Cybercrime and TLS.

Slides:



Advertisements
Similar presentations
High Validation SSL Certificates Mike Davies Marketing Director VeriSign Security Services EMEA.
Advertisements

Browser Security Modes Alex Crowell and James Kasten.
Security in Internet: what is it now? A presentation by Dmitry Belyavsky, TCI ENOG 6 / RIPE NCC Regional Meeting Kiev, Ukraine, October 2013.
By: Hassan Waqar.  A PROTOCOL for securely transmitting data via the internet.  NETWORK LAYER application.  Developed by NETSCAPE.
Bsharah Presentation Threats to Information Security Protecting Your Personal Information from Phishing Scams.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
© GlobalSign. A GMO Internet Inc group company. Authentication. Security. Trust. A tutorial on how you can host multiple SSL Certificates on a single IP.
% of American households with home computer?____ Average age 1 st computer use? _______ Amount of time teens spend per day on computer? _______.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
LittleOrange Internet Security an Endpoint Security Appliance.
S ELECTION OF WEB HOST AND WEB PAGE SYSTEM. W EB HOST stores all the pages of your website and makes them available to computers connected to the Internet.
Public Key Encryption An example of how a bank might accomplish encryption.
Certificate Authority Security Council (CASC) 2015 Consumer Trust Survey.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
STAY SAFE ONLINE. STAY SAFE ONLINE! PLEASE MAKE SURE YOU LOGIN AT THE CORRECT BANK URL / ADDRESS 1.NEVER LOGIN VIA LINKS 2.NEVER REVEAL YOUR PIN.
GONE PHISHING ECE 4112 Final Lab Project Group #19 Enid Brown & Linda Larmore.
Blacklists aggregator: New service by TCI Dmitry Belyavsky, TCI ENOG 9 Kazan, Russia, 9-10 June 2015.
Class Activity: User Education on SNS Phishing. Contextual Training Users are sent simulated phishing s by the experimenter to test user’s vulnerability.
FRAUD, ONE OF THE FASTEST GROWING SEGMENTS OF OUR INDUSTRY Joseph Bajic, Chief Compliance Officer and Vice-President, Compliance.
UNIT 1 DOMAIN NAMES Cambridge Technicals. Domain names You are going to prepare a presentation for a group of small business owners. They are interested.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Computers Are Your Future © 2006 Prentice-Hall, Inc.
An Empirical Study of Visual Security Cues to Prevent the SSLstripping Attack Dongwan Shin and Rodrigo Lopes In Proc. 27 th Annual Computer Security Applications.
PHISH OR NO PHISH? Masquerades, Deception, and Thievery On the web…
SURFING THE WEB PRIVACY, SAFETY, AND RELIABLE SOURCES.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
 Introduction to Computing  Computer Programming  Terrorisom.
Computers Are Your Future © 2008 Prentice-Hall, Inc.
A Quick Insight Paper about phishing attacks based on usability study Users required to classify websites as fraudulent/legitimate using security tools.
Saphe surfing! 1 SAPHE Secure Anti-Phishing Environment Presented by Uri Sternfeld.
AT&T Privacy Bird Screen Shots For more information see
An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks Collin Jackson et. all Presented by Roy Ford.
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
AQA A2 COMP 3: Internet Security. Lesson Aim By the end of the lesson: By the end of the lesson: Describe different security issues and recommend tools/techniques.
1.  Usability study of phishing attacks & browser anti-phishing defenses – extended validation certificate.  27 Users in 3 groups classified 12 web.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Computer Security Set of slides 8 Dr Alexei Vernitski.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
Maryknoll Wireless Network Access Steps for Windows 7 As of Aug 20, 2012.
Remove [Browser Hijackers] For more information regarding [Browser Hijackers] Please Visit:
Communication protocols 2. HTTP Hypertext Transfer Protocol, is the protocol of World Wide Web (www) Client web browser Web server Request files Respond.
TLS: avoiding dangers A presentation by Dmitry Belyavsky, TCI Business Internet Conference Kiev, Ukraine, December 2013.
The Secure Modern Desktop Keeping the Phish in the Sea.
Internet Explorer Connection Error Tech Support Number
Presentation By :- ADARSH PILLAY
Presentation By :- Krishna Sai Mulpuri
Security Unit 1 Business skills for e-commerce
    Customer Profile: If you have tech savvy customers, having your site secured for mobile users is recommended. Business Needs: With the growing number.
Setting and Upload Products
Mike Irving Software Developer, Consultant Web Development: - mainly on C# / .NET, SQL Server, Windows Server Years Commercial Experience. Mobile.
SFS-HTTP: Securing the Web with Self-Certifying URLs
Director of Data Communications
DNS Privacy: Problem and solutions
Industry news. Industry news Industry ? Industry ? 2 AOL Always on SSL All on SSL  by 2020, 100% of the online traffic will be https secured therefore.
How to Check if a site's connection is secure ?
Introducing Umbraco Latch
AVG Antivirus Tech Support Number
Support For AVG Antivirus Helpline Number Just Solution One Call Away.
Determine Applicability of Certificates by using standard CABF CP OIDs
Reconnaissance Report Trillium Technologies
Tom Chothia Computer Security
The world changes again
Partnering with GlobalSign
Deprecation of certificates for internal needs
Step 3 of Selling Process
Introduction to Let’s Encrypt
▶ Partner User Guide (Problem Solution)
Presentation transcript:

Cybercrime and TLS

Cybercrime and TLS Phishing, Browsers and Let’s Encrypt Dmitry Belyavskiy, Technical Centre of Internet Kyiv, Ukraine UADOM-2017 December 1, 2017

Cybercrime, botnets, etc: > 30% TLS trends TLS traffic > 55% New standards Free certificates Browser warnings Cybercrime, botnets, etc: > 30%

Certificates for free!

Free certificates: bad news Phishing domains Normal domains

PayPal phishing certificates

Free certificates: balance Free wildcard certificates CA/Browser forum recommendations

Technical solutions CAs: CA/Browser’s Forum recommendations + Check “dangerous” names - Automatic issuance Browsers: + Warn users about suspicious names - False positives

Explain to users! Green lock means nothing Certificate DOES NOT mean secure site Certificate is significant for reputation DV certificates confirm only control over domain EV certificates confirm the domains owner Phishers use new technologies too

What can registries do? Sell more EV certificates! Educate users

Cybercrime and TLS Questions? beldmit@tcinet.ru