Stealing digital information

Similar documents
Train employees to avoid inadvertent cyber security breaches

Personal Cybersecurity

Target Breach Overview

Evolution of Spear Phishing. White Paper

Your security on click Jobs

Protect Yourself From. Identify Theft

The commission communication "towards a general policy on the fight against cyber crime"

Identity Theft, Fraud & You. PrePare. Protect. Prevent.

FAQ. Usually appear to be sent from official address

Newcomer Finances Toolkit. Fraud. Worksheets

Federal Deposit Insurance Corporation. National Credit Union Administration. Office of the Comptroller of the Currency. Office of Thrift Supervision

Online Security and Safety Protect Your Computer - and Yourself!

IMPORTANT SECURITY CHANGES LOGGING ON. We are replacing the existing enhanced authentication.

Frauds & Scams. Why is the Internet so attractive to scam artists? 2006 Internet Fraud Trends. Fake Checks. Nigerian Scam

Cyber Crime Update. Mark Brett Programme Director February 2016

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

August 2009 Report #22

Phishing Read Behind The Lines

Credit Card Frauds Sept.08, 2016

It pays to stop and think

Panda Security 2010 Page 1

Electronic payments in the Netherlands

Security & Phishing

The Global Cybercrime Industry

COMMON WAYS IDENTITY THEFT CAN HAPPEN:

Towards a more secure Cyber Space for South Africa

Beware! Identity Theft

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

CE Advanced Network Security Phishing I

October 2009 Report #24

Project 2020: Preparing Your Organization for Future Threats Today

UNODC. International Cooperation and Assistance in Cybercrime Matters

Cyber Security Guide. For Politicians and Political Parties

I GOT ROBBED! HOW NYS AND THE US SHOULD PROTECT YOUR DATA ONLINE

CYBER SECURITY: ALTITUDE DOES NOT MAKE YOU SAFE

Preventing fraud in public sector entities

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

The Cyber War on Small Business

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe

MOTION FOR A RESOLUTION

APTLD & MYNIC JOINT SURVEY

Red Flag Regulations

Credit Union Cyber Crisis: Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank

The State of Spam A Monthly Report August Generated by Symantec Messaging and Web Security

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017

Challenges and. Opportunities. MSPs are Facing in Security

Whitepaper on AuthShield Two Factor Authentication with SAP

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

BRING SPEAR PHISHING PROTECTION TO THE MASSES

Objectives. Disclaimer: Phishing: Don t Phall Phor It Part 1. Software Training Services

Phishing Activity Trends Report. 4 th Quarter Unifying the. Global Response To Cybercrime. October December 2012

Cyber Insurance: What is your bank doing to manage risk? presented by

IT Security Update on Practical Risk Mitigation Strategies

Level 2 Cambridge Technical in IT

Accounting Information Systems

Phishing: When is the Enemy

Cyber Hygiene Guide. Politicians and Political Parties

How to recognize phishing s

Compliance: How to Manage (Lame) Audit Recommendations

Contents The Global Cybercrime Industry and Its Structure: Relevant Actors, Motivations, Threats, and Countermeasures

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN?

ELECTRONIC BANKING & ONLINE AUTHENTICATION

Updates on Sharing Threat Data, Security Awareness and Policy Efforts to Fight Cybercrime

IMPORTANT SECURITY INFORMATION PHISHING

PBX Fraud Information

But it Was Such a Little Phish February 2016 Webinar

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

10025/16 MP/mj 1 DG D 2B

BUILDING AN EFFECTIVE PROGRAM TO PROTECT AGAINST FRAUD

ASSESSMENT LAYERED SECURITY

Safety and Security. April 2015

Page 1 of 6 Bank card and cheque fraud

FSOR. Cyber security in the financial sector VISION 2020 FINANCIAL SECTOR FORUM FOR OPERATIONAL RESILIENCE

The State of Spam A Monthly Report June Generated by Symantec Messaging and Web Security

Data and Cyber Crisis how to manage a crisis and reduce loss. Melissa Russell Special Counsel February 2016

Syllabus for P.G. Diploma in Cyber Law and Information Technology

Webomania Solutions Pvt. Ltd. 2017

China and International Governance of Cybercrime

Kaspersky Security Network

Online Scams. Ready to get started? Click on the green button to continue.


IT Security Update on Practical Risk Mitigation Strategies

Project CyberSouth Cooperation on cybercrime in the Southern Neighbourhood

Top Ten IT Security Risks CHRISTOPHER S. ELLINGWOOD SENIOR MANAGER, IT ASSURANCE SERVICES

Best Practices in Public Information Management in Sri Lanka. Presented by Nimal Athukorala D.C. Dissanayake

RISING CYBER SECURITY CAPABILITY WITH A UNIQUE NETWORK OF TRUSTED PARTNERS. Jan De Blauwe Chairman Cyber Security Coalition Belgium

Webroot Phishing Threat Trends

Cybercrime Criminal Law Definitions and Concepts

CLICK TO EDIT MASTER TITLE STYLE Fraud Overview and Mitigation Strategies

Cyber Security Strategic Level Landscape in Poland. Krzysztof Silicki NASK Institute, Poland ENISA MB, EB

KASPERSKY FRAUD PREVENTION FOR ENDPOINTS

Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City

3.5 SECURITY. How can you reduce the risk of getting a virus?

ID Theft and Data Breach Mitigation

NIGERIAN CYBERCRIME LAW: WHAT NEXT? BY CHINWE NDUBEZE AT THE CYBER SECURE NIGERIA 2016 CONFERENCE ON 7 TH APRIL 2014

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

Phishing Activity Trends Report. 3 rd Quarter Unifying the. Global Response To Cybercrime. July September 2012

Security Protection

Transcription:

Stealing digital information Financial and personal perspective SUMMER SCHOOL 2014

Stealing information on the Internet is on the rise It might have negative effects on many aspects of our everyday life Online scammers find more and more sophisticated ways of frauds

Is it a big problem? Many companies underestimate their cyberadversaries capabilities and the strategic financial, reputational, and regulatory risks they pose. Companies are unknowingly increasing their digital attack vulnerabilities 2013 US State of Cybercrime Survey, by the Computer Security Institute

Phishing Type of an attack where the sender tries to trick the target into giving up sensitive information resulting in financial gain for the sender.

Spoofing Type of an attack in which the sender poses as somebody else. It can cover a wide range of tactics to make an e-mail look legitimate, e.g including using logos from the organization Phishers would use spoofing to create a fake e-mail. Spoofing is not intended to steal information (like in phishing), but to actually make you do something for them.

Theft of payment card information. Photocopying receipts or more advanced methods such as using a small electronic device (skimmer) to swipe and store hundreds of victims card numbers. Skimming

In the year of 2012, 82 brands were involved in Chinese phishing attacks. Top 10 brands. The distribution of main brands is showed as follows. CHINA

In the year of 2012, 130 Top-Level Domains were used in Chinese phishing attacks..com,.tk and.cc are the most three TLDs used and accounted for 57.2% of the total number. CHINA

ECUADOR The cyber crimes take place in Ecuador, and the number of virtual robberies reached one milion dollars according to the estimation of Fiscalia (Public Prosecutor's Office) only during the first term of 2011. On the national level, according to the numbers of Fiscalia, there were reported at least 800 cases of such crimes from January to August 2011. In Ecuador there were some emblematic cases, web site of the president, cloned credit cards that costed damage around US$ 6.000.000

ECUADOR Statistics of incidents of security and vulnerability

AFRICA According to Microsofts Security intelligence report on 2011 Most of the country with higher rate are from Africa Egypt settle a top worldwide with highest rate of infection Common problem and phishing were much higher than the worldwide average in Algeria and in Tunisia

AFRICA BSA (Business Software Alliance) found that the rate of piracy software in Algeria reached 84%; Egypt is the third for countries hosting phishing fraud with a total of 6,8% of worldwide phishing; Nigeria has been a king of email spam; Kenya has seen a sharp rise in hacking government sites.

POLAND Example of phishing:

POLAND Example of phishing: Allegro - an online auction website A false message was sent via email to the Internet users with the information about winning the contest and the request to send an email with the phone number. The style of the message was unprofessional and without Polish letters which should immediately raise the attention of the potential victim. However, the logos of Allegro, the United Nations and Facebook add to the credibility of the message. The address did not include any infected software so it was just a primitive attack with the purpose to obtain users phone numbers. Kaspersky Lab Polska stresses that the portal Allegro was not responsible for sending the message. Cyber criminal illegally used the logo of Allegro.

POLAND Example of spoofing:

POLAND Example of spoofing: The Prosecutor examined the case of impersonating Beata Kempa and sending fake emails. The email included the apparent announcement that the Member of Parliament is going to resign from candidating in the Parliamentary elections. A false messages were sent to National Press Agency from the address of Beata Kempa. Beata Kempa puts blame on the government and suggests that the security of the Parliament s mailboxes is not efficient. The experts think it is not the case of the insecurity. They suggested two scenarios. Either somebody broke into her mailbox or just spoofed, impersonating her email address, claims Piotr Konieczny, chief information security officer from niebezpiecznik.pl.

EU REGULATIONS AGAINST STEALING INFORMATION DIRECTIVE 2013/40/EU OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 12 August 2013 on attacks against information systems and replacing Council Framework Decision The main aims of the directive: Establishing minimum rules concerning the definition of criminal offences and sanctions in the area of attacks against information systems. Facilitating the prevention of such offences and to improve cooperation between judicial and other competent authorities.

How to protect ourselves? Install security and scanning software onto computer; Never provide personal information in response to an unsolicited request; Do not use name, date of birth, adress, or any other personal information for passwords; Review account statements regularly to ensure all charges are correct.

How to protect ourselves?