It's Everywhere Point of Sale attacks ● The free WiFi is connected to the same DSL or cable service as the PoS computers ● Depending if this free WiFi.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Accessing Public Wi-Fi: Security Issues Sankar Roy Department of Computing and Information Sciences Kansas State University.
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Wi-Fi Security January 21, 2008 by Larry Finger. Wi-Fi Security Most laptops now come with built-in wireless capability, which can be very handy; however,
Analysis of Privacy Jim McCann & Daniel Kuo EECS 598.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Free Wi-Fi Zone. Detail Process of Free Wi-Fi Access Switch on Wi-Fi setup on your Wi-Fi enabled Device like Cell Phone, Tablet PC, Laptop & search for.
Computer Networks IGCSE ICT Section 4.
1 Computer Security: Protect your PC and Protect Yourself.
Quiz Review.
Wireless Networking 102.
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Cyber Crimes.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
WIRELESS IN YOUR LIBRARY The Anatomy of a Library Communications Network.
Trouble-shooting Tips Georgia Bulldogs I can receive, but not send messages  If you can successfully receive messages, but can’t send.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Ethical Hacking: Hacking GMail. Teaching Hacking.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer Security By Duncan Hall.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Trouble-shooting Tips Georgia Bulldogs I can receive, but not send messages  If you can successfully receive messages, but can’t send messages,
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
E-Commerce & Bank Security By: Mark Reed COSC 480.
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Wireless Network By Mohammed AL Amoudi. Overview Definition of Wireless Reliability Speed Security Conclusion.
Chapter 40 Internet Security.
Hotspot Shield Protect Your Online Identity
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Unit 4 IT Security.
TECHNOLOGY GUIDE THREE
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Overview 1. Phishing Scams
E-commerce companies Here the focus is on the different business models for selling online: Business-to-consumer (B2C): when a company sells to an individual;
Introduction to Computers
Home Computer Security
Information Security 101 Richard Davis, Rob Laltrello.
Phishing is a form of social engineering that attempts to steal sensitive information.
BP5 – encryption - Fun gym
Computer Security Elaine Munn Introduction to Computer Security.
Man-in-the-Middle Attacks
BP5 – encryption - Fun gym
Computer Security.
Security in mobile technologies
Wireless Spoofing Attacks on Mobile Devices
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

It's Everywhere

Point of Sale attacks ● The free WiFi is connected to the same DSL or cable service as the PoS computers ● Depending if this free WiFi is protected or not the attacker can sit in the car while doing this. ● If it is protected and can't be broken into the attacker could buy a cup of coffee, rent a room, or whatever it would take to get onto the network.

PoS prevention ● Larger companies and chains can afford being charged for an extra business DSL service and have more then one internet circuit. ● Smaller companies can use a hotspot gateway to protect their PoS computers from the Wifi hotspot service and includes a firewall to block access to the PoS ● If stolen credit card information from a business is proven the merchant is liable for fines and suspension from merchant card services.

Fake AP's ● You might think you are connected to the free Wifi but you are actually on an ad hoc, peer to peer network. ● Being connected to the attack PC on a peer to peer level, if file sharing is turned on the attacker has free reign over your computer. ● An in-depth survey of the ad hoc networks found at Chicago's O'Hare found 20 ad-hoc networks where 80% of those were broadcasting free wifi. ●

Fake AP prevention ● Never connect to an unknown ad hoc network

Fake AP prevention Cont. ● Rather interestingly Windows Vista is worse about preventing connecting to a Fake AP. Looking at the list of available networks you can only click the properties tab on networks you have already connected to.

Sniffing! ● Once anyone is on that WiFi network it becomes rather trivial to "sniff" out information flying around on that network ● This can be done passively where the person just sits drinking their coffee and capturing gigabytes of network traffic to be looked at offline somewhere else. ● Lots of applications send your account and passwords in clear text.

More Sniffing! ● Since alot of s are sent in clear text and instant messaging is sent in html its very simple to take all the collected data and sift through that data to find important information. ● All the HTML data can give away the websites that the user was surfing as well.

Other Considerations ● Hackers can steal passwords, personal info and credentials off your smart phone just as they would a laptop. ● Using the concept of a man in the middle attack the data coming from the phone can be re- routed to the attackers laptop where tools such as Arpspoof and SSLSTrip that will help break SSl encryption in mobile browsers.

Freeware! ● Allows for somebody with very little knowledge of computers to pick up on these illegal activites ● Programs such as Cain and Abel, Aircrack-ng, Arpsoof, SLLSTrip and Netstumber are all applications that are free and that can assist an attacker. ● As we all know the BackTrack operating system is very useful.

How can you be safe using WiFi's ● Use a third-party VPN product such as HotSpot Shield or HotSpot VPN ● Always select the most secure network that is available to you and make sure to make it a public network and not click the home network. ● Sensitive data should be hidden and file sharing should always be off. ● Many websites use and support HTTPS so use it. ● Make sure the firewall is on and the compuer is up to date.

A safer hotspot.

Refrence Page DarkAudax. "Cracking_wpa [Aircrack-ng]." Aircrack-ng. Aircrack, 07 Mar Web. 18 Apr Geier, Eric. "Wi-Fi Hotspot Security: The Issues - Wireless LAN Tutorial." Eric Geier - Wireless LAN (Wi-Fi) & Computer Author & Freelancer. 28 July Web. 18 Apr Pinkham, Steve. "Wireless Security Attacks and Defenses." Maven Security Consulting, 4 Sept Web. 4 Apr HTCC. "Security at WiFi Hotspots." Redirect. 23 Jan Web. 18 Apr Arbu. "CAIN and ABEL Tutorial 1 | Hackers Library." Hackers' Library. 13 Dec Web. 18 Apr "Overview and Features." Connectify for Windows - Turn Your Laptop or Smartphone into a Secure Wi-Fi Hotspot. Jan.-Feb Web. 18 Apr