HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.

Slides:



Advertisements
Similar presentations
What is Lurking in the shadows...
Advertisements

Win the Cyberwar on Mobile Banking and Payments
George Tubin Senior Analyst Consumer Banking © 2005 The Tower Group, Inc. May not be reproduced by any means without express permission. All rights reserved.
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
Supplied on \web site. on January 10 th, 2008 Customer Security Management Reducing Internet fraud June 1 st, 2008 eSAC Walk Thru © Copyright Prevx Limited.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Latest Threats Against Mobile Devices Dave Jevans Founder, Chairman and CTO.
Mr C Johnston ICT Teacher
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Network Security aka CyberSecurity Monitor and manage security risks at the network level for the entire Johns Hopkins Network.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Securing Online Transactions with a Trusted Digital Identity Dave Steeves - Security Software Engineer Microsoft’s.
1 Managing Identity Threats May Where are the threats ? Customer Web/App Server Vulnerabilities: Trojan sniffers Soliciting to enter credentials.
Security Issues and Challenges in Cloud Computing
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
E-Commerce Security and Fraud Issues and Protections
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Protecting Against Online Fraud F5 SIT Forum
Norman SecureSurf Protect your users when surfing the Internet.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Commercial eSecurity Training and Awareness. Common Online Threats Most electronic fraud falls into one of three categories:  PHISHING – Fraudulent s.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
Securing Information Systems
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Unit 19 INTERNET SECURITY
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
IT security By Tilly Gerlack.
Dell Connected Security Solutions Simplify & unify.
Supplied on \web site. on January 10 th, 2008 Reducing Risk Through Incremental Malware Detection January 2008.
Honeypot and Intrusion Detection System
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Presidio Bank Business Online Banking Security Overview.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Security A Payments Perspective Terry Dooley EVP & CIO SHAZAM Network.
Mark Shtern.  Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
Information Systems Design and Development Security Risks Computing Science.
Secure Authentication Solution. Keypasco – the company Keypasco was founded in 2010 by specialists with over 20 years of experience within online security.
© Copyright 2015 EMC Corporation. All rights reserved. 1 RSA FRAUDACTION DANIEL COHEN * FRAUDACTION ANTI-FRAUD SERVICES.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Network System Security - Task 2. Russell Johnston.
Understanding and breaking the cyber kill chain
Securing Information Systems
Securing Information Systems
Hotspot Shield Protect Your Online Identity
Critical Security Controls
Do you know who your employees are sharing their credentials with
IT Security  .
Instructor Materials Chapter 7 Network Security
Authentication 2.0: User Generated Security
Business Risks of Insecure Networks
Securing Information Systems
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Check Point Connectra NGX R60
E-Commerce Security and Fraud Issues and Protections
Chapter 9 E-Commerce Security and Fraud Protection
Test 3 review FTP & Cybersecurity
Presentation transcript:

HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities are already protected.

The risk outside the organization walls Firewall IPS Anti Virus Employees Customers SSL VPN, Webmail,.. Online Services Hacker

The Risk

Online fraud prevention focusing on Identity Protection and Transaction Integrity. Completely clienteles while solving problems like MITB, MITM identifying infected end-user machines, Phishing attacks set-up (!), Pharming attacks – and all in REAL-TIME. Bottom line: ZERO impact on user experience, MINIMAL implementation and very comprehensive fraud PROTECTION. Versafe solution is implemented in various environments, such as eBanking, insurance, Gaming and ecommerce.

Versafe Solution Architecture Organization Web Application vTrack vCrypt vHTML vCert Versafe Cloud vAlert System vScan vDomain vSpam vTrojan vSocial vMonitor vMobile vPharming vCrime vSpy vToken vSOC vTrack - Website Copy Detection vCrypt - Applaication Layer Encryption vHTML - HTML Modification Detection vCert - Man In The Middle Detection vToken - Automatic Malicious Activity Detection vMobile - Secure Web & Native Mobile Application vScan - Scanning For Similar Website vDomain - Detection Similar Domains vSPAM - Spam Collection And Spam Analysis vCrime - CyberCrime Intelligence vTrojan - Detection & Analysis & Forensics Trojan, C&C, DropZone, Malicious Script, Configuration Files, Mule Accounts And Credential Recovery vSocial - Monitoring Fraud In Social Networks vMonitor - Monitoring Old Fraud vSpy - Monitoring Hacker Communities vPharming - DNS hijacking Detection & MITM Intelligence vSOC - Security Operation Center - Analysis & Takedown Fraud, Phishing, Trojan & Pharming

Phishing Pharming

How long does it take to detect a Phishing site? When did the phishing site go on the air? Who is the attacker? How many victims? Who are these victims?

Faster response, shorter up times Real time alerts Take down of fraud sites within four hours of detection Blacklisting on browsers Disinformation of the attacker Detection of affected users Collecting forensic information

Versafe enables the immediate detection of a Phishing attack. Versafe provides the organization with useful information: Instant detection of phishing site setup The attackers IP Number of victims that logged into the phony site Usernames and IPs of victims Fast take down of the phishing site

Trojans Pharming Phishing

Trojans – what needs to be asked How can I neutralize end-users Trojans transparently? Who are my infected users? What can I do once I found out a user is infected? How do I prevent a Trojan from stealing my customers credentials? How can I protect the customers from automatic transactions?

Prevention, damage mitigation, identification of an infected PC vCrypt - Encryption in the application layer vHTML - Detect Malicious Code Injection in the client side vHTML - Detect Infected Computers Advanced Virtual Keyboard (Anti key loggers, Anti screenshot and Anti click position) vToken - Transaction & Authentication Integrity ( Encryption, Verification and Automation )

Trojan Intelligence Automatic scanning & collecting for: User Credentials in Trojan Drop Zones Dedicated Trojans Malicious Command & Control (C&C) Mule Accounts Malware DNS/Servers Monitoring Information collecting from hacker communities Malware honeypots technologies Collect Partners Feeds

Versafe neutralizes the effects of Trojans transparently Versafe provides the organization with useful information: Infected users are reported to the organization There is no need for intervention by the user Advanced encryption disables Trojan functionality There is no need for compliance or cooperation by the user

Pharming Trojans Phishing

How many users connect to the organization over a tapped network connection? Who are these users? Where have they logged in from? Who is the attacker? How do I prevent a Pharmer harvesting useful data?

Versafe enables the organization to know of each user that logs in from an unsecure location, in real time. Versafe provides the organization with useful information: Identities of Pharming victims Location and IP of compromised router IP of the attacker Advanced encryption renders harvested data useless

Malware detection Application level encryption Native Applications Components Java for Android C Objective for iPhone Web Application Components Certificate checks Virtual keyboard Malware detection Application level encryption Pharming detection Virtual keyboard Phishing detection

Versafe protects your customers & employees Firewall IPS Anti Virus Employees Customers SSL VPN, Webmail,.. Online Services Hacker

Enables organizations to become proactive, faster Fast implementation on the organizations websites No installation of software on the end user side Real time detection of identity theft Supply the organization with critical information Neutralize identity theft by Phishing, Trojans and Pharming

E T #104 F