10.07.2015 Views

1E9Ct5D

1E9Ct5D

1E9Ct5D

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

are designed to steal money or gain access to information. 5Cybercriminals can do thisby installing malicious software on your computer or stealing personal information off ofyour computer. 6Cybercriminals also use social engineering to convince you to installmalicious software or hand over your personal information under false pretenses. 7They might email you, call you on the phone, or convince you to download somethingfrom a website. Some common phishing tricks include:• Spoofed email addresses or caller ID. Hackers can fake a “From” or“Reply” address as well as caller ID. For example, hackers used spoofedIntuit (TurboTax) email addresses (e.g., paypayl@security.intuit.com) to getaccount holders to enter log-in credentials. 8• Fake link. Scam emails often contain a hidden link to a site requestingaccount information: “An urgent file has been uploaded for you, click here.” 9• Fake website. Phony Web sites copy company logos and designs to looklegitimate. Hackers can use HTML, Flash or Java Script to mask or change abrowser address. 10• “Your computer is infected with a virus and I need to help you clean it.”5Microsoft Safety and Security Center, http://www.microsoft.com/security/online-privacy/phishingsymptoms.aspx(last visited Jan. 13, 2015).6 Id.7 Id.8 Intuit, http://security.intuit.com/security-alerts.php (last visited Jan. 13, 2015).9 Id.10 Id.March 6, 2015 5 © 3-6-2015 ALFA International Business Litigation P.G.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!