/
How to Spot a Scam How to Spot a Scam

How to Spot a Scam - PowerPoint Presentation

mitsue-stanley
mitsue-stanley . @mitsue-stanley
Follow
401 views
Uploaded On 2017-03-21

How to Spot a Scam - PPT Presentation

Marshal Graham January 16 2012 Scam A confidence trick is an attempt to defraud a person or group by gaining their confidence A confidence artist is an individual working alone or in concert with others who exploits characteristics of the human psyche such as dishonesty and honesty vanity co ID: 527436

bad scam victim passphrase scam bad passphrase victim good print guys security times pay confidence vigilant characteristics online details

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "How to Spot a Scam" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

How to Spot a Scam

Marshal Graham

January 16, 2012Slide2

Scam

A confidence trick is an attempt to defraud a person or group by gaining their confidence. A confidence artist is an individual working alone or in concert with others who exploits characteristics of the human psyche such as dishonesty and honesty, vanity, compassion, credulity, irresponsibility, naivety and greed

.

A confidence trick is also (non-exhaustively) known as a con game, con, scam, grift, hustle, bunko,

bunco

, swindle, flimflam,

gaffle

, or bamboozle. The intended victim(s) are known as marks. The perpetrator of a confidence trick is often referred to as a confidence man/woman, con man/woman, con artist or

grifter

. When accomplices are employed, they are known as shills.

https://

en.wikipedia.org/wiki/Confidence_trickSlide3
Slide4
Slide5

Scam Enablers

People are the weakest link in computer securitySlide6
Slide7

Scam Enablers

People are the weakest link in computer security.

Bad guys use social engineering to exploit our natural curiosity, desire to be helpful, and other traits to their advantage.Slide8
Slide9
Slide10

Scam Enablers

People are the weakest link in computer security.

Bad guys use social engineering to exploit our natural curiosity, desire to be helpful, and other traits to their advantage.

The bad guys only need to get it right once to profit.Slide11

419 Scams

419 scams or

Advance

Fee

Fraud has existed for decades

An

Ultrascan

Advanced Global

Investigations report from 2009 suggests less than 1% of 419 scams are successful

This amounts to an estimated $9.3 billion lost in 2009.Slide12

Scam Enablers

People are the weakest link in computer security.

Bad guys use social engineering to exploit our natural curiosity, desire to be helpful, and other traits to their advantage.

The bad guys only need to get it right once to profit.

Everyone has something of value online.Slide13

The Trail Always Leads to Money

Personal

Bank accounts

Retirement accounts

Investment accounts

Email

Facebook

PII

Work

Student records

Email

Bank accounts

PII

To the bad guys, all of these represent money or an avenue to gain money.Slide14

Scam Enablers

People are the weakest link in computer security.

Bad guys use social engineering to exploit our natural curiosity, desire to be helpful, and other traits to their advantage.

The bad guys only need to get it right once to profit.

Everyone has something of value online.Slide15

Scam Characteristics

UrgencySlide16

Act Now!!! Before It’s Too Late!!!Slide17

Scam Characteristics

The scam will convey some sense of

Urgency

. Make a bad decision, fast!

Online scams historically have bad grammar.Slide18

You wouldn’t buy these crackers. Don’t buy from the bad grammar scammer!Slide19

Scam Characteristics

The scam will convey some sense of

Urgency

. Make a bad decision, fast!

Scammers typically have bad grammar.

The offer is too good to be true.Slide20

Apple is NOT giving away free iPads.Slide21
Slide22

Scam Characteristics

The scam will convey some sense of

Urgency

. Make a bad decision, fast!

Scammers typically have bad grammar.

The offer is too good to be true.

Something is just not quite right.Slide23

Something Stinks?

You are told you have won a prize, but you must pay for something

before you can receive it. This payment can either be a requirement to purchase a minimum

order, or

it can be a shipping/handling charge or a processing fee

.

You are told to make an immediate decision.

You are told you are one of the few people eligible for an offer.

You are told you won a drawing, yet you do not remember entering the contest.Slide24

Scam Characteristics

The scam will convey some sense of

Urgency

. Make a bad decision, fast!

Scammers typically have bad grammar.

The offer is too good to be true.

Something is just not quite right.

Sometimes, the best thing is to walk awaySlide25

Avoid Becoming A Victim

Be a vigilant at all times.Slide26

VigilanceDo not risk becoming a victim just to get something for free. Y

ou did not need that

iPad

before it was free. You do not need to risk becoming a victim to get it now.

Vigilance is like Scam Repellent.Slide27

Avoid Becoming A Victim

Be a vigilant at all times.

Pay attention to the details.Slide28
Slide29

Avoid Becoming A Victim

Be a vigilant at all times.

Pay attention to the details.

Use a good

password

passphrase, never reuse a passphrase, and change your passphrase regularly.

Never click on links. Always type the URL into your browser.Slide30

URL Links

Hyperlinks are trivial to spoof.

If you get an email claiming to be from your bank,

do not click the link

. Instead, visit the bank’s site to ensure you do not become a victim.

This is difficult to train yourself to do!

<a href="http://myfakebankingsite.com">https://www.cbthomebank.com/</a>Slide31

Avoid Becoming A Victim

Be a vigilant at all times.

Pay attention to the details.

Use a good

password

passphrase, never reuse a passphrase, and change your passphrase regularly.

Never click on links. Always type the URL into your browser.

Always read the fine print and the

bold

print too!Slide32

Is your PC virus-free? Get it infected here!

If you do not understand what you are seeing, ask for help!Slide33

Avoid Becoming A Victim

Be a vigilant at all times.

Pay attention to the details.

Use a good

password

passphrase, never reuse a passphrase, and change your passphrase regularly.

Never click on links. Always type the URL into your browser.

Always read the fine print and the

bold

print too!

Talk to a human.Slide34

Hello, how may I help you?Slide35

Avoid Becoming A Victim

Be a vigilant at all times.

Pay attention to the details.

Use a good

password

passphrase, never reuse a passphrase, and change your passphrase regularly.

Never click on links. Always type the URL into your browser.

Always read the fine print and the

bold

print too!

Talk to a human.Slide36

We have only scratched the surface!

E-cards

Phishing

Work at home

Donations

Alarmists or threats

Lottery

Fake

AntiVirus

And even more!

There is a scam for everyone!Slide37

Future

Scammers

will

get better.

Technology

will

improve.

The stakes

will

increase.

Scams will never end.

My six rules will still give you an advantage!Slide38

Thank You!

Be a vigilant at all times

.

Pay attention to the details

.

Use a good

password

passphrase, never reuse a passphrase, and change your passphrase regularly

.

Never click on links. Always type the URL into your browser

.

Always read the fine print and the

bold

print too

!

Talk to a human.

http://marshalgraham.com

@

marshalgraham

https://www.opendns.com/phishing-quiz

/

http://

www.microsoft.com/security/online-privacy/phishing-scams.aspx

http://

www.microsoft.com/security/online-privacy/msname.aspx

http://

www.microsoft.com/security/online-privacy/phishing-interests.aspx