Beyond the Theoretical: A Deep Dive Into Phishing CUNA Technology Conference
|
|
- Regina Wilkins
- 6 years ago
- Views:
Transcription
1 Beyond the Theoretical: A Deep Dive Into Phishing 2016 CUNA Technology Conference
2 Agenda Introduction to SMTP service How attackers can spoof Review most popular types of phishing s Deliver ransomware Initiate fraudulent wire transfers Harvest credentials Tips to protect your users, members, and organization
3 Introduction to SMTP
4 SMTP Service Created in 1982 Was not designed with security Two main components relevant to spoofing s SMTP Envelope SMTP Letter (Message)
5 SMTP Service SMTP Envelope The behind the scenes communication between two systems Used to route and deliver MAIL FROM: Alice RCPT TO: Bob
6 SMTP Service SMTP Letter What the end user sees FROM field does NOT need to be the same as the Envelope MAIL FROM filed Also supports the Reply-To field FROM: Alice TO: Bob Reply-To: Prince Charles
7 SMTP Service Connected to relay.mail.cogentco.com ( ). MAIL FROM: 250 OK RCPT TO: 250 Accepted DATA 354 Enter message, ending with "." on a line by itself FROM: <bob@cuna.org> TO: <david.anderson@claconnect.com> Subject: Please send money $$$ Reply-To: <PrinceCharles@nigeria.com> SMTP Envelope SMTP Letter Please send me money. I'm totally legit. :). 250 OK id=1b0iuc-0005qr-6u
8 SMTP Service
9 SMTP Service
10 SMTP Service Sender Policy Framework (SPF) Allows organizations to publish authorized mail servers that are allowed to send Only evaluates SMTP Envelope MAIL FROM field Bypass by using a valid domain that does not have a SPF record contoso.com
11 Popular Phishing s
12 Goal of Phishing Please do something for me.k thx bye Visit a malicious website Download and open a malicious file Provide confidential information (Password, Account Number, etc.) Wire money out of the organization
13 Types of attacks Traditional Attack (Spamming) Attacker targets a large amount of users Spear Phishing A custom message is built for a specific target Whaling C-level executives or management is specifically targeted
14 Types of attacks Ransomware CryptoWall, CryptoLocker, etc. Encrypt all data, hold it ransom for $$ Data on local machine and on network Attackers are putting much more time and effort into these types of attacks over the last year Starting to target other operating systems, like Macs
15 Types of attacks
16 Types of attacks
17 Types of attacks Ransomware New variants are shown to be targeting specific organizations Some strains have custom ransomware web pages that are customized to their victim FBI has told victims to pay the ransom if they cannot recover from backups FBI stated they have started seeing instances where victim is NOT provided decryption key after paying
18 Types of attacks Delivery of Ransomware/Malware Exploit Kits E.g. Angler Exploit Kit
19 Types of attacks Delivery of Ransomware/Malware ZIP/RAR attachments Office Macros
20 Types of attacks Delivery of Ransomware/Malware HTML Application (HTA) Execute operating system commands through web page <script> a=new ActiveXObject("WScript.Shell"); a.run( calc.exe, 0);window.close(); </script>
21 Types of attacks Delivery of Ransomware/Malware Object Linking and Embedding (OLE) Embed malicious files into document
22 Types of attacks DEMO HTA Payload OLE Payload
23 Types of attacks Fraudulent Wire Transfers Attackers are spoofing executives/managers, trying to get people to wire money Targeting CU s and Business Members s typically do NOT contain links or malicious attachments Attackers are doing their homework Online reconnaissance Social media
24 Types of attacks Fraudulent Wire Transfers
25 Types of attacks Social Media Attackers are using LinkedIn to figure out names, titles/positions, s, etc. Attackers are using Facebook to see when executives are out-of-town They quickly figure out who has the power to move money
26 Types of attacks Fraudulent Wire Transfers
27 Types of attacks Fraudulent Wire Transfers
28 Types of attacks Credential Harvesting Attackers abuse credential theft to log into any external resource available Webmail VPN Applications You NEED to have two-factor authentication
29
30 Types of attacks Credential Harvesting Example: Outlook Web App Makes it very easy to gain sensitive information or attempt to gain unauthorized remote access by impersonating employees
31 Types of attacks Credential Harvesting Example: Outlook Web App Quick side note: OWA is vulnerable to brute force attacks Service discloses internal domain name Service discloses if a username is valid
32 Types of attacks Credential Harvesting
33 Types of attacks Credential Harvesting Example: Outlook Web App If Outlook Anywhere is enabled, we can hijack the employee s workstation remotely Malicious Outlook Rules
34
35 Types of attacks Tools Rulz.py(Silent Break Security) Ruler (Sensepost) Xrulez (MWRLabs)
36 Types of attacks Video Ruler Mail Rule Pwnage by Sense Post
37 Types of attacks DEMO Send me an Subject: PWNED
38 How to Protect Yourself
39 Protect Against Phishing Harden gateway (spam filter) Block potentially malicious file attachments (e.g. ZIP, RAR, HTA, JAR) Use whitelist approach only allow specific types Prevent your organization s domain from being spoofed Sender Policy Framework (SPF) Custom rule to evaluate Envelope AND Letter FROM field Flag s that originate from the Internet E.g. Modify subject line to say External
40 Protect Against Phishing Web Content Filter Block potentially malicious files (e.g. ZIP, RAR, HTA, JAR, etc.) Block uncategorized web sites Use SSL inspection
41 Protect Against Phishing Lock down Macros Use Group Policy to disable/restrict the use of Macros Train users on the dangers of enabling Macros Office 2016 supports disabling Macros in documents that originate from the Internet
42 Protect Against Phishing
43 Protect Against Phishing Monitor Outlook Rules PowerShell Get-InboxRule Disable-InboxRule If there is a rule that starts an applications, generate an alert and disable the rule
44 Protect Against Phishing Continue to Train Employees and Members Train employees how to spot odd wire requests Politely challenge the request and ask if it has been verified through proper channels (NOT ) Provide educational material and training to business members Provide sample policies/guidelines for organizations that don t have them Hold events for business members that discuss cyber security Explain simple controls to implement (limits, two-step/twofactor, etc.) Make sure request is not authorized via
45 Questions
46 Thank You! David Anderson Manager, Information Security Services David Anderson, OSCP, Manager Information Security Services Group
10 Ways Credit Unions Get PWNED
10 Ways Credit Unions Get PWNED NASCUS 2017 Investment advisory services are offered through CliftonLarsonAllen Wealth Advisors, LLC, an SEC-registered investment advisor. Intro I am going to share with
More informationEthical Hackers Perspective Things that Make a Hacker's Job Easy
WEALTH ADVISORY OUTSOURCING AUDIT, TAX, AND CONSULTING Investment advisory services are offered through CliftonLarsonAllen Wealth Advisors, LLC, an SEC-registered investment advisor Ethical Hackers Perspective
More informationRANSOMWARE PROTECTION. A Best Practices Approach to Securing Your Enterprise
RANSOMWARE PROTECTION A Best Practices Approach to Securing Your Enterprise TABLE OF CONTENTS Introduction...3 What is Ransomware?...4 Employee Education...5 Vulnerability Patch Management...6 System Backups...7
More informationIT Security Protecting Ourselves From Phishing Attempts. Ray Copeland Chief Information Officer (CIO)
IT Security Protecting Ourselves From Phishing Attempts Ray Copeland Chief Information Officer (CIO) Phishing Defined The fraudulent practice of sending emails claiming to be from reputable people or companies
More informationStop Ransomware In Its Tracks. Chris Chaves Channel Sales Engineer
Stop Ransomware In Its Tracks Chris Chaves Channel Sales Engineer Agenda Ransomware A Brief Introduction Why Are Ransomware Attacks so Successful? How Does a Ransomware Attack Happen? How to Stop Ransomware
More informationSectigo Security Solution
Sectigo Email Security Solution 2018 Sectigo. All rights reserved. Email hacking is a commonly used malicious tactic in our increasingly connected world. Business email compromise (BEC), or email account
More informationPersonal Cybersecurity
Personal Cybersecurity The Basic Principles Jeremiah School, CEO How big is the issue? 9 8 7 6 5 4 3 2 1 Estimated global damages in 2018 0 2016 2018 2020 2022 2024 2026 2028 2030 Internet Users Billions
More informationEvolution of Spear Phishing. White Paper
Evolution of Spear Phishing White Paper Executive Summary Phishing is a well-known security threat, but few people understand the difference between phishing and spear phishing. Spear phishing is the latest
More information2016 Tri-State CF Partnership Webinar Series. Cyber Crime Trends a State of the Union April 7, 2016
2016 Tri-State CF Partnership Webinar Series Cyber Crime Trends a State of the Union April 7, 2016 Presenter Mark Eich, Principal Information Security Services Group CliftonLarsonAllen 2014 CliftonLarsonAllen
More information2 User Guide. Contents
E-mail User Guide 2 E-mail User Guide Contents Logging in to your web mail... 3 Changing your password... 5 Editing your signature... 6 Adding an e-mail account to Outlook 2010/2013/2016... 7 Adding an
More informationPhishing Stories. Shaun Jones
Phishing Stories Shaun Jones Agenda What is Phishing? Phishing Story I Intranets are actually pretty useful Phishing Story II Why do I need two factor auth Phishing Story III Everybody gets shells! What
More informationBEST PRACTICES FOR PERSONAL Security
BEST PRACTICES FOR PERSONAL Email Security Sometimes it feels that the world of email and internet communication is fraught with dangers: malware, viruses, cyber attacks and so on. There are some simple
More informationCOSC 301 Network Management. Lecture 14: Electronic Mail
COSC 301 Network Management Lecture 14: Electronic Mail Zhiyi Huang Computer Science, University of Otago COSC301 Lecture 14: Electronic Mail 1 Today s Focus Electronic Mail -- How does it work? -- How
More informationSecurity & Phishing
Email Security & Phishing Best Practices In Cybersecurity Presenters Bill Shieh Guest Speaker Staff Engineer Information Security Ellie Mae Supervisory Special Agent Cyber Crime FBI 2 What Is Phishing?
More informationGetting over Ransomware - Plan your Strategy for more Advanced Threats
Getting over Ransomware - Plan your Strategy for more Advanced Threats Kaspersky Lab Hong Kong Eric Kwok General Manager Lapcom Ltd. BEYOND ANTI-VIRUS: TRUE CYBERSECURITY FROM KASPERSKY LAB 20 years ago
More informationOnline Threats. This include human using them!
Online Threats There are many dangers from using the web (and computer in general). One should watch out for malware, automated programs designed to cause harm to you, your data, and your system. You are
More informationCYBER SECURITY RESOURCE GUIDE. Cyber Fraud Overview. Best Practices and Resources. Quick Reference Guide for Employees. Cyber Security Checklist
CORPORATE & INSTITUTIONAL BANKING CYBER SECURITY RESOURCE GUIDE Cyber Fraud Overview Best Practices and Resources Quick Reference Guide for Employees Cyber Security Checklist 2 5 7 9 AWARENESS OF CYBER
More informationRestech. User Security AVOIDING LOSS GAINING CONFIDENCE IN THE FACE OF TODAY S THREATS
Restech User Security AVOIDING LOSS GAINING CONFIDENCE IN THE FACE OF TODAY S THREATS Your presenter: Vince Gremillion, CISSP 30+ years technical and customer service experience Founder/Co-Owner RESTECH
More informationSocial Engineering (SE)
Social Engineering (SE) BeerTalk Berlin, 17. Februar 2015 Walter Sprenger Compass Security Deutschland GmbH Tauentzienstr. 18 De-10789 Berlin Tel. +49 30 21 00 253-0 Fax +49 30 21 00 253-69 team@csnc.de
More informationAn Ounce of Prevention
REPORT An Ounce of Prevention A 12-month analysis of ransomware, email fraud and other healthcare threats and how you can stop them proofpoint.com 2 Table of Contents INTRODUCTION...3 Why this report is
More informationCompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management
CompTIA Security+ Lecture Six Threats and Vulnerabilities Vulnerability Management Copyright 2011 - VTC Malware Malicious code refers to software threats to network and systems, including viruses, Trojan
More informationPhishing. Eugene Davis UAH Information Security Club April 11, 2013
Phishing Eugene Davis UAH Information Security Club April 11, 2013 Overview A social engineering attack in which the attacker impersonates a trusted entity Attacker attempts to retrieve privileged information
More informationAbout The Presentation 11/3/2017. Hacker HiJinx-Human Ways to Steal Data. Who We Are? Ethical Hackers & Security Consultants
November 3, 2017 Hacker HiJinx-Human Ways to Steal Data Who We Are? Ethical Hackers & Security Consultants Respond To Incidents & Breaches Perform Digital Forensic Investigations Data Mine Internet Intelligence
More informationTrustwave SEG Cloud BEC Fraud Detection Basics
.trust Trustwave SEG Cloud BEC Fraud Detection Basics Table of Contents About This Document 1 1 Background 2 2 Configuring Trustwave SEG Cloud for BEC Fraud Detection 5 2.1 Enable the Block Business Email
More informationADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY
ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY OUTLINE Advanced Threat Landscape (genv) Why is endpoint protection essential? Types of attacks and how to prevent them
More information5. Execute the attack and obtain unauthorized access to the system.
Describe how a combination of preventive, detective, and corrective controls can be employed to provide reasonable assurance about information security. Before discussing the preventive, detective, and
More informationCS System Security Mid-Semester Review
CS 356 - System Security Mid-Semester Review Fall 2013 Mid-Term Exam Thursday, 9:30-10:45 you may bring one 8-1/2 x 11 sheet of paper with any notes you would like no cellphones, calculators This is to
More informationCisco Ransomware Defense The Ransomware Threat Is Real
Cisco Ransomware Defense The Ransomware Threat Is Real Seguridad Integrada Abril 2018 Ransomware B Malicious Software Encrypts Critical Data Demands Payment Permanent Data Loss Business Impacts Ramifications
More informationCross-site request forgery Cross-site scripting Man-in-the-browser Session hijacking Malware Man-in-the-middle DNS cache poisoning DNS spoofing DNS hijacking Dictionary attacks DDoS DDoS Eavesdropping
More informationPhishing. A simplified walkthrough on how phishing campaigns are often orchestrated, and possible defences. Copyright March 2018
Phishing A simplified walkthrough on how phishing campaigns are often orchestrated, and possible defences. Copyright March 2018 Netscylla Cyber Security Ltd GB 10571639 Address: Telecom House, 125-135
More informationSecurity and Privacy. Xin Liu Computer Science University of California, Davis. Introduction 1-1
Security and Privacy Xin Liu Computer Science University of California, Davis Introduction 1-1 What is network security? Confidentiality: only sender, intended receiver should understand message contents
More informationToo Little Too Late: Top Reasons Why You Got Hacked
TUESDAY MAY 23,2017 2:00-3:15 PM Too Little Too Late: Top Reasons Why You Got Hacked MODERATOR SPEAKERS John Gross Director of Financial Management, City of Long Beach, CA Chad Alvarado Supervisory Special
More informationAUTHENTICATION. Do You Know Who You're Dealing With? How Authentication Affects Prevention, Detection, and Response
AUTHENTICATION Do You Know Who You're Dealing With? How Authentication Affects Prevention, Detection, and Response Who we are Eric Scales Mandiant Director IR, Red Team, Strategic Services Scott Koller
More informationWebomania Solutions Pvt. Ltd. 2017
The other name for link manipulation is Phishing or you can say link manipulation is type of phishing attack done generally to mislead the user to a replica website or a looka-like of some well-known site.
More informationPhishing and Ransomware
Phishing and Ransomware Dave Phillips Information Technology Resources March 2, 2016 Phishing Phishing What it looks like How to identify What happens to your credentials Remember that ITR will NEVER,
More informationCyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)
Cyber Security Presenters: - Brian Everest, Chief Technology Officer, Starport Managed Services - Susan Pawelek, Accountant, Compliance and Registrant Regulation February 13, 2018 (webinar) February 15,
More informationRecognizing & Protecting Against Fraud
Fraud Mitigation and Cyber Strategies for Public Entities April 209 Recognizing & Protecting Against Fraud 2 Why is it Important to Remain Vigilant? Fraud does not discriminate it occurs everywhere, and
More informationCourse Outline (version 2)
Course Outline (version 2) Page. 1 CERTIFIED SECURE COMPUTER USER This course is aimed at end users in order to educate them about the main threats to their data s security. It also equips the students
More informationDHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1
Addressing the Evolving Cybersecurity Tom Tollerton, CISSP, CISA, PCI QSA Manager Cybersecurity Advisory Services DHG presenter Tom Tollerton, Manager DHG IT Advisory 704.367.7061 tom.tollerton@dhgllp.com
More informationElectronic Communication of Personal Health Information
Electronic Communication of Personal Health Information A presentation to the Porcupine Health Unit (Timmins, Ontario) May 11 th, 2017 Nicole Minutti, Health Policy Analyst Agenda 1. Protecting Privacy
More informationybersecurity for the Modern Era Three Steps to Stopping malware, Credential Phishing, Fraud and More
ybersecurity for the Modern Era Three Steps to Stopping malware, Credential Phishing, Email Fraud and More www.proofpoint.com EBOOK Cybersecurity in the modern era 2 ONLY AMATEURS ATTACK MACHINES. PROFESSIONALS
More informationPROTECTING YOUR BUSINESS ASSETS
PROTECTING YOUR BUSINESS ASSETS How to Spot Danger Before Your Computer Gets Infected, Your Site Hosts Malware, and Your Credit Card Number Gets Stolen A MyNAMS Presentation by Regina Smola @2012 Regina
More informationPhishing Read Behind The Lines
Phishing Read Behind The Lines Veljko Pejović veljko@cs.ucsb.edu What is Phishing? "Phishing attacks use both social engineering and technical subterfuge to steal consumers' personal identity data and
More informationDrone /12/2018. Threat Model. Description. Threats. Threat Source Risk Status Date Created
Drone - 2 04/12/2018 Threat Model Description Threats Threat Source Risk Status Date Created Mobile Phone: Sensitive Data Leakage Smart Devices Mobile Phone: Session Hijacking Smart Devices Mobile Phone:
More informationEndpoint Security - what-if analysis 1
Endpoint Security - what-if analysis 1 07/23/2017 Threat Model Threats Threat Source Risk Status Date Created File Manipulation File System Medium Accessing, Modifying or Executing Executable Files File
More informationwith Advanced Protection
with Advanced Email Protection OVERVIEW Today s sophisticated threats are changing. They re multiplying. They re morphing into new variants. And they re targeting people, not just technology. As organizations
More informationManaging IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services
Managing IT Risk: What Now and What to Look For Presented By Tina Bode IT Assurance Services Agenda 1 2 WHAT TOP TEN IT SECURITY RISKS YOU CAN DO 3 QUESTIONS 2 IT S ALL CONNECTED Introduction All of our
More informationRansomware A case study of the impact, recovery and remediation events
Ransomware A case study of the impact, recovery and remediation events Palindrome Technologies 100 Village Court Suite 102 Hazlet, NJ 07730 www.palindrometech.com Peter Thermos President & CTO Tel: (732)
More informationSecurity at the Digital Cocktail Party. Social Networking meets IAM
Security at the Digital Cocktail Party Social Networking meets IAM What I m going to talk about Social Networking and its benefits Social Networking is an Identity Management System But not always a very
More informationGovernance Ideas Exchange
www.pwc.com.au Anatomy of a Hack Governance Ideas Exchange Robert Di Pietro October 2018 Cyber Security Anatomy of a Hack Cyber Security Introduction Who are the bad guys? Profiling the victim Insights
More informationTABLE OF CONTENTS Introduction: IS A TOP THREAT VECTOR... 3 THE PROBLEM: ATTACKS ARE EVOLVING FASTER THAN DEFENSES...
The Guide TABLE OF CONTENTS Introduction: EMAIL IS A TOP THREAT VECTOR... 3 THE PROBLEM: ATTACKS ARE EVOLVING FASTER THAN EMAIL DEFENSES... 4 Today s Top Email Fraud Tactics...5 Advanced Malware...8 Outbound
More informationRemote social engineering techniques involving Microsoft Universal Naming Convention (UNC) function.
10 March 2016 Remote social engineering techniques involving Microsoft Universal Naming Convention (UNC) function. Presented by Neil Lines Who am I? Neil Lines - Pen Tester Involved in a range of security
More informationIntroduction to Information Security Dr. Rick Jerz
Introduction to Information Security Dr. Rick Jerz 1 Goals Explain the various types of threats to the security of information Discuss the different categorizations of security technologies and solutions
More informationDefense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation
Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client
More informationSOCIAL NETWORKING'S EFFECT ON BUSINESS SECURITY CONTROLS
SOCIAL NETWORKING'S EFFECT ON BUSINESS SECURITY CONTROLS Jon Hanny Director of Information Security and Assurance, Buckley Sandler LLP Gaurav Chikara Senior Security Engineer, Cooley LLP AGENDA Social
More informationCERTIFIED SECURE COMPUTER USER COURSE OUTLINE
CERTIFIED SECURE COMPUTER USER COURSE OUTLINE Page 1 TABLE OF CONTENT 1 COURSE DESCRIPTION... 3 2 MODULE-1: INTRODUCTION TO DATA SECURITY... 4 3 MODULE-2: SECURING OPERATING SYSTEMS... 6 4 MODULE-3: MALWARE
More informationHome Computer and Internet User Security
Home Computer and Internet User Security Lawrence R. Rogers Version 1.0.4 CERT Training and Education Networked Systems Survivability Software Engineering Institute Carnegie Mellon University Pittsburgh,
More informationThe Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It
The Credential Phishing Handbook Why It Still Works and 4 Steps to Prevent It Introduction Phishing is more than 20 years old, but still represents more than 90% of targeted attacks. The reason is simple:
More informationCensornet. CensorNet Unified Security Service (USS) FREEDOM. VISIBILITY. PROTECTION. Lars Gotlieb Regional Manager DACH
Censornet CensorNet Unified Security Service (USS) FREEDOM. VISIBILITY. PROTECTION. Lars Gotlieb Regional Manager DACH Censornet???? Former SMS passcode. One of the leading vendors in Multi factor authentifaction!
More informationECDL / ICDL IT Security. Syllabus Version 2.0
ECDL / ICDL IT Security Syllabus Version 2.0 Module Goals Purpose This document details the syllabus for the IT Security module. The syllabus describes, through learning outcomes, the knowledge and skills
More informationProtecting from Attack in Office 365
A hacker only needs one person to click on their fraudulent link to access credit card, debit card and Social Security numbers, names, addresses, proprietary information and other sensitive data. Protecting
More informationAccounting Information Systems
Accounting Information Systems Fourteenth Edition Chapter 6 Computer Fraud and Abuse Techniques ALW AYS LEARNING Learning Objectives Compare and contrast computer attack and abuse tactics. Explain how
More informationAustralian Signals Directorate (ASD) Top 35 Reference Card
The Australian Signals Directorate (ASD) published its Strategies to Mitigate Targeted Cyber Intrusions based on its analysis of incidents across the Australian Government. First published in 2010, an
More informationCyber Security Practice Questions. Varying Difficulty
Cyber Security Practice Questions Varying Difficulty 1 : This is a class of programs that searches your hard drive and floppy disks for any known or potential viruses. A. intrusion detection B. security
More informationCountering ransomware with HPE data protection solutions
Countering ransomware with HPE data protection solutions What is ransomware? Definition Malware that prevents or limits users from accessing their system by: Locking the system s screen Encrypting files
More informationMalicious s. How to Identify Them and How to Protect Yourself
Malicious Emails How to Identify Them and How to Protect Yourself 1.Identify the Sender This is the first thing you should do whenever you receive an email, especially if: It is requesting sensitive information
More informationProofpoint, Inc.
1 2018 Proofpoint, Inc. Juan Carlos Cabrera Country Manager Caribbean & Central America AMENAZAS EN EL 2018 SABES QUIEN ESTA UTILIZANDO TU DOMINIO? 2 2017 Proofpoint, Inc. Juan Carlos Cabrera Country Manager
More informationMan-In-The-Browser Attacks. Daniel Tomescu
Man-In-The-Browser Attacks Daniel Tomescu 1 About me Work and education: Pentester @ KPMG Romania Moderator @ Romanian Security Team MSc. Eng. @ University Politehnica of Bucharest OSCP, CREST CRT Interests:
More information9 Steps to Protect Against Ransomware
9 Steps to Protect Against Ransomware IT Support Analyst Task Overview Security Manager Security Dashboard Self Service log Secur Devices With Vulnerabilities Critical Important/High Moderate/Medium 40
More informationANATOMY OF AN ATTACK!
ANATOMY OF AN ATTACK! Are Your Crown Jewels Safe? Dom Kapac, Security Evangelist WHAT DO WE MEAN BY CROWN JEWELS? Crown jewels for most organizations are critical infrastructure and data Data is a valuable
More informationSECURE USE OF IT Syllabus Version 2.0
ICDL MODULE SECURE USE OF IT Syllabus Version 2.0 Purpose This document details the syllabus for the Secure Use of IT module. The syllabus describes, through learning outcomes, the knowledge and skills
More informationWelcome! Copyright 2017 MAC. All Rights Reserved.
Welcome! Copyright 2019 2017 MAC. MAC. All rights All reserved. Rights Reserved. Why QIR Matters-Breach Case Some large hospitality breaches involve multiple reseller companies across the USA. Because
More informationSecure Recipient Guide
Secure Email Recipient Guide Contents How to open your first Encrypted Message.... 3 Step-by-Step Guide to Opening Your First Envelope... 3 Step One:... 3 Step Two:... 4 Step Three:... 4 Step Four:...
More informationCOUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017
COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE Presented by Paul R. Hales, J.D. May 8, 2017 1 HIPAA Rules Combat Cyber Crime HIPAA Rules A Blueprint to Combat Cyber Crime 2 HIPAA Rules Combat Cyber Crime
More informationSpam Protection Guide
Spam Email Protection Guide Version 1.0 Last Modified 5/29/2014 by Mike Copening Contents Overview of Spam at RTS... 1 Types of Spam... 1 Spam Tricks... 2 Imitation of 3 rd Party Email Template... 2 Spoofed
More informationOutline. Login w/ Shared Secret: Variant 1. Login With Shared Secret: Variant 2. Login Only Authentication (One Way) Mutual Authentication
Outline Security Handshake Pitfalls (Chapter 11 & 12.2) Login Only Authentication (One Way) Login i w/ Shared Secret One-way Public Key Lamport s Hash Mutual Authentication Shared Secret Public Keys Timestamps
More informationRANSOMWARE. All Locked Up and No Place to Go. Mark
RANSOMWARE All Locked Up and No Place to Go Mark Villinski @markvillinski $1 Billion in 2016?? http://money.cnn.com/2016/04/15/technology/ransomware-cyber-security/ WHAT IS RANSOMWARE? Ransomware is a
More informationSMTP Sending s While on PureVPN
SMTP Sending E-Mails While on PureVPN If you are facing difficulties sending e-mails while being connected to PureVPN, this may be because we are blocking outgoing e-mail services (SMTP). We block outgoing
More informationAdding your IMAP Mail Account in Outlook 2013 on Windows
Adding your IMAP Mail Account in Outlook 2013 on Windows Replace example.co.za with your domain name as it was sent to you by Visualize IT 1. Launch Outlook 2. Select File on the top left menu bar 3. Select
More informationNORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers
Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.
More informationEBOOK. Stopping Fraud. How Proofpoint Helps Protect Your Organization from Impostors, Phishers and Other Non-Malware Threats.
EBOOK Stopping Email Fraud How Proofpoint Helps Protect Your Organization from Impostors, Phishers and Other Non-Malware Threats www.proofpoint.com EBOOK Stopping Email Fraud 2 Today s email attacks have
More informationSECURING YOUR HOME NETWORK
What is home network security? SECURING YOUR HOME NETWORK Home network security refers to the protection of a network that connects devices to each other and to the internet within a home. Whether it s
More informationProtect your business in today s fast-changing security and risk environment.
FACT SHEET Protect your business in today s fast-changing security and risk environment. Email is the main way your business communicates internally and externally, so you rely on it being available all
More informationBase64 The Security Killer
Base64 The Security Killer Kevin Fiscus NWN Corporation Session ID: DAS-203 Session Classification: Intermediate A Short (Made Up) Security Story Helix Pharmaceuticals is concerned about security Industrial
More informationCyber Insurance: What is your bank doing to manage risk? presented by
Cyber Insurance: What is your bank doing to manage risk? David Kitchen presented by Lisa Micciche Today s Agenda Claims Statistics Common Types of Cyber Attacks Typical Costs Incurred to Respond to an
More informationHIPAA 2017 Compliancy Group, LLC
1 Meet Your Expert Charles Weiselberg Compliancy Group, LLC Director of Customer Service Chuck@compliancygroup.com ENDORSED PARTNER 2 Compliancy Group We simplify compliance so you can confidently focus
More informationCyber Security Guide for NHSmail
Cyber Security Guide for NHSmail Version 3.0 February 2017 Copyright 2017Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created by statute,
More informationAssistance with University Projects? Research Reports? Writing Skills? We ve got you covered! www.assignmentstudio.net WhatsApp: +61-424-295050 Toll Free: 1-800-794-425 Email: contact@assignmentstudio.net
More informationCS System Security 2nd-Half Semester Review
CS 356 - System Security 2nd-Half Semester Review Fall 2013 Final Exam Wednesday, 2 PM to 4 PM you may bring one 8-1/2 x 11 sheet of paper with any notes you would like no cellphones, calculators This
More informationMTA Networking Fundamentals Exam.
Microsoft 98-367 MTA Networking Fundamentals Exam TYPE: DEMO http://www.examskey.com/98-367.html Examskey Microsoft 98-367 exam demo product is here for you to test the quality of the product. This Microsoft
More informationAngelo Gentili Head of Business Development, EMEA Region, PartnerNET
Angelo Gentili Head of Business Development, EMEA Region, PartnerNET The Innovation Solution in the Business Security Field. PartnerNet introduces Seqrite Welcome To Dynamic. Scalable. Future-Ready. Why
More informationUnique Phishing Attacks (2008 vs in thousands)
The process of attempting to acquire sensitive information, such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. In the 2 nd half
More informationPhishing Attacks. Mendel Rosenblum. CS142 Lecture Notes - Phishing Attack
Phishing Attacks Mendel Rosenblum Phishing Basic idea: Get unsuspecting users to visit an evil Web site Convince them that the evil Web site is actually a legitimate site (such as a bank or PayPal) Trick
More informationKim Due Andersen Channel Account Manager,
Kim Due Andersen Channel Account Manager, kim_andersen@trendmicro.com Udviklingen i trusselsbilledet 2 Trusselsbilledet udvalgte nøgletal. 2016: Stigning på 752% i Ransomware familier Kilde: Trend Micro
More informationCIS 5373 Systems Security
CIS 5373 Systems Security Topic 1: Introduction to Systems Security Endadul Hoque 1 Why should you care? Security impacts our day-to-day life Become a security-aware user Make safe decisions Become a security-aware
More informationOnline Security and Safety Protect Your Computer - and Yourself!
Online Security and Safety Protect Your Computer - and Yourself! www.scscu.com Fraud comes in many shapes and sizes, but the outcome is simple: the loss of both money and time. That s why protecting your
More informationBUILDING AN EFFECTIVE PROGRAM TO PROTECT AGAINST FRAUD
BUILDING AN EFFECTIVE PROGRAM TO PROTECT AGAINST EMAIL FRAUD Navindra Ramnauth CISSP Principal Sales Engineer 1 2017 Proofpoint, Inc. Proofpoint at a Glance LEADING CUSTOMERS DEEP SECURITY DNA UNIQUE VISIBILITY
More informationKeep the Door Open for Users and Closed to Hackers
Keep the Door Open for Users and Closed to Hackers A Shift in Criminal Your Web site serves as the front door to your enterprise for many customers, but it has also become a back door for fraudsters. According
More informationTop Ten IT Security Risks CHRISTOPHER S. ELLINGWOOD SENIOR MANAGER, IT ASSURANCE SERVICES
Top Ten IT Security Risks - 2017 CHRISTOPHER S. ELLINGWOOD SENIOR MANAGER, IT ASSURANCE SERVICES INTRODUCTION IT S ALL CONNECTED IN 2017. All of our Top 10 risks impact both us as consumers and as professionals
More informationSecurity. The DynaSis Education Series for C-Level Executives
Email Security The DynaSis Education Series for C-Level Executives Threats to your IT network abound, many of them delivered through email. Fortunately, there are cost effective tools available to protect
More information