CSCD 303 Essential Computer Security Fall 2017

Size: px
Start display at page:

Download "CSCD 303 Essential Computer Security Fall 2017"

Transcription

1 CSCD 303 Essential Computer Security Fall 2017 Lecture 11a - Social Engineering1 Phishing Reading: Chapter 6

2 Overview Social Engineering Defined Humans as vulnerabilities Phishing What is it? What does it accomplish How to recognize it? Solutions to Phishing

3 Social Engineering Social Engineering Manipulating or tricking people into divulging private information as opposed to using technical hacking techniques Or, getting them to use unauthorized devices to compromise themselves Using people as vulnerabilities into systems

4 Test Case of Human Vulnerabilities June 2011, Bloomberg published the results of a test conducted by the U.S. Depart. of Homeland Security To assess the government s vulnerability to unauthorized system access, DHS dropped disks and USB drives in parking lots of government agencies and private contractors What do you think happened?

5 Test Case of Human Vulnerabilities Results 60 % of workers who found devices plugged them into their office computers When device was imprinted with an official logo, number of installations on office machines skyrocketed to 90 %

6 The Individual User Users Represent the largest installed base Completely lack standards Cannot be controlled centrally (or otherwise) Are only predictable in their unpredictability Cannot be redesigned Are all of us!!!

7 What Exactly is Phishing? Define Phishing

8 Phishing Scams Defined Phishing is a type of deception designed to steal your personal data, such as credit card numbers, passwords, account data, or other information Con artists might send millions of fraudulent messages that appear to come from Web sites you trust Like your bank or credit card company, and request that you provide personal information.

9 More Phishing Definitions Spear Phishing a phishing scam that targets a specific audience Example: Kansas Statue University and is sent to K-State addresses Scareware - Tries to trick you into responding by using shock, anxiety or threats Reply with your password now or we ll shut down your account tomorrow

10 Spear-Phishing: Improved Target Selection Socially aware attacks Mine social relationships from public data Phishing appears to arrive from someone known Use spoofed identity of trusted organization to gain trust Urge victims to update or validate their account Threaten to terminate the account if the victims not reply Use gift or bonus as a bait Context-aware attacks Your bid on ebay has won! The books on your Amazon wish list are on sale!

11 Phishing Becoming more Sophisticed Targeting Your Organization Spear-phishing targets specific groups or individuals Type 1 Uses info about your organization General Patton is retiring next week, click here to say whether you can attend his retirement party

12 Phishing Targeting Your Organization Around 40% of people in experiments at CMU would fall for s like this (control condition)

13 Phishing Increasing in Sophistication Targeting You Specifically Type 2 Uses info specifically about you Social Phishing Might use information from social networking sites, corporate directories, or publicly available data Ex. Fake from friends or co-workers Ex. Fake videos of you and your friends

14 Phishing Increasing in Sophistication Targeting You Specifically Here s a video I took of your poster presentation.

15 Another Example:

16 But wait WHOIS : Location: Korea, Republic Of Even bigger problem: I don t have an account with US Bank!

17 Spear Phishing Example KSU.edu 17

18 Spear Phishing Example KSU.edu 18

19 Scareware Example 19

20 Scareware Example 20

21 Another Scareware Example 21

22 Another Scareware Example 22

23 Spear phishing scam received by K-Staters, January 2010 If you clicked on the link 23

24 Malicious link in scam took you to an exact replica of K-State s single sign-on web page, hosted on a server in the Netherlands, that steals ID and password if they enter it and click Sign in Clicking on Sign in then took user to K-State s home page Note the URL flushandfloose.nl, which is obviously not k-state.edu 24

25 Fake SSO web page site not secure (http, not https) and hosted in the Netherlands (.nl) Real SSO web page note https 25

26 Fake SSO web page Real SSO web page Use the eid verification badge to validate 26

27 Result of clicking on eid verification badge on the fake SSO web site, or any site that is not authorized to use the eid and password 27

28 Result of clicking on eid verification badge on a legitimate K-State web site that is authorized to use the eid and password for authentication 28

29 Real K-State Federal Credit Unionweb site Fake K-State Federal Credit Union web site used in spear phishing scam 29

30 History of Phishing Phreaking + Fishing = Phishing Phreaking = making phone calls for free back in 70 s Fishing = Use bait to lure the target Phishing in 1995 Target: AOL users Purpose: getting account passwords for free time Threat level: low Techniques: Similar names ( for ), social engineering Phishing in 2001 Target: Ebayers and major banks Purpose: Getting credit card numbers, accounts Threat level: medium Techniques: Same in 1995, keylogger Phishing in 2007 Target: Paypal, banks, ebay Purpose: bank accounts Threat level: high Techniques: browser vulnerabilities, link obfuscation

31 A bad day phishin, beats a good day workin Anti-phishing Working Group ishing.org/ 2,000,000 s are sent 5% get to the end user 100,000 (APWG) 5% click on the phishing link 5,000 (APWG) 2% enter data into the phishing site 100 (Gartner) $1,200 from each person who enters data (FTC) Potential reward: $120,000 In 2005, David Levi made over $360,000 from 160 people using an ebay Phishing scam

32 How Bad Is Phishing? Consumer Perspective Estimated ~0.5% of Internet users per year fall for phishing attacks Conservative $1B+ direct losses a year to consumers Bank accounts, credit card fraud Doesn t include time wasted on recovery of funds, restoring computers, emotional uncertainty Growth rate of phishing 30k+ reported unique s / month 45k+ reported unique sites / month Social networking sites now major targets

33 How Bad Is Phishing? Perspective of Corporations Direct damage Loss of sensitive customer data Loss of intellectual property

34 Why Do People Fall for Phishing? Phishing has been around for years How come people still fall for it?

35 Research on Phishing Carnegie Mellon University Interviewed 40 Internet users including 35 non-experts Conducted Mental models interviews Mental models included role play and open ended questions in 2006 Reference: J Downs, M. Holbrook, and L. Cranor Decision Strategies and Susceptibility to Phishing. In Proc. of the 2006 Symposium On Usable Privacy and Security

36 Research on Phishing Carnegie Mellon University Only 50% knew the meaning of the term Phishing 85% were aware of the lock icon Only 40% knew it was supposed to be there Only 35% had noticed the https and knew what it means Only 55% noticed an unexpected or strange URL Only 55% reported being cautious when asked for sensitive financial info Few reported being suspicious of being asked for passwords was in 2006 Do you think there would be the same stats today?

37 Research on Phishing Carnegie Mellon University Naïve Evaluation Strategies Most strategies didn't help people in identifying phishing This appears to be for me It's normal to hear from companies you do business with Reputable companies will send s Knowledge of some scams didn't help identify other scams

38 Determining Fraud and Protection Measures

39 Today's Solutions Not so Successful Anti-phishing filters that rely on blacklists and whitelists Usually not up to date and there are many false positives Training Websites and posters help some Spam Filters Don't tend to catch phishing, s look legitimate

40 More Successful Solutions Two Research Based Filters, CMU Pilfer Cantina Pilfer Looks at other features than text Number of domains linked to Links in to other than the main domain Cantina Uses Content based approach Creates a fingerprint of a web page Sends fingerprint to search engine Sees if web page is in search results If yes, then legitimate

41 Detecting Phishing Web Sites Industry uses blacklists to label phishing sites But blacklists slow to new attacks Idea: Use search engines Scammers often directly copy web pages But fake pages should have low PageRank on search engines Generate text-based fingerprint of web page keywords and send to a search engine Y. Zhang, S. Egelman, L. Cranor, and J. Hong Phinding Phish: Evaluating AntiPhishing Tools. In NDSS Y. Zhang, J. Hong, and L. Cranor. CANTINA: A content-based approach to detecting phishing web sites. In WWW G. Xiang and J. Hong. A Hybrid Phish Detection Approach by Identity Discovery and Keywords Retrieval. In WWW 2009.

42 Human Training Following slides provide common advice for identifying phishing or fraudulent s...

43 Human Training How To Tell If An Message is Fraudulent Look at few phrases to look for if you think an message is phishing scam "Verify your account" Businesses should not ask you to send passwords, login names, Social Security numbers, or other personal information through If you receive an from anyone asking you to update your credit card information, do not respond: This is a phishing scam "If you don't respond within 48 hours, your account will be closed."these messages convey a sense of urgency so that you'll respond immediately without thinking

44 Human Training How To Tell If An Message is Fraudulent "Dear Valued Customer." Phishing messages are usually sent out in bulk and often do not contain your first or last name "Click the link below to gain access to your account." HTML-formatted messages can contain links or forms that you can fill out just as you'd fill out a form on a Web site The links that you are urged to click may contain all or part of a real company's name and are usually "masked," meaning that the link you see does not take you to that address but somewhere different, usually a phony Web site. Resting mouse pointer on link reveals the real Web address String of cryptic numbers looks nothing like the company's Web address, which is a suspicious sign.

45 Human Training How To Tell If An Message is Fraudulent Con artists also use Uniform Resource Locators (URLs) that resemble the name of a well-known company but are slightly altered by adding, omitting, or transposing letters. For example, the URL " could appear instead as:

46 Human Training How To Tell If An Message is Fraudulent Never respond to an asking for personal information Always check the site to see if it is secure. Call the phone number if necessary Never click on the link on the . Retype the address in a new window Keep your browser updated Keep antivirus definitions updated Use a firewall P.S: Always shred your home documents before discarding them.

47 Human Training Anti-Phishing Games Ok, traditional training doesn't work but.. People like to play games Teach using a game Results have shown that More people willing to play game than read People are better at identifying phishing after playing the game Best known is Anti-phishing Phil from CMU

48 Anti-Phishing Phil A micro-game to teach people not to fall for phish PhishGuru about , this game about web browser Also based on learning science principles You will get to Try the game! S. Sheng et al. Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People Not to Fall for Phish. In SOUPS 2007, Pittsburgh, PA, 2007.

49 Anti-Phishing Phil

50

51

52 Evaluation of PhishGuru Is embedded training effective? Study 1: Lab study, 30 participants Study 2: Lab study, 42 participants Study 3: Field trial at company, ~300 participants Study 4: Field trial at CMU, ~500 participants Studies showed significant decrease in falling for phish and ability to retain what they learned P. Kumaraguru et al. Protecting People from Phishing: The Design and Evaluation of an Embedded Training System. CHI P. Kumaraguru et al. Getting Users to Pay Attention to Anti-Phishing Education: Evaluation of Retention and Transfer. ecrime 2007.

53 Anti-Phishing Phil: Study Novices showed most improvement in false negatives (calling phish legitimate)

54 Anti-Phishing Phil: Study 2 Improvement all around for false positives

55 Summary Wikipedia has a nice page on phishing Phishing continues to plague Internet Seriously affects consumers, businesses, governments Criminals getting more sophisticated End-users can be trained, but only if done right PhishGuru embedded training uses simulated phishing Anti-Phishing Phil and Anti-Phishing Phyllis micro-games Phishing at HoaxSlayer Nice set of fishing examples with explanations Can try PhishGuru, Phil, and Phyllis at:

56 The End New Assignment is up!!!

57

58

59 Social Engineering Social Engineering Manipulating or tricking people into divulging private information as opposed to using technical hacking techniques Or, getting them to use unauthorized devices to compromise themselves Using people as vulnerabilities into systems 3

60 Test Case of Human Vulnerabilities June 2011, Bloomberg published the results of a test conducted by the U.S. Depart. of Homeland Security To assess the government s vulnerability to unauthorized system access, DHS dropped disks and USB drives in parking lots of government agencies and private contractors What do you think happened? 4

61 Test Case of Human Vulnerabilities Results 60 % of workers who found devices plugged them into their office computers When device was imprinted with an official logo, number of installations on office machines skyrocketed to 90 % cybersecurity-humans.htm

62 The Individual User Users Represent the largest installed base Completely lack standards Cannot be controlled centrally (or otherwise) Are only predictable in their unpredictability Cannot be redesigned Are all of us!!! 6

63 What Exactly is Phishing? Define Phishing 7

64 Phishing Scams Defined Phishing is a type of deception designed to steal your personal data, such as credit card numbers, passwords, account data, or other information Con artists might send millions of fraudulent messages that appear to come from Web sites you trust Like your bank or credit card company, and request that you provide personal information. 8 8

65 More Phishing Definitions Spear Phishing a phishing scam that targets a specific audience Example: Kansas Statue University and is sent to K-State addresses Scareware - Tries to trick you into responding by using shock, anxiety or threats Reply with your password now or we ll shut down your account tomorrow 9

66 Spear-Phishing: Improved Target Selection Socially aware attacks Mine social relationships from public data Phishing appears to arrive from someone known Use spoofed identity of trusted organization to gain trust Urge victims to update or validate their account Threaten to terminate the account if the victims not reply Use gift or bonus as a bait Context-aware attacks Your bid on ebay has won! The books on your Amazon wish list are on sale! 10 10

67 Phishing Becoming more Sophisticed Targeting Your Organization Spear-phishing targets specific groups or individuals Type 1 Uses info about your organization General Patton is retiring next week, click here to say whether you can attend his retirement party 11

68 Phishing Targeting Your Organization Around 40% of people in experiments at CMU would fall for s like this (control condition) 12

69 Phishing Increasing in Sophistication Targeting You Specifically Type 2 Uses info specifically about you Social Phishing Might use information from social networking sites, corporate directories, or publicly available data Ex. Fake from friends or co-workers Ex. Fake videos of you and your friends 13

70 Phishing Increasing in Sophistication Targeting You Specifically Click to add an outline Here s a video I took of your poster presentation. 14

71 Another Example: 15 15

72 But wait WHOIS : Location: Korea, Republic Of Even bigger problem: I don t have an account with US Bank! 16 Images from Anti-Phishing Working Group s Phishing Archive 16

73 Spear Phishing Example KSU.edu

74 Spear Phishing Example KSU.edu

75 Scareware Example 19 19

76 Scareware Example 20 20

77 Another Scareware Example 21 21

78 Another Scareware Example 22 22

79 Spear phishing scam received by K-Staters, January 2010 If you clicked on the link 23 23

80 Malicious link in scam took you to an exact replica of K-State s single sign-on web page, hosted on a server in the Netherlands, that steals ID and password if they enter it and click Sign in Clicking on Sign in then took user to K-State s home page Note the URL flushandfloose.nl, which is obviously not k-state.edu 24 24

81 Fake SSO web page site not secure (http, not https) and hosted in the Netherlands (.nl) Real SSO web page note https 25 25

82 Fake SSO web page Real SSO web page Use the eid verification badge to validate 26 26

83 Result of clicking on eid verification badge on the fake SSO web site, or any site that is not authorized to use the eid and password

84 Result of clicking on eid verification badge on a legitimate K-State web site that is authorized to use the eid and password for authentication

85 Real K-State Federal Credit Unionweb site Fake K-State Federal Credit Union web site used in spear phishing scam 29 29

86 History of Phishing Phreaking + Fishing = Phishing Phreaking = making phone calls for free back in 70 s Fishing = Use bait to lure the target Phishing in 1995 Target: AOL users Purpose: getting account passwords for free time Threat level: low Techniques: Similar names ( for ), social engineering Phishing in 2001 Target: Ebayers and major banks Purpose: Getting credit card numbers, accounts Threat level: medium Techniques: Same in 1995, keylogger Phishing in 2007 Target: Paypal, banks, ebay Purpose: bank accounts Threat level: high Techniques: browser vulnerabilities, link obfuscation 30 30

87 A bad day phishin, beats a good day workin Anti-phishing Working Group ishing.org/ 2,000,000 s are sent 5% get to the end user 100,000 (APWG) 5% click on the phishing link 5,000 (APWG) 2% enter data into the phishing site 100 (Gartner) $1,200 from each person who enters data (FTC) Potential reward: $120,000 In 2005, David Levi made over $360,000 from 160 people using an ebay Phishing scam 31 31

88 How Bad Is Phishing? Consumer Perspective Estimated ~0.5% of Internet users per year fall for phishing attacks Conservative $1B+ direct losses a year to consumers Bank accounts, credit card fraud Doesn t include time wasted on recovery of funds, restoring computers, emotional uncertainty Growth rate of phishing 30k+ reported unique s / month 45k+ reported unique sites / month Social networking sites now major targets billion

89 How Bad Is Phishing? Perspective of Corporations Direct damage Loss of sensitive customer data Loss of intellectual property billion

90 Why Do People Fall for Phishing? Phishing has been around for years How come people still fall for it? 34

91 Research on Phishing Carnegie Mellon University Interviewed 40 Internet users including 35 non-experts Conducted Mental models interviews Mental models included role play and open ended questions in 2006 Reference: J Downs, M. Holbrook, and L. Cranor Decision Strategies and Susceptibility to Phishing. In Proc. of the 2006 Symposium On Usable Privacy and Security 35

92 Research on Phishing Carnegie Mellon University Only 50% knew the meaning of the term Phishing 85% were aware of the lock icon Only 40% knew it was supposed to be there Only 35% had noticed the https and knew what it means Only 55% noticed an unexpected or strange URL Only 55% reported being cautious when asked for sensitive financial info Few reported being suspicious of being asked for passwords was in 2006 Do you think there would be the same stats today? 36

93 Research on Phishing Carnegie Mellon University Naïve Evaluation Strategies Most strategies didn't help people in identifying phishing This appears to be for me It's normal to hear from companies you do business with Reputable companies will send s Knowledge of some scams didn't help identify other scams 37

94 Determining Fraud and Protection Measures 38

95 Today's Solutions Not so Successful Anti-phishing filters that rely on blacklists and whitelists Usually not up to date and there are many false positives Training Websites and posters help some Spam Filters Don't tend to catch phishing, s look legitimate 39

96 More Successful Solutions Two Research Based Filters, CMU Pilfer Cantina Pilfer Looks at other features than text Number of domains linked to Links in to other than the main domain Cantina Uses Content based approach Creates a fingerprint of a web page Sends fingerprint to search engine Sees if web page is in search results 40 If yes, then legitimate

97 Detecting Phishing Web Sites Industry uses blacklists to label phishing sites But blacklists slow to new attacks Idea: Use search engines Scammers often directly copy web pages But fake pages should have low PageRank on search engines Generate text-based fingerprint of web page keywords and send to a search engine Y. Zhang, S. Egelman, L. Cranor, and J. Hong Phinding Phish: Evaluating AntiPhishing Tools. In NDSS Y. Zhang, J. Hong, and L. Cranor. CANTINA: A content-based approach to detecting phishing web sites. In WWW G. Xiang and J. Hong. A Hybrid Phish Detection Approach by 41 Identity Discovery and Keywords Retrieval. In WWW 2009.

98 Human Training Following slides provide common advice for identifying phishing or fraudulent s... 42

99 Human Training How To Tell If An Message is Fraudulent Look at few phrases to look for if you think an message is phishing scam "Verify your account" Businesses should not ask you to send passwords, login names, Social Security numbers, or other personal information through If you receive an from anyone asking you to update your credit card information, do not respond: This is a phishing scam "If you don't respond within 48 hours, your account will be closed."these messages convey a sense of urgency so that you'll respond immediately without thinking 43 43

100 Human Training How To Tell If An Message is Fraudulent "Dear Valued Customer." Phishing messages are usually sent out in bulk and often do not contain your first or last name "Click the link below to gain access to your account." HTML-formatted messages can contain links or forms that you can fill out just as you'd fill out a form on a Web site The links that you are urged to click may contain all or part of a real company's name and are usually "masked," meaning that the link you see does not take you to that address but somewhere different, usually a phony Web site. Resting mouse pointer on link reveals the real Web address String of cryptic numbers looks nothing like the company's Web address, which is a suspicious sign

101 Human Training How To Tell If An Message is Fraudulent Con artists also use Uniform Resource Locators (URLs) that resemble the name of a well-known company but are slightly altered by adding, omitting, or transposing letters. For example, the URL " could appear instead as:

102 Human Training How To Tell If An Message is Fraudulent Never respond to an asking for personal information Always check the site to see if it is secure. Call the phone number if necessary Never click on the link on the . Retype the address in a new window Keep your browser updated Keep antivirus definitions updated Use a firewall P.S: Always shred your home documents before discarding them

103 Human Training Anti-Phishing Games Ok, traditional training doesn't work but.. People like to play games Teach using a game Results have shown that More people willing to play game than read People are better at identifying phishing after playing the game Best known is Anti-phishing Phil from CMU 47

104 Anti-Phishing Phil A micro-game to teach people not to fall for phish PhishGuru about , this game about web browser Also based on learning science principles You will get to Try the game! S. Sheng et al. Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People Not to Fall for Phish. In SOUPS 2007, Pittsburgh, PA, S. Sheng, B. Magnien, P. Kumaraguru, A. Acquisti, L. Cranor, J. Hong, and E. Nunge. Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People Not to Fall for Phish. In Proceedings of the 2007 Symposium On Usable Privacy and Security, Pittsburgh, PA, July 18-20, 2007.

105 Anti-Phishing Phil Click to add an outline 49

106 Click to add title 50

107 51

108 Evaluation of PhishGuru Is embedded training effective? Study 1: Lab study, 30 participants Study 2: Lab study, 42 participants Study 3: Field trial at company, ~300 participants Study 4: Field trial at CMU, ~500 participants Studies showed significant decrease in falling for phish and ability to retain what they learned P. Kumaraguru et al. Protecting People from Phishing: The Design and Evaluation of an Embedded Training System. CHI P. Kumaraguru et al. Getting Users to Pay Attention to Anti-Phishing Education: Evaluation of Retention and Transfer. ecrime P. Kumaraguru et al. Protecting People from Phishing: The Design and Evaluation of an Embedded Training System. CHI P. Kumaraguru et al. Getting Users to Pay Attention to Anti-Phishing Education: Evaluation of Retention and Transfer. ecrime 2007.

109 Anti-Phishing Phil: Study Novices showed most improvement in false negatives (calling phish legitimate) 53

110 Anti-Phishing Phil: Study 2 54 Improvement all around for false positives

111 Summary Wikipedia has a nice page on phishing Phishing continues to plague Internet Seriously affects consumers, businesses, governments Criminals getting more sophisticated End-users can be trained, but only if done right PhishGuru embedded training uses simulated phishing Anti-Phishing Phil and Anti-Phishing Phyllis micro-games Phishing at HoaxSlayer Nice set of fishing examples with explanations Can try PhishGuru, Phil, and Phyllis at: 55

112

CSCD 303 Essential Computer Security Fall 2018

CSCD 303 Essential Computer Security Fall 2018 CSCD 303 Essential Computer Security Fall 2018 Lecture 7 - Social Engineering1 - Phishing Reading: Chapter 6 Overview Social Engineering Defined Humans as vulnerabilities Phishing What is it? What does

More information

Webomania Solutions Pvt. Ltd. 2017

Webomania Solutions Pvt. Ltd. 2017 The other name for link manipulation is Phishing or you can say link manipulation is type of phishing attack done generally to mislead the user to a replica website or a looka-like of some well-known site.

More information

24 User education and phishing

24 User education and phishing 24 User education and phishing Lujo Bauer, Nicolas Christin, and Abby Marsh Engineering & Public Policy April 11, 2016 05-436 / 05-836 / 08-534 / 08-734 Usable Privacy and Security 1 2 ebay: Urgent Notification

More information

Combating Phishing Attacks: A Never Ending Arms Race?

Combating Phishing Attacks: A Never Ending Arms Race? ECom-ICom Experts Address Hong Kong University May 27, 2008 Combating Phishing Attacks: A Never Ending Arms Race? Norman Sadeh School of Computer Science Carnegie Mellon University Work conducted in collaboration

More information

CE Advanced Network Security Phishing I

CE Advanced Network Security Phishing I CE 817 - Advanced Network Security Phishing I Lecture 15 Mehdi Kharrazi Department of Computer Engineering Sharif University of Technology Acknowledgments: Some of the slides are fully or partially obtained

More information

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Quick recap on  ing  Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page Workshop #7 Email Security Previous workshops 1. Introduction 2. Smart phones & Tablets 3. All about WatsApp 4. More on WatsApp 5. Surfing the Internet 6. Emailing Quick recap on Emailing Email Security

More information

Phishing. What do phishing s do?

Phishing. What do phishing  s do? Phishing We have become all too familiar with phishing emails but if that s the case, why do we as a community still fall victim? In this newsletter our goal is to provide you with some basic information

More information

But it Was Such a Little Phish February 2016 Webinar

But it Was Such a Little Phish February 2016 Webinar But it Was Such a Little Phish February 2016 Webinar Firestorm Insights February 2016 1000 Holcomb Woods Parkway Suite 130 Roswell, GA 30076 770-643-1114 Fax: 1-800-418-9088 www.firestorm.com Page Intentionally

More information

FAQ. Usually appear to be sent from official address

FAQ. Usually appear to be sent from official  address FAQ 1. What is Phishing Email? A form of fraud by which an attacker masquerades as a reputable entity in order to obtain your personal information. Usually appear to be sent from official email address

More information

Usable Security: Phishing

Usable Security: Phishing Usable Security: Phishing Dr. Kirstie Hawkey Content from: - Teaching Usable Privacy and Security: A guide for instructors (http:// cups.cs.cmu.edu/course-guide/) - some slides/content from Dr. Lorrie

More information

Your security on click Jobs

Your security on click Jobs Your security on click Jobs At Click Jobs is a trading name of Raspberry Recruitment Limited, we're committed to helping you find the right job in a safe and secure environment. On these pages, you can

More information

IT Security Protecting Ourselves From Phishing Attempts. Ray Copeland Chief Information Officer (CIO)

IT Security Protecting Ourselves From Phishing Attempts. Ray Copeland Chief Information Officer (CIO) IT Security Protecting Ourselves From Phishing Attempts Ray Copeland Chief Information Officer (CIO) Phishing Defined The fraudulent practice of sending emails claiming to be from reputable people or companies

More information

How to recognize phishing s

How to recognize phishing  s Phishing email messages, websites, and phone calls are designed to steal money, steal data and/or destroy information. Cybercriminals can do this by installing malicious software on your computer or stealing

More information

How Cyber-Criminals Steal and Profit from your Data

How Cyber-Criminals Steal and Profit from your Data How Cyber-Criminals Steal and Profit from your Data Presented by: Nick Podhradsky, SVP Operations SBS CyberSecurity www.sbscyber.com Consulting Network Security IT Audit Education 1 Agenda Why cybersecurity

More information

ELECTRONIC BANKING & ONLINE AUTHENTICATION

ELECTRONIC BANKING & ONLINE AUTHENTICATION ELECTRONIC BANKING & ONLINE AUTHENTICATION How Internet fraudsters are trying to trick you What you can do to stop them How multi-factor authentication and other new techniques can help HELPING YOU STAY

More information

Evolution of Spear Phishing. White Paper

Evolution of Spear Phishing. White Paper Evolution of Spear Phishing White Paper Executive Summary Phishing is a well-known security threat, but few people understand the difference between phishing and spear phishing. Spear phishing is the latest

More information

How to Build a Culture of Security

How to Build a Culture of Security How to Build a Culture of Security March 2016 Table of Contents You are the target... 3 Social Engineering & Phishing and Spear-Phishing... 4 Browsing the Internet & Social Networking... 5 Bringing Your

More information

Phishing: Don t Phall Phor It Part 1

Phishing: Don t Phall Phor It Part 1 Phishing: Don t Phall Phor It Part 1 Software Training Services Welcome to Part 1 of the online course: Phishing: Don t Fall for it! 1 Objectives Definition of Phishing State of Phishing Today Recognizing

More information

Why was an extra step of choosing a Security Image added to the sign-in process?

Why was an extra step of choosing a Security Image added to the sign-in process? General Information Why was an extra step of choosing a Security Image added to the sign-in process? Criminals can create websites that look very similar to legitimate business websites. We want to take

More information

Online Security and Safety Protect Your Computer - and Yourself!

Online Security and Safety Protect Your Computer - and Yourself! Online Security and Safety Protect Your Computer - and Yourself! www.scscu.com Fraud comes in many shapes and sizes, but the outcome is simple: the loss of both money and time. That s why protecting your

More information

Phishing: When is the Enemy

Phishing: When  is the Enemy Phishing: When E-mail is the Enemy Phishing, once only a consumer worry, is creating headaches for e-mail administrators as businesses become the next target. CONTENTS Understanding the Enemy 2 Three Things

More information

Dissecting Phishing Scams

Dissecting Phishing Scams Dissecting Phishing Scams IT Security Training April 13, 2011 Harvard Townsend Chief Information Security Officer harv@ksu.edu Agenda Definitions with examples What s the big deal? The numbers Phishing

More information

Who We Are! Natalie Timpone

Who We Are! Natalie Timpone Who We Are! Natalie Timpone Manager of Security Business Management Office Enterprise Security Awareness Manager Carmelo Walsh Security, Risk, and Compliance Security Awareness Subject Matter Expert Who

More information

Manually Create Phishing Page For Facebook 2014

Manually Create Phishing Page For Facebook 2014 Manually Create Phishing Page For Facebook 2014 While you are creating phishing page manually you have to do a lot of work Web Templates -- For importing premade template for Gmail, Facebook from SET.

More information

Spam Protection Guide

Spam  Protection Guide Spam Email Protection Guide Version 1.0 Last Modified 5/29/2014 by Mike Copening Contents Overview of Spam at RTS... 1 Types of Spam... 1 Spam Tricks... 2 Imitation of 3 rd Party Email Template... 2 Spoofed

More information

Frequently Asked Questions (FAQ)

Frequently Asked Questions (FAQ) Your personal information and account security is important to us. This product employs a Secure Sign On process that includes layers of protection at time of product log in to mitigate risk, and thwart

More information

Personal Cybersecurity

Personal Cybersecurity Personal Cybersecurity The Basic Principles Jeremiah School, CEO How big is the issue? 9 8 7 6 5 4 3 2 1 Estimated global damages in 2018 0 2016 2018 2020 2022 2024 2026 2028 2030 Internet Users Billions

More information

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it? LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams

More information

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts A Guide to Protecting Your Identity and Accounts As part of SunTrust s commitment to protecting your accounts and identity, we ve created the Online Fraud & Identity Theft Guide, which provides information

More information

Best Practices Guide to Electronic Banking

Best Practices Guide to Electronic Banking Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have

More information

COMMON WAYS IDENTITY THEFT CAN HAPPEN:

COMMON WAYS IDENTITY THEFT CAN HAPPEN: COMMON WAYS IDENTITY THEFT CAN HAPPEN: OLD FASHIONED STEALING / DUMPSTER DIVING Thieves typically steal wallets and purses. They also steal mail such as credit card and bank statements, pre-approved credit

More information

Webroot Phishing Threat Trends

Webroot Phishing Threat Trends December 2016 Webroot Phishing Threat Trends An update to the 2016 Threat Brief Introduction Who would ever fall for that? That s what many people think when they see a phishing attempt, since less advanced

More information

Phishing Activity Trends Report March, 2005

Phishing Activity Trends Report March, 2005 Phishing Activity Trends Report March, 2005 Phishing is a form of online identity theft that uses spoofed emails designed to lure recipients to fraudulent websites which attempt to trick them into divulging

More information

Basic and Web Security

Basic  and Web Security Basic Email and Web Security September, 2015 Daniel Hegglin Security Officer dhegglin@yahoo.com Agenda The Internet is a bad neighborhood. How did I get here? Why people are so easily tricked Characteristics

More information

Ages Donʼt Fall for Fake: Activity 1 Don t bite that phishing hook! Goals for children. Letʼs talk

Ages Donʼt Fall for Fake: Activity 1 Don t bite that phishing hook! Goals for children. Letʼs talk Ages 11-14 Donʼt Fall for : Activity 1 Don t bite that phishing hook! Children play a game where they study various emails and texts and try to decide which messages are legit and which are phishing scams.

More information

Phishing Activity Trends Report October, 2004

Phishing Activity Trends Report October, 2004 Phishing Activity Trends Report October, 2004 Phishing is a form of online identity theft that uses spoofed emails designed to lure recipients to fraudulent websites which attempt to trick them into divulging

More information

Phishing Activity Trends Report January, 2005

Phishing Activity Trends Report January, 2005 Phishing Activity Trends Report January, 2005 Phishing is a form of online identity theft that uses spoofed emails designed to lure recipients to fraudulent web sites which attempt to trick them into divulging

More information

How Enterprise Tackles Phishing. Nelson Yuen Technology Manager, Cybersecurity Microsoft Hong Kong

How Enterprise Tackles Phishing. Nelson Yuen Technology Manager, Cybersecurity Microsoft Hong Kong How Enterprise Tackles Phishing Nelson Yuen Technology Manager, Cybersecurity Microsoft Hong Kong Hackers turning to easy marks - Social engineering Phishing was the #1 threat vector (> 50%) for Office

More information

KnowBe4 is the world s largest integrated platform for awareness training combined with simulated phishing attacks.

KnowBe4 is the world s largest integrated platform for awareness training combined with simulated phishing attacks. KnowBe4 is the world s largest integrated platform for awareness training combined with simulated phishing attacks. About Us The world s most popular integrated Security Awareness Training and Simulated

More information

Financial scams. What to look for and how to avoid them.

Financial scams. What to look for and how to avoid them. Financial scams What to look for and how to avoid them. Keep your money secure We take the security and wellbeing of our customers very seriously. So we ve created this guide to highlight the most common

More information

DoD Spear-Phishing Awareness Training. Joint Task Force - Global Network Operations

DoD Spear-Phishing Awareness Training. Joint Task Force - Global Network Operations //FOUO DoD Spear-Phishing Awareness Training Joint Task Force - Global Network Operations Updated: 16 NOV 2006 //FOUO Objective Inform and increase the awareness of all Department of Defense personnel

More information

PROTECTING YOUR BUSINESS ASSETS

PROTECTING YOUR BUSINESS ASSETS PROTECTING YOUR BUSINESS ASSETS How to Spot Danger Before Your Computer Gets Infected, Your Site Hosts Malware, and Your Credit Card Number Gets Stolen A MyNAMS Presentation by Regina Smola @2012 Regina

More information

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services Managing IT Risk: What Now and What to Look For Presented By Tina Bode IT Assurance Services Agenda 1 2 WHAT TOP TEN IT SECURITY RISKS YOU CAN DO 3 QUESTIONS 2 IT S ALL CONNECTED Introduction All of our

More information

Phishing Attacks. Mendel Rosenblum. CS142 Lecture Notes - Phishing Attack

Phishing Attacks. Mendel Rosenblum. CS142 Lecture Notes - Phishing Attack Phishing Attacks Mendel Rosenblum Phishing Basic idea: Get unsuspecting users to visit an evil Web site Convince them that the evil Web site is actually a legitimate site (such as a bank or PayPal) Trick

More information

Newcomer Finances Toolkit. Fraud. Worksheets

Newcomer Finances Toolkit. Fraud. Worksheets Newcomer Finances Toolkit Fraud Worksheets Ottawa Community Loan Fund Fonds d emprunt Communautaire d Ottawa 22 O Meara St., Causeway Work Centre, Ottawa, ON K1Y 4N6 Tel: 613-594-3535 Fax: 613-594-8118

More information

TIPS TO AVOID PHISHING SCAMS

TIPS TO AVOID PHISHING SCAMS TIPS TO AVOID PHISHING SCAMS WHAT IS PHISHING? Phishing is the use of fraudulent email, websites, text messages and phone calls to trick people into disclosing personal financial or identity information,

More information

Safety and Security. April 2015

Safety and Security. April 2015 Safety and Security April 2015 Protecting your smartphone and your data 2 Set a passcode on your smartphone For some smartphone models: 1. Go to Settings. 2. Tap ID & Passcode. 3. Set a 4-digit passcode.

More information

Cyber Security Guide for NHSmail

Cyber Security Guide for NHSmail Cyber Security Guide for NHSmail Version 3.0 February 2017 Copyright 2017Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created by statute,

More information

Identity Theft, Fraud & You. PrePare. Protect. Prevent.

Identity Theft, Fraud & You. PrePare. Protect. Prevent. PrePare. Protect. Prevent. Identity Theft, Fraud & You Fraud and identity theft incidents claimed fewer victims in 2010 than in previous years. But don t get too comfortable. Average out-of-pocket consumer

More information

Phishing Read Behind The Lines

Phishing Read Behind The Lines Phishing Read Behind The Lines Veljko Pejović veljko@cs.ucsb.edu What is Phishing? "Phishing attacks use both social engineering and technical subterfuge to steal consumers' personal identity data and

More information

A Review Paper on Network Security Attacks and Defences

A Review Paper on Network Security Attacks and Defences EUROPEAN ACADEMIC RESEARCH Vol. IV, Issue 12/ March 2017 ISSN 2286-4822 www.euacademic.org Impact Factor: 3.4546 (UIF) DRJI Value: 5.9 (B+) A Review Paper on Network Security Attacks and ALLYSA ASHLEY

More information

Objectives. Disclaimer: Phishing: Don t Phall Phor It Part 1. Software Training Services

Objectives. Disclaimer: Phishing: Don t Phall Phor It Part 1. Software Training Services Phishing: Don t Phall Phor It Part 1 Software Training Services Objectives Definition of Phishing State of Phishing Today Recognizing Phishing/Phishing Tricks Examples Best Practices What to do if you

More information

SSAC Public Meeting Paris. 24 June 2008

SSAC Public Meeting Paris. 24 June 2008 SSAC Public Meeting Paris 1 in Phishing Attacks 2 What is? A phishing attack The attacker impersonates a registrar The phish emails are sent to The registrar's customers (bulk) A particular, targeted customer

More information

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN?

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN? WHAT IS CORPORATE ACCOUNT TAKEOVER? Corporate Account Takeover (also referred to as CATO) is a type of fraud where criminals gain access to a business financial accounts to make unauthorized transactions.

More information

Security & Phishing

Security & Phishing Email Security & Phishing Best Practices In Cybersecurity Presenters Bill Shieh Guest Speaker Staff Engineer Information Security Ellie Mae Supervisory Special Agent Cyber Crime FBI 2 What Is Phishing?

More information

South Central Power Stop Scams

South Central Power Stop Scams Don t get tricked. People around the country have been receiving emails and phone calls from scammers. South Central Power wants to help you keep your money and prevent scams. Review the helpful tips below.

More information

Bank of america report phishing

Bank of america report phishing Search Search pages & people Search Search Search pages & people Search Bank of america report phishing email We recently discovered a new phishing scam from a Bank of America spam email some reports that

More information

CLICK TO EDIT MASTER TITLE STYLE Fraud Overview and Mitigation Strategies

CLICK TO EDIT MASTER TITLE STYLE Fraud Overview and Mitigation Strategies Fraud Overview and Mitigation Strategies SUNTRUST TEAM: DOUG HICKMAN SENIOR VICE PRESIDENT FOUNDATIONS AND ENDOWMENTS SPECIALTY PRACTICE JAMES BERNAL ASSISTANT VICE PRESIDENT FOUNDATIONS AND ENDOWMENTS

More information

Introduction to

Introduction to Introduction to Email gcflearnfree.org/print/email101/introduction-to-email Introduction Do you ever feel like the only person who doesn't use email? You don't have to feel left out. If you're just getting

More information

Anti-Phishing Working Group

Anti-Phishing Working Group Phishing Attack Trends Report April, 2004 Phishing attacks use spoofed e-mails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account

More information

Phishing: What is it?

Phishing: What is it? Objec&ves Define phishing and iden&fy various types of phishing scams Recognize common bai&ng tac&cs used in phishing scams Examine real phishing messages Understand how to protect yourself from being

More information

Federal Deposit Insurance Corporation. National Credit Union Administration. Office of the Comptroller of the Currency. Office of Thrift Supervision

Federal Deposit Insurance Corporation. National Credit Union Administration. Office of the Comptroller of the Currency. Office of Thrift Supervision YOU HAVE THE POWER TO STOP IDENTITY THEFT A message from the federal bank, credit union and thrift regulatory agencies Board of Governors of the Federal Reserve System Federal Deposit Insurance Corporation

More information

FAQ: Privacy, Security, and Data Protection at Libraries

FAQ: Privacy, Security, and Data Protection at Libraries FAQ: Privacy, Security, and Data Protection at Libraries This FAQ was developed out of workshops and meetings connected to the Digital Privacy and Data Literacy Project (DPDL) and Brooklyn Public Library

More information

INTERNET SAFETY IS IMPORTANT

INTERNET SAFETY IS IMPORTANT INTERNET SAFETY IS IMPORTANT Internet safety is not just the ability to avoid dangerous websites, scams, or hacking. It s the idea that knowledge of how the internet works is just as important as being

More information

Security Awareness. Chapter 2 Personal Security

Security Awareness. Chapter 2 Personal Security Security Awareness Chapter 2 Personal Security Objectives After completing this chapter, you should be able to do the following: Define what makes a weak password Describe the attacks against passwords

More information

Phishing Activity Trends

Phishing Activity Trends Phishing Activity Trends Report for the Month of September, 2007 Summarization of September Report Findings The total number of unique phishing reports submitted to APWG in September 2007 was 38,514, an

More information

Cyber Security Guide. For Politicians and Political Parties

Cyber Security Guide. For Politicians and Political Parties Cyber Security Guide For Politicians and Political Parties Indian Election Integrity Initiative Design by ccm.design Cover Image by Paul Dufour Helping to Safeguard the Integrity of the Electoral Process

More information

2017 Annual Meeting of Members and Board of Directors Meeting

2017 Annual Meeting of Members and Board of Directors Meeting 2017 Annual Meeting of Members and Board of Directors Meeting Dan Domagala; "Cybersecurity: An 8-Point Checklist for Protecting Your Assets" Join this interactive discussion about cybersecurity trends,

More information

Chapter 6 Network and Internet Security and Privacy

Chapter 6 Network and Internet Security and Privacy Chapter 6 Network and Internet Security and Privacy Learning Objectives LO6.1: Explain network and Internet security concerns LO6.2: Identify online threats LO6.3: Describe cyberstalking and other personal

More information

WEB OF DECEIT. Why are seniors targeted?

WEB OF DECEIT. Why are seniors targeted? A challenge for senior citizens who embrace the computer age is knowing how to avoid online fraud. Although people of all ages are at risk, statistics show that when it comes to online safety, seniors

More information

Frauds & Scams. Why is the Internet so attractive to scam artists? 2006 Internet Fraud Trends. Fake Checks. Nigerian Scam

Frauds & Scams. Why is the Internet so attractive to scam artists? 2006 Internet Fraud Trends. Fake Checks. Nigerian Scam Frauds & Scams Why is the Internet so attractive to scam artists? Anonymity Low cost Rapid growth Easy to adapt Be Cyber Savvy with C-SAFE 118 2006 Internet Fraud Trends Average Loss Online Auctions 34%

More information

3.5 SECURITY. How can you reduce the risk of getting a virus?

3.5 SECURITY. How can you reduce the risk of getting a virus? 3.5 SECURITY 3.5.4 MALWARE WHAT IS MALWARE? Malware, short for malicious software, is any software used to disrupt the computer s operation, gather sensitive information without your knowledge, or gain

More information

BRING SPEAR PHISHING PROTECTION TO THE MASSES

BRING SPEAR PHISHING PROTECTION TO THE MASSES E-Guide BRING SPEAR PHISHING PROTECTION TO THE MASSES SearchSecurity phishing. I n this expert tip, David Sherry describes how a combination of technical controls and user awareness training can help put

More information

Cybersecurity For The Small Business & Home User ( Geared toward Windows, but relevant to Apple )

Cybersecurity For The Small Business & Home User ( Geared toward Windows, but relevant to Apple ) Cybersecurity For The Small Business & Home User ( Geared toward Windows, but relevant to Apple ) Topics: Antivirus / DSSO/ Email Computer Backups Security On The Go Mobile Safety Your first line of defense

More information

Designing a Software that Detect and Block Phishing Attacks

Designing a Software that Detect and Block Phishing Attacks Designing a Software that Detect and Block Phishing Attacks 1 Priyanka R. Raut, 2 Samiksha Bharne Abstract Phishing is a significant security threat to the Internet, which causes tremendous economic lost

More information

Custom Plugin A Solution to Phishing and Pharming Attacks

Custom Plugin A Solution to Phishing and Pharming Attacks Custom Plugin A Solution to Phishing and Pharming Attacks Omer Mahmood School of Information Technology Charles Darwin University Darwin, NT, Australia Abstract - This paper proposes a new method to detect,

More information

To learn more about Stickley on Security visit You can contact Jim Stickley at

To learn more about Stickley on Security visit   You can contact Jim Stickley at Thanks for attending this session on March 15th. To learn more about Stickley on Security visit www.stickleyonsecurity.com You can contact Jim Stickley at jim@stickleyonsecurity.com Have a great day! Fraud

More information

Review Ch. 3 Connecting to the World s Information. 2010, 2006 South-Western, Cengage Learning

Review Ch. 3 Connecting to the World s Information. 2010, 2006 South-Western, Cengage Learning Review Ch. 3 Connecting to the World s Information 2010, 2006 South-Western, Cengage Learning Networks Two linked computers is a network A network of computers located within a short distance is called

More information

Introduction. Logging in. WebMail User Guide

Introduction. Logging in. WebMail User Guide Introduction modusmail s WebMail allows you to access and manage your email, quarantine contents and your mailbox settings through the Internet. This user guide will walk you through each of the tasks

More information

Guide to credit card security

Guide to credit card security Contents Click on a title below to jump straight to that section. What is credit card fraud? Types of credit card fraud Current scams Keeping your card and card details safe Banking and shopping securely

More information

CAREERBUILDER.COM - PRIVACY POLICY

CAREERBUILDER.COM - PRIVACY POLICY Effective Date: September 15, 2010 CareerBuilder, LLC and its subsidiaries and divisions (collectively, CareerBuilder, We or Our ) has drafted its Privacy Policy to ensure that you can use CareerBuilder

More information

Cyber Hygiene Guide. Politicians and Political Parties

Cyber Hygiene Guide. Politicians and Political Parties Cyber Hygiene Guide Politicians and Political Parties Canadian Election Integrity Initiative Design by ccm.design Cover Image by Songquan Deng Helping to Safeguard the Integrity of the Electoral Process

More information

The Cyber War on Small Business

The Cyber War on Small Business The Cyber War on Small Business Dillon Behr Executive Lines Broker Risk Placement Services, Inc. Meet Our Speaker Dillon Behr Executive Lines Broker Risk Placement Services, Inc. Previously worked as Cyber

More information

KASPERSKY FRAUD PREVENTION FOR ENDPOINTS

KASPERSKY FRAUD PREVENTION FOR ENDPOINTS KASPERSKY FRAUD PREVENTION FOR ENDPOINTS www.kaspersky.com KASPERSKY FRAUD PREVENTION 1. Ways of Attacking Online Banking The prime motive behind cybercrime is making money and today s sophisticated criminal

More information

Introduction. Logging in. WebQuarantine User Guide

Introduction. Logging in. WebQuarantine User Guide Introduction modusgate s WebQuarantine is a web application that allows you to access and manage your email quarantine. This user guide walks you through the tasks of managing your emails using the WebQuarantine

More information

Employee Security Awareness Training

Employee Security Awareness Training Employee Security Awareness Training September 2016 Purpose Employees have access to sensitive data through the work they perform for York. Examples of sensitive data include social security numbers, medical

More information

Security Awareness. Presented by OSU Institute of Technology

Security Awareness. Presented by OSU Institute of Technology Security Awareness Presented by OSU Institute of Technology Information Technologies Division Security Awareness Topics Social Engineering Phishing Social Networks Displaying Sensitive Information Wireless

More information

IMPORTANT SECURITY INFORMATION PHISHING

IMPORTANT SECURITY INFORMATION PHISHING IMPORTANT SECURITY INFORMATION PHISHING Protect Yourself and Your Accounts Important Security Information At Century Savings Bank, security and privacy of your financial information is a top priority.

More information

Provide you with a quick introduction to web application security Increase you awareness and knowledge of security in general Show you that any

Provide you with a quick introduction to web application security Increase you awareness and knowledge of security in general Show you that any OWASP Top 10 Provide you with a quick introduction to web application security Increase you awareness and knowledge of security in general Show you that any tester can (and should) do security testing

More information

Target Breach Overview

Target Breach Overview Target Breach Overview Q: Media reports are stating that Target experienced a data breach. Can you provide more specifics? A: Yes, Target has confirmed that it experienced unauthorized access to its systems

More information

A STUDY OF TWO-FACTOR AUTHENTICATION AGAINST ON-LINE IDENTITY THEFT

A STUDY OF TWO-FACTOR AUTHENTICATION AGAINST ON-LINE IDENTITY THEFT A STUDY OF TWO-FACTOR AUTHENTICATION AGAINST ON-LINE IDENTITY THEFT Seungjae Shin, Mississippi State University, 1000 HWY 19N Meridian MS 39307, sshin@meridian.msstate.edu, (601)484-0160 Jerry Cunningham,

More information

Create strong passwords

Create strong passwords Create strong passwords Passwords are the first line of defense against break-ins to your online accounts and computer, tablet, or phone. Poorly chosen passwords can render your information vulnerable

More information

Getting over Ransomware - Plan your Strategy for more Advanced Threats

Getting over Ransomware - Plan your Strategy for more Advanced Threats Getting over Ransomware - Plan your Strategy for more Advanced Threats Kaspersky Lab Hong Kong Eric Kwok General Manager Lapcom Ltd. BEYOND ANTI-VIRUS: TRUE CYBERSECURITY FROM KASPERSKY LAB 20 years ago

More information

Train employees to avoid inadvertent cyber security breaches

Train employees to avoid inadvertent cyber security breaches Train employees to avoid inadvertent cyber security breaches TRAIN EMPLOYEES TO AVOID INADVERTENT CYBER SECURITY BREACHES PAGE 2 How much do you know about cyber security? Small business owners often lack

More information

Security Awareness & Best Practices Best Practices for Maintaining Data Security in Your Business Environment

Security Awareness & Best Practices Best Practices for Maintaining Data Security in Your Business Environment Security Awareness & Best Practices Best Practices for Maintaining Data Security in Your Business Environment Ray Colado, Information Security Analyst Raise awareness around information security to help

More information

Preventing and Identifying Phishing Scams January 31, 2017

Preventing and Identifying Phishing Scams January 31, 2017 Preventing and Identifying Phishing Scams January 31, 2017 Agenda What is phishing? Does this really happen? Getting Caught in Phishing Scam Is it covered by insurance? Preventing phishing scams Available

More information

Protecting your Security and Privacy on the Web. Tony Brett Head of IT Support Staff Services IT Services. 11 March 2013

Protecting your Security and Privacy on the Web. Tony Brett Head of IT Support Staff Services IT Services. 11 March 2013 Protecting your Security and Privacy on the Web Tony Brett Head of IT Support Staff Services IT Services 11 March 2013 Agenda Why bother? Common data leaks Email security Viruses & Trojans Phishing Why

More information

1 of 11 10/1/ :26 AM

1 of 11 10/1/ :26 AM 1 of 11 10/1/2010 12:26 AM About Us Careers Calculators Contact Us Search Home Your Money HQ ID Theft & Fraud FRAUD ALERT E-mail Scams ID Theft and Fraud Avoid Becoming a Victim What To Do If You Are a

More information

Phishing Activity Trends Report August, 2006

Phishing Activity Trends Report August, 2006 Phishing Activity Trends Report, 26 Phishing is a form of online identity theft that employs both social engineering and technical subterfuge to steal consumers' personal identity data and financial account

More information

Virtual Product Fair. Protect your agency data protect your business

Virtual Product Fair. Protect your agency data protect your business Virtual Product Fair Protect your agency data protect your business October 2011 2 Are you doing all that you can to protect your business? Agenda Background Fraudulent activities Sabre actions Steps you

More information