• Cell phone applications also known as "apps," are created by third party developers which is why have potential to be dangerous​​
  • Some malicious apps target personal identifying information and financial account information stored on your cellphone, particularly through mobile banking
  • Viruses and other types of malware can be hidden within the coding of an app and can hide unnoticed on the mobile device
  • If an infected cellphone were to be plugged into a computer, the virus or spyware can potentially "jump ship" and infect the computer
  • Install anti-virus software on cell phones and computers

Passphrases

  • Keep your PIN hidden!
    • Never give out your PIN to anyone, including retailers
    • Enter your PIN yourself, and protect your keystrokes from others that are able to see

  • Be aware of skimming
    • Skimming is the placement of a false card scanner over a real card slot on an ATM often accompanied by a hidden camera
      • The false card scanner copies the card information and transmits it wirelessly to a computer
      • The hidden camera is used to record your fingers as you enter your PIN
    • Skimmers can be used at gas pumps, restaurants, and any other establishment that uses an automated scanner to charge your cards

  • To prevent being a victim of skimming:
    • Be aware of suspicious looking devices covering card scanners. If in doubt, report it to the bank or financial institution responsible for the machine. Call the 800 number that can be found on the machine to report any suspected crime
      • You can also give the scanner a few tugs, if it feels loose or comes off, report it immediately
    • Carefully monitor your bank account!

anti-virus software

  • Use common sense regarding what you post
  • Once your post enters the online world, your personal control of the information disappears
  • DO NOT POST ANYTHING THAT IS QUESTIONABLE
  • Be careful of how much information you reveal, including photos

​cell phone apps:

  • Having an anti-virus software installed on your computer or mobile device is the best way to protect your devices from viruses and other types of malware

  • Make sure to get software that protects you from all types of malware such as: trojans, worms, adware, spyware and more

  • Research different anti-virus software to decide which is best for you

A passphrase is a whole phrase or sentence, that is altered with the use of capital letters,special characters, and numbers, replacing a typical password. Passphrases are used instead of passwords to increase security. It is not recommeneded to use the same passphrase for each account

  • The best passphrase chosen is easy for you to remember, but difficult for others to guess
  • Example of passphrases: "I L1k3 Coc@ Col@" or "C@lif0n1a is aw3s0m3"

​Social media: 

  • The simplest way to help protect your computer from hackers, unauthorized users or viruses, is the use of firewalls
  • Firewall is a piece of software or a dedicated device designed as a gate between your computer and the internet that is intended to block unauthorized interaction while allowing permitted access
    • Firewalls can greatly reduce the risk of viruses or malicious software from finding its way onto your hard drive
  • If your personal photos or other sensitive personal information end up in the wrong hands there can be serious consequences
  • Anyone can easily save photos, manipulate them, and use them against you.
  • Remember public posts is open  for the world to see, do not post anything that you aren't willing to share with the world. 

atm transactions

  • Use a password/passphrase to encrypt your wireless access point to protect your network

​           and computers connected to the network

  • Criminals practice "wardriving," which is when criminals roam neighborhoods and

         wirelessly connect to unsecured networks to conduct illegal operations and steal

         personal information from devices connected to the network

  • Wardriving allows the criminals to be anonymous while committing illegal acts
  • When criminals are conducting these illegal activities on your unsecured network, it

         appears to authorities that you are the criminal, which can result with an unwanted

         visit from law enforcement

firewalls 

Posting information online:

CATCH

​Computer and Technology Crime High-Tech Response Team

updating your system 

sexting

  • Criminals are constantly finding new ways to attack computers and invade people's privacy
  • Software companies counter new threats on computers by providing updated tools that can be used to protect your computer 
  • Enable your system's automatic updates to help keep your computer safe and up to date

Password/PASSPHRASE protected wireless networks

  • ​​​​​Sexting is sharing explicit messages and explicit images via cell phone or

         computer

  • If anyone asks you to send an explicit photo, Do Not Send It!​
  • Anything on the internet can be saved
  • Sex offenders and identity thieves have taken advantage of this upcoming

         trend by posing as young adults to acquire explicit photos of teenagers so

         they can use them for distribution or blackmail

  • One of the dangers of sexting, particularly to the youth, is that possession

         of sexually explicit photos of persons under the age of 18 may constitute

         a violation of possession of child pornography laws

  • Once the explicit image or message is sent, there is no control over where it will end up
  • If someone continues to request explicit images, you can report them to your local law enforcement agency
  • Contact your local law enforcement agency if your private pictures have been distributed without your permission