Phishing relies on a 1-2 combination of online trickery to get users to submit sensitive information (such as usernames, passwords, credit cards, or financial information). Phishing uses email or instant messaging to direct users to fake sites that mimic legitimate sites.
Saturday, May 29, 2010
Will the real Slim Shady please stand up?
Phishing relies on a 1-2 combination of online trickery to get users to submit sensitive information (such as usernames, passwords, credit cards, or financial information). Phishing uses email or instant messaging to direct users to fake sites that mimic legitimate sites.
Does she wear a moustache?
Lost in 60 seconds!

Anything you post - text, video, audio, photo - is at immediate risk. Why? Because the moment it's online, it is out of your control. It can be forwarded, altered, stored, or archived, all without your knowledge or permission.
Making matters worse, this often occurs outside the legal jurisdiction of the USA.
Who said you could come along?

Even the most legitimate websites can have malicious software injected without the website owner's knowledge, leaving unsuspecting surfers prey to unwanted executables downloaded along with their intended file.
While people can reasonably expect game, video, and file-sharing sites to piggyback unwanted software to their computers, they do not anticipate silently downloading malicious software while visiting Google. Yet, malicious code has been injected into Google's website - and has transferred to users' computers - without their knowledge on at least two occasions this year.
Playing Russian Roulette at McDonald's!
There are two types of wireless networks: (1)Public networks, such as at Barnes and Noble, Panera, Starbucks, airports, or McDonald's, and (2)private networks, including the peer-to-peer, gamer and server networks found in many homes.The dangers of public wireless networks are not well recognized. One patron surfing on his own notebook at a corner table may, in fact, be taking advantage of another patron's computer, in spite of secured passwords, through packet sniffing. Equally at risk are home wireless networks, whose signals may reach out to the curb or to an unknown neighbor on a street behind.
Friday, May 28, 2010
A supplemental PowerPoint presentation of additional information, including statistics, definitions, and recommendations, can be downloaded at http://www.mediafire.com/?mywyol3h52y. The PowerPoint slides follow the blog's Bullet Point order and can be integrated into the presentation.
Subscribe to:
Posts (Atom)