Devices Mobile phones Computer or tablet Gaming console Wireless technology Security Risks Hacking Smishing Viruses Vishing Spam Pharming Cookies Spyware Phishing and Key Logging Smishing Short for SMS phishing Use fake text messages Contains URL or phone number embedded in the text Has link or make a phone call Vishing Voice mail message Users thinks that they are talking to a legitimate company Pharming Description Security measures Malicious codeUse an anti- installed spyware that recognizes Redirects the malicious codes or user to a pharming codes Be alert and look website out for clues Spyware and Key Logging Description Security Measures A software that gathers Use anti-spyware data by monitoring key Be alert and look for presses then sends back clues that the keyboard to the hacker. activity in being Will access to all data monitored and install other spyware For passwords,use Can change user’s pointing device , touch default browser screen or drop-down menu Activity In an A4 paper, make a poster promoting e-safety You can show different ways on how to secure information Save as NamesAct3.3 (as JPG)