Are You a Hacker's Target?

  • 38,860 views
Uploaded on

Are you a hacker’s target? How do they get your information? In the world of network security, cybercrime and information warfare, it’s important to protect yourself. Check out the infographic below …

Are you a hacker’s target? How do they get your information? In the world of network security, cybercrime and information warfare, it’s important to protect yourself. Check out the infographic below and let us know: how have you been a hacker’s target?

More in: Technology , Business
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
No Downloads

Views

Total Views
38,860
On Slideshare
0
From Embeds
0
Number of Embeds
5

Actions

Shares
Downloads
302
Comments
4
Likes
36

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. HACKER’STARGET?ARE YOU A
  • 2. Youhavea69%chanceoffallingvictimtocybercrimeinyourlifetimeThat’salmost3outof4peopleincountriesaroundtheworld69%
  • 3. 57MILLIONAMERICANSreceivescamemailsayear1OUTOF3hacksoriginatedintheUSA47%OFIDENTITYTHEFTSareperpetratedbysomeonethevictimknew$8.9MILLIONthecostofcybercrimeperbusinessintheU.S.in2012
  • 4. HOW DO HACKERSGET YOUR INFORMATION?sortthroughyourpersonalcomputerortrash60% hackorscamyouwhileonline25%stealyourwallet15%clickonaspamlink19%disclosefinancialinformationbyaccident3%THOSE WHO GET THEIRINFORMATION STOLEN
  • 5. TACTICSFORHACKINGUSERACCOUNTSONLINEBAITINGsomeone gives you a usb drive or otherelectronic media that is preloaded withmalware. Plug it into your computerand you’ve given them the backdoor toyour personal information!CLICKJACKINGconcealing hyperlinks beneathlegitimate clickable content which,when clicked, gets you to downloadmalware or perform actionsCROSS-SITESCRIPTINGmalicious code is injected into awebsite you trustDOXINGpublicly releasing a personssensitive, identifying information,typically retrieved from socialnetworking site profiles
  • 6. SOCIALENGINEERINGstrategic use of conversation toextract information from peoplewithout giving them the feelingthey are being interrogatedPHARMINGredirecting users from legitimatewebsites to fraudulent ones forthe purpose of extractingconfidential dataPHISHINGusually an email that looks like it isfrom a legitimate organization orperson, but actually contains a linkor file with malwareSPOOFINGdeceiving computers or users byhiding or faking ones identity.Email spoofing utilizes a fakeemail address or simulates agenuine email addressTACTICSFORHACKINGUSERACCOUNTSONLINE(CONTINUED)
  • 7. HOW MANYACCOUNTS HAVEBEEN COMPROMISEDIN SINGLE ATTACKS100,000,000NETFLIX18,000,000WORDPRESS6,500,000LINKEDIN1,500,000VISA&MASTERCARD600,000DAILYFACEBOOK450,000YAHOO250,000TWITTER120,000UNIVERSITIES24,000,000ZAPPOS
  • 8. THEMOSTTARGETEDWEBSITESFORHACKERSTwitterFacebookRetailMediaTechEcommerceInternetServiceProviderSearchEnginesLawEnforcementGovernmentPoliticalFinancial1.FLORIDA 2.ARIZONA 3.CALIFORNIATOPSTATESINTHEUSTHATAREVICTIMSOFCYBERCRIME1.CHINA 2.BRAZIL/INDIA 3.USATOPCOUNTRIESTHATAREVICTIMSOFCYBERCRIME
  • 9. usealockorpasswordforyourcomputerandphoneskeepyourpasswordsatleast8characterslongandavoidusingwordsfoundinadictionaryaddoneuppercaseletterandasymboltoyourpassword—itwilltakehackers200yearstocrackitvs.2hoursifyouusealllowercaseletterslogoutofyouraccountsandclosebrowserwindowsLogOutgopaperless—paperbankstatementsare8xmorelikelytobestolenthanpaperlessstatementsTIPS TO INCREASEYOUR SECURITYwhenyoureceiveemailsfromyourbank,godirectlytotheirwebsite—dontclickonanylinksintheemail
  • 10. SOURCES:http://mashable.com/2012/06/06/6-5-million-linkedin-passwordshttp://www.cnn.com/2012/07/12/tech/web/yahoo-users-hackedhttp://www.symantec.com/about/news/release/article.jsp?prid=20110907_02https://www.fbi.gov/about-us/investigate/counterintelligence/internet-social-networking-riskshttp://www.cbsnews.com/8301-505124_162-57359700/zappos-hacked-24-million-accounts-at-riskhttp://www.escapistmagazine.com/forums/read/7.320322-600-000-Facebook-Accounts-Get-Hacked-Dailyhttp://www.huffingtonpost.com/2012/10/04/hacktivists-college-records-dump-team-ghostshell_n_1940388.htmlhttp://social4ce.com/blog/2013/02/11/social-media-bytes-hacking-social-media-hoax-and-stats-about-arab-online-usershttp://live.wsj.com/video/visa-15m-accounts-were-hacked/46E45A62-7C71-4B1A-AA98-05637A288D2A.html#!46E45A62-7C71-4B1A-AA98-05637A288D2ABROUGHT TO YOU BY:WWW.SOLERANETWORKS.COM