• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Are You a Hacker's Target?
 

Are You a Hacker's Target?

on

  • 39,098 views

Are you a hacker’s target? How do they get your information? In the world of network security, cybercrime and information warfare, it’s important to protect yourself. Check out the infographic ...

Are you a hacker’s target? How do they get your information? In the world of network security, cybercrime and information warfare, it’s important to protect yourself. Check out the infographic below and let us know: how have you been a hacker’s target?

Statistics

Views

Total Views
39,098
Views on SlideShare
38,479
Embed Views
619

Actions

Likes
35
Downloads
296
Comments
4

11 Embeds 619

http://beingsam.in 519
http://cuechrist.com 30
https://twitter.com 22
http://translate.googleusercontent.com 20
http://carolina941617.blogspot.com 10
https://my.examtime.com 8
http://redvolucionate.wikispaces.com 4
http://www.presentationdocs.com 2
http://tw.aisj-jhb.com 2
http://slides.diigo.com 1
http://htmlcomponentservice.appspot.com 1
More...

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel

14 of 4 previous next Post a comment

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Are You a Hacker's Target? Are You a Hacker's Target? Presentation Transcript

    • HACKER’STARGET?ARE YOU A
    • Youhavea69%chanceoffallingvictimtocybercrimeinyourlifetimeThat’salmost3outof4peopleincountriesaroundtheworld69%
    • 57MILLIONAMERICANSreceivescamemailsayear1OUTOF3hacksoriginatedintheUSA47%OFIDENTITYTHEFTSareperpetratedbysomeonethevictimknew$8.9MILLIONthecostofcybercrimeperbusinessintheU.S.in2012
    • HOW DO HACKERSGET YOUR INFORMATION?sortthroughyourpersonalcomputerortrash60% hackorscamyouwhileonline25%stealyourwallet15%clickonaspamlink19%disclosefinancialinformationbyaccident3%THOSE WHO GET THEIRINFORMATION STOLEN
    • TACTICSFORHACKINGUSERACCOUNTSONLINEBAITINGsomeone gives you a usb drive or otherelectronic media that is preloaded withmalware. Plug it into your computerand you’ve given them the backdoor toyour personal information!CLICKJACKINGconcealing hyperlinks beneathlegitimate clickable content which,when clicked, gets you to downloadmalware or perform actionsCROSS-SITESCRIPTINGmalicious code is injected into awebsite you trustDOXINGpublicly releasing a personssensitive, identifying information,typically retrieved from socialnetworking site profiles
    • SOCIALENGINEERINGstrategic use of conversation toextract information from peoplewithout giving them the feelingthey are being interrogatedPHARMINGredirecting users from legitimatewebsites to fraudulent ones forthe purpose of extractingconfidential dataPHISHINGusually an email that looks like it isfrom a legitimate organization orperson, but actually contains a linkor file with malwareSPOOFINGdeceiving computers or users byhiding or faking ones identity.Email spoofing utilizes a fakeemail address or simulates agenuine email addressTACTICSFORHACKINGUSERACCOUNTSONLINE(CONTINUED)
    • HOW MANYACCOUNTS HAVEBEEN COMPROMISEDIN SINGLE ATTACKS100,000,000NETFLIX18,000,000WORDPRESS6,500,000LINKEDIN1,500,000VISA&MASTERCARD600,000DAILYFACEBOOK450,000YAHOO250,000TWITTER120,000UNIVERSITIES24,000,000ZAPPOS
    • THEMOSTTARGETEDWEBSITESFORHACKERSTwitterFacebookRetailMediaTechEcommerceInternetServiceProviderSearchEnginesLawEnforcementGovernmentPoliticalFinancial1.FLORIDA 2.ARIZONA 3.CALIFORNIATOPSTATESINTHEUSTHATAREVICTIMSOFCYBERCRIME1.CHINA 2.BRAZIL/INDIA 3.USATOPCOUNTRIESTHATAREVICTIMSOFCYBERCRIME
    • usealockorpasswordforyourcomputerandphoneskeepyourpasswordsatleast8characterslongandavoidusingwordsfoundinadictionaryaddoneuppercaseletterandasymboltoyourpassword—itwilltakehackers200yearstocrackitvs.2hoursifyouusealllowercaseletterslogoutofyouraccountsandclosebrowserwindowsLogOutgopaperless—paperbankstatementsare8xmorelikelytobestolenthanpaperlessstatementsTIPS TO INCREASEYOUR SECURITYwhenyoureceiveemailsfromyourbank,godirectlytotheirwebsite—dontclickonanylinksintheemail
    • SOURCES:http://mashable.com/2012/06/06/6-5-million-linkedin-passwordshttp://www.cnn.com/2012/07/12/tech/web/yahoo-users-hackedhttp://www.symantec.com/about/news/release/article.jsp?prid=20110907_02https://www.fbi.gov/about-us/investigate/counterintelligence/internet-social-networking-riskshttp://www.cbsnews.com/8301-505124_162-57359700/zappos-hacked-24-million-accounts-at-riskhttp://www.escapistmagazine.com/forums/read/7.320322-600-000-Facebook-Accounts-Get-Hacked-Dailyhttp://www.huffingtonpost.com/2012/10/04/hacktivists-college-records-dump-team-ghostshell_n_1940388.htmlhttp://social4ce.com/blog/2013/02/11/social-media-bytes-hacking-social-media-hoax-and-stats-about-arab-online-usershttp://live.wsj.com/video/visa-15m-accounts-were-hacked/46E45A62-7C71-4B1A-AA98-05637A288D2A.html#!46E45A62-7C71-4B1A-AA98-05637A288D2ABROUGHT TO YOU BY:WWW.SOLERANETWORKS.COM