Jaunt Logo

    Cybersecurity: Avoiding Online Scams Los Altos City Council

    Cybersecurity: Avoiding Online Scams Los Altos City Council

    B
    @BizFinEco
    8 Followers
    4 months ago 448

    This presentation provides insights into cybersecurity, the rise of online scams, and effective prevention strategies. Attendees will learn about phishing tactics, password safety, and utilizing tools like password managers to secure personal and financial information. It offers practical advice on recognizing scams, protecting devices, and managing identities in an increasingly digital landscape.

    CYBERSECURITY
AVOIDING SCAMS
STAYING SAFE ONLINE
 LOS ALTOS HILLS TECHNOLOGY COMMITTEE
 STAN MOK (COUNCIL LIAISON) LEW JAMISON
 RAJIV BHATEJA (CHAIR) ANNIE JU 
 AMEESH DIVATIA (VICE CHAIR) GEORGE LEE
 RON HALEY JOHN SWAN
 
 JUNE 23, 2024
    1/55
    Agenda
 Introduction to Cybersecurity and Scams
 Reducing Risk and Password Safety
 Identifying and Avoiding Scams
 Protecting Accounts and Devices
 Recommendations and Additional Resources
    2/55
    Introduction to 
Cybersecurity and 
Scams
    3/55
    What is Cybersecurity
The term 'cybersecurity' refers to the 
practice of protecting systems, networks, 
and programs from digital attacks. These 
cyberattacks are usually aimed at 
accessing, changing, or destroying 
sensitive information; extorting money 
from users; or interrupting normal 
business processes. 
Implementing effective cybersecurity 
measures is particularly challenging 
today because there are more devices 
than people, and attackers are becoming 
more innovative.
    4/55
    What are Scams
Scams, often referred to in the context of 
cybersecurity, involve deceptive practices 
that aim to manipulate individuals into 
divulging confidential information, 
transferring money, or granting access to 
their systems.
Scams can take various forms, such as 
phishing emails, fake marketplaces, or 
advance payment frauds, and are designed 
to exploit the victims for financial gain or 
to disrupt normal business processes.
    5/55
    What You Can Do
 Be informed
 Types of scams
 Examples of online scams
 Scammer tactics
 Reduce your risk
 Safeguard your personal information
 Harden your accounts
 Increase your awareness
 Reduce the risk of being scammed
 If you’re a victim:
 Whom to contact
 Where to get help
    6/55
    Be Informed
    7/55
    Growth of Scams
Increase in
AI generated
Scams
    8/55
    Common Types of Scams
 Government agency (pretending to be: IRS, Customs, USPS…)
 Example: https://www.irs.gov/newsroom/tax-scamsconsumer-alerts
 Corporations (pretending to be: UPS, Wal-Mart, Amazon, EBay, PayPal, AT&T, banks…)
 Example: https://corporate.walmart.com/privacy-security/fraud-alerts
 Call Centers / Technical Assistance (pretending to be: Microsoft, Norton, McAfee…)
 Example: https://bit.ly/microsoft-scams
 Financial
 Example: credit card cloning/skimming, phone hacking, email phishing
 Romance
 Search for “social catfish” on YouTube
 Family, friends, caregivers
 Example: https://www.plano.gov/2125/Parent-Scam
 Stolen / re-written paper checks
 “You can buy checks on the internet for $45, with a perfectly good signature. There is one website that 
offers a money-back guarantee. It’s like Nordstrom.”
 - John Ravita, Director of Business Development, SQN Banking Systems
    9/55
    Scammer Tactics
• AI-Powered Scams
• Phone Scams
• Text Scams
• Email Scams
• Student Loan Forgiveness Scams
• Creating a Sense of URGENCY, FEAR
• Building Rapport with Casual Talk
• Catching you at a busy time when you’re distracted (soccer field, 
traveling, meeting, etc.): you make a hasty decision.
It's important to be aware of these tactics 
and to be cautious when dealing with 
unsolicited calls, emails, or messages. 
If something seems too good to be true, 
it probably is.
    10/55
    Reducing Risk and 
Password Safety
    11/55
    Reducing Risk of Scams
Here are some ways of reducing risk:
• Be wary of phishing emails, fake online marketplaces, FAKE BILL PAYMENT!
• Don’t click on links in emails. Hover your cursor or go to the site directly.
• e.g, https://wellsfargo.com actually points to scam.com
• Avoid advance payment scams and protect against SIM swaps
• Be skeptical of beneficiary claims and grandchild 
in trouble scams
• Use password safety practices like Multi-Factor 
Authentication and password managers
• Set up alerts and credit freezes for financial accounts
• Protect your devices and accounts with strong 
security measures
    12/55
    Protect Your Passwords
Create strong, unique passwords
 Use at least 12 characters, the longer the better. 
• Combine upper and lowercase letters, numbers, and special symbols. 
• Avoid using personal information (names, birthdays, or addresses).
• Use a unique password for every account. 
 Avoid using dictionary words or common phrases.
Enable Multi-Factor Authentication
 Verification code from app or text message.
Be wary of unsolicited phone calls and emails
 iPhones can silence calls from unknown numbers.
 Android can screen calls, and identify/ignore spam calls/texts
    13/55
    Password Process
Multi-Factor Authentication:
Authenticator App (preferred), or
Text PIN
Use a password manager to 
generate strong passwords
New trend: Passkey
Never re-use important 
passwords
Is your password compromised?
    14/55
    What is a Passkey? – Emerging Trend
• A passkey is a digital token stored on your device 
(usually your phone or computer)
• Similar to GPG technology (private and public key encryption)
• “Your device IS your password”
• Your device needs to be protected by a screen lock 
(fingerprint, PIN, pattern, etc.)
• Advantages:
• No passwords to remember,
• No password to hack
• But:
• Protect your devices
• If someone gets access to your unlocked device…
    15/55
    Never Reuse Passwords
“How can I remember all those passwords?”
Password Manager
    16/55
    Password Managers
Password managers ensure that you really are at the correct website before entering your credentials.
Example: Your Yahoo credentials won’t mistakenly be used at Yah00.com
Password managers also advise you if your password has been hacked or is not secure.
Password managers also suggest very strong passwords.
Independent Password Managers (in no particular order):
 NordPass
 1Password
 Dashlane
 Keeper
 Bitwarden
 LastPass
 KeePass (actually a “password safe”)
Browser-based password managers: “Remember this password?”
 Google Chrome
 Microsoft Edge
 Apple Safari
    17/55
    Why You Should Use a Password Manager
Password Manager suggested passwords are 
completely random and are harder to crack!
    18/55
    Password Strength Checker
Free Password Strength Checker:
 www.nordpass.com/secure-password/
CAUTION:
Generally avoid checking your password 
with websites unless they’re from a reputed 
company.
Password managers do this for you 
automatically.
    19/55
    20
IS YOUR EMAIL IN DATA BREACHES?
https://haveibeenpwned.com
    20/55
    Does your Password Appear in Data Breaches?
This file is licensed under the Creative Commons Attribution-Share Alike 4.0 International license.
Attribution: Santeri Viinamäki
https://haveibeenpwned.com
    21/55
    Unauthorized access to your computer, phone or email can lead to severe consequences.
These are major weak links.
Make sure you PROTECT:
 Computers
 Be very careful about where you’re downloading software from
 Don’t give anyone access to your computers – in-person or remotely
 Phones
 Protect your phone with a SIM PIN (aka “number transfer PIN”)
 Robust screen lock (Fingerprint / PIN / Pattern) – avoid facial recognition
 Fast auto-lock timeout to lock screen
 Email and critical accounts
 Use MFA
 Use a hardware key (like Yubikey) for extra security
 Requires physical key (and optionally a PIN)
Weak Links
    22/55
    Identifying and Avoiding 
Scams
    23/55
    How to Spot Fake Emails
Fear, Anxiety
Float cursor over button to display link
https://www.amazon-prime-renew.com – FAKE!!
    24/55
    To: bhateja@yahoo.com
Subject: Check out my fake email to you
From: "Stanley Mok" <stanmok@losaltoshills.ca.gov> 
X-Priority: 3 (Normal)
Importance: Normal
Errors-To: stanmok@losaltoshills.ca.gov
Reply-To: stanmok@losaltoshills.ca.gov
Content-Type: text/plain; charset=utf-8
Message-Id: 
20240612223911.0A2AD1D7C@emkei.cz
Date: Thu, 13 Jun 2024 00:39:11 +0200 (CEST) 
Content-Length: 54
Hi Rajiv,
How do you like them fakes?
Cheers,
Stan
How Easy is to Fake an Email?
Yahoo mail sent it to spam.
Gmail did not allow it go through at all.
Not all email providers are going to catch all fakes.
Solution: Confirm by other means if suspicious.
    25/55
    Marketplace Fraud
 Account hijacking
 Solution: Protect your credentials, use Multi-Factor Authentication
 Phishing for identify info
 Solution: Don’t share your DOB, SSN, etc. with marketplaces
 [But be aware: that info could be out there already]
 Delivery redirection
 Solution:Watch out for email notifications of address/phone number change
 Inaccurate/misleading listing / Too good to be true
 Solution: READ CAREFULLY. Only use well-reputed sites
 Use trusted sites and payment methods
 Solution: Use credit cards or protected payment methods
 – Not Western Union, Giftcards, Zelle, etc.
 Stay within a protected marketplace
 – AirBnB host suggests offline transaction DECLINE
    26/55
    Example of a Phone Scam
Call from AT&T
Free iPhones !!!
Check AT&T website:
Number checks out!!
The scammer called 
YOU.
They spoofed the 
AT&T phone 
number.
Solution:
Tell them you’ll call 
THEM at the verified 
AT&T number.
3 weeks later…
No iPhones 
Account is 
hacked
It’s a SCAM!
But HOW ??
    27/55
    Avoiding Phone Scams
RULE: 
1. “Don’t call me. I’ll call you.”
2. “Let me call back at the verified number.”
    28/55
    SIM Swapping SIM Swapping: one of the most 
pernicious of all scams
 Lose access to your phone number
 Scammer can reset your passwords 
over email
 Scammer can intercept text one time 
passwords
 Two factor authentication is useless
How To Prevent SIM Swapping
 Add a “number porting” PIN to your 
cellular service provider account
 Be super attentive to emails and 
texts from your cellular service 
provider
 Use authenticator apps whenever 
possible
 Never share codes for two-factor 
authentication with anyone
CAUTION:
If you share your confidential information with a scammer, banks 
may not reimburse you.
    29/55
    Man in the Middle Attack
Step 1: Scammer tricks you into thinking you’re on a bank site:
bankofamer1ca.com (replace i with 1). Scammer can see what 
you enter on this site.
Step 2: You enter your username and password.
Scammer enters your credentials on the REAL BofA site
Step 3: BofA texts you a one time code or
you enter code from your authenticator app.
You enter the code on the fake BofA web page
Scammer now has your one time code.
Step 4: Scammer enters your code and gets into your account.
SOLUTION: Make sure you’re on the right website.
    30/55
    Avoiding Man in the Middle Attack
RULE:
 Make sure you’re on the real website.
 Don’t click on a link in an email or text.
 Go to your bookmarked link or type it in yourself.
    31/55
    Protecting Accounts 
and Devices
    32/55
    Protect Your Phone
Face ID unlock has inherent weaknesses
 Can be faked with AI
 Phone can quickly be held up to your face and unlocked
Is your phone unlocked when within range of your watch?
 Phone can stay unlocked within range of your watch
 Recommend: Use a fingerprint, PIN or pattern (rather than facial recognition) to unlock your phone
Public WiFi / Hotspots
 Using a public WiFi or hotspot allows attackers to sneak malicious software (malware) into your device, 
display infected ads or using a phishing form to steal passwords.
 Recommend: If using a public WiFi network, use VPN from a reputed vendor to protect your phone 
from malicious software. Or use mobile data.
 Some cellular service providers automatically use VPN when using WiFi or hotspots
    33/55
    Protect Credit Card &
Financial Accounts
 Setup text/email alerts for your credit cards
 Same with your bank, investment accounts
 Bank ATMs are more secure than retail ATMs
 Be careful of devices with skimmers
 Inspect device before using your card
 Cards with EMV chips are harder to clone
 Use a chip reader or tap rather than swiping
 Promptly notify your credit card company of any 
unrecognized charges
 If concerned about card security, LOCK your card
 Set up PINs for IRS and FTB accounts to prevent 
scammers filing for a refund on your accounts
    34/55
    Credit Freeze – Prevent Others from Opening an 
Account in Your Name
Credit Freezes are free! [Locks are not free but freezes are effective]
• Limits access to your credit to those you currently have accounts with
• Prevents anyone from opening an account in your name
• Unfreeze temporarily to open a new account
    35/55
    Credit Security Freeze – How To
https://www.equifax.com/personal/credit-report-services/credit-freeze/
https://www.transunion.com/credit-freeze
https://www.experian.com/freeze/center.html
 FREEZES are FREE. Locks are not. A freeze is all you need.
 A freeze can be permanent (recommended), or temporary.
 You can temporarily LIFT a freeze if/when you apply for an account
 Lift can be scheduled to last for 1-30 days
 Freeze automatically reinstated after the temporary lift
    36/55
    Interactive Questions
QUIZ
    37/55
    Question: Safe Links
Scenario: You receive an email from your bank. Which link is safer to 
click?
 Option A: "Click here to verify your account details: 
www.bank-secure-login.com”
 Option B: "Visit our website and log in to your account: 
http://www.bankofamerica.com"
Answer: Neither. 
The link text can be misleading and obscure a fraudulent link. 
Use a bookmark you’ve previously saved, or type in the 
official bank URL into the browser.
    38/55
    Question: Strong Password
Scenario: Which of the following is a stronger password?
 Option A: "Password123”
 Option B: "T3x!7K$z#9Qw”
 Option C: "workHard79"
Answer: B
B is longer and includes upper/lower case letters, 
numbers and special characters.
    39/55
    Question: Phishing Email
Scenario: You receive an email claiming you've won a prize. What should 
you do?
 Option A: Click the link in the email to claim your prize.
 Option B: Verify the sender's email address and contact the 
company directly through their official website.
 Option C: Check if the company is legitimate before you go to 
their website or enter personal information.
Answer: Most such emails are scams. 
But if you really must follow through, Option C is best.
Do not click any links or download attachments.
    40/55
    Question: Public Wi-Fi Safety
Scenario: You're at a coffee shop and need to check your bank account. 
What's the safest way to do this?
 Option A: Use the coffee shop's free Wi-Fi to log in to your bank 
account.
 Option B: Use your mobile data or a VPN (Virtual Private 
Network) to access your bank account.
Answer: B
Public Wi-Fi networks are often insecure and can expose 
your personal information to hackers. Using mobile data 
or a VPN ensures a more secure connection to your 
bank account.
    41/55
    Question: Software Updates
Scenario: You receive a notification that there is a software update available 
for your device. What should you do?
 Option A: Continue using your device.
 Option B: Install the update as soon as possible to ensure your 
device is secure.
Answer: B
Software updates often include important security patches that 
protect your device from vulnerabilities and enhance overall 
performance.
    42/55
    Question: Social Media Privacy 
Scenario: You want to share a vacation photo on social media. What is 
the best practice?
 Option A: Share the photo publicly.
 Option B: Share the photo with a select group of friends using 
privacy settings.
Answer: B
Consider posting photos after your trip to avoid revealing 
your current location and travel schedule.
You can enjoy sharing your vacation memories while 
maintaining your privacy and security.
    43/55
    Question: Two-Factor Authentication (2FA) 
Scenario: Which of the following provides better security for your online 
accounts?
 Option A: Password only.
 Option B: Password and a verification code sent to your phone.
 Option C: Password and a code from an authenticator app.
 Option D: Password, a code and a hardware key. 
Answer: D
This option combines multiple layers of security, including something you 
know (the password), something you have (the code), and something you 
possess (the hardware key).
    44/55
    Question: Suspicious Attachments
Scenario: You receive an email with an attachment from an unknown 
sender. What should you do?
 Option A: Open the attachment to see what it is.
 Option B: Delete the email or mark it as spam without opening the 
attachment.
Answer: B
Attachments from unknown senders can contain malware or viruses. It’s 
safest to delete the email or mark it as spam to protect your device and 
personal information.
    45/55
    Question: Password Management 
Scenario: How should you manage your passwords for different accounts?
 Option A: Use one password for all accounts to make it easier to remember.
 Option B: Use a password manager to generate and store unique passwords 
for each account.
 Option C: Use a variation of a “root” password slightly modified for different 
accounts.
Answer: B
Using a password manager ensures that each of your accounts has a 
strong, unique password, reducing the risk of security breaches. It also 
simplifies the process of managing multiple passwords, as you only need 
to remember one master password for the password manager.
    46/55
    Question: Safe Browsing 
Scenario: You come across a website offering a free download of a 
popular software program. What should you check before downloading?
 Option A: Download the software to take advantage of the offer.
 Option B: Verify the legitimacy of the website and check for 
reviews or official sources before downloading.
Answer: B
Look for official or well-known sources like the software's official website or 
reputable download sites. (Game software is particularly risky.)
    47/55
    Recommendations and 
Additional Resources
    48/55
    Recommendations
 Never re-use passwords.
 Use a password manager
 Use Multi-Factor Authentication and/or a hardware key to secure key accounts
• Authenticator app is safer than one-time PIN
 NEVER share a one-time PIN with anyone else
 Protect against SIM Swapping
 Add a “number transfer PIN” or other credential to your cellular service provider account
 Set up and monitor alerts from your bank, credit card company, cell provider, brokerage
 Avoid clicking on links in emails/texts
 Protect your phone: robust screen lock
 “Don’t call me, I’ll call you” – phone numbers can be hacked
 Place a credit freeze with all three credit reporting agencies
 Be wary of acting in haste in response to an unverified call or text
    49/55
    More Good Practices
    50/55
    51
IF YOU ARE A VICTIM
    51/55
     If you believe you are a victim of a Cybercrime, you should take the following steps:
 Gather information
 Report the incident
 Change passwords
 Contact your financial institution(s)
 Report the incident to your local police: Santa Clara County Sheriff 
 FTC at reportfraud.ftc.gov
 Call the AARP Fraud Watch Network Helpline 877-908-3360
 Spread the word about fraud
52
IF YOU ARE A VICTIM
    52/55
    Additional Articles
 The Day I Put $50,000 in a Shoe Box and Handed It to a Stranger
 https://www.thecut.com/article/amazon-scam-call-ftc-arrest-warrants.html
 My phone, my credit card, my hacker, and me
 https://www.businessinsider.com/credit-card-phone-theft-sim-swap-identity-theft-investigation-2023-4
 A former White House scientist was scammed out of $655,000. Then came the IRS.
 https://www.washingtonpost.com/dc-md-va/2023/12/14/cyber-crime-scams-irs-taxes/
 Finance worker pays out $25 million after video call with deepfake ‘chief financial officer’
 https://www.cnn.com/2024/02/04/asia/deepfake-cfo-scam-hong-kong-intl-hnk/index.html
 ‘I had fun’: Alleged scammer takes credit for Graceland foreclosure upheaval
 https://www.latimes.com/entertainment-arts/story/2024-05-29/nigerian-scammer-graceland-sale#
 Fake Obama created using AI video tool - BBC News
 https://www.youtube.com/watch?v=AmUC4m6w1wo
    53/55
    THANK YOU
    54/55
    55
QUESTIONS?
    55/55

    Cybersecurity: Avoiding Online Scams Los Altos City Council

    • 1. CYBERSECURITY AVOIDING SCAMS STAYING SAFE ONLINE LOS ALTOS HILLS TECHNOLOGY COMMITTEE STAN MOK (COUNCIL LIAISON) LEW JAMISON RAJIV BHATEJA (CHAIR) ANNIE JU AMEESH DIVATIA (VICE CHAIR) GEORGE LEE RON HALEY JOHN SWAN JUNE 23, 2024
    • 2. Agenda  Introduction to Cybersecurity and Scams  Reducing Risk and Password Safety  Identifying and Avoiding Scams  Protecting Accounts and Devices  Recommendations and Additional Resources
    • 3. Introduction to Cybersecurity and Scams
    • 4. What is Cybersecurity The term 'cybersecurity' refers to the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes. Implementing effective cybersecurity measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative.
    • 5. What are Scams Scams, often referred to in the context of cybersecurity, involve deceptive practices that aim to manipulate individuals into divulging confidential information, transferring money, or granting access to their systems. Scams can take various forms, such as phishing emails, fake marketplaces, or advance payment frauds, and are designed to exploit the victims for financial gain or to disrupt normal business processes.
    • 6. What You Can Do  Be informed  Types of scams  Examples of online scams  Scammer tactics  Reduce your risk  Safeguard your personal information  Harden your accounts  Increase your awareness  Reduce the risk of being scammed  If you’re a victim:  Whom to contact  Where to get help
    • 7. Be Informed
    • 8. Growth of Scams Increase in AI generated Scams
    • 9. Common Types of Scams  Government agency (pretending to be: IRS, Customs, USPS…)  Example: https://www.irs.gov/newsroom/tax-scamsconsumer-alerts  Corporations (pretending to be: UPS, Wal-Mart, Amazon, EBay, PayPal, AT&T, banks…)  Example: https://corporate.walmart.com/privacy-security/fraud-alerts  Call Centers / Technical Assistance (pretending to be: Microsoft, Norton, McAfee…)  Example: https://bit.ly/microsoft-scams  Financial  Example: credit card cloning/skimming, phone hacking, email phishing  Romance  Search for “social catfish” on YouTube  Family, friends, caregivers  Example: https://www.plano.gov/2125/Parent-Scam  Stolen / re-written paper checks  “You can buy checks on the internet for $45, with a perfectly good signature. There is one website that offers a money-back guarantee. It’s like Nordstrom.” - John Ravita, Director of Business Development, SQN Banking Systems
    • 10. Scammer Tactics • AI-Powered Scams • Phone Scams • Text Scams • Email Scams • Student Loan Forgiveness Scams • Creating a Sense of URGENCY, FEAR • Building Rapport with Casual Talk • Catching you at a busy time when you’re distracted (soccer field, traveling, meeting, etc.): you make a hasty decision. It's important to be aware of these tactics and to be cautious when dealing with unsolicited calls, emails, or messages. If something seems too good to be true, it probably is.
    • 11. Reducing Risk and Password Safety
    • 12. Reducing Risk of Scams Here are some ways of reducing risk: • Be wary of phishing emails, fake online marketplaces, FAKE BILL PAYMENT! • Don’t click on links in emails. Hover your cursor or go to the site directly. • e.g, https://wellsfargo.com actually points to scam.com • Avoid advance payment scams and protect against SIM swaps • Be skeptical of beneficiary claims and grandchild in trouble scams • Use password safety practices like Multi-Factor Authentication and password managers • Set up alerts and credit freezes for financial accounts • Protect your devices and accounts with strong security measures
    • 13. Protect Your Passwords Create strong, unique passwords  Use at least 12 characters, the longer the better. • Combine upper and lowercase letters, numbers, and special symbols. • Avoid using personal information (names, birthdays, or addresses). • Use a unique password for every account.  Avoid using dictionary words or common phrases. Enable Multi-Factor Authentication  Verification code from app or text message. Be wary of unsolicited phone calls and emails  iPhones can silence calls from unknown numbers.  Android can screen calls, and identify/ignore spam calls/texts
    • 14. Password Process Multi-Factor Authentication: Authenticator App (preferred), or Text PIN Use a password manager to generate strong passwords New trend: Passkey Never re-use important passwords Is your password compromised?
    • 15. What is a Passkey? – Emerging Trend • A passkey is a digital token stored on your device (usually your phone or computer) • Similar to GPG technology (private and public key encryption) • “Your device IS your password” • Your device needs to be protected by a screen lock (fingerprint, PIN, pattern, etc.) • Advantages: • No passwords to remember, • No password to hack • But: • Protect your devices • If someone gets access to your unlocked device…
    • 16. Never Reuse Passwords “How can I remember all those passwords?” Password Manager
    • 17. Password Managers Password managers ensure that you really are at the correct website before entering your credentials. Example: Your Yahoo credentials won’t mistakenly be used at Yah00.com Password managers also advise you if your password has been hacked or is not secure. Password managers also suggest very strong passwords. Independent Password Managers (in no particular order):  NordPass  1Password  Dashlane  Keeper  Bitwarden  LastPass  KeePass (actually a “password safe”) Browser-based password managers: “Remember this password?”  Google Chrome  Microsoft Edge  Apple Safari
    • 18. Why You Should Use a Password Manager Password Manager suggested passwords are completely random and are harder to crack!
    • 19. Password Strength Checker Free Password Strength Checker: www.nordpass.com/secure-password/ CAUTION: Generally avoid checking your password with websites unless they’re from a reputed company. Password managers do this for you automatically.
    • 20. 20 IS YOUR EMAIL IN DATA BREACHES? https://haveibeenpwned.com
    • 21. Does your Password Appear in Data Breaches? This file is licensed under the Creative Commons Attribution-Share Alike 4.0 International license. Attribution: Santeri Viinamäki https://haveibeenpwned.com
    • 22. Unauthorized access to your computer, phone or email can lead to severe consequences. These are major weak links. Make sure you PROTECT:  Computers  Be very careful about where you’re downloading software from  Don’t give anyone access to your computers – in-person or remotely  Phones  Protect your phone with a SIM PIN (aka “number transfer PIN”)  Robust screen lock (Fingerprint / PIN / Pattern) – avoid facial recognition  Fast auto-lock timeout to lock screen  Email and critical accounts  Use MFA  Use a hardware key (like Yubikey) for extra security  Requires physical key (and optionally a PIN) Weak Links
    • 23. Identifying and Avoiding Scams
    • 24. How to Spot Fake Emails Fear, Anxiety Float cursor over button to display link https://www.amazon-prime-renew.com – FAKE!!
    • 25. To: bhateja@yahoo.com Subject: Check out my fake email to you From: "Stanley Mok" <stanmok@losaltoshills.ca.gov> X-Priority: 3 (Normal) Importance: Normal Errors-To: stanmok@losaltoshills.ca.gov Reply-To: stanmok@losaltoshills.ca.gov Content-Type: text/plain; charset=utf-8 Message-Id: 20240612223911.0A2AD1D7C@emkei.cz Date: Thu, 13 Jun 2024 00:39:11 +0200 (CEST) Content-Length: 54 Hi Rajiv, How do you like them fakes? Cheers, Stan How Easy is to Fake an Email? Yahoo mail sent it to spam. Gmail did not allow it go through at all. Not all email providers are going to catch all fakes. Solution: Confirm by other means if suspicious.
    • 26. Marketplace Fraud  Account hijacking  Solution: Protect your credentials, use Multi-Factor Authentication  Phishing for identify info  Solution: Don’t share your DOB, SSN, etc. with marketplaces [But be aware: that info could be out there already]  Delivery redirection  Solution:Watch out for email notifications of address/phone number change  Inaccurate/misleading listing / Too good to be true  Solution: READ CAREFULLY. Only use well-reputed sites  Use trusted sites and payment methods  Solution: Use credit cards or protected payment methods – Not Western Union, Giftcards, Zelle, etc.  Stay within a protected marketplace – AirBnB host suggests offline transaction DECLINE
    • 27. Example of a Phone Scam Call from AT&T Free iPhones !!! Check AT&T website: Number checks out!! The scammer called YOU. They spoofed the AT&T phone number. Solution: Tell them you’ll call THEM at the verified AT&T number. 3 weeks later… No iPhones Account is hacked It’s a SCAM! But HOW ??
    • 28. Avoiding Phone Scams RULE: 1. “Don’t call me. I’ll call you.” 2. “Let me call back at the verified number.”
    • 29. SIM Swapping SIM Swapping: one of the most pernicious of all scams  Lose access to your phone number  Scammer can reset your passwords over email  Scammer can intercept text one time passwords  Two factor authentication is useless How To Prevent SIM Swapping  Add a “number porting” PIN to your cellular service provider account  Be super attentive to emails and texts from your cellular service provider  Use authenticator apps whenever possible  Never share codes for two-factor authentication with anyone CAUTION: If you share your confidential information with a scammer, banks may not reimburse you.
    • 30. Man in the Middle Attack Step 1: Scammer tricks you into thinking you’re on a bank site: bankofamer1ca.com (replace i with 1). Scammer can see what you enter on this site. Step 2: You enter your username and password. Scammer enters your credentials on the REAL BofA site Step 3: BofA texts you a one time code or you enter code from your authenticator app. You enter the code on the fake BofA web page Scammer now has your one time code. Step 4: Scammer enters your code and gets into your account. SOLUTION: Make sure you’re on the right website.
    • 31. Avoiding Man in the Middle Attack RULE: Make sure you’re on the real website. Don’t click on a link in an email or text. Go to your bookmarked link or type it in yourself.
    • 32. Protecting Accounts and Devices
    • 33. Protect Your Phone Face ID unlock has inherent weaknesses  Can be faked with AI  Phone can quickly be held up to your face and unlocked Is your phone unlocked when within range of your watch?  Phone can stay unlocked within range of your watch  Recommend: Use a fingerprint, PIN or pattern (rather than facial recognition) to unlock your phone Public WiFi / Hotspots  Using a public WiFi or hotspot allows attackers to sneak malicious software (malware) into your device, display infected ads or using a phishing form to steal passwords.  Recommend: If using a public WiFi network, use VPN from a reputed vendor to protect your phone from malicious software. Or use mobile data.  Some cellular service providers automatically use VPN when using WiFi or hotspots
    • 34. Protect Credit Card & Financial Accounts  Setup text/email alerts for your credit cards  Same with your bank, investment accounts  Bank ATMs are more secure than retail ATMs  Be careful of devices with skimmers  Inspect device before using your card  Cards with EMV chips are harder to clone  Use a chip reader or tap rather than swiping  Promptly notify your credit card company of any unrecognized charges  If concerned about card security, LOCK your card  Set up PINs for IRS and FTB accounts to prevent scammers filing for a refund on your accounts
    • 35. Credit Freeze – Prevent Others from Opening an Account in Your Name Credit Freezes are free! [Locks are not free but freezes are effective] • Limits access to your credit to those you currently have accounts with • Prevents anyone from opening an account in your name • Unfreeze temporarily to open a new account
    • 36. Credit Security Freeze – How To https://www.equifax.com/personal/credit-report-services/credit-freeze/ https://www.transunion.com/credit-freeze https://www.experian.com/freeze/center.html  FREEZES are FREE. Locks are not. A freeze is all you need.  A freeze can be permanent (recommended), or temporary.  You can temporarily LIFT a freeze if/when you apply for an account  Lift can be scheduled to last for 1-30 days  Freeze automatically reinstated after the temporary lift
    • 37. Interactive Questions QUIZ
    • 38. Question: Safe Links Scenario: You receive an email from your bank. Which link is safer to click?  Option A: "Click here to verify your account details: www.bank-secure-login.com”  Option B: "Visit our website and log in to your account: http://www.bankofamerica.com" Answer: Neither. The link text can be misleading and obscure a fraudulent link. Use a bookmark you’ve previously saved, or type in the official bank URL into the browser.
    • 39. Question: Strong Password Scenario: Which of the following is a stronger password?  Option A: "Password123”  Option B: "T3x!7K$z#9Qw”  Option C: "workHard79" Answer: B B is longer and includes upper/lower case letters, numbers and special characters.
    • 40. Question: Phishing Email Scenario: You receive an email claiming you've won a prize. What should you do?  Option A: Click the link in the email to claim your prize.  Option B: Verify the sender's email address and contact the company directly through their official website.  Option C: Check if the company is legitimate before you go to their website or enter personal information. Answer: Most such emails are scams. But if you really must follow through, Option C is best. Do not click any links or download attachments.
    • 41. Question: Public Wi-Fi Safety Scenario: You're at a coffee shop and need to check your bank account. What's the safest way to do this?  Option A: Use the coffee shop's free Wi-Fi to log in to your bank account.  Option B: Use your mobile data or a VPN (Virtual Private Network) to access your bank account. Answer: B Public Wi-Fi networks are often insecure and can expose your personal information to hackers. Using mobile data or a VPN ensures a more secure connection to your bank account.
    • 42. Question: Software Updates Scenario: You receive a notification that there is a software update available for your device. What should you do?  Option A: Continue using your device.  Option B: Install the update as soon as possible to ensure your device is secure. Answer: B Software updates often include important security patches that protect your device from vulnerabilities and enhance overall performance.
    • 43. Question: Social Media Privacy Scenario: You want to share a vacation photo on social media. What is the best practice?  Option A: Share the photo publicly.  Option B: Share the photo with a select group of friends using privacy settings. Answer: B Consider posting photos after your trip to avoid revealing your current location and travel schedule. You can enjoy sharing your vacation memories while maintaining your privacy and security.
    • 44. Question: Two-Factor Authentication (2FA) Scenario: Which of the following provides better security for your online accounts?  Option A: Password only.  Option B: Password and a verification code sent to your phone.  Option C: Password and a code from an authenticator app.  Option D: Password, a code and a hardware key. Answer: D This option combines multiple layers of security, including something you know (the password), something you have (the code), and something you possess (the hardware key).
    • 45. Question: Suspicious Attachments Scenario: You receive an email with an attachment from an unknown sender. What should you do?  Option A: Open the attachment to see what it is.  Option B: Delete the email or mark it as spam without opening the attachment. Answer: B Attachments from unknown senders can contain malware or viruses. It’s safest to delete the email or mark it as spam to protect your device and personal information.
    • 46. Question: Password Management Scenario: How should you manage your passwords for different accounts?  Option A: Use one password for all accounts to make it easier to remember.  Option B: Use a password manager to generate and store unique passwords for each account.  Option C: Use a variation of a “root” password slightly modified for different accounts. Answer: B Using a password manager ensures that each of your accounts has a strong, unique password, reducing the risk of security breaches. It also simplifies the process of managing multiple passwords, as you only need to remember one master password for the password manager.
    • 47. Question: Safe Browsing Scenario: You come across a website offering a free download of a popular software program. What should you check before downloading?  Option A: Download the software to take advantage of the offer.  Option B: Verify the legitimacy of the website and check for reviews or official sources before downloading. Answer: B Look for official or well-known sources like the software's official website or reputable download sites. (Game software is particularly risky.)
    • 48. Recommendations and Additional Resources
    • 49. Recommendations  Never re-use passwords.  Use a password manager  Use Multi-Factor Authentication and/or a hardware key to secure key accounts • Authenticator app is safer than one-time PIN  NEVER share a one-time PIN with anyone else  Protect against SIM Swapping  Add a “number transfer PIN” or other credential to your cellular service provider account  Set up and monitor alerts from your bank, credit card company, cell provider, brokerage  Avoid clicking on links in emails/texts  Protect your phone: robust screen lock  “Don’t call me, I’ll call you” – phone numbers can be hacked  Place a credit freeze with all three credit reporting agencies  Be wary of acting in haste in response to an unverified call or text
    • 50. More Good Practices
    • 51. 51 IF YOU ARE A VICTIM
    • 52.  If you believe you are a victim of a Cybercrime, you should take the following steps:  Gather information  Report the incident  Change passwords  Contact your financial institution(s)  Report the incident to your local police: Santa Clara County Sheriff  FTC at reportfraud.ftc.gov  Call the AARP Fraud Watch Network Helpline 877-908-3360  Spread the word about fraud 52 IF YOU ARE A VICTIM
    • 53. Additional Articles  The Day I Put $50,000 in a Shoe Box and Handed It to a Stranger  https://www.thecut.com/article/amazon-scam-call-ftc-arrest-warrants.html  My phone, my credit card, my hacker, and me  https://www.businessinsider.com/credit-card-phone-theft-sim-swap-identity-theft-investigation-2023-4  A former White House scientist was scammed out of $655,000. Then came the IRS.  https://www.washingtonpost.com/dc-md-va/2023/12/14/cyber-crime-scams-irs-taxes/  Finance worker pays out $25 million after video call with deepfake ‘chief financial officer’  https://www.cnn.com/2024/02/04/asia/deepfake-cfo-scam-hong-kong-intl-hnk/index.html  ‘I had fun’: Alleged scammer takes credit for Graceland foreclosure upheaval  https://www.latimes.com/entertainment-arts/story/2024-05-29/nigerian-scammer-graceland-sale#  Fake Obama created using AI video tool - BBC News  https://www.youtube.com/watch?v=AmUC4m6w1wo
    • 54. THANK YOU
    • 55. 55 QUESTIONS?


    • Previous
    • Next
    • f Fullscreen
    • esc Exit Fullscreen