SlideShare una empresa de Scribd logo
1 de 5
Phishing, Email and Internet Scams
     Source: http://www.scu.edu.au/it/index.php/20
Phishing, Email and Internet Scams

Phishing, email and Internet scams are common on the Internet and can
include:
Emails containing virus infected attachments. The two common methods
for distribution of viruses and malicious code are via email attachments
and downloading malicious code from the Internet. By far the most
common method of distribution is by email attachments so exercise
caution when opening attachments. The general rule is: If you are not
expecting the attachment and don't trust the source - don't open it!

For information on recognising a phishing email, visit the Microsoft Safety
and Security Centre website: How To Recognise a Phishing Email.

Further information on spam and scams are available below:
 Nigeria 419 scams
 How to recognise spoofed websites
What is Phishing?

Phishing is a type of deception aimed at identify theft. In a phishing scam,
a malicious person tries to get personal and financial information such as
bank account details, credit card numbers, passwords, or other personal
information from you by convincing you to give it to them under false
pretences.

Phishing schemes usually come via spam email that contains a link to a
fake website such as a banksite or e-bay site.

A phishing scam begins with a malicious user who sends out millions of
fraudulent e-mail messages that appear to come from popular Web sites
or from sites that you trust, like your bank or credit card company.
The e-mail messages, and the Web sites they often send you to, look
official enough that they deceive many people into believing that they're
legitimate. Believing that these emails are legitimate, unsuspecting people
too often respond to the email's requests for their credit card numbers,
passwords, account information, or other personal information.
A scam artist might put a link in a fake e-mail that appears to go to the
legitimate Web site, but actually takes you to a scam site or even a pop-up
window that looks exactly like the official site. These copies are often
called spoofed Web sites. Once you're at one of these spoofed sites or
pop-up windows you might unwittingly enter even more personal
information that will be transmitted directly to the person who created
the spoofed site. That person can then use this information to purchase
goods, apply for a new credit card, or steal your identity.



Protect yourself against phishing
Just as they do in the physical world, scam artists will continue to develop
new and more sinister ways to trick you online. But following these five
steps can help you protect your personal information.
Never respond to requests for personal information via e-mail or in a pop-
up window. If in doubt, call the institution that claims to be the sender of
the e-mail or pop-up window. Australian Banks never send emails
containing weblinks to login sites for bank accounts.
Avoid clicking on weblinks included in suspicious emails as you may
download a virus or malicious code by visiting the site. Instead visit web
sites by typing the URL into your address bar or by having the URL already
bookmarked.
Check to make sure the Web site is using encryption by looking for the
yellow padlock on the website (although this is increasingly being faked as
well).
Routinely review your credit card and bank statements.
Report suspected abuses of your personal information to the proper
authorities.

Más contenido relacionado

Destacado

Destination Management & DMO Stories. A focus on commercial strategies.
Destination Management & DMO Stories. A focus on commercial strategies.Destination Management & DMO Stories. A focus on commercial strategies.
Destination Management & DMO Stories. A focus on commercial strategies.Matteo Ciccalè
 
B2B Challenges Across the Automotive Industry
B2B Challenges Across the Automotive IndustryB2B Challenges Across the Automotive Industry
B2B Challenges Across the Automotive IndustryMark Morley, MBA
 
Diferencia entre estilos y tendencias
Diferencia entre estilos y tendenciasDiferencia entre estilos y tendencias
Diferencia entre estilos y tendenciasPaulinaNaranjo
 
A Practical Guide to Business Modeling
A Practical Guide to Business ModelingA Practical Guide to Business Modeling
A Practical Guide to Business ModelingLHBS
 
Trabajo de Grado nelson gonzalez jun 2016
Trabajo de Grado nelson gonzalez jun 2016Trabajo de Grado nelson gonzalez jun 2016
Trabajo de Grado nelson gonzalez jun 2016NELSON GONZALEZ
 

Destacado (6)

Destination Management & DMO Stories. A focus on commercial strategies.
Destination Management & DMO Stories. A focus on commercial strategies.Destination Management & DMO Stories. A focus on commercial strategies.
Destination Management & DMO Stories. A focus on commercial strategies.
 
B2B Challenges Across the Automotive Industry
B2B Challenges Across the Automotive IndustryB2B Challenges Across the Automotive Industry
B2B Challenges Across the Automotive Industry
 
Diferencia entre estilos y tendencias
Diferencia entre estilos y tendenciasDiferencia entre estilos y tendencias
Diferencia entre estilos y tendencias
 
Clase 1
Clase 1Clase 1
Clase 1
 
A Practical Guide to Business Modeling
A Practical Guide to Business ModelingA Practical Guide to Business Modeling
A Practical Guide to Business Modeling
 
Trabajo de Grado nelson gonzalez jun 2016
Trabajo de Grado nelson gonzalez jun 2016Trabajo de Grado nelson gonzalez jun 2016
Trabajo de Grado nelson gonzalez jun 2016
 

Último

13042024_First India Newspaper Jaipur.pdf
13042024_First India Newspaper Jaipur.pdf13042024_First India Newspaper Jaipur.pdf
13042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
12042024_First India Newspaper Jaipur.pdf
12042024_First India Newspaper Jaipur.pdf12042024_First India Newspaper Jaipur.pdf
12042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Foreign Relation of Pakistan with Neighboring Countries.pptx
Foreign Relation of Pakistan with Neighboring Countries.pptxForeign Relation of Pakistan with Neighboring Countries.pptx
Foreign Relation of Pakistan with Neighboring Countries.pptxunark75
 
15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdf15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Political-Ideologies-and-The-Movements.pptx
Political-Ideologies-and-The-Movements.pptxPolitical-Ideologies-and-The-Movements.pptx
Political-Ideologies-and-The-Movements.pptxSasikiranMarri
 
11042024_First India Newspaper Jaipur.pdf
11042024_First India Newspaper Jaipur.pdf11042024_First India Newspaper Jaipur.pdf
11042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Emerging issues in migration policies.ppt
Emerging issues in migration policies.pptEmerging issues in migration policies.ppt
Emerging issues in migration policies.pptNandinituteja1
 
Transforming Andhra Pradesh: TDP's Legacy in Road Connectivity
Transforming Andhra Pradesh: TDP's Legacy in Road ConnectivityTransforming Andhra Pradesh: TDP's Legacy in Road Connectivity
Transforming Andhra Pradesh: TDP's Legacy in Road Connectivitynarsireddynannuri1
 
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...The Lifesciences Magazine
 
Geostrategic significance of South Asian countries.ppt
Geostrategic significance of South Asian countries.pptGeostrategic significance of South Asian countries.ppt
Geostrategic significance of South Asian countries.pptUsmanKaran
 
Power in International Relations (Pol 5)
Power in International Relations (Pol 5)Power in International Relations (Pol 5)
Power in International Relations (Pol 5)ssuser583c35
 
14042024_First India Newspaper Jaipur.pdf
14042024_First India Newspaper Jaipur.pdf14042024_First India Newspaper Jaipur.pdf
14042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
lok sabha Elections in india- 2024 .pptx
lok sabha Elections in india- 2024 .pptxlok sabha Elections in india- 2024 .pptx
lok sabha Elections in india- 2024 .pptxdigiyvbmrkt
 

Último (14)

13042024_First India Newspaper Jaipur.pdf
13042024_First India Newspaper Jaipur.pdf13042024_First India Newspaper Jaipur.pdf
13042024_First India Newspaper Jaipur.pdf
 
12042024_First India Newspaper Jaipur.pdf
12042024_First India Newspaper Jaipur.pdf12042024_First India Newspaper Jaipur.pdf
12042024_First India Newspaper Jaipur.pdf
 
Foreign Relation of Pakistan with Neighboring Countries.pptx
Foreign Relation of Pakistan with Neighboring Countries.pptxForeign Relation of Pakistan with Neighboring Countries.pptx
Foreign Relation of Pakistan with Neighboring Countries.pptx
 
15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdf15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdf
 
Political-Ideologies-and-The-Movements.pptx
Political-Ideologies-and-The-Movements.pptxPolitical-Ideologies-and-The-Movements.pptx
Political-Ideologies-and-The-Movements.pptx
 
11042024_First India Newspaper Jaipur.pdf
11042024_First India Newspaper Jaipur.pdf11042024_First India Newspaper Jaipur.pdf
11042024_First India Newspaper Jaipur.pdf
 
Emerging issues in migration policies.ppt
Emerging issues in migration policies.pptEmerging issues in migration policies.ppt
Emerging issues in migration policies.ppt
 
Transforming Andhra Pradesh: TDP's Legacy in Road Connectivity
Transforming Andhra Pradesh: TDP's Legacy in Road ConnectivityTransforming Andhra Pradesh: TDP's Legacy in Road Connectivity
Transforming Andhra Pradesh: TDP's Legacy in Road Connectivity
 
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...
Mitochondrial Fusion Vital for Adult Brain Function and Disease Understanding...
 
Geostrategic significance of South Asian countries.ppt
Geostrategic significance of South Asian countries.pptGeostrategic significance of South Asian countries.ppt
Geostrategic significance of South Asian countries.ppt
 
Power in International Relations (Pol 5)
Power in International Relations (Pol 5)Power in International Relations (Pol 5)
Power in International Relations (Pol 5)
 
14042024_First India Newspaper Jaipur.pdf
14042024_First India Newspaper Jaipur.pdf14042024_First India Newspaper Jaipur.pdf
14042024_First India Newspaper Jaipur.pdf
 
16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf
 
lok sabha Elections in india- 2024 .pptx
lok sabha Elections in india- 2024 .pptxlok sabha Elections in india- 2024 .pptx
lok sabha Elections in india- 2024 .pptx
 

Abney Associates Internet Technology: Phishing, Email and Internet Scams

  • 1. Phishing, Email and Internet Scams Source: http://www.scu.edu.au/it/index.php/20
  • 2. Phishing, Email and Internet Scams Phishing, email and Internet scams are common on the Internet and can include: Emails containing virus infected attachments. The two common methods for distribution of viruses and malicious code are via email attachments and downloading malicious code from the Internet. By far the most common method of distribution is by email attachments so exercise caution when opening attachments. The general rule is: If you are not expecting the attachment and don't trust the source - don't open it! For information on recognising a phishing email, visit the Microsoft Safety and Security Centre website: How To Recognise a Phishing Email. Further information on spam and scams are available below:  Nigeria 419 scams  How to recognise spoofed websites
  • 3. What is Phishing? Phishing is a type of deception aimed at identify theft. In a phishing scam, a malicious person tries to get personal and financial information such as bank account details, credit card numbers, passwords, or other personal information from you by convincing you to give it to them under false pretences. Phishing schemes usually come via spam email that contains a link to a fake website such as a banksite or e-bay site. A phishing scam begins with a malicious user who sends out millions of fraudulent e-mail messages that appear to come from popular Web sites or from sites that you trust, like your bank or credit card company. The e-mail messages, and the Web sites they often send you to, look official enough that they deceive many people into believing that they're legitimate. Believing that these emails are legitimate, unsuspecting people too often respond to the email's requests for their credit card numbers, passwords, account information, or other personal information.
  • 4. A scam artist might put a link in a fake e-mail that appears to go to the legitimate Web site, but actually takes you to a scam site or even a pop-up window that looks exactly like the official site. These copies are often called spoofed Web sites. Once you're at one of these spoofed sites or pop-up windows you might unwittingly enter even more personal information that will be transmitted directly to the person who created the spoofed site. That person can then use this information to purchase goods, apply for a new credit card, or steal your identity. Protect yourself against phishing Just as they do in the physical world, scam artists will continue to develop new and more sinister ways to trick you online. But following these five steps can help you protect your personal information.
  • 5. Never respond to requests for personal information via e-mail or in a pop- up window. If in doubt, call the institution that claims to be the sender of the e-mail or pop-up window. Australian Banks never send emails containing weblinks to login sites for bank accounts. Avoid clicking on weblinks included in suspicious emails as you may download a virus or malicious code by visiting the site. Instead visit web sites by typing the URL into your address bar or by having the URL already bookmarked. Check to make sure the Web site is using encryption by looking for the yellow padlock on the website (although this is increasingly being faked as well). Routinely review your credit card and bank statements. Report suspected abuses of your personal information to the proper authorities.