Presentation is loading. Please wait.

Presentation is loading. Please wait.

CyberSource 2013 and 2014 Online Fraud Report 1. 2.

Similar presentations


Presentation on theme: "CyberSource 2013 and 2014 Online Fraud Report 1. 2."— Presentation transcript:

1

2

3 CyberSource 2013 and 2014 Online Fraud Report

4 1. http://www.huffingtonpost.com/2014/09/29/domain-theft_n_5877510.html 2. http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_v18_2012_21291018.en-us.pdf

5

6 Huffingtonpost.com, When Hackers Steal A Web Address, Few Owners Ever Get It Back by Gerald Smith 10/07/2014 http://www.huffingtonpost.com/2014/09/29/domain-theft_n_5877510.html

7

8

9 Disgruntled Employee: Employee leaves a company angry so he uses the login information, which wasn’t updated upon his departure, to access the domains’ registrar to update the content information and move them into his account to get revenge. Pharming: Obtain personal information through domain spoofing. Pharming changes a DNS server by infusing false information into the DNS server, resulting in a user's request being redirected elsewhere. Your browser still shows the correct website, which makes pharming difficult to detect.

10

11 The hack was announced by Hitcher on his twitter account: twitter https://www.hackread.com/israeli-government-website-hacked-by-hitcher-against-mr-badoos-arrest/

12 Most hackers are in it for the money

13 http://mashable.com/2014/04/02/ramshackle-glam-hacking/ Blogger Pulls Off $30,000 Sting to Get Her Stolen Site back by Jordan Reid April 2, 2014

14

15 Sting Operation definition: A sting operation uses deception to catch a criminal in the act. Usually relying on undercover officers to act as accomplices or victims. -WiseGeek http://mashable.com/2014/04/02/ramshackle-glam-hacking/ Blogger Pulls Off $30,000 Sting to Get Her Stolen Site back by Jordan Reid April 2, 2014

16

17

18 Value Domain Asset Domain Name Protection Services Accurate & Private Whois Records Stay Informed

19 Security and Stability Advisory Committee (SSAC) chairman Steve Crocker referencing a 2005 press release on the committee's official report.

20 Choose a domain registrar carefully. Does the registrar have: Protection services for your domain names Safeguard measures in place to guard against the fraudulent removal of your transfer lock and change to your domain name configuration Standard practices to send transfer pending notification Personalized protection method -Will the registrar implement additional authentication and authorization measures? In example: 1.Transfer must be initiated from within the domain holder’s register’s account 2.The registrar must call only a specified number for transfer verification 3.The domain holder gives the registrar representative a code that only the domain holder knows http://securityskeptic.typepad.com/the-security-skeptic/how-to-protect-yourself-against-domain-name-hijackers-.html

21

22

23 http://archive.icann.org/en/announcements/hijacking-report-12jul05.pdf http://www.huffingtonpost.com/2014/09/29/domain-theft_n_5877510.html http://docs.apwg.org/reports/APWG_Global_Phishing_Report_1H_2014.pdf https://www.hackread.com/israeli-government-website-hacked-by-hitcher-against-mr-badoos- arrest/ http://mashable.com/2014/04/02/ramshackle-glam-hacking/ http://securityskeptic.typepad.com/the-security-skeptic/how-to-protect-yourself-against- domain-name-hijackers-.html http://www.symantec.com/content/en/us/enterprise/other_resources/b- istr_main_report_v18_2012_21291018.en-us.pdf http://www.entrepreneur.com/article/232426


Download ppt "CyberSource 2013 and 2014 Online Fraud Report 1. 2."

Similar presentations


Ads by Google