Frauds & Scams. Why is the Internet so attractive to scam artists? 2006 Internet Fraud Trends. Fake Checks. Nigerian Scam

Similar documents
Newcomer Finances Toolkit. Fraud. Worksheets

Credit Card Frauds Sept.08, 2016

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Identity Theft, Fraud & You. PrePare. Protect. Prevent.

It pays to stop and think

Common Scams and Fraud. Charlottesville/Albemarle County TRIAD Group

INFORMATION ABOUT SCAMS FOR RESIDENTS

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Toolkit for March Fraud Prevention Month 2017 Senior Support. FRAUD Recognize It Reject It Report It.

South Central Power Stop Scams

Who We Are! Natalie Timpone

Retail/Consumer Client Internet Banking Awareness and Education Program

The Dime Bank Security Tips

ELECTRONIC BANKING & ONLINE AUTHENTICATION

Target Breach Overview

McAfee S DO s AnD DOn ts Of Online Shopping

COMMON WAYS IDENTITY THEFT CAN HAPPEN:

Beware! Identity Theft

Financial scams. What to look for and how to avoid them.

Top 5 Tips To Take A Stand Against Telephone Scams

How Cyber-Criminals Steal and Profit from your Data

Guide to credit card security

Federal Deposit Insurance Corporation. National Credit Union Administration. Office of the Comptroller of the Currency. Office of Thrift Supervision

Identity Theft and Account Takeover Prevention

Today s Presentation. Define phishing Explain phishing techniques Examples of phishing Statistics about phishing Defense against Dark Arts Resources

The 12 scams of Christmas

Evolution of Spear Phishing. White Paper

Online Security and Safety Protect Your Computer - and Yourself!

FAQ. Usually appear to be sent from official address

9/11/ FALL CONFERENCE & TRAINING SEMINAR 2014 FALL CONFERENCE & TRAINING SEMINAR

Fraud awareness & Information pack for ANZ Customers

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Protect Yourself From. Identify Theft

Your security on click Jobs

CUSTOMER TIPS: HOW TO GUARD AGAINST FRAUD WHEN USING ONLINE BANKING OR ATM s

Safety and Security. April 2015

Protecting Your Business From Hackers

Contents. What we re doing to protect your accounts. Protecting yourself from the most common scams and types of fraud

How to Keep Your Personal Information Secure

IMPORTANT SECURITY INFORMATION PHISHING

WEB OF DECEIT. Why are seniors targeted?

Security Awareness. Chapter 2 Personal Security

Page 1 of 6 Bank card and cheque fraud

1 of 11 10/1/ :26 AM

DAVE COGDILL. California Legislature Assembly. Dear Friend,

Identity Theft Victim s Complaint and Affidavit

Protecting your Security and Privacy on the Web. Tony Brett Head of IT Support Staff Services IT Services. 11 March 2013

The BUSINESS of Fraud. Don t let it put you out of business. AFFILIATE LOGO

Safeguarding Your Dealership from Fraud

Why you MUST protect your customer data

Signs of Financial Fraud of the Elderly. Brenda Charles-Edwards National Notary Association Ambassador for Washington State

Online Scams. Ready to get started? Click on the green button to continue.

Consumers Use of Mobile Financial Services 2015

Phishing: What is it?

FRAUDULENT TRAVEL SCAMS

Review Ch. 3 Connecting to the World s Information. 2010, 2006 South-Western, Cengage Learning

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?

Defend Yourself From Fraud

Six Steps to Protect Your Clients and Protect Yourself from Identity Theft. Ley Mills IRS Stakeholder Liaison December 20, 2017

Red Flag Regulations

AARP WATCHDOG ALERT HANDBOOK

Business/Commercial Client Internet Banking Awareness and Education Program

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name.

Risk Outlook Anti money Laundering and Cybercrime. Steve Wilmott and George Hawkins

Personal Cybersecurity

Electronic Identity Theft and Basic Security

AARP Watchdog Alert Handbook

Six Steps to Protect Your Clients and Protect Yourself from Identity Theft

Prevention of Identity Theft in Student Financial Transactions AP 5800

TWINSBURG COMMUNITY SERVICE BUREAU. Senior Scam Workshop. Presented by Officer Ron Fruscella and Officer Greg Kopniske

Notice to our customers regarding Toll Fraud

Bringing the Fight to Them: Exploring Aggressive Countermeasures to Phishing and other Social Engineering Scams

Best Practices Guide to Electronic Banking

Management of IT Infrastructure Security by Establishing Separate Functional Area with Spiral Security Model

Web Cash Fraud Prevention Best Practices

It is my great pleasure to inform that you have won the latest model of Ferrari Car and 4 Bed Room Villa in Palm Jumeirah for attending this Seminar

Chapter 4 Network and Internet Security

University of North Texas System Administration Identity Theft Prevention Program

Red Flag Policy and Identity Theft Prevention Program

Payment Systems Department

Identity Theft Prevention Program. Effective beginning August 1, 2009

Employee Security Awareness Training

Cyber Security Practice Questions. Varying Difficulty

Taking control of your finances... 5 Use these tips to manage your finances

Detect, Denounce, Deter

Chapter 6 Network and Internet Security and Privacy

5LINX ID GUARD Product Overview. Credit/Presenter Goes Here

Webomania Solutions Pvt. Ltd. 2017

Privacy and Security are two sides of the same coin

( Utility Name ) Identity Theft Prevention Program

Small Business FRAUD PREVENTION Manual

Security & Phishing

[Utility Name] Identity Theft Prevention Program

STAYING SAFE FROM SOCIAL ENGINEERING SCHEMES

Important Information

Chapter Contents PERSONAL SAFETY INFORMATION

Seattle University Identity Theft Prevention Program. Purpose. Definitions

Mapping the Frontiers of the Electronic Crime Threat From Consumers' Desktops to National Equities Markets

Security Awareness & Best Practices Best Practices for Maintaining Data Security in Your Business Environment

THE SMALL BUSINESS FRAUD PREVENTION MANUAL

Transcription:

Frauds & Scams Why is the Internet so attractive to scam artists? Anonymity Low cost Rapid growth Easy to adapt Be Cyber Savvy with C-SAFE 118 2006 Internet Fraud Trends Average Loss Online Auctions 34% $1,331 General Merchandise 33% $1,197 Fake Checks 11% $4,053 Nigerian Scam 7% $3,741 Lotteries/Lottery Clubs 4% $1,515 Phishing Scams 2% $ ------ Email was the initial attack vector in almost 100% of these! Avoiding auction/general merchandise fraud Research any seller before giving out personal information (buyer s feedback, Google, etc) Use a credit card or service like PayPal Avoid payment methods with no protection, e.g. wire transfers Be wary of sellers outside the US Make your PayPal password unique National Fraud Information Center January-December 2006 119 120 Fake Checks Some fake checks look genuine, even to bank tellers Money from checks you deposit may show up in your account before they have cleared Before you spend the money, verify with your bank that a check has actually cleared (this may take weeks) Report fake check scams to: Federal Trade Commission at www.ftc.gov 1-877-FTC-HELP (1-877-382-4357) 121 Nigerian Scam Also called an Advanced Fee Scam or a 419 Scam, this is one of the oldest scams around My name is Barrister j.c.don a Legal practitioner and member of the Institute of Advanced Legal Studies and Institute of International Affairs in my country. I am forwarding this proposal to you out of the intuitive confidences I have about you and your ability to assist in the executtion of a certain straightforward transaction. The transaction involves a cash investment of the sum of US$40,500,000.00... 122 1

Nigerian Scam Categories Deposed leaders, their families, and associates Over-invoiced contracts and government employees Forgotten accounts, wills, and inheritances Gifts to charitable or religious organizations American soldiers in Afghanistan/Iraq Nigerian Scam Bottom Line If someone you don t know wants to give you money it s a scam! If they ask you for a little bit of money so that they can send you a whole lot of money it s a scam! 123 124 Lottery Clubs It s illegal to use mail or telephone to play lotteries across borders including state lines Joining a lottery club won t improve your chances of winning foreign lotteries Phishing Sending a message claiming to be a business to scam the user into surrendering private information Phishing combines social engineering with technical subterfuge. 125 126 How does phishing work? You receive an email that appears to be from a legitimate or well-known company. The email informs you that you need to access your account, usually to correct a problem. A link in the email takes you to a counterfeit website that looks genuine. You are instructed to fix the problem by entering sensitive personal information, or risk losing access to your account 127 Spear Phishing A highly targeted e-mail attack that a scammer will send only to people within a small group, such as a company Spear phishers also target people who use a certain product or web site. Scammers use any information to personalize a phishing scam to as specific a group as possible 128 2

PayPal recommends using a debit card instead of a credit card, due to the higher security level of these. 129 130 More Social Engineering. You ve been selected to take part in our Customer Survey we will credit $100.00 to your account. 131 Tips to Avoid Getting Hooked Be skeptical of any email that asks for personal information DO NOT click on the link provided Access your user information only through the company s homepage NOTE: Spoofed web addresses are likely to be excessively long Contact law enforcement if you ve been a victim 132 Internet Crime Complaint Center www.ic3.gov 133 134 www.antiphishing.org 3

Identity Theft ID theft occurs when an unauthorized person pretends to be you or uses your personal information Identity Theft Be Cyber Savvy with C-SAFE 136 ID Theft Statistics How do they get my information? (No-tech ways) Theft of wallets, purses Change of address cards Find info in your home Dumpster diving Shoulder surfing Moles Mail theft Social engineering 137 138 How do they get my information? (Hi-tech ways) Skimming: an example Malware Viruses, Trojan horses, Keyloggers Phishing Vishing (Voice over IP) Old hard drives Skimming 139 140 4

What do bad guys do with my information? Change the mailing address on your credit card accounts Open new lines of credit; exhaust them Forge checks and wipe out your existing account Commit crimes and give your name as an alias ID Theft Prevention Use a credit card Fair Credit Billing Act limits consumer liability Electronic Fund Transfer Act limits consumer liability for ATM or debit cards, with stipulations Get a free credit report annually www.annualcreditreport.com Shred all documents containing personal info Don t email personal or financial information 141 142 ID Theft Prevention (cont.) Secure Connection: IE Update anti-virus and anti-spyware software regularly Do not download files from strangers Do not click on links from unknown sources Use a secure connection for online transactions 143 144 Secure Connection: Firefox If you think you re a victim Call the FTC ID Theft Hotline: 1-877-IDTHEFT (877-438-4338) Contact the three major credit bureaus File a report with your local police Contact your creditors 145 147 5

http://myfloridalegal.com/identitytheft 148 http://www.ftc.gov/idtheft 149 6