Security Guide to Social Networks
|
|
|
- Clemence Phillips
- 10 years ago
- Views:
Transcription
1 Security Guide to Social Networks Trend Micro, Incorporated By: David Sancho Senior Threat Researcher A Trend Micro White Paper I August 2009
2 TABLE OF CONTENTS INTRODUCTION...3 PRIVACY IN A CONNECTED WORLD: DATA MINING IN SOCIAL NETWORKS...4 CREATING LARGE NETWORKS...6 WHEN CODE BREAKS...8 BEST PRACTICES...9 REFERENCES WHITE PAPER SECURITY GUIDE TO SOCIAL NETWORKS
3 INTRODUCTION Social networking sites are websites designed for human interaction. They enable users to meet others; keep in touch with them; and share experiences, feelings, and opinions. They are all built on a similar foundation the user builds a network of contacts bound by an element of trust. The user then creates content for his/her friends and, in turn, accesses the content they have created. This content can include such diverse things as holiday pictures, interesting links, latest news, opinions, comments, and mood updates. The potential for mischief and malicious activities arises when one or more of those contacts breaks your trust. When that happens, a number of things can go wrong such as: Your contact s account was compromised and somebody else is using it. You added somebody to your network that you thought you knew but, in fact, you did not. You added somebody you thought was trustworthy but he/she turns out not to be. Insufficient use of privacy controls caused you to share data with people you never intended. This document will cover the most common areas of attack using social networks and will recommend ways of minimizing risks. The goal of this paper is not to stop you from participating in social networks but to enable you to use them more safely. 3 WHITE PAPER SECURITY GUIDE TO SOCIAL NETWORKS
4 PRIVACY IN A CONNECTED WORLD: DATA MINING IN SOCIAL NETWORKS Social networks contain a wealth of personal information. People share their date of birth, address, home address, family ties, and pictures. Some of that information would not be valuable by itself but having a clear picture of everything about a person can give attackers ideas and information required to perform other attacks such as credit card fraud or identity theft. Any real-life targeted attack can be made much more effective through access to additional information about the intended victim. In addition to this, underground forums sell personal information. Your data can be mined and stored somewhere in the dark corners of the Internet waiting for a criminal to pay the right price for it. Criminals can use this information to obtain birth certificates/passports/other documentation and fake real-life identities. Some countries have looser controls than others, but in general, identity theft is something that already happens regularly. Other data that is of interest to criminals include addresses, physical addresses, dates of birth, and affiliations: Social networks contain a wealth of information. These include: Date of birth address Home address Family ties Pictures addresses are entered into databases that are later used for spam campaigns. addresses that come from social networks can be further categorized to improve the impact of the campaign race, age, country and other factors can be used as filters in such a database so that its market price is higher than just any normal address database. addresses can also be of great value in spearphishing campaigns where they are often used as sender addresses. Spear-phishing is a very targeted phishing attack so using a known contact from a friends list adds credibility to the malicious and increases the chances of success for the criminal. Real-life addresses are often shared in social networking sites and they too can be used to amass mailing databases for advertising purposes in a similar way as described above. TrendLabs researchers have reported prices of personal information ranging from US$50 per stolen bank account credentials to about US$8 per million addresses. This last figure is likely to be much higher if it involves fresh addresses coming from a social networking site. [1] Date of birth data is used by different companies to confirm people s identities over the telephone. Criminals do not have databases but they do have tools to automate date of birth searches in social networking sites. This proves that there is a demand for this information as a complementary piece in order to perpetrate certain types of fraud. Another factor that exacerbates this massive data-leakage potential is a user s public profile. When users set their information to be accessible without logging in to the social networking site, that informa- Figure 1. Sample pipl profile page 4 WHITE PAPER SECURITY GUIDE TO SOCIAL NETWORKS
5 tion can be indexed in search engines or any other archive. There are social networking search engines that can search all available data about any name in a certain region. This makes the lives of stalkers, fraudsters, or any other attacker much easier. Not only do Google and other crawlers gather publicly available information but there are also meta-search engines like pipl.com specifically designed to search social networking sites and other sources to gather all sorts of information, from your name and the names of your friends to all the holiday pictures from three years ago that you already forgot you published online. In July 2009, the wife of a high-level government executive in the United Kingdom published personal data in a social networking site. This garnered a lot of attention, not for the confidentiality of the content but for the lack of awareness there is about the accessibility of your online content. There is also another issue at play here, which is the fact that once you publish any picture online, you lose control over it as people leech and republish it on places you do not even know. In this case, news sites were some of the first to republish the infamous family pictures originally shared by the said executive s wife. [2] It is worth mentioning the fact that Human Resource (HR) departments are already utilizing information on social networks public profiles to know more about job candidates. A certain online recruitment website reports that 20% of employers use social networking sites to run searches on job applicants and 68% use search engines like Google and Yahoo! to check on candidates. [3] Although this common practice is not strictly illegal, it might be ethically questionable. 5 WHITE PAPER SECURITY GUIDE TO SOCIAL NETWORKS
6 CREATING LARGE NETWORKS Social networking sites not only facilitate interacting with personal and professional contacts but also locating them in the first place. They are intended for both connecting and reconnecting people. It is fairly simple for miscreants to create a large network of contacts by using any number of underhanded techniques such as: Creating a fake celebrity profile and allowing people to add them to their contact lists. Creating a duplicate of somebody s profile and re-inviting all of their friends. Creating a profile, adding themselves to a medium-sized group or community, and inviting a number of members of the group (universities, schools, etc.). Then joining a second group and starting again. Creating a female profile and publishing a pretty picture of herself then letting people add him/her to their lists. A lot of people use social networking sites to meet their partners online and many of these sites have specific tools to facilitate this. There are a number of strategies that allow an attacker to break the circle of trust and get into people s contact lists. A lot of social network users do not realize that their contact lists really is a circle of trust and by adding somebody they do not know celebrities included they are opening their data to untrusted parties. Some sites do not have privacy controls in place, or the ones they have do not protect all user data. Even if they do have comprehensive privacy controls, the user is often not obligated to select who can access his/her data and is often dissuaded from using the available controls because they appear too complex or time-consuming. Many users simply do not bother to configure these controls, be it for laziness or lack of knowledge. This means that whether by the site s design or the user s lack of interest, personal data is needlessly exposed to strangers, search engines, and the wider online world. So, what can an attacker do with a large network of contacts in a social networking site? One obvious possibility is advertise. By writing/commenting on people s profiles or sending private mail, the attacker can distribute links advertising websites and products. If this strategy is done subtly, it can work relatively well, although usually this will be too much effort for any attacker. Contacts will quickly notice that the posts are covert advertising and will delete/block the attacker altogether. The same can be accomplished by private Web messaging, which all social sites allow but it is similarly ineffective for the same reasons stated above. These kinds of social networking spam runs are usually of a very limited duration and come from pay-per-click or pay-per-action affiliate-based online marketing schemes. So what can an attacker do with a large network of contacts in a social networking site? One obvious possibility is advertise. The second possibility is collect contact information such as addresses or telephone numbers. The third possibility is phishing and/ or malware installation. The second possibility is the collection of contact information such as addresses or telephone numbers. Those social sites that display your friends contact information can be used to amass working databases along with phone numbers or other data that can serve to better target future spam, phishing, and vishing (voice phishing) campaigns. There are people amassing large contact databases, which are later sold to spammers, scammers, and credit card fraudsters. The value of such a database is measured on the quality of the data. Older databases have been spammed over and over so the addresses might have been abandoned or accounts closed altogether. The more valuable databases include fresh working s such as the ones you can find in social networking sites. This kind of data is not only useful for conducting campaigns but also has value in itself and can be sold through the underground economy. The third possibility is for phishing and/or malware installation. Imagine this scenario the attacker creates a phishing page identical to Facebook s login page. Then they change their status line to check this funny video I found yesterday and a link to the fake page. When people click the link, they are presented with a fake Facebook login page, which they use to log in again, perhaps thinking that somehow their session had timed out. At this point, the attacker has the victim s username and password but the attack does not end there. After logging in, the fake page displays a funny video that 6 WHITE PAPER SECURITY GUIDE TO SOCIAL NETWORKS
7 exploits a browser vulnerability and installs a Trojan in the background. This is not a hypothetical scenario but a high-level description of the activities of the malware known as KOOBFACE that have been successful spreading on a number of Figure 2. Sample malicious Facebook personal message social networks. This is already happening and, as has always been the case with malware attacks, they will continue to get more and more complex as users become increasingly careful with the links they click. This is the real danger of social and community-based sites users trust their contacts to not send bad links, to not to try to infect their computers and take good care of their personal data. Once the trust is broken any of those situations can happen at any time. The real finesse comes from masking those bad links as if they were good. A normal user will probably have no problem clicking on a youtube.com link coming from an online contact but might be more careful with a badsite.org link. Enter URL shorteners. These online redirection services purposely hide a URL in order to make it shorter. Masked malicious URLs do not look dangerous before clicking on them. After that click, though, it is often too late. These shortening services are so widely used that people do not think twice before clicking one of them, even without knowing what lurks behind. URL shorteners are a security concern and should be taken very seriously. Figure 3. Sample malicious video linked to a Facebook personal message 7 WHITE PAPER SECURITY GUIDE TO SOCIAL NETWORKS
8 WHEN CODE BREAKS Another attack vector is the exploitation of programming flaws in websites. These Web pages have been made by humans and they can have errors that could compromise the site s security measures. This has happened a number of times to well-known social networking sites and will likely happen again in the future. In these occurrences, all users are at risk. Poorly thought-out security, weak administration practices, or badly written code can all help an attacker to gather your data or help them stage a bigger attack against any number of users. There have been instances of security flaws on Facebook that allowed anybody to access the basic information data of any user, no matter what their security settings were. [4] This attack was released by casual users after Facebook ignored the users warnings for a few days. No great knowledge was needed in this case to exploit a security weakness. Twitter has had cross-site scripting attacks performed against it. In these cases, the attackers could change the Twitter status of any user accessing the attacker s account. This meant that the bad guys could make you tweet bad links so your Twitter followers would be at risk of being infected. [5] MySpace was attacked in 2007 by a JavaScript that would copy itself to the viewer s profile along with a piece of text Samy is my hero. This was caused by a security flaw that could have caused the victim to run any other command like redirecting the page to a malicious website. Thankfully, the young man who discovered the flaw and created the worm only wanted to have more friends added to his profile. [6] These three examples are not the only cases of security flaws on social networking sites. In fact, such flaws are identified frequently. News about such security holes are released every month and are a concern for all affected websites and their users. Since their solution is out of the user s hands, it is difficult or impossible to do anything about them. Social networking sites keep adding to their security controls and refining their existing ones but, as in any development project, they also continue to innovate on their platforms and add exciting new features. These new options need to keep up with the security features or they too will suffer from security weaknesses. This is a cat-and-mouse game where the privacy and data security of the users are at stake. Social networking sites keep adding to their security controls and refining their existing ones but, as in any development project, they also continue to innovate on their platforms and add exciting new features. These new options need to keep up with the security features or they too will suffer from security weaknesses. 8 WHITE PAPER SECURITY GUIDE TO SOCIAL NETWORKS
9 BEST PRACTICES Social networking and community-based online services offer great fun and many benefits, both to individual users and to organizations. Users can reestablish contact with old school friends, find activity or even life partners, create art, and make new friends. Companies can leverage them to build their brand, get invaluable information about what their customers really think, and fix problems as they arise, among many other value-adding activities. However, social networking sites can also be a source of personal information leaks. They can also become a malware attack vector when not used cautiously. There are ways to manage the risks. For starters, you should only publish information that you are perfectly comfortable with, depending on what you want to accomplish. In a dating site, you will want to state your age but not your exact birthday. Likewise, in a site where you plan to meet your high school friends, your year of graduation is probably the most important thing and date of birth will not be something you need to share at all. This may sound logical on a security standpoint but many people do not give it a second thought when opening their accounts. The second recommendation is to add only people you trust to your contact list. Every time you receive a request from somebody to be your contact, ask yourself if you really trust that this person will keep your data safe and if their intentions are legitimate. If you are going to use the social network to meet new people and therefore plan to add unknown persons, set up a special address and minimize the amount of personal information you share. In this case, avoid clicking on unexpected links coming from them and never fully trust any of those contacts. The following are ways to minimize risks in social networks: You should only publish information that you are perfectly comfortable with, depending on what you want to accomplish. Add only people you trust to your contact list. Avoid clicking unexpected links coming from people you do not know. Never fully trust anyone you do not know that well. As my good friend Rik Ferguson always says, the rule of thumb for this is asking yourself Would I give this information to a stranger over the phone? If the answer is no, then you should not be posting it online, as they amount to the same thing. Wise words, Rik. 9 WHITE PAPER SECURITY GUIDE TO SOCIAL NETWORKS
10 REFERENCES [1] [2] [3] [4] [5] [6] TREND MICRO Trend Micro Incorporated is a pioneer in secure content and threat management. Founded in 1988, Trend Micro provides individuals and organizations of all sizes with award-winning security software, hardware and services. With headquarters in Tokyo and operations in more than 30 countries, Trend Micro solutions are sold through corporate and value-added resellers and service providers worldwide. For additional information and evaluation copies of Trend Micro products and services, visit our Web site at TREND MICRO INC N. De Anza Blvd. Cupertino, CA US toll free: phone: fax: WHITE PAPER SECURITY GUIDE TO SOCIAL NETWORKS 2009 by Trend Micro, Incorporated. All rights reserved. Trend Micro, the Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners.
PROTECT YOUR COMPUTER AND YOUR PRIVACY!
PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That
Email Privacy 101. A Brief Guide
Trend Micro, Incorporated A brief guide to adding encryption as an extra layer of security to protect your company in today s high risk email environment. A Trend Micro White Paper I February 2009 A brief
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
BE SAFE ONLINE: Lesson Plan
BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take
White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks
White paper Phishing, Vishing and Smishing: Old Threats Present New Risks How much do you really know about phishing, vishing and smishing? Phishing, vishing, and smishing are not new threats. They have
N-CAP Users Guide. Everything You Need to Know About Using the Internet! How Worms Spread via Email (and How to Avoid That)
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Worms Spread via Email (and How to Avoid That) How Worms Spread via Email (and How to Avoid That) Definitions of: A Virus: is
10 Quick Tips to Mobile Security
10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22
How to Configure Your Account s Privacy Settings
Making the Most Out of Facebook s Privacy Settings How to Configure Your Account s Privacy Settings Rik Ferguson, Vice President Security Research Making the Most Out of Facebooks Privacy Settings As a
OCT Training & Technology Solutions [email protected] (718) 997-4875
OCT Training & Technology Solutions [email protected] (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,
WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World
Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING Web Threats Are Serious Business Your
Email Security. 01-15-09 Fort Mac
Email Security 01-15-09 Fort Mac Most Common Mistakes in Email Security Email Security 1. Using just one email account. 2. Holding onto spammed-out accounts too long. 3. Not closing the browser after logging
Social Network Security. Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA)
Social Network Security Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA) How Do We Communicate Today? I can write you a letter by snail mail. I can write you a letter
How To Integrate Hosted Email Security With Office 365 And Microsoft Mail Flow Security With Microsoft Email Security (Hes)
A Trend Micro Integration Guide I August 2015 Hosted Email Security Integration with Microsoft Office 365» This document highlights the benefits of Hosted Email Security (HES) for Microsoft Office 365
WHY DOES MY SPEED MONITORING GRAPH SHOW -1 IN THE TOOLTIP? 2 HOW CAN I CHANGE MY PREFERENCES FOR UPTIME AND SPEED MONITORING 2
FAQ WHY DOES MY SPEED MONITORING GRAPH SHOW -1 IN THE TOOLTIP? 2 HOW CAN I CHANGE MY PREFERENCES FOR UPTIME AND SPEED MONITORING 2 WHAT IS UPTIME AND SPEED MONITORING 2 WHEN I TRY TO SELECT A SERVICE FROM
DON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise
Provided by: December 2014 Oliver James Enterprise DON T BE FOOLED BY EMAIL SPAM FREE GUIDE 1 This guide will teach you: How to spot fraudulent and spam e-mails How spammers obtain your email address How
Defense Media Activity Guide To Keeping Your Social Media Accounts Secure
Guide To Keeping Your Social Media Accounts Secure Social media is an integral part of the strategic communications and public affairs missions of the Department of Defense. Like any asset, it is something
Trend Micro Incorporated Research Paper 2012. Adding Android and Mac OS X Malware to the APT Toolbox
Trend Micro Incorporated Research Paper 2012 Adding Android and Mac OS X Malware to the APT Toolbox Contents Abstract... 1 Introduction... 1 Technical Analysis... 2 Remote Access Trojan Functionality...
What you need to know to keep your computer safe on the Internet
What you need to know to keep your computer safe on the Internet Tip 1: Always install Operating System updates The most important steps for any computer user is to always install updates, especially security
Welcome to the Protecting Your Identity. Training Module
Welcome to the Training Module 1 Introduction Does loss of control over your online identities bother you? 2 Objective By the end of this module, you will be able to: Identify the challenges in protecting
INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. [email protected]
INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library [email protected] Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup
Computer Security Self-Test: Questions & Scenarios
Computer Security Self-Test: Questions & Scenarios Rev. Sept 2015 Scenario #1: Your supervisor is very busy and asks you to log into the HR Server using her user-id and password to retrieve some reports.
Streamlining Web and Email Security
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor
When you listen to the news, you hear about many different forms of computer infection(s). The most common are:
Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than ever. Thanks to the Internet, you can conduct your banking,
Protect Yourself. Who is asking? What information are they asking for? Why do they need it?
Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary
The Dark Side of Trusting Web Searches From Blackhat SEO to System Infection
The Dark Side of Trusting Web Searches From Blackhat SEO to System Infection Trend Micro, Incorporated Marco Dela Vega and Norman Ingal Threat Response Engineers A Trend Micro Research Paper I November
Recommended Practice Case Study: Cross-Site Scripting. February 2007
Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber
Cyber Security. Maintaining Your Identity on the Net
Cyber Security Maintaining Your Identity on the Net Why Cyber Security? There are three points of failure in any secure network: Technology (hardware and software) Technology Support (ITS) End Users (USD
1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.
Employee Security Awareness Survey Trenton Bond [email protected] Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is
What are the common online dangers?
ONLINE SECURITY GUIDELINES Internet Banking is convenient and times saving. You can do remittances, place online deposit and other transactions through online banking with the convenience and privacy of
Latest Business Email Compromise Malware Found: Olympic Vision
A TrendLabs Report Latest Business Email Compromise Malware Found: Olympic Vision Technical Brief TrendLabs Security Intelligence Blog Jaaziel Carlos Junestherry Salvador March 2016 Introduction Olympic
ONLINE IDENTITY THEFT KEEP YOURSELF SAFE FROM BESTPRACTICES WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR
ONLINE IDENTITY THEFT KEEP YOURSELF SAFE FROM BESTPRACTICES 01 One must remember that everyone and anyone is a potential target. These cybercriminals and attackers often use different tactics to lure different
Shield Your Business - Combat Phishing Attacks. A Phishnix White Paper
A Phishnix White Paper Shield Your Business - Combat Phishing Attacks Aujas Information Risk Services 19925 Steven s Creek Blvd, Suite 100, Cupertino, CA 95014-2358 Phone: 1.855.PHISHNX Fax : +1 408 973
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,
Phishing Scams Security Update Best Practices for General User
Phishing Scams Security Update Best Practices for General User hishing refers to the malicious attack Pmethod by attackers who imitate legitimate companies in sending emails in order to entice people to
Customer Awareness for Security and Fraud Prevention
Customer Awareness for Security and Fraud Prevention Identity theft continues to be a growing problem in our society today. All consumers must manage their personal information wisely and cautiously to
GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE
GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE Defense Media Activity TABLE OF CONTENTS PROTECTIVE MEASURES... 2 PREPARATION CHECKLIST... 2 IF YOU SUSPECT YOUR ACCOUNT IS COMPROMISED, THE FOLLOWING
How to stay safe online
How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware
Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:
Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for
TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY. Mark Villinski @markvillinski
TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY Mark Villinski @markvillinski Why do we have to educate employees about cybersecurity? 2014 Corporate Threats Survey 94% of business s suffered one
Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May 2014. TrustInAds.org. Keeping people safe from bad online ads
Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams May 2014 TrustInAds.org Keeping people safe from bad online ads OVERVIEW Today, even the most tech savvy individuals can find themselves
Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction
Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID
Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation By Marc Ostryniec, vice president, CSID The increase in volume, severity, publicity and fallout of recent data breaches
Top 10 Tips to Keep Your Small Business Safe
Securing Your Web World Top 10 Tips to Keep Your Small Business Safe Protecting your business against the latest Web threats has become an incredibly complicated task. The consequences of external attacks,
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Addressing Big Data Security Challenges: The Right Tools for Smart Protection
Addressing Big Data Security Challenges: The Right Tools for Smart Protection Trend Micro, Incorporated A Trend Micro White Paper September 2012 EXECUTIVE SUMMARY Managing big data and navigating today
Policy for Social Media Usage in Catawba County
Policy for Social Media Usage in Catawba County Adopted March 1, 2010 Revised September 7,2010 1. PURPOSE The role of technology in the 21 st century workplace is constantly expanding and now includes
How Do People Use Security in the Home
How Do People Use Security in the Home Kaarlo Lahtela Helsinki University of Technology [email protected] Abstract This paper investigates home security. How much people know about security and how
High Speed Internet - User Guide. Welcome to. your world.
High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a
Basic Security Considerations for Email and Web Browsing
Basic Security Considerations for Email and Web Browsing There has been a significant increase in spear phishing and other such social engineering attacks via email in the last quarter of 2015, with notable
QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY
QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY EXPLOIT KITS UP 75 PERCENT The Infoblox DNS Threat Index, powered by IID, stood at 122 in the third quarter of 2015, with exploit kits up 75 percent
Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical to Today s Enterprise
Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical to Today s Enterprise White Paper Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical
Perception and knowledge of IT threats: the consumer s point of view
Perception and knowledge of IT threats: the consumer s point of view It s hard to imagine life without digital devices, be it a large desktop computer or a smartphone. Modern users are storing some of
Cybercrime Prevention and Awareness
April, 2014 Cybercrime Prevention and Awareness Basic Security Principles to Help You Better Navigate Through Cyberspace To join conference call dial (305) 433-6663 option 4 PIN # 42014 Presented by: Miguel
Everyone s online, but not everyone s secure. It s up to you to make sure that your family is.
TrendLabs Everyone s online, but not everyone s secure. It s up to you to make sure that your family is. We live out our digital lives on the Internet. There, communication is quicker and easier, and our
FRAUD ALERT THESE SCAMS CAN COST YOU MONEY
FRAUD ALERT THESE SCAMS CAN COST YOU MONEY Phishing spear phishing vishing smishing debit card skimming fake check scams THE COMMON SENSE PRECAUTIONS INSIDE CAN KEEP YOU SAFE! SCHEMES SCAMS FRAUDS Criminals
Money and shopping 8.1 Online banking. Beginner s guide to. Wider interests
Wider interests Use this document with the glossary Beginner s guide to Money and shopping 8.1 Online banking This activity will help you register to bank online and get you started with your online banking
INSIDE. Cyberterrorism and the Home User By Sarah Gordon, Senior Research Fellow
Symantec Security Response WHITE PAPER Cyberterrorism and the Home User By Sarah Gordon, Senior Research Fellow Symantec Security Response INSIDE What it is? How does this affect me? What can I do to make
Email Correlation and Phishing
A Trend Micro Research Paper Email Correlation and Phishing How Big Data Analytics Identifies Malicious Messages RungChi Chen Contents Introduction... 3 Phishing in 2013... 3 The State of Email Authentication...
E-MAIL FILTERING FAQ
V8.3 E-MAIL FILTERING FAQ COLTON.COM Why? Why are we switching from Postini? The Postini product and service was acquired by Google in 2007. In 2011 Google announced it would discontinue Postini. Replacement:
Tips for Banking Online Safely
If proper attention is given to safety and security, banking and monetary activities can be completed online in a convenient and effective fashion. This guide helps to establish procedures for remaining
Almost 400 million people 1 fall victim to cybercrime every year.
400,000000 Almost 400 million people 1 fall victim to cybercrime every year. A common way for criminals to attack people is via websites, unfortunately this includes legitimate sites that have been hacked
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
NAVY COMMAND PRINCIPAL SECURITY ADVISOR RECOMMENDED FACEBOOK SECURITY SETTINGS
NAVY COMMAND PRINCIPAL SECURITY ADVISOR RECOMMENDED FACEBOOK SECURITY SETTINGS NC PSyA Recommended Facebook Settings - October 2014 1 Introduction 3 Privacy Shortcuts 3 Privacy Settings and Tools 6 General
A6- Sensitive Data Exposure
OWASP Vulnerabilities and Attacks Simplifie d: Business Manager Series Part 2 Have you heard of the times when Fantastic Frank from Randomland was furious? Money and critical data was being stolen from
EMAIL ACCOUNT TAKEOVER TO IDENTITY TAKEOVER
EMAIL ACCOUNT TAKEOVER TO IDENTITY TAKEOVER March 2013 Phishing attacks are notorious for their potential harm to online banking and credit card users who may fall prey to phishers looking to steal information
DIGITAL LIFE E-GUIDE How to Protect your Smartphone
A DIGITAL LIFE E-GUIDE How to Protect your Smartphone It s been said that information is the new currency. 1 Carrying a smartphone nowadays is like having a second wallet. Instead of containing money
eprism Email Security Suite
FAQ V8.3 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks
What Spammers Don t Want You To Know About Permanently Blocking Their Vicious E-mails
2000 Linwood Ave Suite 19J Fort Lee, NJ 07024-3012 What Spammers Don t Want You To Know About Permanently Blocking Their Vicious E-mails Following Last Year s Hack Attack At Epsilon, You May Be Overwhelmed
National Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
Malware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
Safe Practices for Online Banking
November 2012 Follow these guidelines to help protect your information while banking online. At First Entertainment Credit Union, our goal is to provide you with the best all around banking experience.
