Download presentation
Presentation is loading. Please wait.
1
Hey check out this cool PHISHING presentation! Benjamin Ross Lyerly
2
PHISHING: A BRIEF HISTORY WORD ORIGIN (1996) from the hacking community to describe the act of fishing for account info with emails as lure.
3
Can be done on paper or phone, but much more successful on the net AOL in the mid 90s experienced the most phishing issues since it was a pay to use Phishers would lure AOL users to give username and password information which was termed “phish” Phishers could then trade these as currency for warez, serials, or phish they wanted
4
WHAT’S AOL? After AOL phishing continued but grew out of just USERNAME and PASSWORD Now any personal information is valuable Current phishers are looking for credit card numbers, social security numbers, date of births, and they even want to know your mother’s maiden name
5
NOT JUST E-MAIL AND IM A better target than ignorant surfers is desperate surfers The same trick in a new way, phishers now fill the job sites, credit scores, prize giveaways, and many other get rich schemes
6
THE PRESENT False apps are being put on DROID and IPHONE online stores Most common are banking applications that send your information to its creator Others pose as bookstores, pizza ordering, anything that you place your card number in Some have malicious code that will trawl your phone for contacts’ information
7
PHAMOUS PHISHING ATTACKS
8
had to reset passwords to thousands of accounts after emails were sent out to users with a link to change their passwords at http://twitter.access-logins.com/login http://twitter.access-logins.com/login These kinds of attacks are bulk e-mails in which the phisher sends out at random hoping to pick up people who just don’t know better
9
User database was hacked and e-mail addresses were stolen for 6.3 million customers at TD AMERITRADE These specific addresses were the victims of SPEAR PHISHING attacks
10
Many CEOs were sent phishing e-mails to disguised as subpoenas that directed them to a site that appears to be on a government site. They were then told to update their adobe acrobat, and upon doing so they were given a malicious trojan that spied on everything they did
11
SOME EXAMPLES
14
HOW TO PROTECT YOURSELF Financial sites will never ask you to confirm your identity through an email Never click hyperlinks through an email or im Keep your browsers and antivirus updated If you suspect you’ve been scammed alert your credit companies immediately and change all of your passwords Smart phones have begun installing malware as of this year
16
http://www.allspammedup.com/2010/01/phishing-and- malware-in-the-smart-phone-era/ http://www.allspammedup.com/2010/01/phishing-and- malware-in-the-smart-phone-era/ http://www.cnn.com/2010/TECH/02/02/twitter.phishing/? hpt=T2 http://www.cnn.com/2010/TECH/02/02/twitter.phishing/? hpt=T2 http://isc.sans.org/diary.html?storyid=4289 http://blogs.pcmag.com/securitywatch/2008/04/whale_ph ishing.php http://blogs.pcmag.com/securitywatch/2008/04/whale_ph ishing.php http://www.sophos.com/pressoffice/news/articles/2007/0 9/ameritrade.html http://www.sophos.com/pressoffice/news/articles/2007/0 9/ameritrade.html http://www.articlesbase.com/home-and-family- articles/what-you-should-know-about-internet-phishing- 1039201.html http://www.articlesbase.com/home-and-family- articles/what-you-should-know-about-internet-phishing- 1039201.html http://www.fraud.org/tips/internet/phishing.htm
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.