HACKER’STARGET?ARE YOU A
Youhavea69%chanceoffallingvictimtocybercrimeinyourlifetimeThat’salmost3outof4peopleincountriesaroundtheworld69%
57MILLIONAMERICANSreceivescamemailsayear1OUTOF3hacksoriginatedintheUSA47%OFIDENTITYTHEFTSareperpetratedbysomeonethevictimk...
HOW DO HACKERSGET YOUR INFORMATION?sortthroughyourpersonalcomputerortrash60% hackorscamyouwhileonline25%stealyourwallet15%...
TACTICSFORHACKINGUSERACCOUNTSONLINEBAITINGsomeone gives you a usb drive or otherelectronic media that is preloaded withmal...
SOCIALENGINEERINGstrategic use of conversation toextract information from peoplewithout giving them the feelingthey are be...
HOW MANYACCOUNTS HAVEBEEN COMPROMISEDIN SINGLE ATTACKS100,000,000NETFLIX18,000,000WORDPRESS6,500,000LINKEDIN1,500,000VISA&...
THEMOSTTARGETEDWEBSITESFORHACKERSTwitterFacebookRetailMediaTechEcommerceInternetServiceProviderSearchEnginesLawEnforcement...
usealockorpasswordforyourcomputerandphoneskeepyourpasswordsatleast8characterslongandavoidusingwordsfoundinadictionaryaddon...
SOURCES:http://mashable.com/2012/06/06/6-5-million-linkedin-passwordshttp://www.cnn.com/2012/07/12/tech/web/yahoo-users-ha...
Upcoming SlideShare
Loading in...5
×

Are You a Hacker's Target?

39,004

Published on

Are you a hacker’s target? How do they get your information? In the world of network security, cybercrime and information warfare, it’s important to protect yourself. Check out the infographic below and let us know: how have you been a hacker’s target?

Published in: Technology, Business
4 Comments
36 Likes
Statistics
Notes
No Downloads
Views
Total Views
39,004
On Slideshare
0
From Embeds
0
Number of Embeds
6
Actions
Shares
0
Downloads
303
Comments
4
Likes
36
Embeds 0
No embeds

No notes for slide

Are You a Hacker's Target?

  1. 1. HACKER’STARGET?ARE YOU A
  2. 2. Youhavea69%chanceoffallingvictimtocybercrimeinyourlifetimeThat’salmost3outof4peopleincountriesaroundtheworld69%
  3. 3. 57MILLIONAMERICANSreceivescamemailsayear1OUTOF3hacksoriginatedintheUSA47%OFIDENTITYTHEFTSareperpetratedbysomeonethevictimknew$8.9MILLIONthecostofcybercrimeperbusinessintheU.S.in2012
  4. 4. HOW DO HACKERSGET YOUR INFORMATION?sortthroughyourpersonalcomputerortrash60% hackorscamyouwhileonline25%stealyourwallet15%clickonaspamlink19%disclosefinancialinformationbyaccident3%THOSE WHO GET THEIRINFORMATION STOLEN
  5. 5. TACTICSFORHACKINGUSERACCOUNTSONLINEBAITINGsomeone gives you a usb drive or otherelectronic media that is preloaded withmalware. Plug it into your computerand you’ve given them the backdoor toyour personal information!CLICKJACKINGconcealing hyperlinks beneathlegitimate clickable content which,when clicked, gets you to downloadmalware or perform actionsCROSS-SITESCRIPTINGmalicious code is injected into awebsite you trustDOXINGpublicly releasing a personssensitive, identifying information,typically retrieved from socialnetworking site profiles
  6. 6. SOCIALENGINEERINGstrategic use of conversation toextract information from peoplewithout giving them the feelingthey are being interrogatedPHARMINGredirecting users from legitimatewebsites to fraudulent ones forthe purpose of extractingconfidential dataPHISHINGusually an email that looks like it isfrom a legitimate organization orperson, but actually contains a linkor file with malwareSPOOFINGdeceiving computers or users byhiding or faking ones identity.Email spoofing utilizes a fakeemail address or simulates agenuine email addressTACTICSFORHACKINGUSERACCOUNTSONLINE(CONTINUED)
  7. 7. HOW MANYACCOUNTS HAVEBEEN COMPROMISEDIN SINGLE ATTACKS100,000,000NETFLIX18,000,000WORDPRESS6,500,000LINKEDIN1,500,000VISA&MASTERCARD600,000DAILYFACEBOOK450,000YAHOO250,000TWITTER120,000UNIVERSITIES24,000,000ZAPPOS
  8. 8. THEMOSTTARGETEDWEBSITESFORHACKERSTwitterFacebookRetailMediaTechEcommerceInternetServiceProviderSearchEnginesLawEnforcementGovernmentPoliticalFinancial1.FLORIDA 2.ARIZONA 3.CALIFORNIATOPSTATESINTHEUSTHATAREVICTIMSOFCYBERCRIME1.CHINA 2.BRAZIL/INDIA 3.USATOPCOUNTRIESTHATAREVICTIMSOFCYBERCRIME
  9. 9. usealockorpasswordforyourcomputerandphoneskeepyourpasswordsatleast8characterslongandavoidusingwordsfoundinadictionaryaddoneuppercaseletterandasymboltoyourpassword—itwilltakehackers200yearstocrackitvs.2hoursifyouusealllowercaseletterslogoutofyouraccountsandclosebrowserwindowsLogOutgopaperless—paperbankstatementsare8xmorelikelytobestolenthanpaperlessstatementsTIPS TO INCREASEYOUR SECURITYwhenyoureceiveemailsfromyourbank,godirectlytotheirwebsite—dontclickonanylinksintheemail
  10. 10. SOURCES:http://mashable.com/2012/06/06/6-5-million-linkedin-passwordshttp://www.cnn.com/2012/07/12/tech/web/yahoo-users-hackedhttp://www.symantec.com/about/news/release/article.jsp?prid=20110907_02https://www.fbi.gov/about-us/investigate/counterintelligence/internet-social-networking-riskshttp://www.cbsnews.com/8301-505124_162-57359700/zappos-hacked-24-million-accounts-at-riskhttp://www.escapistmagazine.com/forums/read/7.320322-600-000-Facebook-Accounts-Get-Hacked-Dailyhttp://www.huffingtonpost.com/2012/10/04/hacktivists-college-records-dump-team-ghostshell_n_1940388.htmlhttp://social4ce.com/blog/2013/02/11/social-media-bytes-hacking-social-media-hoax-and-stats-about-arab-online-usershttp://live.wsj.com/video/visa-15m-accounts-were-hacked/46E45A62-7C71-4B1A-AA98-05637A288D2A.html#!46E45A62-7C71-4B1A-AA98-05637A288D2ABROUGHT TO YOU BY:WWW.SOLERANETWORKS.COM
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×