Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


Social Networking Scams

Social Networking Scams - Comp Lit project

Christopher Land

on 25 April 2010

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Social Networking Scams

Social Networking Scams What is a scam? Social networking scams are the cases where your information is stolen. This depends on the information you enter in websites to create profiles, mostly social networks. When creating an account on any website, you are at least asked to enter your e-mail adress. The e-mail adress can sometimes be enough to find out information about you. Types of scams include: Downloading Malware - Often it is enough to play a simple game on a social networking site. This so called "game" is actually just a trap door where you have officially become a member of a wonderful malware software. This means that during playing the "game" malware, or software that steels information from your computer, is downloaded and installed on your computer without you noticing. False identity - Hackers or criminals often enjoy being someone else. This means that they could go create a bank account, for example, under your name. They could also use a name that is non-existent. Sometimes the false identity is just there for some annonymous fun. But sometimes a false identity is just used to manipulate you. A social networking account could be created under your name and immediately, people that know you will think this is you and add you as a friend. Identity theft - This is a similar thing as false identity. In identity theft, though your complete identity can be used for your personal harm. Name, birthdate, car license plate, etc. can be used for any purpose that will be a great profit for a criminal but a great harm for you. Profile hacks - A username and password can be enough to log into your profile in a social networking site and changing your profile. This can sometimes be very harmful to your own image. Especially when, for example, the hacker has pictures of you drunk at a party and uploads them. Afterwards they could change the password and e-mail adress of your account and it will be theirs. Spam e-mails - Most e-mail providers have a trained spam filter. That means that any unwanted e-mails will automatically land in the spam folder and you will not get it to your eyes. Though, it happens often enough that a spam e-mail will land in your personal inbox. Of course, a spam filter is not perfect and things like this can happen. But opening the mail and then clicking on some link in the e-mail will give you everything else than what you have expected. This includes malware, spyware, trojans, etc. Results of Scams Scams can be very threatening to you. No matter if your profile is just hacked or your complete identity is literally stolen. It is extremely to take aware of the threats that lay in the Internet and on social networking sites. It is nothing "bad" to create a social networking site, you just have to be careful and be aware about every action taken. That is the best security system you can have, yourself. Christopher Land THE END
Full transcript