance, place names, and other details about the origin of
the media being tagged helping users find a variety of online location-specific information.
Ghosting - Theft of the identity of a deceased person to fraudulently open credit accounts, obtain loans or get utility or medical services in the
person's name.
Hacker - highly skilled computer user who gains entry to information on computers not intended for them by “cracking” the programming codes .
Hash busters: The random words or sentences contained in spam emails that allow these emails to bypass your spam filters.
Keylogger—also called keylogging and keystroke logging, is the action of tracking (or logging) the keys struck on a computer keyboard; usually
runs hidden in the background and automatically records all keystrokes so that users are unaware of its presence and that their actions
are being monitored Malware—short for malicious software, software that disrupts or damages a computer’s operation, gathers sensitive
or private information, or gains access to private computer systems; may include botnets, viruses, worms, Trojans, keyloggers, spyware,
adware, and rootkits.
Malvertising - Malicious online advertising that contains malware — software intended to damage or disable computers.
Man-in-the-middle attack - When a fraudster secretly intercepts and possibly alters messages between two parties who believe they are
securely communicating with each other.
Patch - computer code created to correct a problem (i.e.,bug) within an existing program
Pharming: When hackers use malicious programs to route you to their own websites (often convincing look-alikes of well-known sites), even if
you've correctly typed in the address of the site you want to visit.
phishing - scam email sent to elicit private information from the recipient to be used for identity theft
pirated software - software that has been illegally copied
Pop-ups—or pop-up ads, are a form of online advertising on the World Wide Web intended to attract web traffic or capture email addresses;
created by advertisers, pop-ups generally appear unexpectedly in a small web browser window when a user is linking to a new Web site.
Pop-up blockers—a web browser feature, software, or application that allows users to limit or block pop-up ads; users may often set the
preferred level of blocking, from total blocking to minimal blocking.
Scareware/Ransomeware holds your computer for ransom. It’s a relatively new danger. The scareware will sometimes pretend to be a helpful
piece of software like an antivirus program and may offer a ‘trial version’ or ‘free scan’. Once it has access to your computer, it will tell you your
computer has tons of problems and the only way to fix them is to pay for the full version of the program. Other times it will be more direct and
simply demand money in return for not doing something bad to your computer.
Rootkit—a type of malware that opens a permanent “back door” into a computer system; once installed, a rootkit will allow more and more
viruses to infect a computer as various hackers find the vulnerable computer exposed and attack.
Scareware - A program that displays on-screen warnings of nonexistent infections on your computer to trick you into installing malware or
buying fake antivirus protection.
Skimming - The capture of information from the magnetic stripe on credit and debit cards by "skimmer" devices that are secretly installed on
card-reading systems at gas pumps, ATMs and store checkout counters.
“SMiShing” is the mobile version of phishing, and occurs when someone sends a SMS/text message asking you to provide personal and/ or
financial information by clicking on a link or responding via text or phone number.
spam - unsolicited commercial/junk email
Spear-phishing: Phishing with personalized email, often appearing to be from someone you know.
Spoofing – Email spoofing is when you receive an email message that appears to be from someone other than the actual sender. This method
enables the junk e-mailer to hide his or her identity from the recipient. In spoofing, the sender places a false return address on the junk
message. When spoofed, the recipient has no idea who sent the message and has no way of responding or stopping the problem. Emails
can also contain a spoofed web site address.
spyware - software that covertly gathers user information when connected to the Internet without the user’s knowledge
SSL (secure sockets layer) - format for transmitting private documents over the Internet. It uses a cryptographic system that involves two keys.
surge protector - device that protects the computer from irregular electrical currents
upgrading software - installing a new and improved version of a software program already installed on the computer
(trojan) virus - computer problem created by malcontented computer geeks. Viruses are meant to damage computers and are spread by opening email
attachments or links or using someone else’s disks.
Vishing - Short for "voice phishing," the use of recorded phone messages intended to trick you into revealing sensitive information for identity theft.
Water Holing - A watering hole attack is a security exploit in which the attacker seeks to compromise a specific group of end users by infecting websites
that members of the group are known to visit
War Driving - War driving is a term used to describe the process of a hacker who, armed with a laptop, smartphone or tablet, uses commonly available
software to troll neighborhoods via a car, bicycle, or even drone to find open or poorly protected WiFi networks
Web Cache -, temporary stored web documents such as HTML pages and images. Caching reduces bandwidth use and load time when a web page is
visited.
Whaling - Phishing attempt on a "big fish" target (typically corporate executives or payroll departments) by a scammer who poses as its CEO, a company
attorney or a vendor to get payments or sensitive information.
worm - program, not unlike a virus, that replicates itself over a computer network and usually performs malicious actions

Weitere ähnliche Inhalte

Was ist angesagt?

Internet security.spyware
Internet security.spywareInternet security.spyware
Internet security.spywarediwakar sharma
 
Delete fb downloader search
Delete fb downloader searchDelete fb downloader search
Delete fb downloader searchchristaldisouza1
 
Nir goldshlager Killing a bug bounty program - twice Hack In The Box 2012
Nir goldshlager Killing a bug bounty program - twice Hack In The Box 2012Nir goldshlager Killing a bug bounty program - twice Hack In The Box 2012
Nir goldshlager Killing a bug bounty program - twice Hack In The Box 2012Nir Goldshlager
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014B2BPlanner Ltd.
 
Remove search shield.com pop-ups manually
Remove search shield.com pop-ups manuallyRemove search shield.com pop-ups manually
Remove search shield.com pop-ups manuallyharoNaroum
 
Bug bounty null_owasp_2k17
Bug bounty null_owasp_2k17Bug bounty null_owasp_2k17
Bug bounty null_owasp_2k17Sagar M Parmar
 
Jupitersupport blog
Jupitersupport blogJupitersupport blog
Jupitersupport blogMathew peter
 
Things that go bump on the web - Web Application Security
Things that go bump on the web - Web Application SecurityThings that go bump on the web - Web Application Security
Things that go bump on the web - Web Application SecurityChristian Heilmann
 
Techniques For Making 21st Century Learning Tools Safer
Techniques For Making 21st Century Learning Tools SaferTechniques For Making 21st Century Learning Tools Safer
Techniques For Making 21st Century Learning Tools Safernerakmac
 
Bug Bounty #Defconlucknow2016
Bug Bounty #Defconlucknow2016Bug Bounty #Defconlucknow2016
Bug Bounty #Defconlucknow2016Shubham Gupta
 
Effective guides to remove websearch.hotsearches.info
Effective guides to remove websearch.hotsearches.infoEffective guides to remove websearch.hotsearches.info
Effective guides to remove websearch.hotsearches.infoharoNaroum
 
How to become hacker
How to become hackerHow to become hacker
How to become hackerRaman Sanoria
 
Remove mystart3.dealwifi.com redirect virus
Remove mystart3.dealwifi.com redirect virusRemove mystart3.dealwifi.com redirect virus
Remove mystart3.dealwifi.com redirect viruscoseanonans
 
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016Frans Rosén
 
Gremlin Apps & Gremlin Botnets by Chema Alonso
Gremlin Apps & Gremlin Botnets by Chema AlonsoGremlin Apps & Gremlin Botnets by Chema Alonso
Gremlin Apps & Gremlin Botnets by Chema AlonsoTelefónica
 
How not to suck at Cyber Security
How not to suck at Cyber SecurityHow not to suck at Cyber Security
How not to suck at Cyber SecurityChris Watts
 
How to remove windowssecurityalarm.com pop up
How to remove windowssecurityalarm.com pop upHow to remove windowssecurityalarm.com pop up
How to remove windowssecurityalarm.com pop upharoNaroum
 
Cscu module 06 internet security
Cscu module 06 internet securityCscu module 06 internet security
Cscu module 06 internet securitySejahtera Affif
 

Was ist angesagt? (20)

Internet security.spyware
Internet security.spywareInternet security.spyware
Internet security.spyware
 
Delete fb downloader search
Delete fb downloader searchDelete fb downloader search
Delete fb downloader search
 
Nir goldshlager Killing a bug bounty program - twice Hack In The Box 2012
Nir goldshlager Killing a bug bounty program - twice Hack In The Box 2012Nir goldshlager Killing a bug bounty program - twice Hack In The Box 2012
Nir goldshlager Killing a bug bounty program - twice Hack In The Box 2012
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Remove search shield.com pop-ups manually
Remove search shield.com pop-ups manuallyRemove search shield.com pop-ups manually
Remove search shield.com pop-ups manually
 
Bug bounty null_owasp_2k17
Bug bounty null_owasp_2k17Bug bounty null_owasp_2k17
Bug bounty null_owasp_2k17
 
Jupitersupport blog
Jupitersupport blogJupitersupport blog
Jupitersupport blog
 
Make profit with UI-Redressing attacks.
Make profit with UI-Redressing attacks.Make profit with UI-Redressing attacks.
Make profit with UI-Redressing attacks.
 
Things that go bump on the web - Web Application Security
Things that go bump on the web - Web Application SecurityThings that go bump on the web - Web Application Security
Things that go bump on the web - Web Application Security
 
Techniques For Making 21st Century Learning Tools Safer
Techniques For Making 21st Century Learning Tools SaferTechniques For Making 21st Century Learning Tools Safer
Techniques For Making 21st Century Learning Tools Safer
 
Bug Bounty #Defconlucknow2016
Bug Bounty #Defconlucknow2016Bug Bounty #Defconlucknow2016
Bug Bounty #Defconlucknow2016
 
Effective guides to remove websearch.hotsearches.info
Effective guides to remove websearch.hotsearches.infoEffective guides to remove websearch.hotsearches.info
Effective guides to remove websearch.hotsearches.info
 
How to become hacker
How to become hackerHow to become hacker
How to become hacker
 
Remove mystart3.dealwifi.com redirect virus
Remove mystart3.dealwifi.com redirect virusRemove mystart3.dealwifi.com redirect virus
Remove mystart3.dealwifi.com redirect virus
 
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016
 
Gremlin Apps & Gremlin Botnets by Chema Alonso
Gremlin Apps & Gremlin Botnets by Chema AlonsoGremlin Apps & Gremlin Botnets by Chema Alonso
Gremlin Apps & Gremlin Botnets by Chema Alonso
 
How not to suck at Cyber Security
How not to suck at Cyber SecurityHow not to suck at Cyber Security
How not to suck at Cyber Security
 
How to remove windowssecurityalarm.com pop up
How to remove windowssecurityalarm.com pop upHow to remove windowssecurityalarm.com pop up
How to remove windowssecurityalarm.com pop up
 
Cscu module 06 internet security
Cscu module 06 internet securityCscu module 06 internet security
Cscu module 06 internet security
 
Nbt con december-2014-slides
Nbt con december-2014-slidesNbt con december-2014-slides
Nbt con december-2014-slides
 

Ähnlich wie Staying Safe on the Computer and Online

Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeComputer Explorers
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security riskK. A. M Lutfullah
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Mainsmeech
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Joel May
 
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 MeetingCombating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 MeetingOWASP Delhi
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacyVikas Patel
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 
How To Remove Browser Hijacker
How To Remove Browser HijackerHow To Remove Browser Hijacker
How To Remove Browser HijackerSean Doyal
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.pptAsif Raza
 
Getting Your Electronic World Working for You
Getting Your Electronic World Working for YouGetting Your Electronic World Working for You
Getting Your Electronic World Working for YouCarol Thomson-Duvall
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarDaniel Versola
 
Computers.ppt
Computers.pptComputers.ppt
Computers.pptSdhrYdv1
 

Ähnlich wie Staying Safe on the Computer and Online (20)

Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safe
 
Spyware
SpywareSpyware
Spyware
 
Protect your website
Protect your websiteProtect your website
Protect your website
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Main
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
 
Spyware.
Spyware.Spyware.
Spyware.
 
Spyware.
Spyware.Spyware.
Spyware.
 
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 MeetingCombating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
 
Spyware (1).ppt
Spyware (1).pptSpyware (1).ppt
Spyware (1).ppt
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
Spyware
SpywareSpyware
Spyware
 
spyware
spywarespyware
spyware
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Internet security
Internet securityInternet security
Internet security
 
How To Remove Browser Hijacker
How To Remove Browser HijackerHow To Remove Browser Hijacker
How To Remove Browser Hijacker
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
Getting Your Electronic World Working for You
Getting Your Electronic World Working for YouGetting Your Electronic World Working for You
Getting Your Electronic World Working for You
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security Seminar
 
Computers.ppt
Computers.pptComputers.ppt
Computers.ppt
 

Mehr von cat509

Myspace
MyspaceMyspace
Myspacecat509
 
Microsoft Office Basics
Microsoft Office BasicsMicrosoft Office Basics
Microsoft Office Basicscat509
 
Health apps
Health appsHealth apps
Health appscat509
 
Video apps
Video appsVideo apps
Video appscat509
 
Blogs 101 and Websites for Free
Blogs 101 and Websites for Free Blogs 101 and Websites for Free
Blogs 101 and Websites for Free cat509
 
Music apps
Music appsMusic apps
Music appscat509
 
Travel apps
Travel appsTravel apps
Travel appscat509
 
Windows10
Windows10Windows10
Windows10cat509
 
Todo apps
Todo appsTodo apps
Todo appscat509
 
Netbook
NetbookNetbook
Netbookcat509
 
Ebooksandmp3s
Ebooksandmp3sEbooksandmp3s
Ebooksandmp3scat509
 
Cutting the cord
Cutting the cordCutting the cord
Cutting the cordcat509
 
Overdrive
OverdriveOverdrive
Overdrivecat509
 
Safari
SafariSafari
Safaricat509
 
Digphoto
DigphotoDigphoto
Digphotocat509
 
Train The Trainer
Train The TrainerTrain The Trainer
Train The Trainercat509
 
Exercises
ExercisesExercises
Exercisescat509
 
craigslist
craigslistcraigslist
craigslistcat509
 

Mehr von cat509 (20)

Myspace
MyspaceMyspace
Myspace
 
Microsoft Office Basics
Microsoft Office BasicsMicrosoft Office Basics
Microsoft Office Basics
 
Health apps
Health appsHealth apps
Health apps
 
Video apps
Video appsVideo apps
Video apps
 
Blogs 101 and Websites for Free
Blogs 101 and Websites for Free Blogs 101 and Websites for Free
Blogs 101 and Websites for Free
 
Music apps
Music appsMusic apps
Music apps
 
Travel apps
Travel appsTravel apps
Travel apps
 
Windows10
Windows10Windows10
Windows10
 
Todo apps
Todo appsTodo apps
Todo apps
 
Netbook
NetbookNetbook
Netbook
 
Ebooksandmp3s
Ebooksandmp3sEbooksandmp3s
Ebooksandmp3s
 
Cutting the cord
Cutting the cordCutting the cord
Cutting the cord
 
Overdrive
OverdriveOverdrive
Overdrive
 
Safari
SafariSafari
Safari
 
Digphoto
DigphotoDigphoto
Digphoto
 
Start
StartStart
Start
 
Train The Trainer
Train The TrainerTrain The Trainer
Train The Trainer
 
Wifi
WifiWifi
Wifi
 
Exercises
ExercisesExercises
Exercises
 
craigslist
craigslistcraigslist
craigslist
 

Kürzlich hochgeladen

Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 

Kürzlich hochgeladen (20)

Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 

Staying Safe on the Computer and Online

  • 1. Staying Safe on the Computer and Online
  • 2. You can also use cotton or foam swabs More on cleaning a computer https://www.computerhope.com/cleaning.htm https://www.gcflearnfree.org/computerbasics/keeping-your-computer-clean/1/
  • 3.
  • 4.
  • 5. • Record your keyboard strokes (Keylogger) • Steal private information such as passwords, credit card numbers, etc. (Spyware) • Hold your files hostage (Ransomware) • Use your processing power and internet for nefarious purposes (Worm) • Masquerade as a normal program which then installs a virus (Trojan Horse) • Erase your hard drive, cause your computer to malfunction, crash and become non-responsive (Malware) • Help infect other computers or attack the internet (bot or zombie computer)
  • 6.
  • 7.
  • 8. For windows, use windows update. You can go to http://windows.microsoft.com/en- us/windows/windows-update for more information. Set up for automatic updates. For a Mac, you can access updates through the app store. For more information go to https://support.apple.com/en-us/HT201541 For Android and Apple devices go to Settings then go to About Device - Software Update for Android devices and General – About – Software update for Apple Devices. Avoid using unsupported Operating system (example: Windows XP, Windows Vista, Mac OS X Leopard) Upgrade to the newest operating system available for your device when possible This is also called patching.
  • 9. https://www.gcflearnfree.org/internetsafety/installing-and-updating-browser-plugins/1/ Make sure you download programs and plug-ins from their websites or use the following services. https://ninite.com/ http://filehippo.com/ Make sure the drivers for the devices attached to your computer are up to date as well (printers, scanners, cameras, etc.) Also make sure you update the apps on your device through Google Play Store or Apple’s App Store.
  • 10. A common trick these days is to hide 3rd party software inside utility programs like Java or within printer programs during the installation process. The best way to keep junk programs out and prevent other unnecessary changes to your computer is by paying close attention to what is happening while you are installing any program. Most companies count on you to not pay attention and rely on users to tap on next, next, I agree. Another trick to sneak junk software into your computer is by convincing you that the "standard installation" is best and of course the recommended one. They may make it sound like you have to be a rocket scientist to go with the "custom installation", but when you do choose it, you’ll see what they are trying to sneak past you. Start making it a point to click the custom or advanced option when installing anything new on your system so you can avoid the junk before it sneaks in. This tip is the key to avoiding attempts by software companies to take over your browser with additional toolbars, switching the default search engine or changing your start page. https://www.datadoctors.com/media/tips/1307
  • 11. Make sure you keep these up to date as well. https://www.commoncraft.com/video/computer-viruses-and-threats What to do if your computer gets a virus https://www.gcflearnfree.org/internetsafety/what-to-do-if-your-computer-gets-a- virus/1/
  • 12.
  • 13.
  • 14.
  • 15. Windows 7 Windows 10 1. Go to settings 2. Click on Apps 3. Click on the app You want to uninstall 4. Click on Uninstall
  • 17.
  • 18.
  • 19.
  • 21. Before getting rid of your computer /laptop, remove files etc. that you want to keep then wipe or remove the hard drive Before getting rid of your mobile device or gaming console, do a factory reset.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26. https://howsecureismypassword.net/ to see how secure your password is.
  • 27. Paper is the best. Password Managers http://www.datadoctors.com/help/kenscolumns/22107-Are-Password-Managers-Safe-to- Use/ Lastpass https://www.lastpass.com/business/home Keepass http://keepass.info/ Roboform http://www.roboform.com/ Dashlane https://www.dashlane.com/ Password Passphrase generators Xkpasswd.net https://xkpasswd.net/s/ Diceware http://world.std.com/~reinhold/diceware.html
  • 28. Avoid the temptation to use the same user name and password for every account. Whenever possible, change your passwords every six months. Whenever possible, use a “pass-phrase” as your answer to account security questions – such as "Youllneverguessmybrotherinlawsmiddlename"
  • 29. https://ssd.eff.org/en/module/how-enable-two-factor-authentication Increases your security by texting you a code to access your account Greatly increases security of any account You know if your account was hacked right away https://twofactorauth.org/ AKA Two-Step Verification
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44. 9. Baits: Do not take any free offers lightly. Think twice before responding to unsolicited offers such as free screensavers, free downloads such as pirated software and pornographic images, icons or even virus and spyware protection. Along with the promised goodies, you may also get ―Adware‖ or ―Spyware‖ that monitors your online activities and floods your screen with pop-ups. If someone invites you to share the fortune of a Nigerian prince or redeem winnings from a contest you’ve never entered, don’t do it! Finally, beware of messages urging you to ―update‖ or ―validate‖your account information online. No legitimate company will ever request your account number and password via e-mail. When in doubt, call the company involved on the phone.
  • 45.
  • 46.
  • 47.
  • 49. Frequent random popups. Popular sign that you've been hacked is also one of the more annoying ones. When you're getting random browser pop-ups from websites that don't normally generate them, your system has been compromised.
  • 51.
  • 52.
  • 55. Windows 10 expiration scam – Someone calls and says your copy of Windows 10 has expired. https://www.datadoctors.com/help/kenscolumns/22279- Beware-of-Windows-10-Expiration-Scams/
  • 56. http://www.azfamily.com/story/38514042/ftc-says-beware-of-tech-support- calls?autostart=true Tech support calls from someone claiming to be Microsoft or one if it’s representatives. https://www.aarp.org/money/scams-fraud/info-2019/tech-support.html https://www.consumer.ftc.gov/features/pass-it-on/imposter-scams/tech- support-scams
  • 57. Fake Antivirus Messages. The fake scan, which always finds tons of "viruses," is a lure to buy scammer product. Clicking on the provided link sends you to a professional-looking website, complete with glowing letters of recommendation. There, they ask you for your credit card number and billing information. Unwanted browser toolbars. Common sign of exploitation: Your browser has multiple new toolbars with names that seem to indicate the toolbar is supposed to help you. Redirected Internet searches. Many hackers make their living by redirecting your browser somewhere other than you want to go. The hacker gets paid by getting your clicks to appear on someone else's website, often those who don't know that the clicks to their site are from malicious redirection
  • 59.
  • 61. AARP’s The Perfect Scam Podcast https://www.aarp.org/podcasts/the-perfect-scam/ How to protect yourself from scams in Google Search https://www.azfamily.com/news/features/how-to-protect- yourself-from-scams-in-google-search- results/article_18c26420-baeb-11e9-8164-27d21964efd9.html Consumers getting duped by smart device 'Activation Scam' https://www.azfamily.com/news/investigations/3_on_your_sid e/originals/consumers-getting-duped-by-smart-device- activation-scam/article_a88c4f84-f5e8-11e9-b26a- 270e8a2c5150.html
  • 62. Keeping Kids Safe Online https://www.komando.com/news/parents-check-your- childs-phone-for-these-15-apps-frequented-by- predators/699468/
  • 64. The “Lucky” Phone Call (or You’ve Won!) : How fortunate! You’ve won a free gift, an exclusive service, or a great deal on a trip to Las Vegas. Must hurry because this is a “limited time offer”. https://www.consumer.ftc.gov/features/pass-it-on/youve-won-scams 809 Area Code Scam: Callers lured into placing calls to the 809 area code (Bahama) charged large long-distance fees. If you call from the US, you will apparently be charged $2,425 per-minute Emergency scam: Be cautious if you get a call from a family member or friend claiming to be in an accident, arrested, or hospitalized while traveling in another country. Never send money unless you confirm with another family member that it’s true. https://www.consumer.ftc.gov/features/pass-it-on/imposter-scams/grandkid-scams https://www.usatoday.com/story/tech/columnist/saltzman/2017/07/03/delete- suspicious-text-messages-on-your-smartphone/439647001/ https://seniorplanet.org/scam-alert-cellphone-identity-theft/ https://seniorplanet.org/scam-alert-can-you-hear-me/ https://seniorplanet.org/scam-alert-watch-out-for-this-phone-call/
  • 65. Robocalls National Do Not Call Registry https://www.donotcall.gov/ Check with cell phone provider to see what they offer. Third party blocker : Nomorobo, YouMail, Truecaller, RoboKiller. https://www.consumer.ftc.gov/topics/limiting-unwanted-calls- emails?sort=popular https://www.consumer.ftc.gov/features/pass-it-on/unwanted-calls Neighbor Spoofing https://www.bbb.org/article/news-releases/16670-a-new-kind-of- phone-scam-neighbor-spoofing Credit Report https://www.annualcreditreport.com/index.action Check Kids as well. If kids start getting credit card offers etc. they have been scammed.
  • 66. Hidden URLs: You'll see them everywhere on Twitter, but you never know where you're going to go since the URL ("Uniform Resource Locator," the Web address) hides the full location. Clicking on such a link could direct you to your intended site, or one that installs all sorts of malware on your computer. (Bitly, Goo.gl, Ow.ly, etc.). So always put your cursor over the link and read the address that comes up at the bottom of the browser. You can tell if it is a bad address or not. http://www.datadoctors.com/help/kenscolumns/22156-Beware-of-Typosquatting/ Account Takeover Fraud - Financial identity theft in the form of account takeover fraud generally means using another person's account information (e.g., a credit card number) to obtain products and services using that person's existing accounts. https://www.aarp.org/money/scams-fraud/info-2018/identity-theft-social-security- benefits.html?intcmp=AE-MON-CP-EOA1 https://blog.ssa.gov/category/fraud-2/ https://www.medicare.gov/forms-help-resources/help-fight-medicare-fraud https://www.consumer.ftc.gov/features/pass-it-on/health-care-scams
  • 67. https://seniorplanet.org/its-irs-tax-scam-season/ https://www.irs.gov/newsroom/irs-wraps-up-dirty-dozen-list-of-tax-scams-for-2018- encourages-taxpayers-to-remain-vigilant https://www.irs.gov/newsroom/taxpayer-guide-to-identity-theft https://www.consumer.ftc.gov/features/pass-it-on/imposter-scams/irs-imposter-scams IRS will never call or email with problems. Will always mail through USPS. Same with Medicare and Social Security. https://www.aarp.org/money/scams-fraud/info-2019/shimon-richmond-interview- medicare.html?intcmp=AE-FRDSC-MOR-R2-POS3 Nanny/Caregiver Scams https://www.consumer.ftc.gov/blog/2018/07/staying-away-nanny-and-caregiving-job- scams
  • 68. 1. The Fake Utility Company You're behind on your bill, and you'll lose power if you don't provide cash now. 4. DNA Cancer Screening People like you have died because they didn't take the DNA test we're offering. 5. Missed Jury Duty Scam There's a warrant for your arrest because you didn't show up for your jury duty assignment Job scams -https://www.consumer.ftc.gov/articles/0243- job-scams Amazon Scams- Caller says you owe for an item or for Amazon Prime membership renewal even though you don’t
  • 69.
  • 70. •Social media: Scams on social platforms are also on the rise. Victims do the work of the cybercriminals by sharing videos or stories with their friends that include links to sketchy sites. Spread rapidly because people are more likely to click on something posted by a friend. https://www.datadoctors.com/media/tips/1433 •You now even need to be careful when it comes to friend requests. Some scammers are stealing photos and pretending to be people you may know. And you may just blindly click on accept. •Your friends receive social media invitations from you that you didn’t send. Either you or your friends receive invitations to “be a friend” when you are already connected friends on that social media site. Your friend may contact you to find out why you are sending out new friend requests. The hacker either controls your social media site, has created a second near-look-alike bogus page, or you or friend has installed a rogue social media application. •Likejacking: Using fake "like" buttons, hackers trick people into clicking on website buttons that install malware and may post updates on a user's news feed, spreading the attack. •Facebook “Like” Farming - Someone will post to Facebook and people will like that post. Then they will like the page it’s on. Then the person changes the page to something like an ad for a bogus business or a too-good-to-be-true product you can buy online. Make your page only so Friends can see what you post. That way people don’t get info about you that they can use against you for id theft. •Social media gift exchange: It sounds like a great deal; buy one gift and get 36 in return. But it’s just a variation on a pyramid scheme and it’s illegal. Other Scams https://www.aarp.org/money/scams-fraud/info-2019/scams-on-social-media-
  • 71. Student Loan Scams https://studentaid.ed.gov/sa/repay-loans/avoiding-loan-scams https://studentaid.ed.gov/sa/resources#consumer-protection Online Dating Scams https://www.consumer.ftc.gov/features/pass-it-on/imposter-scams/online- dating-scams Military Families https://www.militaryconsumer.gov/ Census Scams https://www.census.gov/programs-surveys/surveyhelp/fraudulent-activity-and- scams.html Do not pay scammers with gift cards. https://www.consumer.ftc.gov/articles/paying-scammers-gift-cards Debit Collector Scams https://www.consumerfinance.gov/about-us/blog/how-tell-difference- between-legitimate-debt-collector-and-scammers/ Debit Relief Scams https://www.aarp.org/money/scams-fraud/info-2019/debt-relief.html
  • 72. What do these scams all have in common? 1. Sense of urgency 2. Odd payment requests 3. Voice/images of authority 4. Playing on emotions/fears
  • 73. SIM Hijacking The popularity of using 2-factor authentication with smartphones has led to various exploits to usurp this extra layer of protection including SIM swapping or SIM hijacking. By taking over control of your phone number, hackers can have the special code sent to a phone that they have in their possession. https://www.datadoctors.com/help/kenscolumns/22225-Preventing-SIM-Hijacking/ Pretexting They’ve also become very good at fooling victims by calling them posing as an organization that claims to have detected a break in that wants to verify that the victim is the actual owner of the account. They’ll tell the victim that they will be getting a special code on their smartphone that they need them to read back to ‘verify’ that they are the authentic owner. Of course, reading back the code allows the remote hacker into the account because they are at the screen that is asking for the code on their computer.
  • 74. USB Security Keys Since the bad guys have found easy ways to side step the security that smartphone based 2-factor authentication offers, another form of higher level of security has surfaced in the form of the USB key. Instead of using a smartphone as the 2nd form of authentication, you would use a special USB key on your computer, smartphone or tablet that costs $20 to $50. Once you set them up, a USB security key connected to your device is required in order to gain access to the protected accounts. There are backup methods to allow you in, should you lose your USB key, so be sure to set one up if you plan on using them. To get more of an understanding of your options, checkout the various models from YubiKey (https://goo.gl/cGQzPY) or Google’s offering called ‘Titan’ (https://goo.gl/iDc5uj). https://www.datadoctors.com/help/kenscolumns/22227-Should-I-Use-a-USB- Security-Key/
  • 75. Social Media and Facebook Privacy Basics http://www.gcflearnfree.org/internetsafety/social-media-privacy-basics/1/ https://techboomers.com/t/facebook-privacy http://www.gcflearnfree.org/facebook101/adjusting-your-privacy-settings/1/ What you put in the internet stays there forever! Think before you post.
  • 76. Wifi Security https://www.gcflearnfree.org/internetsafety/wifi-security/1/ When connecting to wifi in a public place make sure of the name of the business’ wifi. If a connection name looks strange don’t connect to it! Don’t leave your laptop or mobile device unattended. Protect usb drives and external hard drives. Lock your computer before you leave it. Enable automatic screenlock on your devices. Evil Twin Attack or Pharming: Hacker sets up a Wi-Fi access point with the same name as a legitimate network you have connected to previously and compels your computer or phone to connect to it automatically without your consent. . A mobile hotspot is more secure than public Wi-Fi, and it prevents an Internet service provider from selling your information and online activity to a third party. (In many cases, companies are legally allowed to do this.)
  • 77. 7. Never plug your devices (mobile phone, tablet and/or laptop) into an electrical outlet in an airport or any other public place. Doing so will make you more susceptible to being hacked. Instead, travel with an external battery charger to keep your devices charged. https://www.lonelyplanet.com/articles/smartphone-risk-public-usb-port Juice Jacking - when the device you connect to for a charge actually attempts to connect to your device to access data. https://www.datadoctors.com/media/tips/1698 https://www.howtogeek.com/166497/htg-explains-what-is-juice-jacking-and- how-worried-should-you-be/ War Driving: War driving is a term used to describe the process of a hacker who, armed with a laptop, smartphone or tablet, uses commonly available software to troll neighborhoods via a car, bicycle, or even drone to find open or poorly protected WiFi networks
  • 78.
  • 79.
  • 80.
  • 81. What is cache and browsing history? https://techboomers.com/t/what-is-cache-browsing-history What are Cookies https://techboomers.com/t/what-are-cookies
  • 82. IP address: When your computer connects to the Internet, it's given a unique number that distinguishes it from every other computer on the Internet. Websites that you connect to can see this address, and can use parts of it to figure out what country, region, or even city you live in. User-agent strings: These are lines of computer code that identify what program you're using to connect to the Internet or World Wide Web. Using these, trackers can tell what type of browser you're using (e.g. Chrome, Firefox, Internet Explorer, and so on). https://techboomers.com/t/privacy-policies
  • 83. Data Flow​, the way digital information moves in a given process. http://www.dataprivacyproject.org/wp-content/uploads/2017/02/Handout-Data- Flows-Handout.pdf
  • 84. What Is Data Mining? In recent news, you've probably heard something about Big Data and data mining. Data mining means searching for patterns and relationships in large collections of data—often called Big Data. Data has always been analyzed for patterns, but computers have made collecting, storing, and analyzing data far more efficient and commonplace. Through the process of automatic inference, these patterns are used to find trends, draw conclusions, and sometimes even predict future patterns. Your Data Is a Valuable Commodity Data aggregators, also known as data brokers, specialize in learning everything they can about consumers. There are few limits on what data brokers can do with this this information, though they don't generally make it publicly available for free. Data brokers combine information from companies you do business with, online tracking data, and public records from government websites to make a consumer profile with a unique ID, which may in turn be sold to an advertising company. These profiles may or may not be linked with your name—but even an "anonymous" profile compiled by a data broker probably has enough information to uniquely identify you. The more advertisers know about you, the better they can predict your future behavior.
  • 85. Everyone has an information (digital) footprint—a trail of information you leave behind as you use technology. Limiting Who Sees Your Footprint You can limit who sees your information footprint by talking to your service providers, being selective when you share information online, and adjusting your device and app settings to optimize privacy. Your footprint may still be large, but it will be significantly more private.​ Lastly, Paige says that even with verified, legitimate nonprofits, it's always important to take a moment and ask yourself, "Do I want to extend my digital footprint to this organization?" Be mindful of which personal information you are sharing. Make decisions with care when signing up for newsletters or giving out information needed for the purposes of a tax write-off. "You might not want to be part of their email database. You need to take control of where your information is being stored," she says. Give only information that is required on websites. Be careful what you post on social media. https://www.digitalliteracyassessment.org/external-resources#standards-slide-digital- footprint
  • 88.
  • 89. Encryption https://www.leblibrary.com/online-self-defense?qt-online_self_defense=3#qt- online_self_defense https://ssd.eff.org/en/module/what-encryption FULL DISK ENCRYPTION Filevault (OS X): https://support.apple.com/en-us/HT204837 Bitlocker (Windows): http://windows.microsoft.com/en-US/windows-vista/BitLocker- Drive-Encryption-Overview LUKS (GNU/Linux): https://gitlab.com/cryptsetup/cryptsetup/blob/master/README.md Veracrypt: https://veracrypt.codeplex.com/
  • 91. Electronic Payment Apps If purchasing items online, consider using a secured payment app, such as those below PayPal Apple Pay Google Wallet Or use gift cards 4. Don’t use a debit card to shop online it can compromise your checking account . Use only one credit card. If you don't feel safe using a credit card, explore alternative payment options. Online Shopping •Purchase gift cards from behind the customer-service desk. •Choose cards with packaging that covers the card number and security code. •Choose a card with loss or theft protection. •Watch for any signs that a card has been tampered with, such as a scratched-off pin number. •Avoid purchasing gift cards from an online auction. •If a card is preloaded, ask for the card to be scanned to verify its value. •Keep the receipt from a gift-card purchase. •Protect your card: Some gift cards can be registered as credit cards on websites listed on the card, which can protect them against theft or loss. Also take photos of the front and back of the card or write down card details as some companies will replace lost or stolen cards if you can provide specifics. Receipts with card information are good to hold on too. •Free gift cards: Pop-up ads or email offering free gift cards are often just a ploy to get your personal information that can later be used for identity theft. Only buy gift cards from brick and mortar stores or directly from their official website. Unusual forms of payment: Be wary of anyone who asks you to pay for holiday purchases using prepaid debit cards, gift cards, wire transfers, third parties, bitcoin, etc. These payments cannot be traced and cannot be undone.
  • 92. 1. Never click on links in external emails. If you want to shop at a site, enter that site address in your browser. There are thousands of fake sites that look almost identical to the real thing. Don't fall for evil-twin shopping sites. 4. Beware of e-skimmers. This is a new one. Do you know that bad guys sometimes skim your credit card at gas stations or ATMs? Well, there is a new flavor of that, the shopping website you order from might be infected with a "e-skimmer" and they steal your card data when you check out. You can prevent that by using PayPal or Amazon. 1. Keep a close eye on your credit card and bank accounts. During this season, unexpected and strange charges might appear which could very well be the first sign your card or even your whole identity has been stolen. If you think you might have been scammed, stay calm and call your credit card company, nix that card and get a new one.
  • 93. 2. Read the ratings and reviews on items and sellers. Beware of fake reviews. https://www.scambusters.org/fakereviews.html 3. Before you buy an item, read its returns and refunds policy carefully. Also, read safety tips on websites like ebay and craigslist. 6. Don’t use public wifi to shop unless you use a VPN Fake retail site or look a like sites scam You come across the item you want at a super low price being sold at a website you never heard of. To make your purchase you need to input your credit card information. You could be giving your number to a crook who will in turn use it to make bogus charges or even sell your number.
  • 94. Do look twice at URLs and app names. Misplaced or transposed letters are a scam giveaway but easy to miss. Do research an unfamiliar product or brand. Search for its name with terms like “scam” or “complaint,” and look for reviews. Don’t provide more information than a retailer needs. That should be only your billing information and the shipping address. Don’t use sites that require you to download software or enter personal information to access coupons or discount codes. https://www.aarp.org/money/scams-fraud/info-2019/online- shopping.html
  • 95. Avoid getting your packages stolen (aka Porch Pirates) Pick-up your packages promptly Pick up at brick and mortar store if possible Ship to Another Location (Work, Family, Friend, Neighbor, etc. or have them delivered to a pickup location operated by the carrier or vendor Ex Amazon. ) Leave special instructions for delivery (either with a note or while ordering the item) direct the delivery company to place packages somewhere which makes it harder to see from the street Require a Signature Track your package Install a camera with feed to the porch Shipping confirmation ploy You get an email or phone call from the US Postal service or major carrier. You’re told that you have a package waiting for you or that it was delivered to someone else by mistake. In order to make sure you are the correct recipient, you’re asked to submit personal information including your name, address, date of birth, and social security number. Crooks can use this information to steal your identity and open accounts in your name. Fake shipping notifications: These can have attachments or links to sites that will download malware on your computer to steal your identity and your passwords. Don’t be fooled by a holiday phishing scam. Fake purchase confirmation: If you get an email from a retailer, but didn’t make the purchase it mentions, “don’t click on anything in that email.” Opt out of credit card offers https://www.optoutprescreen.com/?rf=t Informed Delivery from USPS. Shows what will be in your mailbox in a day or two. https://informeddelivery.usps.com/ https://www.azfamily.com/news/investigations/3_on_your_side/originals/mesa-woman-loses-thousands-of-dollars-in-microsoft- scam/article_1308356e-862a-11e9-bcb2-a360f6c1ab64.html https://www.aarp.org/money/scams-fraud/info-2019/gift-card.html https://www.aarp.org/money/scams-fraud/info-2019/gift-card-fraud.html https://www.abc15.com/news/let-joe-know/amazon-sending-you-an-email-what-not-to-do
  • 96.
  • 97. Charity Cons: Unless you dialed the call, don't provide a credit card number over the phone. And before donating, verify an organization's legitimacy at Charity Navigator or Give.org, or through your state's agency that regulates charities. https://www.consumer.ftc.gov/features/pass-it-on/charity-fraud Classified ad come-on You find the perfect gift, but it is not being sold in a store. Instead it’s listed in a classified ad on a site such as Craigslist or Backpage. In order to buy it the vendor asks you to make a wire transfer, use an online escrow service, or pay through Venmo. You place the order, but the item never arrives. You send emails to the seller, but they go unanswered. E-cards: Electronic cards can be great fun, but be careful. Two red flags to watch out for are: the sender’s name is not apparent; you are required to share additional information to get the card. Letters from Santa: Several trusted companies offer charming and personalized letters from Santa, but scammers mimic them to get personal information from unsuspecting parents. Check with bbb.org to find out which ones are legitimate. Phony charities: Everyone is in a generous mood at the holidays, so scammers take advantage of that with fake charity solicitations in email, on social media sites, and even by text. Check out charities at give.org before donating. Temporary holiday jobs: Retailers and delivery services need extra help at the holidays, but beware of solicitations that require you to share personal information online or pay for a job lead. Apply in person or go to retailers’ main websites to find out who is hiring. Faux Freebies From iPhones to cruises, the holidays are the time for emails, text messages and social media posts that promise free merchandise. Many of them are a ploy to install malware once you click on a link for details. Others lead to online surveys designed to steal personal information for possible identity theft or to set you up as a future target for scammers. Some bogus offers for freebies require your credit card, saying it is necessary to cover shipping costs or a deposit. That often leads to unnecessary charges on your bill. Before taking the bait, check the manufacturer’s or provider’s website. If the offer isn’t touted there, assume it’s the work of thieves. And think twice before downloading free holiday-themed entertainment, screen savers or mobile apps. Some are specifically designed to hack personal information, passwords and files from your device. • Don't open attachments with special offers. It's a classic scam. The offer should be in the email and you should be able to see it right away. • Watch for malicious ads and popups. Do not click on ads that sound too good to be true, and ignore popups that might propose the "best deal ever". Survey Swindles: These unexpected emails, text messages and social media posts promise a generous gift card, coupon or actual products for sharing your opinions about planned purchases or a “recent shopping experience.” But beware: Links that are supposed to lead you to a survey often hide computer malware. And “questions” about personal or financial information — including bank and credit accounts for supposed reward deposits — could be a setup for future identity theft
  • 98. White Label Ticket Scams - Purchase tickets to shows, sporting events, concerts, from the venue itself or from websites like Ticketmaster. This way you know the tickets will be legitimate and not fake. Home repairs and security checks - Emails, phone calls, or in person. People will tell you they are a contractor or from a security firm. Ignore them. https://www.consumer.ftc.gov/features/pass-it-on/home-improvement-scams Rental Listing Scams https://www.consumer.ftc.gov/articles/0079-rental-listing- scams https://www.abc15.com/news/let-joe-know/renting-a- vacation-home-you-could-be-sending-money-to-a-scammer Lotteries and sweepstakes – If you have to send money in to get your winnings from a lottery or sweepstakes, it’s a scam. Jury Scam – You get a call saying that you missed jury duty and you will be arrested for it. https://superiorcourt.maricopa.gov/jury/jury-scam/ http://www.azd.uscourts.gov/jury/juror-scams https://scambusters.org/juryduty.html
  • 99. • Car Scams https://www.consumer.ftc.gov/articles/0525-deceptive- auto-scams-infographic • Job Scams https://www.consumer.gov/jobs#!what-to-do • Weather Scams https://www.consumer.ftc.gov/features/dealing- weather-emergencies • https://www.fcc.gov/consumers/guides/one-ring-phone-scam • Do not call person back. Will likely be a toll call. • Cryptojacking is the hijacking of Internet connected devices to secretly make use of the processor for the mining of crypto currency.
  • 100.
  • 101. Shimmer Scams – the shims contain a microchip that can read and transmit information from your card. Though your chip cannot be cloned in the same way a chip can, bad guys can glean enough information to make purchases using the extracted data. Work from home scams https://www.consumer.ftc.gov/features/pass-it-on/work-at-home-scams Money Mule Scams https://www.consumer.ftc.gov/features/pass-it-on/money-mule-scams
  • 102.
  • 103. Don’t post on social media that you are on vacation. Post pictures etc. after you get back.
  • 104.
  • 105.
  • 106. You don’t have to give out your social security number. Your SSN has been used in crimes, and you're going to be arrested unless … Data breach https://identitytheft.gov/databreach
  • 107. 3 dangers to kids on the internet : strangers, friends, and themselves Talk to your kids about strangers, posting things (info they share can affect kids in future) etc. Tell kids to be careful who they talk to, don’t post personal info. Encourage kids that they can come talk to parents. Dedicated pc for kids in public high traffic area. Set ground rules for using internet, what they can and can’t do online, and post them by the computer.. Use parental controls and filtering. Familiarize yourself with your child’s online activities and maintain a dialogue with them about what applications they are using. Put mobile devices in parent’s room at night (central charging station). Signs a Child Is Being Bullied Look for changes in the child. However, be aware that not all children who are bullied exhibit warning signs. Unexplainable injuries Lost or destroyed clothing, books, electronics, or jewelry Frequent headaches or stomach aches, feeling sick or faking illness Changes in eating habits, like suddenly skipping meals or binge eating. Kids may come home from school hungry because they did not eat lunch. Difficulty sleeping or frequent nightmares Declining grades, loss of interest in schoolwork, or not wanting to go to school Sudden loss of friends or avoidance of social situations Feelings of helplessness or decreased self esteem Self-destructive behaviors such as running away from home, harming themselves, or talking about suicide http://www.datadoctors.com/help/kenscolumns/22129-Apps-for-Managing-a-Childs-Smartphone/
  • 108. http://www.datadoctors.com/help/kenscolumns/22135-Are-Smart-Devices-Safe-to-Use/ Change the default username and password that comes with your IOT connected device. https://www.datadoctors.com/help/kenscolumns/22169-What-Exactly-is-the-Deep-Web/ https://wtop.com/consumer-news/2017/11/hackable-holidays-six-steps-to-protect- your-smart-home-from-spies/ Change your password to your devices and your accounts regularly. Make sure the software is up to date. Enable two factor authentication. Add a shared user. https://www.datadoctors.com/help/kenscolumns/22275-Ring-Doorbell-Security- Warning/ https://www.vice.com/en_us/article/3a88k5/how-hackers-are-breaking-into-ring-cameras?
  • 109. http://denverlibrary.org/files/Backing%20Up%20Your%20Data%20handout%205-19- 2014.pdf http://denverlibrary.org/files/Clean%20Up%20and%20Speed%20Up%20your%20Co mputer%20handout%206-30-2014.pdf http://denverlibrary.org/files/Protecting%20Your%20Privacy%20Online%20handout% 202-27-14_0.pdf http://denverlibrary.org/files/StayingSafeOnline_Handout_11-20-13.pdf http://denverlibrary.org/files/Viruses%20and%20Malware%20101%20handout%2012 -26-13.pdf https://sites.google.com/a/nypl.org/techconnect/course- materials/protectingyourprivacysecurity http://www.gcflearnfree.org/onlinesafety/internetsafety http://www.gcflearnfree.org/techsavvy/password-tips http://www.gcflearnfree.org/techsavvy/backing-up-your-files http://www.gcflearnfree.org/techsavvy/browsing-privately http://www.gcflearnfree.org/internet-tips/installing-and-updating-browser-plug-ins http://www.gcflearnfree.org/computerbasics/14/full
  • 111. http://www.akronlibrary.org/training/pdf/Computer%20Security%20Windows%207.pdf http://www.lexpublib.org/sites/default/files/attachments/computer_security_0.docx http://houstonlibrary.org/sites/default/files/module4_computersecurity1.ppt http://houstonlibrary.org/sites/default/files/module4_computersecurity2.ppt http://www.provlib.org/sites/default/files/Protecting%20your%20computer.pdf http://aarptek.aarp.org/online-safety/ http://member.aarp.org/home-family/personal-technology/info-2014/create-password- avoid-hacks-kirchheimer.html https://www.aarp.org/podcasts/the-perfect-scam/ https://techboomers.com/c/internet-courses https://www.commoncraft.com/videolist?qt-cc_video_quicktab=2#qt-cc_video_quicktab http://computer.howstuffworks.com/security-channel.htm http://lifehacker.com/top-10-tech-security-basics-every-person-should-follow-1767148925 https://www.digitallearn.org/courses/online-scams https://www.digitallearn.org/courses/accounts-passwords https://www.digitallearn.org/courses/internet-privacy
  • 112. http://lifehacker.com/unlock-ransomed-files-with-avasts-four-free-ransomware-1789577598 http://www.datadoctors.com/help/kenscolumns/22115-Ransomware-Victim-Options/ https://sites.google.com/a/nypl.org/techconnect/course-materials/protectingyourprivacysecurity https://sites.google.com/a/nypl.org/techconnect/course-materials/computersafetymaintenance https://sites.google.com/a/nypl.org/techconnect/course-materials/savingandrecoveringdata http://www.trilogycomputerclub.com/uploads/6/8/9/9/6899335/cyber_awareness_.pdf https://applieddigitalskills.withgoogle.com/c/middle-and-high-school/en/avoid-online- scams/overview.html https://www.gailstoolkit.com/basics https://duckduckgo.com/newsletter https://spreadprivacy.com/tag/privacy-newsletter/ https://www.sjpl.org/privacy https://www.leblibrary.com/online-self-defense https://libraryfreedomproject.org/ http://www.dataprivacyproject.org/curriculum/ https://www.stopthinkconnect.org/ https://www.bbb.org/avoidscams/ https://www.connectsafely.org
  • 113. http://www.onguardonline.gov/ https://www.staysafeonline.org http://www.dhs.gov/publication/stopthinkconnect-older-american-resources http://www.dhs.gov/stopthinkconnect https://www.scamadviser.com https://www.scambusters.org/ https://www.consumer.ftc.gov/scam-alerts https://www.consumer.ftc.gov/features/feature-0014-identity-theft https://www.azag.gov/identity-theft https://www.identitytheft.gov https://www.idtheftcenter.org/ donotcall.gov, consumerfinance.gov/complaint ic3.gov/complaint https://www.fbi.gov/scams-and-safety postalinspectors.uspis.gov http://www.aarp.org/money/scams-fraud/info-2016/how-to-report-fraud-file- complaints.html https://www.google.com/transparencyreport/safebrowsing/diagnostic http://www.aarp.org/money/scams-fraud/info-2017/fraud-protection-ultimate- guide.html https://www.aarp.org/money/scams-fraud/info-2017/holiday-season-scams- photo.html https://catalog.fdic.gov/system/files/MSOA_RG_180828.pdf https://about.usps.com/publications/pub310.pdf
  • 116. Adware—type of malware that allows popup ads on a computer system, ultimately taking over a user’s Internet browsing. Antivirus program - software that helps detect and destroy viruses Botnet—a network of private computers, each of which is called a “bot,” infected with malicious software (malware) and controlled as a group without the owners' knowledge for nefarious and, often, criminal purposes; computers are typically infected when users open up an infected attachment or visit an infected website. Catfish - Someone who creates a fake online profile to intentionally deceive you. Cyberbullying—bullying that takes place using electronic technology, including the Internet, and related technologies to harm other people, in a deliberate, repeated, and hostile manner; may involve text messages or emails, rumors sent by email or posted on social networking sites, and embarrassing pictures, videos, Web sites, or fake profiles. Cyberstalking—a criminal offense that involves using the Internet or other technology to stalk or harass an individual, a group of individuals, or an organization; it may include false accusations, monitoring, making threats, identity theft, damage to data or equipment, or harassment. Computer virus—a software program that is designed to replicate itself, spread from one computer to another, and interfere with computer operation; a computer virus may corrupt or delete data on a user’s computer, use an email program to spread itself to other computers, or even erase everything on a user’s hard disk. Computer viruses can be spread by attachments in email messages or instant messaging messages; disguised as attachments of images, greeting cards, or audio and video files, and hidden in illicit software or programs that are downloaded to a computer. Cookie—also referred to as an “HTTP cookie,” is a small text file that contains a unique ID tag placed on the user’s computer by a Web site to track pages visited on the site and other information; “tracking cookies” and “third-party tracking cookies” are used to compile long-term records of individuals’ browsing histories. Denial of Service Attack—type of online computer attack designed to deprive user or groups of users normally accessible online services; generally involves effort by hackers to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. Encryption—the conversion of digital information into a format unreadable to anyone except those possessing a “key” through which the encrypted information is converted back into its original form (decryption), making it readable again. Evil Twin Attack - Hacker sets up a Wi-Fi access point with the same name as a legitimate network you have connected to previously and compels your computer or phone to connect to it automatically without your consent. . .
  • 117. Firewall—software or hardware that, after checking information coming into a computer from the Internet or an external network, either blocks the transmission or allows it to pass through, depending on the pre-set firewall settings, preventing access by hackers and malicious software ; often offered through computer operating systems. Geotagging—the process of adding geographical location, or label, to photographs, videos, website, SMS messages, QR Codes, or RSS feeds; a geotag usually consists of latitude and longitude coordinates, altitude, distance, place names, and other details about the origin of the media being tagged helping users find a variety of online location-specific information. Ghosting - Theft of the identity of a deceased person to fraudulently open credit accounts, obtain loans or get utility or medical services in the person's name. Hacker - highly skilled computer user who gains entry to information on computers not intended for them by “cracking” the programming codes . Hash busters: The random words or sentences contained in spam emails that allow these emails to bypass your spam filters. Keylogger—also called keylogging and keystroke logging, is the action of tracking (or logging) the keys struck on a computer keyboard; usually runs hidden in the background and automatically records all keystrokes so that users are unaware of its presence and that their actions are being monitored Malware—short for malicious software, software that disrupts or damages a computer’s operation, gathers sensitive or private information, or gains access to private computer systems; may include botnets, viruses, worms, Trojans, keyloggers, spyware, adware, and rootkits. Malvertising - Malicious online advertising that contains malware — software intended to damage or disable computers. Man-in-the-middle attack - When a fraudster secretly intercepts and possibly alters messages between two parties who believe they are securely communicating with each other. Patch - computer code created to correct a problem (i.e.,bug) within an existing program Pharming: When hackers use malicious programs to route you to their own websites (often convincing look-alikes of well-known sites), even if you've correctly typed in the address of the site you want to visit. phishing - scam email sent to elicit private information from the recipient to be used for identity theft pirated software - software that has been illegally copied Pop-ups—or pop-up ads, are a form of online advertising on the World Wide Web intended to attract web traffic or capture email addresses; created by advertisers, pop-ups generally appear unexpectedly in a small web browser window when a user is linking to a new Web site.
  • 118. Pop-up blockers—a web browser feature, software, or application that allows users to limit or block pop-up ads; users may often set the preferred level of blocking, from total blocking to minimal blocking. Scareware/Ransomeware holds your computer for ransom. It’s a relatively new danger. The scareware will sometimes pretend to be a helpful piece of software like an antivirus program and may offer a ‘trial version’ or ‘free scan’. Once it has access to your computer, it will tell you your computer has tons of problems and the only way to fix them is to pay for the full version of the program. Other times it will be more direct and simply demand money in return for not doing something bad to your computer. Rootkit—a type of malware that opens a permanent “back door” into a computer system; once installed, a rootkit will allow more and more viruses to infect a computer as various hackers find the vulnerable computer exposed and attack. Scareware - A program that displays on-screen warnings of nonexistent infections on your computer to trick you into installing malware or buying fake antivirus protection. Skimming - The capture of information from the magnetic stripe on credit and debit cards by "skimmer" devices that are secretly installed on card-reading systems at gas pumps, ATMs and store checkout counters. “SMiShing” is the mobile version of phishing, and occurs when someone sends a SMS/text message asking you to provide personal and/ or financial information by clicking on a link or responding via text or phone number. spam - unsolicited commercial/junk email Spear-phishing: Phishing with personalized email, often appearing to be from someone you know. Spoofing – Email spoofing is when you receive an email message that appears to be from someone other than the actual sender. This method enables the junk e-mailer to hide his or her identity from the recipient. In spoofing, the sender places a false return address on the junk message. When spoofed, the recipient has no idea who sent the message and has no way of responding or stopping the problem. Emails can also contain a spoofed web site address. spyware - software that covertly gathers user information when connected to the Internet without the user’s knowledge SSL (secure sockets layer) - format for transmitting private documents over the Internet. It uses a cryptographic system that involves two keys. surge protector - device that protects the computer from irregular electrical currents
  • 119. upgrading software - installing a new and improved version of a software program already installed on the computer (trojan) virus - computer problem created by malcontented computer geeks. Viruses are meant to damage computers and are spread by opening email attachments or links or using someone else’s disks. Vishing - Short for "voice phishing," the use of recorded phone messages intended to trick you into revealing sensitive information for identity theft. Water Holing - A watering hole attack is a security exploit in which the attacker seeks to compromise a specific group of end users by infecting websites that members of the group are known to visit War Driving - War driving is a term used to describe the process of a hacker who, armed with a laptop, smartphone or tablet, uses commonly available software to troll neighborhoods via a car, bicycle, or even drone to find open or poorly protected WiFi networks Web Cache -, temporary stored web documents such as HTML pages and images. Caching reduces bandwidth use and load time when a web page is visited. Whaling - Phishing attempt on a "big fish" target (typically corporate executives or payroll departments) by a scammer who poses as its CEO, a company attorney or a vendor to get payments or sensitive information. worm - program, not unlike a virus, that replicates itself over a computer network and usually performs malicious actions