Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

You've Got Mail aka The Danger in Unwanted Messages

What can your mail hide from you and what can be hidden in it.
by

Lada Kadaníková

on 19 November 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of You've Got Mail aka The Danger in Unwanted Messages

You've got
mail

- to be aware about the possibilities & dangers

- to realize what to protect yourself & your sensitive information from

- not to be the fool
Thank
You for you
attention!
aka The Danger
of Unwanted Messages
Sender
Unknown

- mostly to harm &/or use recipient =>
protection:
automatic filters +
read closely/don't click/don't answer

- uses "spoofing"

- contacts bought, "harvested", gained from databases/forms

- spam, scam, phishing, pharming
SPAM

- unwanted messages
sent massively

- mostly advertising content

- huge amount (most of it filtered)

- different medias, different types
SCAM
- special kind of spam using user's
trust to
financially benefit at the expanse of receiver

- example: Letters from Nigeria,
Fake Loteries
SPAM
SCAM
PHISHING
PHARMING
PHISHING
- masking as known sources
(usually financial companies)
=> asking for sensitive data, if given => theft/ID fraud
PHARMING
- same goals as phishing but harder to detect & protect from

- creating scam website => masking as the official one => getting sensitive data

- automatic redirection to scam websites
Sender
Known

- more trustworthy

- once received => spread further

- isn't always dangerous

- chain mail, hoax
CHAIN MAILS
CHAIN MAILS
- widely known

- different purposes
(hoax, joke, gaining contacts)
You've got mail!
HOAX
How to fool users for fun
aka what's hoax
HOAX
=
untruthful
message created
to alarm or confuse
people

- wannabe trustworthy, possibly dangerous

- example: paying for Facebook, "stories from life"
SOURCES
KOVÁROVÁ, Pavla. KISK FF MU. Nevyžádané zprávy: Informační bezpečnost [prezentace]. Brno, 2012, 24 s., 2012-08-03 [cit. 2012-10-04]
BARRET, Daniel, J. Bandité na informační dálnici. Kateina Dufková. 1. vyd. Brno : Computer press, 1999. 235 s. ISBN 80-7226-167-3
BEDNÁR, Vojtech. Hrozba jménem Spim. PC World [online]. 2007 [cit. 2011-03-16]. Dostupný z WWW: <http://pcworld.cz/ostatni/hrozbajmenem-spim-5608>. ISSN 1210-1079
BEDNÁR, Vojtech. Pharming je zpet a silnejší. Lupa.cz: Server o českém internetu [online]. 2007-03-23 [cit. 2012-10-04]. ISSN 1213-0702. Dostupné z: http://www.lupa.cz/clanky/pharming-je-zpet-a-silnejsi/
Confidence trick. In: Wikipedia: the free encyclopedia [online]. San Francisco (CA): Wikimedia Foundation, 2001- [cit. 2012-10-04]. Dostupné z: http://en.wikipedia.org/wiki/Scam
CUNNINGHAM, Eleese, MARCASON, Wendy. Internet hoaxes : How to spot them and how to debunk them. Journal of the American
Dietetic Association. 2001, vol. 101, is. 4, s. 460
DOSEDEL, Tomáš. Počítačová bezpečnost a ochrana dat. Brno : Computer Press, 2004. 190 s. ISBN 80-251-0106-1
Email Spoofing. In: Wikipedia: the free encyclopedia [online]. San Francisco (CA): Wikimedia Foundation, 2001- [cit. 2012-10-04]. Dostupné z: http://en.wikipedia.org/wiki/Email_spoofing
SOURCES

How to save on AA Batteries. [online video]. [cit. 2012-10-04]. Dostupné z:
KERA, Denisa. Všichni lou všem, odhalte spiknutí. Computer. 2003, č. 15, s. 75. ISSN 1210-8790
‘Pharming’ scams. AUSTRALIAN COMPETION & CONSUMER COMMISSION. SCAMwatch Home [online]. 2012 [cit. 2012-10-04]. Dostupné z: http://www.scamwatch.gov.au/content/index.phtml/itemId/829456
Phishing a pharming. BEZPEČNÝ INTERNET.CZ. Bezpečný internet: Rady pro vaši bezpečnost na internetu [online]. [cit. 2012-10-04]. Dostupné z: http://www.bezpecnyinternet.cz/pokrocily/internetove-bankovnictvi/phishing-a-pharming.aspx
Spam (electronic). In: Wikipedia: the free encyclopedia [online]. San Francisco (CA): Wikimedia Foundation, 2001- [cit. 2012-10-04]. Dostupné z: http://en.wikipedia.org/wiki/Spam_(electronic)
PRIBYL, Tomáš. Sajrajt jménem Spam. PC World. 2008, č. 3, s. 54-55. ISSN 1210-1079
Full transcript