PHISHING PRESENTED BY: ARQAM PASHA. AGENDA What is Phishing? Phishing Statistics Phishing Techniques Recent Examples Damages Caused by Phishing How to.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Phishing, what you should know L kout Initiative.
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Phishing, what you should know L kout Initiative Office of Information Technology.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
1 Identity Theft and Phishing: What You Need to Know.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
Identity Theft.
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
1 What is Phishing? …listening to music by the band called Phish or perhaps …a hobby, sport or recreation involving the ocean, rivers or streams…nope.
Bsharah Presentation Threats to Information Security Protecting Your Personal Information from Phishing Scams.
DO YOU LOVE FISHING “PHISHING” ? OR Global Wealth Management Group MORGAN STANLEY & SMITH BARNEY A term used to describe fraudulent attempts to steal.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Internet Phishing Not the kind of Fishing you are used to.
Hey check out this cool PHISHING presentation! Benjamin Ross Lyerly.
Phishing – Read Behind The Lines Veljko Pejović
Scams Stevie's Scam School videos
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
The OWASP Foundation OWASP Chennai Phishing.
How It Applies In A Virtual World
What is E-commerce Safety Precautions Password Strengths
Scholarship Scams Avoiding Scholarship Scams, Phishing & Identity Theft at All Cost.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Day 3 Cybersafety Presented by FJUHSD Teacher Librarian.
Cybersafety.
PHISHING FINANCIAL THREATS ON THE INTERNET -Alisha Esshaki 8a.
Reliability & Desirability of Data
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
PREPARED BY: SYAIDATUL SYAZANA BT PAUZI INTRODUCTION What is the definition of Phishing Hacking.
Information Security Sharon Welna Information Security Officer.
Survey Scams Sam Roberts. What is a Survey Scam?  A scam where someone asks you to fill out a survey answering personal question, business questions,
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
Phishing A practical case study. What is phishing? Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details.
To:Employee From: impersonated official company Message: Give us personal information here.
How Phishing Works Prof. Vipul Chudasama.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
A Matter of Your Personal Security Phishing. Beware of Phishing s Several employees received an that looked legitimate, as if it was being.
Phishing Dennis Schmidt, CISSP Director, Office of Information Systems HIPAA Security Officer UNC School of Medicine UNC School of Medicine.
What is Spam? d min.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
A Matter of Your Personal Security Phishing Revised 11/30/15.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
Do you know who you’re dealing with? Social Engineering: Minimise the risk of becoming a victim.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    1 Overall Classification of this Briefing is UNCLASSIFIED//FOUO Phishing.
Managing Money Workshop The National Autistic Society AGM
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Important Information Provided by Information Technology Center
Social Engineering Charniece Craven COSC 316.
ISYM 540 Current Topics in Information System Management
Phishing, what you should know
FJUHSD Teacher Librarian
Phishing is a form of social engineering that attempts to steal sensitive information.
Social Media Cybersafety.
Cybersecurity Awareness
Robert Leonard Information Security Manager Hamilton
9 ways to avoid viruses and spyware
What is Phishing? Pronounced “Fishing”
Presentation transcript:

PHISHING PRESENTED BY: ARQAM PASHA

AGENDA What is Phishing? Phishing Statistics Phishing Techniques Recent Examples Damages Caused by Phishing How to avoid being a Phishing Victim?

What is Phishing? “Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication”.

What is Phishing? The purpose of a phishing message is to acquire sensitive information about a user. For doing so the message needs to deceive the intended recipient. Typically carried out by or IM. Official-looking sent to potential victims. Pretends to be from their Service Provider such as Retail Store, Bank, Club etc.

What is Phishing? Link in an message directs the user to a Web page Asks for Financial Information Page looks genuine Easy to fake valid Web site Any HTML page on the real Web can be copied and thus modified.

Phishing Statistics

Global Phishing Survey 2010 In 2H2010, there were at least 67,677 phishing attacks worldwide. This is greater than the 48,244 observed in 1H2010, but significantly less than the record 126,697 in 2H2009. Phishing remains concentrated in certain namespaces. Sixty percent of attacks occurred in just four TLDs:.COM,.CC,.NET, and.ORG. And 89 percent of malicious domain registrations were made in four TLDs:.COM,.TK,.NET, and.INFO.

Phishing Techniques

Recent Examples An example of a phishing , disguised as an official from a (fictional) bank. The sender is attempting to trick the recipient into revealing confidential information by "confirming" it at the phisher's website. Note the misspelling of the words received and discrepancy. Also note that although the URL of the bank's webpage appears to be legitimate, the hyperlink would actually be pointed at the phisher's webpage.

Ebay This link takes you to

Citibank Not the real address

People’s Bank Not the proper link for peoples.com

Damages Caused by Phishing Threatens effective communication Undermines goodwill and trust Drives people away from usage of Internet Direct harm to customers from stolen IDs, passwords

Damages Caused by Phishing Diminishes value of brand Could affect shareholders Possibility of liability for failure to exercise due diligence in protecting trademark

How to avoid being a victim? 1. Never respond to requests for personal information via . When in doubt, call the institution that claims to have sent you the . –phishers typically include upsetting or exciting (but false)statements in their s to get people to react immediately (i.e., claiming they will shut off your account) –phishers typically ask for confidential information such as usernames, passwords, credit card numbers, social security numbers, etc.

How to Avoid being a victim? 2. If you suspect the message might not be authentic, don't use the links within the to get to a web page –call the company on the telephone or log onto the website directly by typing their Web address in your browser. 3. Never fill out forms in messages that ask for confidential information

How to avoid being a victim? 4. Always ensure that you're using a secure website when submitting credit card or other sensitive information via your web browser –check the beginning of the Web address in your browsers address bar - it should be ‘ rather than just ‘ –look for the locked padlock icon on your browser (i.e. Internet Explorer/Mozilla)

How to avoid being a victim? 5. Regularly check your bank, credit and debit card statements to ensure that all transactions are legitimate and if anything is suspicious, contact your bank and all card issuers immediately 6. Ensure that your browser and OS software is up-to-date and that latest security patches are applied

Works Cited APWG. "Global Phishing Survey: Trends and Domain Name Use in 2H 2010.“ "Avoid Getting 'Hooked' By Phishers." Welcome to Fraud.org, Online Home of NCL's Fraud Center. Patil, DJ. "Building Data Science Teams - O'Reilly Radar." O'Reilly Radar - Insight, Analysis, and Research about Emerging Technologies. "ScienceDirect - Computer Fraud & Security : Internet War: Picking on the Finance Sector – Survey: More Vulnerabilities & Phishing." ScienceDirect - Home. Urmann, David. "Phishing Techniques." Ezine Articles. Wikipedia. "Phishing." Wikipedia, the Free Encyclopedia.

Time’s Up! Thank you for listening!