Online Organized Crime Yesterday: SaaS Software as a Service Today: CaaS Crime as a Service.

Size: px
Start display at page:

Download "Online Organized Crime Yesterday: SaaS Software as a Service Today: CaaS Crime as a Service. www.kompetenzzentrum.it www.av-comparatives."

Transcription

1 Fighting the Malware Online Organized Crime Yesterday: SaaS Software as a Service Today: CaaS Crime as a Service Speaker: Peter Stelzhammer

2 About Us Two Divisions AV-Comparatives Independent Testing Organizationation - Worldwide Leader in Security Software Testing - Charter Member of AMTSO (Anti Malware Standard Testing Organization) kompetenzzentrum.it Commercial Consulting - IT Security Auditing & Consulting - IT Solution Center - e-commerce / Marketing - Management Consulting Our Customers - AV-Industry: Microsoft, Kaspersky, Symantec, Avira, McAfee and many more - Business & Government: sorry, under non disclosure agreements Page 2

3 Agenda 1 Really boring statistical ti ti data infections, damage, $$$. 2 3 Why are they still out there? Case Studies Part I (EstDomain, iframecash) Why companies/users get infected? Case Conficker 4 Case Studies Part II (Carder Planet, Swedbank) 5 6 DataTheft Watch Your Accounts! Spam And how to earn money with it 7 Who are they? Where are they? 8 What can we do against them? Page 3

4 Statistical Data Number of new threats 2009: 2, Page 4

5 Statistical Data Potential infections by type, EMEA and global Page 5

6 Statistical Data Threats to confidential Information, EMEA and global Page 6

7 Statistical Data Page 7

8 Statistical Data Page 8

9 Statistical Data Page 9

10 Statistical Data Phishing Top 3 Fake ID`s Bank of famerica Paypal Abbey More than 55,000 people/month are victims of phishing Round about 660,000 victims in 2009 Page 10

11 Statistical Data IT-Guys fighting against Online-Criminals Approximately 5,000 IT-Guys in the AV-Industry Endless Online Criminals Page 11

12 Statistical Data Disadvantages 55 Mrd. USD Worldwide about 55 Mrd. USD 18 Mrd. USD Germany about 18 Mrd. USD 1.8 Mrd USD Austria about 1.8 Mrd. USD growing Steadily growing! Page 12

13 Case Studies Part I - EstDomains Case Study EstDomains Vladimir Tšaštšin aka SCR Where do they get their Domains? No Name No Follow Up Page 13

14 Case Studies Part I - EstDomains Tartu, Estland Page 14

15 Case Studies Part I - EstDomains Tartu, Estland Page 15

16 Case Studies Part I - EstDomains Tartu, Estland Page 16

17 Case Studies Part I - EstDomains Tartu, Estland Page 17

18 Case Studies Part I - EstDomains Tartu, Estland Page 18

19 Case Studies Part I - EstDomains Tartu, Estland Mr. Tšaštšin is also the CEO and largest owner of Rove Digital. Rove generates revenues of several million Euros a year, as shown in this listing of TOP Estonian IT companies by the Äripäev magazine. Vladimir Tšaštšin (aka "SCR") was sentenced earlier to six months of jail for credit card fraud, money laundering, and related charges. Page 19

20 Case Studies Part I - EstDomains Tartu, Estland Page 20

21 Case Studies Part I - EstDomains Tartu, Estland Page 21

22 Case Studies Part I - iframecash Case Study iframecash Andrey Sporaw aka Sp0Raw We pay affiliates $61 per 1,000 infections, no questions asked! Page 22

23 Case Studies Part I - iframecash Tartu, Estland Page 23

24 Case Studies Part I - iframecash Tartu, Estland Page 24

25 Case Studies Part I - iframecash Tartu, Estland Page 25

26 Case Studies Part I - iframecash Tartu, Estland Page 26

27 Case Studies Part I - iframecash Mebroot how does it work? Tartu, Estland Page 27

28 Case Studies Part I - iframecash Tartu, Estland Page 28

29 Case Studies Part I - iframecash Tartu, Estland Page 29

30 Case Studies Part I - iframecash Tartu, Estland Page 30

31 Case Studies Part I - iframecash Tartu, Estland Page 31

32 Case Studies Part I - iframecash Tartu, Estland Page 32

33 Case Studies Part I - iframecash Tartu, Estland Page 33

34 Case Conficker Why Companies Get Infected Case Conficker Downup, Downadup, Dumprep und Worm.Win32/Conficker Conficker only became famous because of ist name It s a worm like millions. Page 34

35 Case Conficker Tartu, Estland Page 35

36 Case Conficker Tartu, Estland Page 36

37 Case Conficker Timeline th September 2008 Gimmiv seen in the wild - Hanoi rd 2 23rd October Microsoft issues Security Patch MS th Otb October Chinese hackers prepare a toolkit and sell it for $ st November Conficker.A spotted in the wild 5 22 nd November Microsoft release a strongly worded post recommending to immediatly apply MS08-67 Page 37

38 Case Conficker Timeline 6 24 th December m machines infected Later more than (6 %) 7 29 th December Conficker.B spotted in the wild 8 6 th January 2009 UK s MOD suffers first infections 9 11 th Januars Microsoft updates Removal Tool 10 And the infections are going on!! Page 38

39 Case Conficker 7 bis 10 Jänner 2009 Infektionen bei KABEG obwohl der Patch seit fast 2 Monaten verfügbar ist Nur wenige Tage nachdem der Wurm Conficker/Downad die Rechner der Kärntner Landesregierung lahmgelegt hat, meldet nun auch die Kärntner Krankenanstalten Betriebsgesellschaft (KABEG) einen Befall durch den Schädling. "Wir müssen das gesamte Netzwerk außer Betrieb setzten", erklärte der kaufmännische Direktor Herwig Wetzlinger gegenüber der APA. Der Wurm bringe eine Verlangsamung des Systems mit sich, Gefahr für Daten bestehe allerdings nicht. Betroffen sind rund PCs. "Es handelt sich um eine Mutation des Virus, der auch schon in der Landesregierung aufgetreten ist", sagte Wetzlinger. Das Problem sei mit einem externen Datenträger - vermutlich einem USB-Stick - eingeschleppt worden. Page 39

40 Case Studies Part II - Carderplanet Case Study Carderplanet Dmitri Golubov aka Script Credit Card Dumps Page 40

41 Case Studies Part II - Carderplanet Tartu, Estland Page 41

42 Case Studies Part II - Carderplanet Tartu, Estland Page 42

43 Case Studies Part II - Carderplanet Tartu, Estland Page 43

44 Case Studies Part II - Carderplanet Tartu, Estland Page 44

45 Case Studies Part II - Carderplanet Where do they get their dumps? Hack Shopadmins (xtc, osc, virtuemart etc.) Phishing Buy data from adressbrokers Finding CD S with db s on the street Many more. Page 45

46 Case Studies Part II - Carderplanet Dmitri Golubov aka Script Golubov was convicted in 2005 for selling credit card details ("dumps") stolen via trojans. He was accused of causing multi-million dollar damages. Turns out Mr. Golubov is now out of jail and is running a political party in Ukraine, possibly seeking a position the Ukrainian government (which would grant him automatic immunity from prosecution for criminal activities). His party IPU has wait for it promised to fight against public corruption. Page 46

47 Case Studies Part II - Carderplanet Tartu, Estland Page 47

48 Case Studies Part II - Carderplanet Tartu, Estland Page 48

49 Case Studies Part II - Carderplanet Tartu, Estland Page 49

50 Case Studies Part II - Carderplanet Tartu, Estland Page 50

51 Case Studies Part II - Swedbank Case Study Swedbank Remote Control Device The New Gun of Bankrobbers! Page 51

52 Case Studies Part II - Swedbank Tartu, Estland Page 52

53 Case Studies Part II - Swedbank USD Page 53

54 Private Datenerfassung Datensätze - Bewerberdatenbank von PricewaterhouseCoopers Datenpannen Woher? Datenmissbrauch Angriffe auf Datenbanken Identitäts- und Datendiebstahl 17 Millionen Kundenstammdaten bei T-Mobile mit Bankdaten Page 54

55 Spam and how to earn money with it Spam Don t eat it. Mail it! Page 55

56 Spam and how to earn money with it! Page 56

57 Spam and how to earn money with it! Page 57

58 Spam and how to earn money with it! Page 58

59 Spam and how to earn money with it! Page 59

60 Spam and how to earn money with it! Page 60

61 Who and where are they? Who are they? Where are they? It is easier to hack cc data than to rob a handbag! Page 61

62 Who and where are they? Hi, I am Ronit. I am in the 9th grade. I struggled a lot in my life, but I'm still happy bcoz my family is with me. But now I don't have any friends. All people are very bad. I really want to change my life. Please teach me how to hack credit cards and shop admins. Page 62

63 Where do they do their Business? Page 63

64 Where do they do their Business? Page 64

65 Where do they do their Business? Page 65

66 Who and where are they? Page 66

67 Summary 1 Threat scenario is not getting better 2 The enemy is everywhere and they are not stupid 3 It is getting harder and harder to keep protected 4 Most Companies are not protected enough 5 We've never seen this many new samples coming in (40,000 just yesterday) Page 67

68 Do you have any questions? Page 68

All the English here is taken from students work, both written and spoken. Can you spot the errors and correct them?

All the English here is taken from students work, both written and spoken. Can you spot the errors and correct them? Grammar Tasks This is a set of tasks for use in the Basic Grammar Class. Although they only really make sense when used with the other materials from the course, you can use them as a quick test as the

More information

Practical guide for secure Christmas shopping. Navid

Practical guide for secure Christmas shopping. Navid Practical guide for secure Christmas shopping Navid 1 CONTENTS 1. Introduction 3 2. Internet risks: Threats to secure transactions 3 3. What criteria should a secure e-commerce page meet?...4 4. What security

More information

Topic 1 Lesson 1: Importance of network security

Topic 1 Lesson 1: Importance of network security Topic 1 Lesson 1: Importance of network security 1 Initial list of questions Why is network security so important? Why are today s networks so vulnerable? How does Melissa virus work? How does I love you

More information

Search Engines Chapter 2 Architecture. 14.4.2011 Felix Naumann

Search Engines Chapter 2 Architecture. 14.4.2011 Felix Naumann Search Engines Chapter 2 Architecture 14.4.2011 Felix Naumann Overview 2 Basic Building Blocks Indexing Text Acquisition Text Transformation Index Creation Querying User Interaction Ranking Evaluation

More information

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms Overview Common Internet Threats Tom Chothia Computer Security, Lecture 19 Phishing Sites Trojans, Worms, Viruses, Drive-bydownloads Net Fast Flux Domain Flux Infiltration of a Net Underground economy.

More information

The anatomy of an online banking fraud

The anatomy of an online banking fraud The anatomy of an online banking fraud or: Harvesting bank account data By Valentin Höbel. Mail to valentin@xenuser.org (March2010) I. What this document is about II. Introduction III. The anatomy of an

More information

TEFO STUDERUS HACKING 4 FUN & PROFIT

TEFO STUDERUS HACKING 4 FUN & PROFIT TEFO STUDERUS HACKING 4 FUN & PROFIT Ivan Bütler Compass Security AG, Switzerland ivan.buetler@csnc.ch Compass Security AG Glärnischstrasse 7 Postfach 1628 CH-8640 Rapperswil Tel.+41 55-214 41 60 Fax+41

More information

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

MALICIOUS REDIRECTION A Look at DNS-Changing Malware

MALICIOUS REDIRECTION A Look at DNS-Changing Malware MALICIOUS REDIRECTION A Look at DNS-Changing Malware What are Domain Naming System (DNS)-changing malware? These recently garnered a lot of attention due to the recent Esthost takedown that involved a

More information

Top tips for improved network security

Top tips for improved network security Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a

More information

Identity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office

Identity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office Identity Theft CHRISTOS TOPAKAS Head of Group IT Security and Control Office Agenda Identity Theft Threats and Techniques Identity Theft Definition and Facts Identity Theft & Financial Institutions Prevention

More information

Moderne Sicherheit. Fokussiert auf Business Continuity, Mobilität & Application Control. Marc Mathys Country Manager Switzerland

Moderne Sicherheit. Fokussiert auf Business Continuity, Mobilität & Application Control. Marc Mathys Country Manager Switzerland Moderne Sicherheit Fokussiert auf Business Continuity, Mobilität & Application Control Marc Mathys Country Manager Switzerland Network Security History in a Nutshell 1990s The Internet is bad if we do

More information

THE CONFICKER MYSTERY. Mikko Hypponen Chief Research Officer F-Secure Corporation

THE CONFICKER MYSTERY. Mikko Hypponen Chief Research Officer F-Secure Corporation THE CONFICKER MYSTERY Mikko Hypponen Chief Research Officer F-Secure Corporation Network worms were supposed to be dead. Turns out they aren't. In 2009 we saw the largest outbreak in years: The Conficker

More information

Internet Security Threat Report Volume XII. B-Security(1)

Internet Security Threat Report Volume XII. B-Security(1) Internet Security Threat Report Volume XII B-Security(1) Internet Security Threat Report XII Important Facts Data Sources Symantec Global Intelligence Network 40,000 registered sensors in 180 countries.

More information

Innovative network monitoring technologies for hydraulically not separated large zones

Innovative network monitoring technologies for hydraulically not separated large zones Innovative network monitoring technologies for hydraulically not separated large zones MWM Martinek Water Management AUSTRIA What means Sisyphus to Water-Loss-Reduction? According to Greek Mythology Zeus

More information

GlobalSign Malware Monitoring

GlobalSign Malware Monitoring GLOBALSIGN WHITE PAPER GlobalSign Malware Monitoring Protecting your website from distributing hidden malware GLOBALSIGN WHITE PAPER www.globalsign.com CONTENTS Introduction... 2 Malware Monitoring...

More information

The Impact of Cybercrime on Business

The Impact of Cybercrime on Business The Impact of Cybercrime on Business Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil Sponsored by Check Point Software Technologies Independently conducted

More information

Vergleich der Versionen von Kapitel 1 des EU-GMP-Leitfaden (Oktober 2012) 01 July 2008 18 November 2009 31 Januar 2013 Kommentar Maas & Peither

Vergleich der Versionen von Kapitel 1 des EU-GMP-Leitfaden (Oktober 2012) 01 July 2008 18 November 2009 31 Januar 2013 Kommentar Maas & Peither Chapter 1 Quality Management Chapter 1 Quality Management System Chapter 1 Pharmaceutical Quality System Principle The holder of a Manufacturing Authorisation must manufacture medicinal products so as

More information

Software / FileMaker / Plug-Ins Mailit 6 for FileMaker 10-13

Software / FileMaker / Plug-Ins Mailit 6 for FileMaker 10-13 Software / FileMaker / Plug-Ins Mailit 6 for FileMaker 10-13 Seite 1 / 5 Mailit 6 for FileMaker 10-13 The Ultimate Email Plug-In Integrate full email capability into your FileMaker 10-13 solutions with

More information

Cloud Security VS Cybercrime Economy: The Kaspersky Vision. Eugene Kaspersky Co-founder & CEO, Kaspersky Lab

Cloud Security VS Cybercrime Economy: The Kaspersky Vision. Eugene Kaspersky Co-founder & CEO, Kaspersky Lab Cloud Security VS Cybercrime Economy: The Kaspersky Vision Eugene Kaspersky Co-founder & CEO, Kaspersky Lab The Digital World is Under Attack 20 000 000 The last five years have become the 18 000 000 Golden

More information

Office 365 Sicherheit mit RMS und DLP

Office 365 Sicherheit mit RMS und DLP Office 365 Sicherheit mit RMS und DLP Wie die Cloud Sie in Fragen der Sicherheit unterstützen kann Michael Kirst-Neshva mkn@ankbs.de www.ankbs.de MVP Office 365 Cloud Ambassador Microsoft P-TSP Cloud Sicherheitsoptionen

More information

CS; SSART-Treffen, November 18, 2015. Internet Banking: Increasing power of cyber crime... and what to do?

CS; SSART-Treffen, November 18, 2015. Internet Banking: Increasing power of cyber crime... and what to do? CS; SSART-Treffen, November 18, 2015 Internet Banking: Increasing power of cyber crime.. and what to do? Different targets for cyber crime Collect large data volumes (financial data) Collect customer related

More information

1. Ask what your financial institution knows or has personally experienced with regard to internal and external data breaches.

1. Ask what your financial institution knows or has personally experienced with regard to internal and external data breaches. Part 1: Internal & External Data Breach Vulnerabilities Presented on: Thursday, February 12, 2 3 ET Co presented by: Ann Davidson VP of Risk Consulting at Allied Solutions Joe Majka CSO at Verifone 1 Breakdown

More information

IBM Security. Alle Risiken im Blick und bessere Compliance Kumulierte und intelligente Security Alerts mit QRadar Security Intelligence

IBM Security. Alle Risiken im Blick und bessere Compliance Kumulierte und intelligente Security Alerts mit QRadar Security Intelligence IBM Security Alle Risiken im Blick und bessere Compliance Kumulierte und intelligente Security Alerts mit QRadar Security Intelligence Peter Kurfürst Vertrieb IBM Security Lösungen Enterprise-Kunden Baden-Württemberg

More information

Computer infiltration

Computer infiltration Computer infiltration Computer infiltration means unauthorized entering program code into computer system in order to perform undesired (often concealed) activities. Currently, there are about 80,000 types

More information

Almost 400 million people 1 fall victim to cybercrime every year.

Almost 400 million people 1 fall victim to cybercrime every year. 400,000000 Almost 400 million people 1 fall victim to cybercrime every year. A common way for criminals to attack people is via websites, unfortunately this includes legitimate sites that have been hacked

More information

Cybersecurity Best Practices

Cybersecurity Best Practices Ten Essential Cybersecurity Best Practices Banking Business Employees Brought to you by: 1 Did you know? One in five small-to-medium-sized companies were the victims of cyber breaches in 2013.1 In 76%

More information

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

When you listen to the news, you hear about many different forms of computer infection(s). The most common are: Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than ever. Thanks to the Internet, you can conduct your banking,

More information

ONE STEP AHEAD of hackers, cybersecurity, threats and the competition

ONE STEP AHEAD of hackers, cybersecurity, threats and the competition ONE STEP AHEAD of hackers, cybersecurity, threats and the competition Thomas Werner Threat Prevention Security Engineer CER & Nordics 2015 Check 2015 Point Check Software Point Software Technologies Ltd.

More information

Cybercrime. Crime and Cybercrime. Examples of Cybercrime. Illegal, immoral, unethical

Cybercrime. Crime and Cybercrime. Examples of Cybercrime. Illegal, immoral, unethical Crime and Cybercrime An act committed or omitted in violation of a law forbidding or commanding it and for which punishment is imposed upon conviction http://www.thefreedictionary.com/crime Deviant behavior

More information

Internet threats: steps to security for your small business

Internet threats: steps to security for your small business Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential

More information

State of Black Market for Stolen Credit Cards (2015) by N. Vlajic

State of Black Market for Stolen Credit Cards (2015) by N. Vlajic State of Black Market for Stolen Credit Cards (2015) by N. Vlajic http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/ Worst Security Hacks of the Last Decade http://www.bloomberg.com/graphics/2014-data-breaches/

More information

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123 Cybersecurity: A Growing Concern for Small Businesses Copyright Materials This presentation is protected by US and International Copyright

More information

Seamless payment for cultural needs MUNICH 25TH MARCH 2015, CHRISTOPH JUNG, HEAD OF SALES DACH

Seamless payment for cultural needs MUNICH 25TH MARCH 2015, CHRISTOPH JUNG, HEAD OF SALES DACH Seamless payment for cultural needs MUNICH 25TH MARCH 2015, CHRISTOPH JUNG, HEAD OF SALES DACH 2 Ingenico Payment Services stellt sich vor 3 Ingenico Payment Services stellt sich vor Opportunities in Europe

More information

Quick Start Guide UTM 110/120

Quick Start Guide UTM 110/120 Quick Start Guide UTM 110/120 Sophos Access Points Sophos Access Points 1. Preparation Before you begin, please confirm that you have a working Internet connection & make sure you have the following items

More information

ES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS

ES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISSIONERS ES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY COMMISS The Internet Threat Landscape Symantec TM Dean Turner Director Global Intelligence Network Symantec Security

More information

The Information Security Problem

The Information Security Problem Chapter 10 Objectives Describe the major concepts and terminology of EC security. Understand phishing and its relationship to financial crimes. Describe the information assurance security principles. Identify

More information

BP1 Mobile App Management: Solutions for ios and Android. Gary Barton Mobility Architect Citrix Receivers and Gateways Group

BP1 Mobile App Management: Solutions for ios and Android. Gary Barton Mobility Architect Citrix Receivers and Gateways Group BP1 Mobile App Management: Solutions for ios and Android Gary Barton Mobility Architect Citrix Receivers and Gateways Group Agenda 1. Synergy Announcements 2. Mobile Management Market 3. Citrix Vision

More information

Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC

Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC Cyber Security CHAD KNUTSON SECURE BANKING SOLUTIONS 2014 SECURE BANKING SOLUTIONS, LLC Presenter Chad Knutson Senior Information Security Consultant Masters in Information Assurance CISSP (Certified Information

More information

A CFO s Perspective. Security. Walt Conway, QSA, CPISM

A CFO s Perspective. Security. Walt Conway, QSA, CPISM A CFO s Perspective on Cyber Security Walt Conway, QSA, CPISM 403 Labs, LLC Agenda Hackers and Phishes and Breaches, Oh My! CFO s role in cyber security Questions you need to ask And answers you need to

More information

PBS CBW NLS IQ Enterprise Content Store

PBS CBW NLS IQ Enterprise Content Store CBW NLS IQ Enterprise Content Store Solution for NetWeaver BW and on HANA Information Lifecycle Management in BW Content Information Lifecycle Management in BW...3 Strategic Partnership...4 Information

More information

Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org

Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org Dr. K. Jaishankar Senior Assistant Professor Department of Criminology and Criminal Justice Manonmaniam Sundaranar University Tirunelveli, Tamil Nadu, India Executive Director Centre for Cyber Victim Counselling

More information

Raiffeisen E-Banking The security of Raiffeisen E-Banking Security on the Internet

Raiffeisen E-Banking The security of Raiffeisen E-Banking Security on the Internet Security on the Internet Seite 1 Who is it? Michael Mäder Business Analyst Raiffeisen E-Banking michael.maeder@raiffeisen.ch Background 20 years experience of computer science (programming, project management,

More information

Criminal money flows on the Internet

Criminal money flows on the Internet EuropaInstitut an der Universität Zürich 6. upc cablecom lecture 15. Oktober 2012 Tator Internet Europäische / Internationale Bekämpfungsstrategien Criminal money flows on the Internet Alexander Seger

More information

Metasploit The Elixir of Network Security

Metasploit The Elixir of Network Security Metasploit The Elixir of Network Security Harish Chowdhary Software Quality Engineer, Aricent Technologies Shubham Mittal Penetration Testing Engineer, Iviz Security And Your Situation Would Be Main Goal

More information

Managing Information Security @ Stanford

Managing Information Security @ Stanford Managing Information Security @ Stanford March 4, 2011 Tina Darmohray, Assistant Vice President and Chief Information Security Officer 1 Stanford Information Assets Stanford s diversity results in many

More information

Laura Royer, Extension Faculty, University of Florida/IFAS Osceola County Extension Services

Laura Royer, Extension Faculty, University of Florida/IFAS Osceola County Extension Services Consumer Choices: Computer Security Software Prepared by: Dave Palmer, Instructional Media Faculty, University of Florida/IFAS Extension, South Central Extension District Laura Royer, Extension Faculty,

More information

Practical tips for a. Safe Christmas

Practical tips for a. Safe Christmas Practical tips for a Safe Christmas CONTENTS 1. Online shopping 2 2. Online games 4 3. Instant messaging and mail 5 4. Practical tips for a safe digital Christmas 6 The Christmas holidays normally see

More information

MUK-IT 63. Roundtable. Herzlich Willkommen bei der Software AG. Anton Hofmeier VP Sales Terracotta DACH / MdGL

MUK-IT 63. Roundtable. Herzlich Willkommen bei der Software AG. Anton Hofmeier VP Sales Terracotta DACH / MdGL MUK-IT 63. Roundtable Herzlich Willkommen bei der Software AG Anton Hofmeier VP Sales Terracotta DACH / MdGL Überblick February 15, 2013 2 Software AG www.softwareag.com 5.500 Mitarbeiter >1Mrd Umsatz

More information

BOTNETS. Douwe Leguit, Manager Knowledge Center GOVCERT.NL

BOTNETS. Douwe Leguit, Manager Knowledge Center GOVCERT.NL BOTNETS Douwe Leguit, Manager Knowledge Center GOVCERT.NL Agenda Bots: what is it What is its habitat How does it spread What are its habits Dutch cases Ongoing developments Visibility of malware vs malicious

More information

Global Security Services Market 2015-2019

Global Security Services Market 2015-2019 Brochure More information from http://www.researchandmarkets.com/reports/3217235/ Global Security Services Market 2015-2019 Description: About Security Services Security services focus on the security

More information

Phishing Activity Trends Report. 1 st Half 2009. Committed to Wiping Out Internet Scams and Fraud

Phishing Activity Trends Report. 1 st Half 2009. Committed to Wiping Out Internet Scams and Fraud 1 st Half 2009 Committed to Wiping Out Internet Scams and Fraud January June 2009 Phishing Report Scope The quarterly APWG analyzes phishing attacks reported to the APWG by its member companies, its Global

More information

Upgrading Your Skills to MCSA Windows Server 2012 MOC 20417

Upgrading Your Skills to MCSA Windows Server 2012 MOC 20417 Upgrading Your Skills to MCSA Windows Server 2012 MOC 20417 In dieser Schulung lernen Sie neue Features und Funktionalitäten in Windows Server 2012 in Bezug auf das Management, die Netzwerkinfrastruktur,

More information

Using big data analytics to identify malicious content: a case study on spam emails

Using big data analytics to identify malicious content: a case study on spam emails Using big data analytics to identify malicious content: a case study on spam emails Mamoun Alazab & Roderic Broadhurst Mamoun.alazab@anu.edu.au http://cybercrime.anu.edu.au 2 Outline Background Cybercrime

More information

Does it really CHANGE something?

Does it really CHANGE something? Does it really CHANGE something? WHY do we need a PHOTOGRAPHER when anyone can take photos? Because... WRONG USAGE LOW QUALITY Inappropriate content WRONG message The Director s PROBLEM 10000 useless photos

More information

Cloud Performance Group 1. Cloud@Night Event. 14. Januar 2016 / Matthias Gessenay (matthias.gessenay@corporatesoftware.ch)

Cloud Performance Group 1. Cloud@Night Event. 14. Januar 2016 / Matthias Gessenay (matthias.gessenay@corporatesoftware.ch) 1 Cloud@Night Event 14. Januar 2016 / Matthias Gessenay (matthias.gessenay@corporatesoftware.ch) 2 Agenda SharePoint ABC Project Server ABC What s new in O365 4 SharePoint 2016 ABC A Access App-Support

More information

Fighting Cyber Crime in the Telecommunications Industry. Sachi Chakrabarty

Fighting Cyber Crime in the Telecommunications Industry. Sachi Chakrabarty Fighting Cyber Crime in the Telecommunications Industry Sachi Chakrabarty Agenda Cyber Crime What s all the fuss about CyberCrime? DoS Attacks Telco Solutions Cybercrime? Cybercrime Definition All criminal

More information

I Textarbeit. Text 1. I never leave my horse

I Textarbeit. Text 1. I never leave my horse BEJ Musterprüfung Englisch (11020) 1 I Textarbeit Text 1 I never leave my horse 1 5 10 15 20 Police officers in Ireland don t carry guns. But they often ride through Dublin on horses. Julie Folan is a

More information

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details: Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for

More information

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus cdoulig at unipi dot gr Department of Informatics University of Piraeus Safety & Security in Cyber Space: Building up Trust in the EU Athens, 6-7 March 2014 Cybersecurity: where do we stand? Major Trends

More information

DATA is just like CRUDE. It s valuable, but if unrefined it cannot really be used.

DATA is just like CRUDE. It s valuable, but if unrefined it cannot really be used. Data is the new Oil DATA is just like CRUDE. It s valuable, but if unrefined it cannot really be used. Clive Humby "Digitale Informationsspeicher Im Meer der Daten" "Die Menschen produzieren immer mehr

More information

PHISHING IN SEASON TAX TIME MALWARE, PHISHING AND FRAUD

PHISHING IN SEASON TAX TIME MALWARE, PHISHING AND FRAUD PHISHING IN SEASON TAX TIME MALWARE, PHISHING AND FRAUD April 2013 As cybercriminals will have it, phishing attacks are quite the seasonal trend. It seems that every April, after showing a slight decline

More information

What are the common online dangers?

What are the common online dangers? ONLINE SECURITY GUIDELINES Internet Banking is convenient and times saving. You can do remittances, place online deposit and other transactions through online banking with the convenience and privacy of

More information

DTR Business Systems, Inc. Rene Beltran

DTR Business Systems, Inc. Rene Beltran DTR Business Systems, Inc. Rene Beltran Established 1983 Provide on premise and off premise server based technology for Small Business users. Provide hardware, network and operating systems support for

More information

Protecting Your Business from Online Banking Fraud

Protecting Your Business from Online Banking Fraud Protecting Your Business from Online Banking Fraud Robert Comella, Greg Farnham, John Jarocki October 2009 Objective According to Brian Krebs of The Washington Post, smaller organizations are suffering

More information

Hope is not a strategy. Jérôme Bei

Hope is not a strategy. Jérôme Bei Hope is not a strategy Jérôme Bei Press Highlights Conficker hits German Government! 3000 Clients down! Datatheft at German Telekom: 17.000.000 Customer Records lost! About 1.000.000 pieces of Malware

More information

What you need to know to keep your computer safe on the Internet

What you need to know to keep your computer safe on the Internet What you need to know to keep your computer safe on the Internet Tip 1: Always install Operating System updates The most important steps for any computer user is to always install updates, especially security

More information

Intel vpro and Information Security. Itai Yarom Senior Technical Lead LAN Access Division Intel Israel

Intel vpro and Information Security. Itai Yarom Senior Technical Lead LAN Access Division Intel Israel Intel vpro and Information Security Itai Yarom Senior Technical Lead LAN Access Division Intel Israel The Power of Two: It s all about You The Intel brand delivers a promise to you and your customers,

More information

Network Security and the Small Business

Network Security and the Small Business Network Security and the Small Business Why network security is important for a small business Many small businesses think that they are less likely targets for security attacks as compared to large enterprises,

More information

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current

More information

What s Hot and What s Not in the World of Cyber Security and Cyber Crime

What s Hot and What s Not in the World of Cyber Security and Cyber Crime Department of Technology, Management & Budget (DTMB) What s Hot and What s Not in the World of Cyber Security and Cyber Crime Dan Lohrmann, Chief Technology Officer Department of Technology, Management

More information

Conficker Summary and Review Dave Piscitello, ICANN Senior Security Technologist 7 May 2010

Conficker Summary and Review Dave Piscitello, ICANN Senior Security Technologist 7 May 2010 ConfickerSummaryandReview ConfickerSummaryandReview DavePiscitello,ICANNSeniorSecurityTechnologist 7May2010 Abstract Thisreportprovidesachronologyofeventsrelatedtothecontainmentof theconfickerworm.itprovidesanintroductionandbriefdescriptionofthe

More information

INDUSTRY OVERVIEW: FINANCIAL

INDUSTRY OVERVIEW: FINANCIAL ii IBM MSS INDUSTRY OVERVIEW: FINANCIAL RESEARCH AND INTELLIGENCE REPORT RELEASE DATE: NOVEMBER 5, 2014 BY: JOHN KUHN, SENIOR THREAT RESEARCHER iii TABLE OF CONTENTS EXECUTIVE OVERVIEW... 1 MAJOR FINANCIAL

More information

IAC-BOX Network Integration. IAC-BOX Network Integration IACBOX.COM. Version 2.0.1 English 24.07.2014

IAC-BOX Network Integration. IAC-BOX Network Integration IACBOX.COM. Version 2.0.1 English 24.07.2014 IAC-BOX Network Integration Version 2.0.1 English 24.07.2014 In this HOWTO the basic network infrastructure of the IAC-BOX is described. IAC-BOX Network Integration TITLE Contents Contents... 1 1. Hints...

More information

Security Bank of California Internet Banking Security Awareness

Security Bank of California Internet Banking Security Awareness Security Bank of California Internet Banking Security Awareness INTRODUCTION Fraudsters are using increasingly sophisticated and malicious techniques to thwart existing authentication controls and gain

More information

Linux. schreibung des Players Xmms. Die Option -q leitet sich aus dem englischen Wort Que

Linux. schreibung des Players Xmms. Die Option -q leitet sich aus dem englischen Wort Que he p ch (A Pat anized free so me a kind of role m dation (ASF) deriving pa dati jhklhjklllllklon s task is to pache s both financially and mthe pulse of linu schreibung des Players Xmms. Die Option -q

More information

Quick Start Guide UTM 220/320/425/525/625

Quick Start Guide UTM 220/320/425/525/625 Quick Start Guide UTM 220/320/425/525/625 Sophos Access Points Sophos Access Points Before you begin, please confirm that you have a working Internet connection and make sure you have the following items

More information

APT Detection using Splunk

APT Detection using Splunk APT Detection using Splunk Wir starten mit Schütteln Swiss Cyber Storm -> 22. Oktober 2014, KKL Luzern Former US Secret Service Agent, Robert Rodriguez Microsoft Research, Elia Florio www.swisscyberstorm.com

More information

Information Security Threat Trends

Information Security Threat Trends Talk @ Microsoft Security Day Sep 2005 Information Security Threat Trends Mr. S.C. Leung 梁 兆 昌 Senior Consultant 高 級 顧 問 CISSP CISA CBCP M@PISA Email: scleung@hkcert.org 香 港 電 腦 保 安 事 故 協 調 中 心 Introducing

More information

Exemplar for Internal Assessment Resource German Level 1. Resource title: Planning a School Exchange

Exemplar for Internal Assessment Resource German Level 1. Resource title: Planning a School Exchange Exemplar for internal assessment resource German 1.5A for Achievement Standard 90887! Exemplar for Internal Assessment Resource German Level 1 Resource title: Planning a School Exchange This exemplar supports

More information

RETHINKING CYBER SECURITY Changing the Business Conversation

RETHINKING CYBER SECURITY Changing the Business Conversation RETHINKING CYBER SECURITY Changing the Business Conversation October 2015 Introduction: Diane Smith Michigan Delegate Higher Education Conference Speaker Board Member 2 1 1. Historical Review Agenda 2.

More information

E Commerce and Internet Security

E Commerce and Internet Security E Commerce and Internet Security Zachary Rosen, CFE, CIA President, ACFE Czech Republic Chapter Introduction The Internet has become a global phenomenon reshaping the way we communicate and conduct business.

More information

Global Antivirus Software Package Market 2015-2019

Global Antivirus Software Package Market 2015-2019 Brochure More information from http://www.researchandmarkets.com/reports/3498718/ Global Antivirus Software Package Market 2015-2019 Description: About antivirus software package An antivirus scans the

More information

4/20/2015. Fraud Watch Campaign. AARP is Fighting for You. AARP is Fighting for You. Campaign Tactics. AARP can help you Spot & Report Fraud

4/20/2015. Fraud Watch Campaign. AARP is Fighting for You. AARP is Fighting for You. Campaign Tactics. AARP can help you Spot & Report Fraud AARP can help you Spot & Report Fraud Fraud Fighter Call Center: Talk to a volunteer trained in how to spot and report fraud. Call the Fraud Fighter Call Center at (877) 908-3360 Fraud Watch Campaign What

More information

SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012

SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012 SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012 Cyberspace is both an ecosystem consisting of an infrastructure and services, and an environment where and through

More information

Fraud and Phishing Scam Response Arrangements in Brazil

Fraud and Phishing Scam Response Arrangements in Brazil Fraud and Phishing Scam Response Arrangements in Brazil Marcelo H. P. C. Chaves mhp@cert.br Computer Emergency Response Team Brazil CERT.br http://www.cert.br/ Brazilian Internet Steering Committee http://www.cgi.br/

More information

Stefan Engelberg (IDS Mannheim), Workshop Corpora in Lexical Research, Bucharest, Nov. 2008 [Folie 1]

Stefan Engelberg (IDS Mannheim), Workshop Corpora in Lexical Research, Bucharest, Nov. 2008 [Folie 1] Content 1. Empirical linguistics 2. Text corpora and corpus linguistics 3. Concordances 4. Application I: The German progressive 5. Part-of-speech tagging 6. Fequency analysis 7. Application II: Compounds

More information

CobraNet TM User s Manual

CobraNet TM User s Manual CobraNet TM User s Manual 19201 Cook Street, Foothill Ranch, CA 92610-3501 USA Phone: (949) 588-9997 Fax: (949) 588-9514 Email: sales@renkus-heinz.com Web: www.renkus-heinz.com CobraNet TM is a registered

More information

CYBER SECURITY. II. SCANDALOUS HACKINGS To show the seriousness of hacking we have included some very scandalous hacking incidences.

CYBER SECURITY. II. SCANDALOUS HACKINGS To show the seriousness of hacking we have included some very scandalous hacking incidences. CYBER SECURITY Mandar Tawde, Pooja Singh, Maithili Sawant, Girish Nair Information Technology, Government Polytechnic Mumbai 49, Kherwadi Ali Yawar Jung Marg, Bandra (E), Mumbai-400051, India mandar258@gmail.com,

More information

1949 Self-reproducing cellular automata. 1959 Core Wars

1949 Self-reproducing cellular automata. 1959 Core Wars 114 Virus timeline When did viruses, Trojans and worms begin to pose a threat? Most histories of viruses start with the Brain virus, written in 1986. That was just the first virus for a Microsoft PC, though.

More information

Cyber-Security Risk in the Global Organization:

Cyber-Security Risk in the Global Organization: Cyber-Security Risk in the Global Organization: Trends, Challenges and Strategies for Effective Management David Childers, CCEP, CIPP CEO, Compli Todd Carroll Assistant Special Agent in Charge, FBI Three

More information

Email Security. 01-15-09 Fort Mac

Email Security. 01-15-09 Fort Mac Email Security 01-15-09 Fort Mac Most Common Mistakes in Email Security Email Security 1. Using just one email account. 2. Holding onto spammed-out accounts too long. 3. Not closing the browser after logging

More information

Cybercrime: risks, penalties and prevention

Cybercrime: risks, penalties and prevention Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,

More information

9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500

9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500 INFO 1500 9. Information Assurance and Security, Protecting Information Resources 11. ecommerce and ebusiness Janeela Maraj Tutorial 9 21/11/2014 9. Information Assurance and Security, Protecting Information

More information

Microsoft Nano Server «Tuva» Rinon Belegu

Microsoft Nano Server «Tuva» Rinon Belegu 1 Microsoft Nano Server «Tuva» Rinon Belegu Partner: 2 Agenda Begrüssung Vorstellung Referent Content F&A Weiterführende Kurse 3 Vorstellung Referent Rinon Belegu Microsoft Certified Trainer (AWS Technical

More information

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to

More information

Thomas Rümmler AIT GmbH & Co. KG Christian Schlag AIT GmbH & Co. KG. Central Build and Release Management with TFS

Thomas Rümmler AIT GmbH & Co. KG Christian Schlag AIT GmbH & Co. KG. Central Build and Release Management with TFS Thomas Rümmler AIT GmbH & Co. KG Christian Schlag AIT GmbH & Co. KG Central Build and Release Management with TFS 2 OUR DAILY MOTIVATION It s hard enough for software developers to write code that works

More information

Holiday Safe Shopping

Holiday Safe Shopping Holiday Safe Shopping Or How to keep the Grinch away this Holiday Season What is Identify Theft Scams and Technology How to Protect yourself How to Protect your customers What is Identity Theft Identity

More information