SK International Journal of Multidisciplinary Research Hub

Size: px
Start display at page:

Download "SK International Journal of Multidisciplinary Research Hub"

Transcription

1 ISSN: (Online) Volume 2, Issue 9, September 2015 Journal for all Subjects Research Article / Survey Paper / Case Study Published By: SK Publisher ( Novel Method to Protect Against Phishing Attack Gaurav Kumar Dep. Of Information Technology, Bengal College Of Engineering & Technology, Durgapur, West Bengal, India Abstract: Phishing is major issue in the Internet world and also all over world. In many case phishing is done by . Now this days whole world are suffering to the phishing and the case of phishing are increase suddenly days to days, many of Anti phishing organization work on the to protect user or people to the phishing but they are in success in the less percent and the increasing rate of phishing are suddenly increase. In this present work first I write concept of phishing to understand the term phishing and proposed new method to protect against phishing generally fraud, if we work start on the proposed method we can easily say that we are safe from the phishing attack, experimental result in this work show that the method work successfully or we safe for the phishing. KeyWords: Phishing, Phishing attack, Phishing type and technique, Anti Phishing. I. INTRODUCTION Phishing is fraud method or fraud method in which the attacker accrue sensitive information such as financial information like credit card, user name, password details sometime money also [1]. Commonly the messages appear to come trustworthy, well known and famous websites. Websites that are widely used by phishers in purpose of spoofed like ebay, PayPal, Yahoo etc and now this day phishing keep growing [2]. The risk of grows in larger in the social media such as Facebook, Google+ and Twitter [3]. Phishers take help of these trustworthy and famous sites to attack people using them on their home, workplace to take security as well as personal information which can be affect organization. Generally Security refers the safe of your data in the terms of security to the phishing the data are credit card, user name and password or security information [4]. Phishing may be contain link that website may be injected with the malware [5]. In the common word phishing is more often example of social engineering technique used by the device user [6]. Now this days Phishing are growing rapidly in worldwide, the Phishing case are increasing year by year more suddenly and many Organization such as government, private work on the Protect user or public against the phishing. Phone phishing are now these days are also widely used by phishers to spoofing people. The mission of Anti phishing working group is to provide a resource for information on the problem and solution for phishing or fraud [7]. KEY CONCEPT II. PHISHING TYPES 1. Phishing method of fraud or method of accrue sensitive information such as credit card, password, username etc details by using trustworthy entity such as famous website in an electronic communication. In October 2013 this method is used by phishers using name of American Express. Were sent to unknown number of recipients. 2. Spear Phishing The attack are directed attempt to company have been categories as spear phishing. In this phishing phishers get required personal information directly to chance of success maximum. The technique widely success in today internet world and average 91% of accounting case phishing done by this method. 2015, SK Publisher All Rights Reserved 12 P age

2 3. Clone Phishing- In this type of phishing attack where a effectual and already delivered, include link or an attachment had content and its recipient address taken and used to construct nearly cloned . The link within the is replaced with the malicious version and after that send from an address spoofed to appear come from the legal or original sender. 4. Whaling- In this type of attack, attacker or phishers target directly to the high profile or senior executive of the company within businesses and the term whaling classify this type of attack. In this case of attack targeted a webpage or take more serious high profile or senior executive level form. The content to target upper level manager or upper level person in the company, the content of the attack are written in form of legal customer complain or executive. Whaling phishermen also use name of higher government authority. III. PHISHING TECHNIQUES 1. Link Manipulation In this technique phisher design a link in (and spoofed the website its lead to) appear to belong to spoofed organization. The use of sub domain is the trick used the attacker. 2. Filter evasion In this technique phishers don t use text directly, in this technique images are used by phishers and instead of it difficult to detect anti phishing filter text that widely used in the phishing . But in the new technology most anti phishing filter are able to recover text that hidden in the images generally these filter optical Character recognition to optically scan the hidden text and filter in it. Some of the anti phishing organization also use intelligent word recognition which is also successful. 3. Website forgery- In this type of phishing technique, phishers make a website same as the trustworthy website and once time a victim visit to phishing website that s and the deception not over. Some of phishing scams that help in history used java script command to order the alter the address bar and the work is done by with the help placing a picture of legitimate URL. 4. Covert redirected In this phishing technique, phishers use the link of legitimate website but when any one clicks on the link, it redirected to the victim of an attacker website. Generally this is used log in popup based of an affected site s domain. 5. Phone phishing Phone phishing are widely increase in this days. In this type of phishing attacker message you that you win some amount of money and if you want to claim the money send your security or sensitive information such as name, mobile number, address, account number etc. One another type of phishing is also target by phishers that are directly they call you and give you phishers own details of name higher bank authority and tell you about wrong or fake issue of your account and request you to give your sensitive information or security information such as credit card number, pin, cvv number etc. The phone phishing techniques are suddenly increased in now in this era. 6. Tabnabbing In this phishing technique, mainly phishers use advantage of multiple tabs in browser. Which use multiple open tabs and that user are use and redirected a user effected site. 7. Evils Twin In this phishing technique, it s hard to detect this type of fraud work. Mainly in this technique phishers make a fake wireless network that structure and look are similar to legitimate public network that generally found in airport, bus stand, hotels, coffee shops if any one connect own system to the network they try to capture password, credit card details etc. IV. PHISHING SCAMS The damage cause by the phishing attack ranges from denial of access through the to enough financial loss. That is counted between the year may 2004 to may 2005 that is 1.2 millions of computer user are suffered losses that cause by phishing, approximate 229 million us dollar and from the one survey united state business loss an approximate 2 billion yearly as their client become victim [20]. In the year 2007 phishing attack increased suddenly and result 3.6 million adults lost and 3.2 billion dollar in ending of august 2007[21]. 2015, SK Publisher All Rights Reserved ISSN: (Online) 13 P age

3 According to the report of 3 rd Microsoft computing safer index released in month February year the annual impact of phishing could be high as 5 billion dollar [22]. The bank of Ireland suddenly refused to cover losses suffered by its customer. V. ANTI PHISHING As the recently in the year 2007, the adoption of anti- phishing strategies by businesses that needed to protect financial as well as personal information. Now in these days there are several different techniques including legislation and technology that protect against phishing these technology include phone, website, , organization now can be reported as authorities. 1. Social response Social response category under train people to protect against the phishing attack. People can take step to avoid phishing slightly modifying their browsing habit that when any one contacted about sensitive information, you directly contact to organization. Nearly all legitimate from company contain that information that not available on phishers. 2. Technical Response Anti phishing measure or detector have been implemented as feature of browsers, as extension or as toolbars for browsers. Anti phishing software also available in online. There is other technique in this part such as (1) Helping to identify legitimate website, (2) Secure connection, (3) Which site, (4) Who is the authority, (5) Fundamental laws in the security model of secure browsing (6) Browser alerting user to fraudulent website and (7) eliminating phishing mail etc. PHISHING INCIDENT VI. PROPOSED METHOD FOR PROTECT AGAINST PHISHING ATTACK 1. SELF INTELLIGENCY 2. REPORT 3. ACTION 4. FINAL 1. SELF INTELLIGENCY First is the self intelligence power, first control self against fraud or phishing , bank or any other financial organization not give you prize even not tell you about claiming your prize. 2. REPORT In this section you report against phishing to your mail service provider or other organization such as government or private that work on phishing and unsubscribe the phishing in your account. 3. ACTION In this stage basically work for service provider and other organization that work on phishing. First service provider investigate the reported and ban it on your service that why it never send the phishing again to user. If possible find the fraud people and give for law. 4. FINAL In this stage take care of all the above process, basically send a to requesting user to report about phishing , check the process two that lies report against phishing coming or not and the process three action against phishing taken or not. 2015, SK Publisher All Rights Reserved ISSN: (Online) 14 P age

4 FLOW CHART 1. VII. EXPERIMENTAL RESULTS SELF INTELLI GENCY REPORT ACTION FINAL YOU ARE SAFE 2. FINAL IS PROCESS 1, 2, 3 IS YES THEN YES OTHERWISE NO NO THEN NOT SAFE YES THEN SAFE MATH PROOF Here number is shown process number. Phishing Incident= Is process 1 is yes then go to process 2 otherwise no. Is process 2 is yes then go to process 3 otherwise no. Is process 3 is yes then go to process 4 otherwise no. 2015, SK Publisher All Rights Reserved ISSN: (Online) 15 P age

5 Is process 4 is yes then we are safe from the phishing attack and if any one of process 1 to three are no then process four are no that lies all the 1, 2, 3 process are yes then four yes =Secure against Phishing attack. THEORATICAL PROOF From the above proposed method we can see that we are safe from the phishing attack. The proposed method is divided into four method first one is the Self intelligency means that self control is main factor in the protect self against phishing and in this method you learn about the how to avoid phishing target. Now coming to second one Report against phishing if any one target to you for phishing first you report about that your service provider such as service provider or anti phishing organization government or private that working on Anti phishing. After that coming to next one that is Action means basically for service provider or Anti phishing organization take strict action about the reported phishing target. And last one is the Final that means how we do all in this method take care of all the above process if any fault in any of the above three process just prepare report about it or send a reminder message to all of above that you do own responsibility that lies tell to user report about phishing target that after that phishers not target anyone and technically do own responsibility of safe user to the phishing attack. VIII. CONCLUSION From the above result it seen that if we start working now on the proposed method the chance of phishing be less and now phishing increasing suddenly days to days, from the use of above method the increase phishing scams goes down in decreasing order and people are feel safe to the phishing attack. Basically from the my thinking one need of government organization that take care of final that I tell in last method and work of organization take care of above three process and time to time send reminder to user and Anti phishing organization. References 1. RAMZAN, ZULFIKAR (2010). "PHISHING ATTACKS AND COUNTERMEASURES". IN STAMP, MARK & STAVROULAKIS, PETER.HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY. ON 23 SEPTEMBER ON 24 SEPTEMBER Retrieved 25 September GAURAV KUMAR, NOVEL METHOD AND PROCEDURE FOR SYSTEM SECURITY On INTERNATIONAL JOURNAL OF ADVANCE ENGINEERING AND GLOBAL TECHNOLOGY IN VOLUME 3 ISSUE 9. ON 25 September "Safe Browsing (Google Online Security Blog)". Retrieved 25 September Microsoft Corporation. "What is social engineering?" Retrieved 25 September Retrieved 25 September Gaurav Kumar, Best Plan for System Security on International Journal of Advance Research in Computer Science & Technology In Volume 3 Issue 3. On 25 September Retrieved 25 September Paul, Andrew. "Phishing s: The Unacceptable Failures of American Express". Answers. Retrieved 25 September "What is spear phishing?". Microsoft Security At Home. Retrieved September 25, Stephenson, Debbie. "Spear Phishing: Who s Getting Caught?". Firmex. Retrieved 25 September "What Is 'Whaling'? Is Whaling Like 'Spear Phishing'?". About Tech. Archived from the original on On 25 September "Fake subpoenas harpoon 2,100 corporate fat cats". The Register. Archived from the original on On September 25, "HSBC Security and Fraud Center Phishing Scams,Fraud Protection". Hsbcusa.com. Retrieved Mutton, Paul. "Fraudsters seek to make phishing sites undetectableby content filters". Netcraft. On 25 September The use of Optical Character Recognition OCR software in spam filtering - PowerPoint PPT Presentation On 25 September Mutton,Paul. "PhishingWebsite Methods".FraudWatchInternational.On September 25, "Serious security flaw in OAuth, OpenID discovered".cnet.2 May On 25 September Kerstein, Paul (July 19, 2005). "How Can We Stop Phishing and Pharming Scams?". CSO. On 25 September McCall, Tom (December 17, 2007). "Gartner Survey Shows Phishing Attacks Escalated in 2007; More than $3 Billion Lost to These Attacks". Gartner on 25 September "20% Indians are victims of online phishing attacks: Microsoft". IANS. News.biharprabha.com. Retrieved 25 September , SK Publisher All Rights Reserved ISSN: (Online) 16 P age

6 AUTHOR(S) PROFILE Gaurav Kumar is pursuing the degree in Information Technology from the Maulana Abul Kalam Azad University of Technology (formerly known as West Bengal University of Technology) Kolkata, India. His research and study area are Information Security, Digital Watermarking, Digital Image Processing, Design and Analysis Of Algorithm, Operating System, Computer Architecture, Cloud Computing, Data structure, JAVA, C, C++, PYTHON. 2015, SK Publisher All Rights Reserved ISSN: (Online) 17 P age

Phoenix Information Technology Services. Julio Cardenas

Phoenix Information Technology Services. Julio Cardenas Phoenix Information Technology Services Julio Cardenas Email spam, also known as junk email or unsolicited bulk email (UBE), is a subset of electronic spam involving nearly identical messages sent to numerous

More information

Don t Fall Victim to Cybercrime:

Don t Fall Victim to Cybercrime: Don t Fall Victim to Cybercrime: Best Practices to Safeguard Your Business Agenda Cybercrime Overview Corporate Account Takeover Computer Hacking, Phishing, Malware Breach Statistics Internet Security

More information

Phishing Scams Security Update Best Practices for General User

Phishing Scams Security Update Best Practices for General User Phishing Scams Security Update Best Practices for General User hishing refers to the malicious attack Pmethod by attackers who imitate legitimate companies in sending emails in order to entice people to

More information

The Devil is Phishing: Rethinking Web Single Sign On Systems Security. Chuan Yue USENIX Workshop on Large Scale Exploits

The Devil is Phishing: Rethinking Web Single Sign On Systems Security. Chuan Yue USENIX Workshop on Large Scale Exploits The Devil is Phishing: Rethinking Web Single Sign On Systems Security Chuan Yue USENIX Workshop on Large Scale Exploits and Emergent Threats (LEET 2013) Web Single Sign On (SSO) systems Sign in multiple

More information

About junk e-mail protection

About junk e-mail protection About junk e-mail protection Entourage 2008 Junk E-Mail Protection Entourage has a built-in junk mail filter that helps separate junk e-mail also called spam from legitimate messages. By default, the level

More information

Conducting an Email Phishing Campaign

Conducting an Email Phishing Campaign Conducting an Email Phishing Campaign WMISACA/Lansing IIA Joint Seminar May 26, 2016 William J. Papanikolas, CISA, CFSA Sparrow Health System Estimated cost of cybercrime to the world economy in 2015 was

More information

Recognizing Spam. IT Computer Technical Support Newsletter

Recognizing Spam. IT Computer Technical Support Newsletter IT Computer Technical Support Newsletter March 23, 2015 Vol.1, No.22 Recognizing Spam Spam messages are messages that are unwanted. If you have received an e-mail from the Internal Revenue Service or the

More information

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,

More information

How to Identify Phishing E-Mails

How to Identify Phishing E-Mails How to Identify Phishing E-Mails How to recognize fraudulent emails and avoid being phished. Presented by : Miguel Fra, Falcon IT Services (miguel@falconitservices.com) http://www.falconitservices.com

More information

Advice about online security

Advice about online security Advice about online security May 2013 Contents Report a suspicious email or website... 3 Security advice... 5 Genuine DWP contacts... 8 Recognising and reporting phishing and bogus emails... 9 How DWP

More information

FSOEP Web Banking & Fraud: Corporate Treasury Attacks

FSOEP Web Banking & Fraud: Corporate Treasury Attacks FSOEP Web Banking & Fraud: Corporate Treasury Attacks Your Presenters Who Are We? Tim Wainwright Managing Director Chris Salerno Senior Consultant Led 200+ penetration tests Mobile security specialist

More information

Payment Fraud and Risk Management

Payment Fraud and Risk Management Payment Fraud and Risk Management Act Today! 1. Help protect your computer against viruses and spyware by using anti-virus and anti-spyware software and automatic updates. Scan your computer regularly

More information

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library ccayne@biblio.org Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup

More information

Cloud Services. Email Anti-Spam. Admin Guide

Cloud Services. Email Anti-Spam. Admin Guide Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...

More information

OIG Fraud Alert Phishing

OIG Fraud Alert Phishing U.S. EQUAL EMPLOYMENT OPPORTUNITY COMMISSION Washington, D.C. 20507 Office of Inspector General Aletha L. Brown Inspector General July 22, 2005 OIG Fraud Alert Phishing What is Phishing? Phishing is a

More information

BE SAFE ONLINE: Lesson Plan

BE SAFE ONLINE: Lesson Plan BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take

More information

A new fake Citibank phishing scam using advanced techniques to manipulate users into surrendering online banking access has emerged.

A new fake Citibank phishing scam using advanced techniques to manipulate users into surrendering online banking access has emerged. A new fake Citibank phishing scam using advanced techniques to manipulate users into surrendering online banking access has emerged. The Citibank scam tricks users into surrendering their online banking

More information

Deter, Detect, Defend

Deter, Detect, Defend Deter, Detect, Defend Deter Never provide personal information, including social security number, account numbers or passwords over the phone or Internet if you did not initiate the contact Never click

More information

Tahoe Tech Group serves as your technology partner with a focus on providing cost effective and long term solutions.

Tahoe Tech Group serves as your technology partner with a focus on providing cost effective and long term solutions. Tahoe Tech Group LLC Cyber Security Briefing Truckee Donner Chamber of Commerce March 6, 2015 Tahoe Tech Group serves as your technology partner with a focus on providing cost effective and long term solutions.

More information

Your Guide to Email Security

Your Guide to Email Security Your Guide to Email Security Protect your Information Email is a powerful way to connect with people. Unfortunately it also makes us vulnerable targets of scammers that can affect us from thousands of

More information

How to stay safe online

How to stay safe online How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware

More information

http://connectwise.reflexion.net/login?domain=connectwise.net

http://connectwise.reflexion.net/login?domain=connectwise.net ConnectWise Total Control: Managed Email Threat Protection Version: 1.5 Creation Date: 11-September-2009 Last Updated: 24-August-2012 LOGGING IN An e-mail will be or has sent with your username and password.

More information

Information Security Field Guide to Identifying Phishing and Scams

Information Security Field Guide to Identifying Phishing and Scams Information Security Field Guide to Identifying Phishing and Scams 010001010100101010001010011010101010101010101 01000101010011010010100101001010 1 Contents Introduction Phishing Spear Phishing Scams Reporting

More information

Online Security Information. Tips for staying safe online

Online Security Information. Tips for staying safe online Online Security Information ProCredit Bank is committed to protecting the integrity of your transactions and bank account details. ProCredit Bank therefore uses the latest security software and procedures

More information

How does the Excalibur Technology SPAM & Virus Protection System work?

How does the Excalibur Technology SPAM & Virus Protection System work? How does the Excalibur Technology SPAM & Virus Protection System work? All e-mail messages sent to your e-mail address are analyzed by the Excalibur Technology SPAM & Virus Protection System before being

More information

Identity Theft, Fraud & You. Prepare. Protect. Prevent.

Identity Theft, Fraud & You. Prepare. Protect. Prevent. Prepare. Protect. Prevent. Identity Theft, Fraud & You Fraud and identity theft incidents claimed fewer victims in 2010 than in previous years. But don t get too comfortable. Average out-of-pocket consumer

More information

When visiting online banking's sign-on page, your browser establishes a secure session with our server.

When visiting online banking's sign-on page, your browser establishes a secure session with our server. The privacy of communications between you (your browser) and our servers is ensured via encryption. Encryption scrambles messages exchanged between your browser and our online banking server. How Encryption

More information

Managing Junk Mail. About the Junk Mail Filter

Managing Junk Mail. About the Junk Mail Filter Managing Junk Mail Outlook can filter out certain types of messages and send them to a separate folder to keep your Inbox from being cluttered with junk mail. Outlook can also disable links in suspicious

More information

Social Engineering Toolkit

Social Engineering Toolkit Social Engineering Toolkit Author: 3psil0nLaMbDa a.k.a Karthik R, INDIA http://www.epsilonlambda.wordpress.com The social engineering toolkit is a project named Devolution, and it comes with Backtrack

More information

Phishing and the threat to corporate networks

Phishing and the threat to corporate networks Phishing and the threat to corporate networks A Sophos white paper August 2005 SUMMARY This paper explains the online fraud known as phishing, examining how it threatens businesses and looking at the dramatic

More information

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks White paper Phishing, Vishing and Smishing: Old Threats Present New Risks How much do you really know about phishing, vishing and smishing? Phishing, vishing, and smishing are not new threats. They have

More information

Authenticating and policing the internet for consumer confidence and security

Authenticating and policing the internet for consumer confidence and security Authenticating and policing the internet for consumer confidence and security Secure On-Line ID Introduction Unique zero intervention at a glance solution Built on positive site validation Allows policing

More information

SEC-GDL-005-Anatomy of a Phishing Email

SEC-GDL-005-Anatomy of a Phishing Email Technology & Information Services SEC-GDL-005-Anatomy of a Phishing Email Author: Paul Ferrier Date: 07/11/2014 Document Security Level: Document Version: PUBLIC 0.98 Document Ref: SEC-GDL-005 Document

More information

Dealing with Spam. February 16, 2012. Marc Berger SRJC Information Technology. Tuesday, April 10, 12

Dealing with Spam. February 16, 2012. Marc Berger SRJC Information Technology. Tuesday, April 10, 12 Dealing with Spam February 16, 2012 Marc Berger SRJC Information Technology Overview How Information Technology handles E-mail and Spam What you can do about E-mail and Spam Cloud-based E-mail What exactly

More information

Security Tips You are here: Home» Security Tips

Security Tips You are here: Home» Security Tips Security Tips You are here: Home» Security Tips Click on a the Security Icon to view detailed information on: Responsibility of the Bank Password Policy Guide Online Security Internet Security Tips Scam

More information

DON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise

DON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise Provided by: December 2014 Oliver James Enterprise DON T BE FOOLED BY EMAIL SPAM FREE GUIDE 1 This guide will teach you: How to spot fraudulent and spam e-mails How spammers obtain your email address How

More information

With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful.

With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful. With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful. Breach Overview Q: Media reports are stating that Target experienced a data breach. Can you provide more

More information

Creating smarter fish by customizing the pond What application developers can do to stop phishing

Creating smarter fish by customizing the pond What application developers can do to stop phishing Creating smarter fish by customizing the pond What application developers can do to stop phishing 12 July, 2006 Ron Ritchey Chief Scientist IATAC 703/377.6704 Ritchey_ronald@bah.com 0 Agenda Introduction

More information

Phishing Past, Present and Future

Phishing Past, Present and Future White Paper Phishing Past, Present and Future By Theodore Green, President, SpamStopsHere.com Abstract A particularly dangerous and now common type of spam known as "Phishing attempts to trick recipients

More information

ReadySpace Limited Unit J, 16/F Reason Group Tower, 403-413 Castle PeakRoad, Kwai Chung, N.T.

ReadySpace Limited Unit J, 16/F Reason Group Tower, 403-413 Castle PeakRoad, Kwai Chung, N.T. Reputation and Blacklist Monitoring Basic Professional Business Enterprise Reputation Monitoring Blacklist Monitoring Standard Malware Detection Scan for known Malware Scan for known viruses All pages

More information

Why is a strong password important?

Why is a strong password important? Internet Security Why is a strong password important? Identity theft motives: To gain access to resources For the challenge/fun Personal reasons Theft methods Brute forcing and other script hacking methods

More information

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft OVERVIEW 2 1. Cyber Crime Unit organization 2. Legal framework 3. Identity theft modus operandi 4. How to avoid online identity theft 5. Main challenges for investigation 6. Conclusions ORGANIZATION 3

More information

Social Application Guide

Social Application Guide Social Application Guide Version 2.2.0 Mar 2015 This document is intent to use for our following Magento Extensions Or any other cases it might help. Copyright 2015 LitExtension.com. All Rights Reserved

More information

A Hybrid Approach to Detect Zero Day Phishing Websites

A Hybrid Approach to Detect Zero Day Phishing Websites International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 17 (2014), pp. 1761-1770 International Research Publications House http://www. irphouse.com A Hybrid Approach

More information

SPAM, VIRUSES AND PHISHING, OH MY! Michael Starks, CISSP, CISA ISSA Fellow 10/08/2015

SPAM, VIRUSES AND PHISHING, OH MY! Michael Starks, CISSP, CISA ISSA Fellow 10/08/2015 SPAM, VIRUSES AND PHISHING, OH MY! Michael Starks, CISSP, CISA ISSA Fellow 10/08/2015 The Usual Players Indebtedness for driving on toll road Transaction receipts Notice to appear Major and Emerging Trends

More information

ModusMail Software Instructions.

ModusMail Software Instructions. ModusMail Software Instructions. Table of Contents Basic Quarantine Report Information. 2 Starting A WebMail Session. 3 WebMail Interface. 4 WebMail Setting overview (See Settings Interface).. 5 Account

More information

Online Shopping and a Phishing Pheeding Phrenzy

Online Shopping and a Phishing Pheeding Phrenzy Online Shopping and a Phishing Pheeding Phrenzy David Harley, ESET Senior Research Fellow Urban Schrott, IT Security & Cybercrime Analyst, ESET Ireland Introduction One of the earliest projects David Harley

More information

Online Cash Manager Security Guide

Online Cash Manager Security Guide Online Cash Manager Security Guide You re the One who can protect your business from the threat of a Corporate Account Takeover. 102 South Clinton Street Iowa City, IA 52240 1-800-247-4418 Version 1.0

More information

Shield Your Business - Combat Phishing Attacks. A Phishnix White Paper

Shield Your Business - Combat Phishing Attacks. A Phishnix White Paper A Phishnix White Paper Shield Your Business - Combat Phishing Attacks Aujas Information Risk Services 19925 Steven s Creek Blvd, Suite 100, Cupertino, CA 95014-2358 Phone: 1.855.PHISHNX Fax : +1 408 973

More information

Outlook Safe Sender s Filtering

Outlook Safe Sender s Filtering Outlook Safe Sender s Filtering User s Guide Also Guide to Making Internet Explorer More Secure By: Gregg Sterner Trellix Engineering Corp. Table of Contents Introduction... 1 This Manual... 3 Junk E-mail

More information

Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide

Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide Definitions Malware is term meaning malicious software. Malware is software designed to disrupt a computer system.

More information

Protect yourself online

Protect yourself online Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice

More information

Phishing: Facing the Challenge of Email Identity Theft with Proper Tools and Practices

Phishing: Facing the Challenge of Email Identity Theft with Proper Tools and Practices Phishing: Facing the Challenge of Email Identity Theft with Proper Tools and Practices A Leadfusion White Paper 2012 Leadfusion, Inc. All rights reserved. The Threat of Phishing Email is an indispensable

More information

mycampus Portal Student Email ASU Network Software Student Edition ASU IT Services 082212

mycampus Portal Student Email ASU Network Software Student Edition ASU IT Services 082212 mycampus Portal Student Email ASU Network Software Student Edition ASU IT Services 082212 YOUR STUDENT ACCOUNT AND EMAIL INFORMATION Are you admitted to ASU? If so, congratulations! You have an ASU account!

More information

Internet Security. For Home Users

Internet Security. For Home Users Internet Security For Home Users Basic Attacks Malware Social Engineering Password Guessing Physical Theft Improper Disposal Malware Malicious software Computer programs designed to break into and create

More information

Computer and Information Security End User Questionnaire

Computer and Information Security End User Questionnaire Computer and Information Security End User Questionnaire Human Factors Issues in Computer and Information Security Funded by the National Science Foundation: EIA-0120092 Project http://cis.engr.wisc.edu/

More information

Email Security. 01-15-09 Fort Mac

Email Security. 01-15-09 Fort Mac Email Security 01-15-09 Fort Mac Most Common Mistakes in Email Security Email Security 1. Using just one email account. 2. Holding onto spammed-out accounts too long. 3. Not closing the browser after logging

More information

Using big data analytics to identify malicious content: a case study on spam emails

Using big data analytics to identify malicious content: a case study on spam emails Using big data analytics to identify malicious content: a case study on spam emails Mamoun Alazab & Roderic Broadhurst Mamoun.alazab@anu.edu.au http://cybercrime.anu.edu.au 2 Outline Background Cybercrime

More information

Anti-Phishing Best Practices for ISPs and Mailbox Providers

Anti-Phishing Best Practices for ISPs and Mailbox Providers Anti-Phishing Best Practices for ISPs and Mailbox Providers Version 2.01, June 2015 A document jointly produced by the Messaging, Malware and Mobile Anti-Abuse Working Group (M 3 AAWG) and the Anti-Phishing

More information

Phishing Victims Likely Will Suffer Identity Theft Fraud

Phishing Victims Likely Will Suffer Identity Theft Fraud Markets, A. Litan Research Note 14 May 2004 Phishing Victims Likely Will Suffer Identity Theft Fraud Fifty-seven million U.S. adults think they have received a phishing e-mail. More than 1.4 million users

More information

APWG. (n.d.). Unifying the global response to cybecrime. Retrieved from http://www.antiphishing.org/

APWG. (n.d.). Unifying the global response to cybecrime. Retrieved from http://www.antiphishing.org/ DB1 Phishing attacks, usually implemented through HTML enabled e-mails, are becoming more common and more sophisticated. As a network manager, how would you go about protecting your users from a phishing

More information

Phishing the Web. $$$ Make money fast! $$$ Phishing the web / Peter Panter / 2004 12 27

Phishing the Web. $$$ Make money fast! $$$ Phishing the web / Peter Panter / 2004 12 27 Phishing the Web $$$ Make money fast! $$$ Agenda Introduction Phenomenon, developement in 2004 Method A: phishing by e mail Attack model, recent cases, detection and counter action Method B: phishing by

More information

Don t Click That Link and other security tips. Laura Perry Jennifer Speegle Mike Trice

Don t Click That Link and other security tips. Laura Perry Jennifer Speegle Mike Trice Don t Click That Link and other security tips Laura Perry Jennifer Speegle Mike Trice About Us Laura Perry Information Security Jennifer Speegle Firewall Administrator Mike Trice Network Engineer Mail

More information

WHITEPAPER. V12 Group www.v12groupinc.com 141 West Front Street, Suite 410 Red Bank, NJ 07701 info@v12groupinc.com 1.866.842.1001

WHITEPAPER. V12 Group www.v12groupinc.com 141 West Front Street, Suite 410 Red Bank, NJ 07701 info@v12groupinc.com 1.866.842.1001 WHITEPAPER Phishing Facts for Email Marketers: Understanding the phishing factor impact on your email programs. Email phishing attacks are destructive for everyone, it s not just the brands (and their

More information

WHITE PAPER. The Cost of Phishing: Understanding the True Cost Dynamics Behind Phishing Attacks

WHITE PAPER. The Cost of Phishing: Understanding the True Cost Dynamics Behind Phishing Attacks WHITE PAPER The Cost of Phishing: Understanding the True Cost Dynamics Behind Phishing Attacks A Cyveillance Report October 2008 EXECUTIVE SUMMARY How much do phishing attacks really cost organizations?

More information

Statistical Analysis of Internet Security Threats. Daniel G. James

Statistical Analysis of Internet Security Threats. Daniel G. James Statistical Analysis of Internet Security Threats Daniel G. James ABSTRACT The purpose of this paper is to analyze the statistics surrounding the most common security threats faced by Internet users. There

More information

Remote Deposit Quick Start Guide

Remote Deposit Quick Start Guide Treasury Management Fraud Prevention How to Protect Your Business Remote Deposit Quick Start Guide What s Inside We re committed to the safety of your company s financial information. We want to make you

More information

Protecting your business from fraud

Protecting your business from fraud Protecting your business from fraud KEY TAKEAWAYS > Understand the most common types of fraud and how to identify them. > What to do if you uncover fraudulent activity or suspect you are a victim of fraud.

More information

ORU IT 2014-15. Oral Roberts University Information Technology Student Guide

ORU IT 2014-15. Oral Roberts University Information Technology Student Guide ORU IT 2014-15 Oral Roberts University Information Technology Student Guide August 2014 Contents Contacting ORU IT... 2 Accessing ORU-Student Wireless on Campus... 2 How to Log into the ORU Web Apps...

More information

How To Help Protect Yourself From Identity Theft

How To Help Protect Yourself From Identity Theft How To Help Protect Yourself From Identity Theft January 20, 2015 Bryan Strong Senior Vice President and Director Information Security This complimentary interactive webinar is sponsored by Zions Bank

More information

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. 2001 2014 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks are hereby acknowledged. Microsoft and Windows are either registered

More information

Multi-Factor Authentication Reference Guide

Multi-Factor Authentication Reference Guide Multi-Factor Authentication Reference Guide March 2011 Support: (800) 350-3557 www.pacificwesternbank.com Table of Contents Multi-Factor Authentication (MFA) Required for All Customers...page 2 Challenge

More information

Advanced Security Methods for efraud and Messaging

Advanced Security Methods for efraud and Messaging Advanced Security Methods for efraud and Messaging Company Overview Offices: New York, Singapore, London, Tokyo & Sydney Specialization: Leader in the Messaging Intelligence space Market focus: Enterprise,

More information

Internet Usage (as of November 1, 2011)

Internet Usage (as of November 1, 2011) ebusiness Chapter 11 Online Payment Systems Internet Usage (as of November 1, 2011) United States Population: 312,521,655 Internet users: 245,000,000 (78.4% of population) Facebook users: 151,350,260 (61.8%

More information

Infocomm Sec rity is incomplete without U Be aware,

Infocomm Sec rity is incomplete without U Be aware, Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN

More information

Connecting to LUA s webmail

Connecting to LUA s webmail Connecting to LUA s webmail Effective immediately, the Company has enhanced employee remote access to email (Outlook). By utilizing almost any browser you will have access to your Company e-mail as well

More information

Data protection. Protecting your personal information online

Data protection. Protecting your personal information online Data protection Protecting your personal information online 3 Introduction More and more people are conducting their personal affairs online. Online shopping, social networking, job hunting and the ability

More information

Role of Computer Security in Identity Theft (November 2007)

Role of Computer Security in Identity Theft (November 2007) 1 Role of Computer Security in Identity Theft (November 2007) Charanjit Dhanoya, Chendursundaran Kumaragurubaran and Joey Ting Abstract Phishing is becoming a popular form of online identity theft. As

More information

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

Microsoft Phishing Filter: A New Approach to Building Trust in E-Commerce Content

Microsoft Phishing Filter: A New Approach to Building Trust in E-Commerce Content Microsoft Phishing Filter: A New Approach to Building Trust in E-Commerce Content The recent flurry of media coverage around identity theft and what is being called the new scam of phishing, in which online

More information

mycampus Portal Campus Email Voicemail Wireless Network Employee / Faculty Edition ASU IT Services 081914

mycampus Portal Campus Email Voicemail Wireless Network Employee / Faculty Edition ASU IT Services 081914 mycampus Portal Campus Email Voicemail Wireless Network Employee / Faculty Edition 1 ASU IT Services 081914 Accessing the mycampus Portal The mycampus Portal can be accessed using any web browser by entering

More information

AHS Computing. IE 7 Seminar

AHS Computing. IE 7 Seminar AHS Computing IE 7 Seminar What is IE 7? IE 7 is the new web-browser distributed by Microsoft New features with IE 7 make surfing the web easier and safer Tabbed Browsing New Favorites Center Built in

More information

January 2011 Report #49. The following trends are highlighted in the January 2011 report:

January 2011 Report #49. The following trends are highlighted in the January 2011 report: January 2011 Report #49 Spam made up 81.69% of all messages in December, compared with 84.31% in November. The consistent drop in spam made us wonder, did spammers take a holiday break? Global spam volume

More information

A Secure Login Process Using USB for Various Phishing Prevention System

A Secure Login Process Using USB for Various Phishing Prevention System International Journal of Computer Systems (ISSN: 2394-1065), Volume 01, Issue 02, November, 2014 Available at http://www.ijcsonline.com/ Amit Solanki, S. R. Dogiwal Dept. of Computer Science & Engineering,

More information

CYBER SECURITY. II. SCANDALOUS HACKINGS To show the seriousness of hacking we have included some very scandalous hacking incidences.

CYBER SECURITY. II. SCANDALOUS HACKINGS To show the seriousness of hacking we have included some very scandalous hacking incidences. CYBER SECURITY Mandar Tawde, Pooja Singh, Maithili Sawant, Girish Nair Information Technology, Government Polytechnic Mumbai 49, Kherwadi Ali Yawar Jung Marg, Bandra (E), Mumbai-400051, India mandar258@gmail.com,

More information

Outlook 2010 Essentials

Outlook 2010 Essentials Outlook 2010 Essentials Training Manual SD35 Langley Page 1 TABLE OF CONTENTS Module One: Opening and Logging in to Outlook...1 Opening Outlook... 1 Understanding the Interface... 2 Using Backstage View...

More information

December 2010 Report #48

December 2010 Report #48 December 2010 Report #48 With the holidays in full gear, Symantec observed an increase of 30 percent in the product spam category as spammers try to push Christmas gifts and other products. While the increase

More information

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Protect Yourself. Who is asking? What information are they asking for? Why do they need it? Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary

More information

Security And Backups. Topic Website Tutorial 18

Security And Backups. Topic Website Tutorial 18 Topic Website Tutorial 18 Security And Backups Since your online strategy is a core component of your business plan, you need to ensure that you are able to recover all your files should your website crash

More information

E-MAIL & INTERNET FRAUD

E-MAIL & INTERNET FRAUD FRAUD ALERT! FRAUD ALERT! Guarding Against E-MAIL & INTERNET FRAUD What credit union members should know to counter Phishing Pharming Spyware Online fraud On-Line Fraud Is Growing E-Mail and Internet Fraud

More information

WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES

WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES WEB PROTECTION Features SECURITY OF INFORMATION TECHNOLOGIES The web today has become an indispensable tool for running a business, and is as such a favorite attack vector for hackers. Injecting malicious

More information

Guide to credit card security

Guide to credit card security Contents Click on a title below to jump straight to that section. What is credit card fraud? Types of credit card fraud Current scams Keeping your card and card details safe Banking and shopping securely

More information

Where every interaction matters.

Where every interaction matters. Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper

More information

Forefront Online Protection for Exchange (FOPE) User documentation

Forefront Online Protection for Exchange (FOPE) User documentation Forefront Online Protection for Exchange (FOPE) User documentation About Your FOPE Quarantine Mailbox Applies To: Forefront Online Protection for Exchange This document will help you get started with the

More information

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer

More information

Identity Theft Protection

Identity Theft Protection Identity Theft Protection Email Home EDUCATION on DANGER ZONES Internet Payments Telephone ID theft occurs when someone uses your personal information with out your knowledge to commit fraud. Some terms

More information

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers. Employee Security Awareness Survey Trenton Bond trent.bond@gmail.com Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is

More information

Phishing. Exciting horror stories and the very boring antidote

Phishing. Exciting horror stories and the very boring antidote Phishing Exciting horror stories and the very boring antidote EXPECTATIONS WHAT YOU LL KNOW, AND NOT KNOW, AFTER I M DONE WITH YOU WHAT YOU WILL KNOW How the phishing attack is carried out Some really

More information

Malicious Email Mitigation Strategy Guide

Malicious Email Mitigation Strategy Guide CYBER SECURITY OPERATIONS CENTRE Malicious Email Mitigation Strategy Guide Introduction (UPDATED) SEPTEMBER 2012 1. Socially engineered emails containing malicious attachments and embedded links are commonly

More information

Internet Basics. Meg Wempe, Adult Services Librarian ABOUT THIS CLASS. P a g e 1

Internet Basics. Meg Wempe, Adult Services Librarian ABOUT THIS CLASS. P a g e 1 P a g e 1 Internet Basics ABOUT THIS CLASS This class is designed to provide a basic introduction to accessing and navigating the internet (a.k.a. the world wide web or the web ). Throughout the class,

More information