Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Socially Engineered Attack Vectors Openings and Closings

802 views

Published on

Presentation by Digijaks CEO Alan W Silberberg at the California Cyber Security Task Force on November, 3, 2015.

  • Be the first to comment

Socially Engineered Attack Vectors Openings and Closings

  1. 1. Alan W Silberberg CEO of DIGIJAKS Presented to California Cyber Security Task Force November 2015. Presented By Alan W Silberberg to Calfiornia Cyber Security Task Force 2015 1
  2. 2.  Opening – Who does this and how do they get in?  Social Engineered Attack as Phishing in Mobile leading to bluejacking, device denial and theft.  Social Engineered Attack using a “Social Graph” as vector to learn more about orgs, people then to commence with phishing, watering-hole and MiTM attacks.  Closing the Barn Door, keeping it shut, while still looking through the window. Presented By Alan W Silberberg to Calfiornia Cyber Security Task Force 2015 2
  3. 3. 3 Presented By Alan W Silberberg to Calfiornia Cyber Security Task Force 2015
  4. 4. Presented By Alan W Silberberg to Calfiornia Cyber Security Task Force 2015 4
  5. 5. Presented By Alan W Silberberg to Calfiornia Cyber Security Task Force 2015 5
  6. 6. Presented By Alan W Silberberg to Calfiornia Cyber Security Task Force 2015 6
  7. 7. Presented By Alan W Silberberg to Calfiornia Cyber Security Task Force 2015 7
  8. 8. 8 Presented By Alan W Silberberg to Calfiornia Cyber Security Task Force 2015
  9. 9.  Every APP has to be thoroughly vetted even if coming from Apple or Google stores for PUA and Permission Authorities.  Social Media is both the way in and the way to shut them down. It is imperative to be using social media, to be on, and listening but also to have all privacy and safety settings bolted down. True in personal and organizational environments.  Phishing can occur through voice, through SMS, through social media and even through videos and websites. 9 Presented By Alan W Silberberg to Calfiornia Cyber Security Task Force 2015
  10. 10.  NODEXL is a free plug in for Microsoft Excel which allows for bulk importation of social media graph data from multiple platforms and allows for complex visualizations to be built using a number of categories including users and hashtags/content.  MENTIONMAPP.COM is excellent for instant social map on twitter.  PAID SERVICES INCLUDE:  RADIAN 6  BOTTLENOSE  Numerous Analytics companies that offer visualizations 10 Presented By Alan W Silberberg to Calfiornia Cyber Security Task Force 2015

×