Download presentation
Presentation is loading. Please wait.
Published byDella Williamson Modified over 9 years ago
3
CyberSource 2013 and 2014 Online Fraud Report
4
1. http://www.huffingtonpost.com/2014/09/29/domain-theft_n_5877510.html 2. http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_v18_2012_21291018.en-us.pdf
6
Huffingtonpost.com, When Hackers Steal A Web Address, Few Owners Ever Get It Back by Gerald Smith 10/07/2014 http://www.huffingtonpost.com/2014/09/29/domain-theft_n_5877510.html
9
Disgruntled Employee: Employee leaves a company angry so he uses the login information, which wasn’t updated upon his departure, to access the domains’ registrar to update the content information and move them into his account to get revenge. Pharming: Obtain personal information through domain spoofing. Pharming changes a DNS server by infusing false information into the DNS server, resulting in a user's request being redirected elsewhere. Your browser still shows the correct website, which makes pharming difficult to detect.
11
The hack was announced by Hitcher on his twitter account: twitter https://www.hackread.com/israeli-government-website-hacked-by-hitcher-against-mr-badoos-arrest/
12
Most hackers are in it for the money
13
http://mashable.com/2014/04/02/ramshackle-glam-hacking/ Blogger Pulls Off $30,000 Sting to Get Her Stolen Site back by Jordan Reid April 2, 2014
15
Sting Operation definition: A sting operation uses deception to catch a criminal in the act. Usually relying on undercover officers to act as accomplices or victims. -WiseGeek http://mashable.com/2014/04/02/ramshackle-glam-hacking/ Blogger Pulls Off $30,000 Sting to Get Her Stolen Site back by Jordan Reid April 2, 2014
18
Value Domain Asset Domain Name Protection Services Accurate & Private Whois Records Stay Informed
19
Security and Stability Advisory Committee (SSAC) chairman Steve Crocker referencing a 2005 press release on the committee's official report.
20
Choose a domain registrar carefully. Does the registrar have: Protection services for your domain names Safeguard measures in place to guard against the fraudulent removal of your transfer lock and change to your domain name configuration Standard practices to send transfer pending notification Personalized protection method -Will the registrar implement additional authentication and authorization measures? In example: 1.Transfer must be initiated from within the domain holder’s register’s account 2.The registrar must call only a specified number for transfer verification 3.The domain holder gives the registrar representative a code that only the domain holder knows http://securityskeptic.typepad.com/the-security-skeptic/how-to-protect-yourself-against-domain-name-hijackers-.html
23
http://archive.icann.org/en/announcements/hijacking-report-12jul05.pdf http://www.huffingtonpost.com/2014/09/29/domain-theft_n_5877510.html http://docs.apwg.org/reports/APWG_Global_Phishing_Report_1H_2014.pdf https://www.hackread.com/israeli-government-website-hacked-by-hitcher-against-mr-badoos- arrest/ http://mashable.com/2014/04/02/ramshackle-glam-hacking/ http://securityskeptic.typepad.com/the-security-skeptic/how-to-protect-yourself-against- domain-name-hijackers-.html http://www.symantec.com/content/en/us/enterprise/other_resources/b- istr_main_report_v18_2012_21291018.en-us.pdf http://www.entrepreneur.com/article/232426
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.