OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft
|
|
- Christine Pierce
- 8 years ago
- Views:
Transcription
1
2 OVERVIEW 2 1. Cyber Crime Unit organization 2. Legal framework 3. Identity theft modus operandi 4. How to avoid online identity theft 5. Main challenges for investigation 6. Conclusions
3 ORGANIZATION 3 DIRECTORATE OF COUNTERING ORGANIZED CRIME Trafficking of Human Beings Money Laundering and financing the terrorism Central CyberCrime Unit Drugs Trafficking
4 CYBER CRIME UNIT - ORGANIZATION 4 Central Service for Countering Computer Crimes 1 st Bureau: E-Commerce Frauds and Payment card frauds 2 nd Bureau: Computer Forensic 3 rd Bureau: Child Pornography 4 rd Bureau: Computer related crimes 15 BCCO Cyber Crime Unit 7-10 police officers 27 County Offices 1-4 cyber police officers
5 LEGAL FRAMEWORK IN ROMANIA 5 Penal Code! ART. 360 Illegal acces to a computer system! ART. 361 Illegal interception of a computer data transmission! ART. 362 Computer data alteration! ART. 363 Operation disruption of computer systems! ART. 364 Unauthorized data transfer! ART. 365 Illegal operations with digital devices and software! ART. 249 Computer fraud! ART. 374 Child pornography through computer systems! ART. 250 Making fraudulent financial operations! ART. 251 Accepting transactions made fraudulently
6 IDENTITY THEFT MODUS OPERANDI! AUCTION FRAUDS! PHISHING / PHARMING / SPEARPHISHING! VISHING / SMISHING! SOCIAL NETWORK IDENTITY THEFT! MALWARE MOBILE APPS! SKIMMING 6
7 AUCTION FRAUDS 7! Seller account takeover! Posting products for sale! Luring the victim with to good to be true deals! Setting up a money cashing network! Money laundering
8 PHISHING 8 MAIN USES:! obtaining payment card information! obtaining online bank accounts! obtaining usernames and password for different types of accounts (Yahoo, Gmail, Paypal, Facebook, etc )
9 PHISHING 9 BASIC STEPS:! Identifying a target and preparing for the attack! Launch the attack! Data gathering! Checking phished informations! Using phished informations and obtaining money
10 PHISHING identifying a target 10! The phisher usually targets banks or other financial institutions! The phisher will decide on the method of attack, which will often be some combination of phishing, pharming, deceptive downloads, and other available techniques! The beginners collaborate with other phishers, in order to learn how to operate and to carry out the attack! The most experienced ones, recruit accomplices for some parts of the attack
11 PHISHING - launch the attack 11! The attacker has to send out the bait for a phishing attack or find some other way to attack the consumer.! The best-known phishing attack is an that asks the user for personal information.! Other attacks could be deceptive downloads onto user computers, pharming attacks, and recruiting insiders who can help in harvesting personal information.
12 PHISHING - launch the attack! The phishing attack conducted through 12 " Obtaining lists of accounts (millions of accounts) " Using mass sender software and hacked servers, the attacker will send messages to potential victims; " Create or customizing a fake websites " Create an account, used as a dropbox for receiving information; " Upload fake websites on compromised servers or on hosting servers which the attacker has bought using previous stolen credit card information. " Preparing backup servers, in case the first servers will be blocked by ISPs or law enforcement
13 PHISHING - launch the attack! Deceptive downloads: 13! Could turn user system into a zombie where the attacker is able to remotely control system resources, so user computer become part of a BotNet.! Spam perpetuates phishing attacks. BotNets can send spam and launch Distributed Denial of Service attacks (DDOS).! The attacker also try to get search engines to promote their spoofed links by paying for sponsored links or using the BotNets to cheat the rank algorithm.! The most insidious form of deceptive software is a rootkit which installs at or below the level of the operating system to avoid detection! Pharming:! compromises DNS servers which redirect a user to the attacker site even when the user enters or clicks on a trusted link. Rogue software can edit a local hosts file to effect the same action.
14 PHARMING 14 A pharming attack occurs when users are redirected from an authentic to a fraudulent website that replicates the original in appearance
15 PHISHING - data gathering Major ways to harvest the data : 15! user entry of data, such as on a spoofed Web site or in an ;! software capture of data, such as by logging the consumer keystrokes or sniffing traffic in the network.
16 PHISHING checking phished informations! Once the criminals have gathered personal data, they have to decide how to use it. 16! For attacks against a financial institution or online merchant, they have to learn the modus operandi what information is needed for authorization, what sum limits activates alarms.! The criminals also need to select the best users to attack who has the large assets, the good credit score, or other characteristics that make them a profitable target.
17 PHISHING using phished informations! Attackers seek to take advantage of the data they have gathered. 17! Most often the crime is financial fraud, such as:! unauthorized purchase,! hijacking a bank account and transfer funds from it! withdraw cash from ATMs! In other cases the attackers are selling the information they gathered.
18
19 Phishing attacks Examples 19
20 SPEARPHISHING 20 Spearphishing is an spoofing fraud attempt that targets a specific organization, seeking unauthorized access to confidential data.
21 VISHING / SMISHING 21! VISHING is the illegal access of data via voice over Internet Protocol (VoIP). Vishing is IP telephony s version of phishing and in some cases uses voice messages to steal identities and financial resources.
22 VISHING / SMISHING 22! SMISHING is an identity theft scheme that involves sending consumers text messages containing a link to a fraudulent website or a phone number in an attempt to collect personal information
23 SOCIAL NETWORK IDENTITY THEFT! Social networking sites have the greatest potential for abuse, because of the sensitive information that can be used against you in a variety of malicious ways. The following profile elements can be used to steal or misappropriate your identity: 23 Full name (particularly your middle name) Date of birth (often required) Home town Relationship status School locations and graduation dates Affiliations, interests and hobbies! All the sensitive and apparently unimportant information (pet names, mother's maiden name) provided on social networks sites can be used by an attacker to impersonate the victim of an identity theft in offline situations (e.g. at a bank)
24 MALWARE MOBILE APPS 24! when the app is launched, a fake login form window (e.g. Facebook) is displayed to the user. If victims fell for the scam, their credentials would be sent to the attackers server.! certain apps can transmit the IMEI, IMSI, storage info, and installed app info to a remote server. Then, the server can send a command to uninstall certain apps (such as anti-virus applications), launch other apps, or download and install apps from URLs given by the server. These actions can be used to launch further attacks.
25 MALWARE MOBILE APPS 25
26 SKIMMING 26! A method used by criminals to capture data from the magnetic stripe on the back of any card, using a card reader which can be disguised to look like a part of the ATM, or installed inside of a POS! Even if this is an offline modus operandi of identity theft, it is one of the most frequent ways to steal credit/debit card information
27 HOW TO AVOID ONLINE IDENTITY THEFT! Be suspicious of any or communication (including text messages, social media post, ads) with urgent requests for personal financial information.! Avoid clicking on links. Instead, go to the website by typing the Web address directly into your browser or by searching for it in a search engine. Calling the company to verify its legitimacy is also an option, too.! Don t send personal financial information via , and avoid filling out forms in that ask for your information.! Use a secure website ( and a security lock icon) when submitting credit card or other sensitive information online. 27
28 HOW TO AVOID ONLINE IDENTITY THEFT! Keep A Clean Machine.! Keep security software current.! Automate software updates.! Protect all devices that connect to the Internet.! Plug & scan: Protect Your Personal Information.! Secure your accounts.! Make passwords long and strong: Unique account, unique password.! Write it down and keep it safe.! Own your online presence.! Connect With Care.! When in doubt, throw it out.! Get savvy about Wi-Fi hotspots.! Protect your $$: Be Web Wise.! Stay current. Keep pace with new ways to stay safe online.! Think before you act.! Back it up..! Be an online Law Abiding Citizen.! Safer for me more secure for all.! Help the authorities fight cyber crime 28
29 MAIN CHALLENGES 29 Tracing and Identifying Criminals Undercover Online Investigations Constant Development and Evolution of Technology Digital Forensic Analysis International Co-operation in Cybercrime Investigation
30 TRACING AND IDENTIFYING CRIMINALS 30! Fragmented nature of identity theft! Different suspects may be responsible for various aspects of identity theft crimes, such as providing how-to instructions, helping to set up spoofed sites and sending s, and money laundering! many of the perpetrators targeting consumers in one country operate from foreign countries! Better organization of the criminal groups through structuring and specialization of their members! Use of youngsters with skills in using computer and new technologies, which are organized and coordinated by the leaders of criminal groups
31 TRACING AND IDENTIFYING CRIMINALS 31! Following the money! It s obviously better to disrupt criminal acts as early as possible, before the harm to individuals takes place. However, sometimes the only chance to identify the attacker is in the later stages of an attack. At the stage where the suspect tries to convert the stolen personal information into money, investigators can follow up on these fraudulent transactions and trace the criminals involved in identity theft operations.! Tracing communications! While it is actually occurring! Using data stored by communications providers
32 UNDERCOVER ONLINE INVESTIGATIONS 32! Investigators can enter in chatrooms and other places where potential phishers communicate with each other! Undercover agents can infiltrate the criminal groups! Undercover operations can create the evidence needed for successful prosecutions! Use disinformation when the criminal gathers personal data:! Investigators can cause trouble for phishers by feeding false personal data to the spoof sites. This approach may reduce the economic value of phishing! Investigators can deliberately seed a false name, bank account, etc. to a spoof site. If that false name or number is then used, that is strong evidence that the person using the data is linked to criminal phishing activity.! Disinformation, therefore, can reduce the value of personal information on the black market and create evidence that links the criminal to illegal phishing activity
33 CONSTANT DEVELOPMENT AND EVOLUTION OF TECHNOLOGY 33! Easy acces to new technologies and the possibility to travel abroad faster will make the tracking more difficult.! Permanent concern in finding new modes of operation, the identification of products that can be defrauded and systems that can be compromised;! The suspects started to change the field of action from small phishing /skimming attacks against persons to major frauds (major damagehundreds of thousands/millions) against companies;
34 CONSTANT DEVELOPMENT AND EVOLUTION OF TECHNOLOGY 34! Resources problems - Investigators in law enforcement agencies often lag behind cyber criminals in terms of their understanding of technology and the equipment at their disposal.! As identity theft methods evolve, it is crucial for investigators to keep up-to-date. Yet, sufficient funding is often lacking in the public sector for the ongoing training, hardware and software, and other tools necessary to keep up with the perpetrators! Law Enforcement Needs:! Experts dedicated to high-tech crime! Experts available 24 hours a day! Continuous training! Continuously updated equipment
35 DIGITAL FORENSIC ANALYSIS! New tools and processes capable of locating and recovering sufficient evidence from larger data storage devices quickly, efficiently and in detail! Forensic tools are often commercial products rather than science -based, and do not fulfill all forensic needs! Increasing size of data storage on some personal computing devices, as well as cloud and network storage represents a real challenge to law enforcement! Cloud computing services (which replaces much of the traditional IT hardware) can be hosted and managed by an organization, or by a third-party provider, making it harder for law enforcement to acquire evidence 35
36 INTERNATIONAL CO-OPERATION IN CYBERCRIME INVESTIGATIONS 36! The transborder nature of the cybercrimes will make the investigation more difficult as we need information from authorities from abroad (by means of rogatory letters), an expensive and slow procedure.! Cooperation with the private sector can help! Differences in language, laws, and legal procedures make it very difficult to prosecute the suspects
37 CONCLUSIONS 37! The threats are continuously evolving and blended together by the suspects to form new attacks.! Self awareness is the first step in protecting online identity. It is better to be aware of all of the ways someone could possibly steal your personal information, than to have it happen and wonder how or why.! International and inter-institutional cooperation is a key factor in preventing, controlling and fighting against online identity theft
38 THANK YOU QUESTIONS? Silviu CIOBOTICI
Retail/Consumer Client. Internet Banking Awareness and Education Program
Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet
More informationWhite paper. Phishing, Vishing and Smishing: Old Threats Present New Risks
White paper Phishing, Vishing and Smishing: Old Threats Present New Risks How much do you really know about phishing, vishing and smishing? Phishing, vishing, and smishing are not new threats. They have
More informationLearn to protect yourself from Identity Theft. First National Bank can help.
Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone
More informationFRAUD ALERT THESE SCAMS CAN COST YOU MONEY
FRAUD ALERT THESE SCAMS CAN COST YOU MONEY Phishing spear phishing vishing smishing debit card skimming fake check scams THE COMMON SENSE PRECAUTIONS INSIDE CAN KEEP YOU SAFE! SCHEMES SCAMS FRAUDS Criminals
More informationNational Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
More informationRemote Deposit Quick Start Guide
Treasury Management Fraud Prevention How to Protect Your Business Remote Deposit Quick Start Guide What s Inside We re committed to the safety of your company s financial information. We want to make you
More informationIdentity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office
Identity Theft CHRISTOS TOPAKAS Head of Group IT Security and Control Office Agenda Identity Theft Threats and Techniques Identity Theft Definition and Facts Identity Theft & Financial Institutions Prevention
More informationMalware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
More informationCyber Security. Securing Your Mobile and Online Banking Transactions
Cyber Security Securing Your Mobile and Online Banking Transactions For additional copies or to download this document, please visit: http://msisac.cisecurity.org/resources/guides 2014 Center for Internet
More informationDon t Fall Victim to Cybercrime:
Don t Fall Victim to Cybercrime: Best Practices to Safeguard Your Business Agenda Cybercrime Overview Corporate Account Takeover Computer Hacking, Phishing, Malware Breach Statistics Internet Security
More informationProtecting your business from fraud
Protecting your business from fraud KEY TAKEAWAYS > Understand the most common types of fraud and how to identify them. > What to do if you uncover fraudulent activity or suspect you are a victim of fraud.
More informationOIG Fraud Alert Phishing
U.S. EQUAL EMPLOYMENT OPPORTUNITY COMMISSION Washington, D.C. 20507 Office of Inspector General Aletha L. Brown Inspector General July 22, 2005 OIG Fraud Alert Phishing What is Phishing? Phishing is a
More information9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500
INFO 1500 9. Information Assurance and Security, Protecting Information Resources 11. ecommerce and ebusiness Janeela Maraj Tutorial 9 21/11/2014 9. Information Assurance and Security, Protecting Information
More informationOCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875
OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,
More informationVISA International Security Summit. Dr. Colonel Tran Van Hoa Deputy Director Viet Nam Hightech Crime Police Department
VISA International Security Summit Dr. Colonel Tran Van Hoa Deputy Director Viet Nam Hightech Crime Police Department Hanoi June 2010 Vietnam Economic Outlook One of the fastest growing economies in South-East
More informationDeter, Detect, Defend
Deter, Detect, Defend Deter Never provide personal information, including social security number, account numbers or passwords over the phone or Internet if you did not initiate the contact Never click
More informationFraud Prevention Tips
Fraud Prevention Tips The best defense against fraud or identity theft is a proactive approach. Here are a few steps you can take to help protect yourself. Protect your identity Copy the front and back
More informationPhishing Scams Security Update Best Practices for General User
Phishing Scams Security Update Best Practices for General User hishing refers to the malicious attack Pmethod by attackers who imitate legitimate companies in sending emails in order to entice people to
More informationSound Business Practices for Businesses to Mitigate Corporate Account Takeover
Sound Business Practices for Businesses to Mitigate Corporate Account Takeover This white paper provides sound business practices for companies to implement to safeguard against Corporate Account Takeover.
More informationGuide to credit card security
Contents Click on a title below to jump straight to that section. What is credit card fraud? Types of credit card fraud Current scams Keeping your card and card details safe Banking and shopping securely
More informationEvolving Threats and Attacks: A Cloud Service Provider s viewpoint. John Howie Senior Director Online Services Security and Compliance
Evolving Threats and Attacks: A Cloud Service Provider s viewpoint John Howie Senior Director Online Services Security and Compliance Introduction Microsoft s Cloud Infrastructure Evolution of Threats
More information1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.
Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft
More informationThreat Events: Software Attacks (cont.)
ROOTKIT stealthy software with root/administrator privileges aims to modify the operation of the OS in order to facilitate a nonstandard or unauthorized functions unlike virus, rootkit s goal is not to
More informationWhen visiting online banking's sign-on page, your browser establishes a secure session with our server.
The privacy of communications between you (your browser) and our servers is ensured via encryption. Encryption scrambles messages exchanged between your browser and our online banking server. How Encryption
More informationFraud Information and Security
Fraud Information and Security Updated: January 13, 2015 How We Protect You At WySTAR Global Retirement Solutions security is a top priority. We understand that your trust in us depends on how well we
More informationDeception scams drive increase in financial fraud
ADDRESS 2 Thomas More Square London E1W 1YN WEBSITE www.financialfraudaction.org.uk DIRECT LINE 020 3217 8436 NEWS RELEASE EMAIL press@ukcards-ffauk.org.uk Deception scams drive increase in financial fraud
More informationT-CY Guidance Note #4 Identity theft and phishing in relation to fraud
www.coe.int/tcy Strasbourg, 5 June 2013 T-CY (2013)8E Rev Cybercrime Convention Committee (T-CY) T-CY Guidance Note #4 Identity theft and phishing in relation to fraud Adopted by the 9 th Plenary of the
More informationHow to stay safe online
How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware
More informationInformation Security. Annual Education 2014. Information Security. 2014 Mission Health System, Inc.
Annual Education 2014 Why? Protecting patient information is an essential part of providing quality healthcare. As Mission Health grows as a health system and activities become more computerized, new information
More informationDEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000
DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000 CHIEF INFORMATION OFFICER October 1, 2015 MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS CHAIRMAN OF THE JOINT CHIEFS OF
More informationIdentity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection
Identity Theft: A Growing Problem presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection Identity Theft What it is How it happens How to protect yourself
More informationAvoid completing forms in email messages that ask for personal financial information.
INTERNET FRAUD Online scams and viruses are constantly evolving and they threaten the security of computers worldwide. As criminals evolve their tactics, you need to keep your PC's security software (virus
More information10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
More informationPhishing Activity Trends Report June, 2006
Phishing Activity Trends Report, 26 Phishing is a form of online identity theft that employs both social engineering and technical subterfuge to steal consumers' personal identity data and financial account
More informationPROTECT YOUR COMPUTER AND YOUR PRIVACY!
PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That
More informationAVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
More informationThe author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report:
The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Author: Examining the Creation, Distribution, and Function
More informationHow to Identify Phishing E-Mails
How to Identify Phishing E-Mails How to recognize fraudulent emails and avoid being phished. Presented by : Miguel Fra, Falcon IT Services (miguel@falconitservices.com) http://www.falconitservices.com
More informationInnovations in Network Security
Innovations in Network Security Michael Singer April 18, 2012 AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies.
More informationSpyware. Michael Glenn Technology Management Michael.Glenn@Qwest.com. 2004 Qwest Communications International Inc.
Spyware Michael Glenn Technology Management Michael.Glenn@Qwest.com Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References
More informationMonitoring mobile communication network, how does it work? How to prevent such thing about that?
Monitoring mobile communication network, how does it work? How to prevent such thing about that? 潘 維 亞 周 明 哲 劉 子 揚 (P78017058) (P48027049) (N96011156) 1 Contents How mobile communications work Why monitoring?
More informationBE SAFE ONLINE: Lesson Plan
BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take
More informationPractical tips for a. Safe Christmas
Practical tips for a Safe Christmas CONTENTS 1. Online shopping 2 2. Online games 4 3. Instant messaging and mail 5 4. Practical tips for a safe digital Christmas 6 The Christmas holidays normally see
More informationPromoting a cyber security culture and demand compliance with minimum security standards;
Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute
More informationACCEPTABLE USE AND TAKEDOWN POLICY
ACCEPTABLE USE AND TAKEDOWN POLICY This Acceptable Use and Takedown Policy ( Acceptable Use Policy ) of Wedding TLD2, LLC (the Registry ), is to be read together with the Registration Agreement and words
More informationWhen registering on a jobsite, first ensure that the site is reputable and has a physical address and landline phone number.
Job searching online has become the most popular method of finding employment. Searching for the type of job you want is fast and easy, and you can see new jobs as soon as employers / agencies post them.
More informationPhoenix Information Technology Services. Julio Cardenas
Phoenix Information Technology Services Julio Cardenas Email spam, also known as junk email or unsolicited bulk email (UBE), is a subset of electronic spam involving nearly identical messages sent to numerous
More informationOverview of computer and communications security
Overview of computer and communications security 2 1 Basic security concepts Assets Threats Security services Security mechanisms 2 Assets Logical resources Information Money (electronic) Personal data
More informationIDENTITY THEFT WHAT YOU NEED TO KNOW. Created by GL 04/09
IDENTITY THEFT WHAT YOU NEED TO KNOW Created by GL 04/09 Table of Contents 1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do
More information3 day Workshop on Cyber Security & Ethical Hacking
3 day Workshop on Cyber Security & Ethical Hacking 1 st day-highlights-hands On Phishing Attack Hammad Mashkoor Lari Freelancer What is Cyber Security? What is Ethical hacking? What is Computer Science?
More informationONLINE IDENTITY THEFT KEEP YOURSELF SAFE FROM BESTPRACTICES WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR
ONLINE IDENTITY THEFT KEEP YOURSELF SAFE FROM BESTPRACTICES 01 One must remember that everyone and anyone is a potential target. These cybercriminals and attackers often use different tactics to lure different
More informationChapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers 2012. Your Interactive Guide to the Digital World
Chapter 11 Manage Computing Securely, Safely and Ethically Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define the term, computer security risks, and briefly
More informationCorporate Account Takeover & Information Security Awareness. Customer Training
Corporate Account Takeover & Information Security Awareness Customer Training No computer system can provide absolute security under all conditions. NO SECURITY MEASURE OR LIST OF SECURITY MEASURES CAN
More informationTMCEC CYBER SECURITY TRAINING
1 TMCEC CYBER SECURITY TRAINING Agenda What is cyber-security? Why is cyber-security important? The essential role you play. Overview cyber security threats. Best practices in dealing with those threats.
More informationWhat is Identity Theft?
What is Identity Theft? Identity theft is a crime in which someone obtains key pieces of personal information, such as Social Security or driver's license numbers, in order to impersonate someone else.
More informationSCHEMES SCAMS FRAUDS
FRAUD ALERT! FRAUD ALERT! GUARDING AGAINST INTERNET & MOBILE FRAUD SCHEMES SCAMS FRAUDS & THESE SCAMS CAN COST YOU MONEY: Phishing spear phishing vishing smishing debit card skimming fake check scams THE
More informationIntroduction to Computer Security
Introduction to Computer Security Rev. Sept 2015 What is Computer Security? 2 Computer Security is the protection of computing systems and the data that they store or access 3 Why is Computer Security
More informationUsing big data analytics to identify malicious content: a case study on spam emails
Using big data analytics to identify malicious content: a case study on spam emails Mamoun Alazab & Roderic Broadhurst Mamoun.alazab@anu.edu.au http://cybercrime.anu.edu.au 2 Outline Background Cybercrime
More informationBad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May 2014. TrustInAds.org. Keeping people safe from bad online ads
Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams May 2014 TrustInAds.org Keeping people safe from bad online ads OVERVIEW Today, even the most tech savvy individuals can find themselves
More information7 PRACTICES FOR SAFER COMPUTING
7 7 PRACTICES FOR SAFER COMPUTING EFFICIENT SHOPPING ACCESS TO INFORMATION, MUSIC, AND GAMES EDUCATIONAL RESOURCES TRAVEL PLANNING SPORTS, HOBBIES, AND SOCIAL NETWORKS CONNECTIONS TO FAMILY AND FRIENDS
More informationPhishing Activity Trends
Phishing Activity Trends Report for the Month of, 27 Summarization of Report Findings The number of phishing reports received by the (APWG) came to 23,61 in, a drop of over 6, from January s previous record
More informationPROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit
PROTECT YOURSELF AND YOUR IDENTITY Chase Identity Theft Tool Kit USE THESE IMPORTANT CONTACTS TO KEEP YOURSELF PROTECTED CHASE CONTACTS Customer Protection Group Credit Cards 1-888-745-0091 Other Account
More informationINFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure!
INFOCOMM SEC RITY is INCOMPLETE WITHOUT Be aware, responsible secure! U HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD FASTEN UP!
More informationProtect yourself online
Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice
More informationIdentity Theft Protection
Identity Theft Protection Email Home EDUCATION on DANGER ZONES Internet Payments Telephone ID theft occurs when someone uses your personal information with out your knowledge to commit fraud. Some terms
More informationHow To Help Protect Yourself From Identity Theft
How To Help Protect Yourself From Identity Theft January 20, 2015 Bryan Strong Senior Vice President and Director Information Security This complimentary interactive webinar is sponsored by Zions Bank
More informationThis session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
More informationSecurity Tips You are here: Home» Security Tips
Security Tips You are here: Home» Security Tips Click on a the Security Icon to view detailed information on: Responsibility of the Bank Password Policy Guide Online Security Internet Security Tips Scam
More informationFIGHTING FRAUD ON 4G. Neutralising threats in the LTE ecosystem
FIGHTING FRAUD ON 4G Neutralising threats in the LTE ecosystem TABLE OF CONTENTS Introduction...3 New and Old Vulnerabilities...4 Identity Management...5 A Unified Response...6 Data Mining...7 An Evolving
More informationIdentity Theft: An Introduction to the Scope of the Crime, and Its Prevention, Detection and Remediation
Identity Theft: An Introduction to the Scope of the Crime, and Its Prevention, Detection and Remediation June 2009 Cairo, Egypt Joanna P. Crane Identity Theft Program Manager Senior Attorney The views
More informationFraud Trends. HSBCnet Online Security Controls PUBLIC
Fraud Trends HSBCnet Online Security Controls العربیة 文 En français En Español 繁 體 中 文 简 体 中 Contents Types of Fraud Malware Attacks Business E-mail Compromise Voice Phishing ( Vishing ) Short Message
More informationNetwork Security & Privacy Landscape
Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies
More informationCybercrime : Malaysia. By DSP MahfuzBin Dato Ab. Majid Royal Malaysia Police
Cybercrime : Malaysia By DSP MahfuzBin Dato Ab. Majid Royal Malaysia Police ICT Development The ICT development within this region has been rapid since more than 3 decades ago. With the launching of the
More informationCyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014
Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014 Lisa D. Traina, CPA, CITP, CGMA Lisa Traina utilizes her 30+ years of experience as a CPA, CITP and CGMA
More informationAcceptable Use Policy. This Acceptable Use Policy sets out the prohibited actions by a Registrant or User of every registered.bayern Domain Name.
This Acceptable Use Policy sets out the prohibited actions by a Registrant or User of every registered.bayern Domain Name. This Acceptable Use Policy forms part of the Registry Policies that apply to and
More informationRed Flags in International Payments and Trade. Presented by Paul Warfield and Despina Margiori
Red Flags in International Payments and Trade Presented by Paul Warfield and Despina Margiori Red Flags on International Payments Financial Crimes Enforcement Network (FinCEN) alerts that Criminal organizations
More informationInformation Security Awareness
Corporate Account Takeover & Corporate Account Takeover & Information Security Awareness The information contained in this session may contain privileged and confidential information. This presentation
More informationTips for Banking Online Safely
If proper attention is given to safety and security, banking and monetary activities can be completed online in a convenient and effective fashion. This guide helps to establish procedures for remaining
More informationNATIONAL CYBER SECURITY AWARENESS MONTH
NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the
More informationBest Practices Guide to Electronic Banking
Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have
More informationAnti-Phishing Best Practices for ISPs and Mailbox Providers
Anti-Phishing Best Practices for ISPs and Mailbox Providers Version 2.01, June 2015 A document jointly produced by the Messaging, Malware and Mobile Anti-Abuse Working Group (M 3 AAWG) and the Anti-Phishing
More informationPractical guide for secure Christmas shopping. Navid
Practical guide for secure Christmas shopping Navid 1 CONTENTS 1. Introduction 3 2. Internet risks: Threats to secure transactions 3 3. What criteria should a secure e-commerce page meet?...4 4. What security
More informationIdentity Theft - Six Ways to Protect Your Personal and Business
À votre service...pour le soin de votre avenir. Depuis 1968. IDENTITY THEFT E-11 Here for you now... Here for your future. Since 1968. A. Background The crime of identity theft occurs when someone, without
More informationWhen Fraud Comes Knocking
When Fraud Comes Knocking Identity theft occurs when someone uses your name, Social Security number, credit card number, or other personal information without your permission. It is a very serious crime.
More informationAdvanced Security Methods for efraud and Messaging
Advanced Security Methods for efraud and Messaging Company Overview Offices: New York, Singapore, London, Tokyo & Sydney Specialization: Leader in the Messaging Intelligence space Market focus: Enterprise,
More informationF-Secure Anti-Virus for Mac 2015
F-Secure Anti-Virus for Mac 2015 TOC F-Secure Anti-Virus for Mac 2015 Contents Chapter 1: Getting started...3 1.1 Manage subscription...4 1.2 How to make sure that my computer is protected...4 1.2.1 Protection
More informationWhy is a strong password important?
Internet Security Why is a strong password important? Identity theft motives: To gain access to resources For the challenge/fun Personal reasons Theft methods Brute forcing and other script hacking methods
More informationFraud Detection and Prevention. Timothy P. Minahan Vice President Government Banking TD Bank
Fraud Detection and Prevention Timothy P. Minahan Vice President Government Banking TD Bank Prevention vs. Detection Prevention controls are designed to keep fraud from occurring Detection controls are
More informationLegal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.com Why should we care about CYBER CRIME & CYBER SECURITY? Clarification
More informationPayment Fraud and Risk Management
Payment Fraud and Risk Management Act Today! 1. Help protect your computer against viruses and spyware by using anti-virus and anti-spyware software and automatic updates. Scan your computer regularly
More informationU.S. Cellular Mobile Data Security. User Guide Version 00.01
U.S. Cellular Mobile Data Security User Guide Version 00.01 Table of Contents Install U.S. Cellular Mobile Data Security...3 Activate U.S. Cellular Mobile Data Security...3 Main Interface...3 Checkup...4
More informationPresentation Objectives
Gerry Cochran, IT Specialist Jennifer Van Tassel, Associate Examiner Office of the State Comptroller Thomas P. DiNapoli State & Local Government Accountability Andrew A. SanFilippo Executive Deputy Comptroller
More informationCorporate Account Takeover & Information Security Awareness
Corporate Account Takeover & Information Security Awareness The information contained in this session may contain privileged and confidential information. This presentation is for information purposes
More informationSAFE ONLINE BANKING. Online Banking, Data Security You. Your Partnership for Safe Online Banking
SAFE ONLINE BANKING Online Banking, Data Security You & Your Partnership for Safe Online Banking Partnering for Online Security O Online banking has grown rapidly into a major new way to bank. Some surveys
More informationInternet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
More informationThe SMB Cyber Security Survival Guide
The SMB Cyber Security Survival Guide Stephen Cobb, CISSP Security Evangelist The challenge A data security breach can put a business out of business or create serious unbudgeted costs To survive in today
More informationOnline Privacy and Security Policy
Online Privacy and Security Policy How We Protect You This CommerceWest Bank (Bank) Online Security and Privacy Policy explains how we may collect information from you online when you visit our website.
More informationTHE HOME LOAN SAVINGS BANK. Corporate Account Takeover & Information Security Awareness
THE HOME LOAN SAVINGS BANK Corporate Account Takeover & Information Security Awareness The information contained in this session may contain privileged and confidential information. This presentation is
More informationProtect yourself against fraud
With the approach of festive season and the shopping boom associated with this time of year, we would like to warn you about the ways used by fraudsters to trick unsuspecting members of the public. Here
More informationInformation Security It s Everyone s Responsibility
Information Security It s Everyone s Responsibility Developed By The University of Texas at Dallas (ISO) Purpose of Training As an employee, you are often the first line of defense protecting valuable
More information