Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
HACKER’STARGET?ARE YOU A
Youhavea69%chanceoffallingvictimtocybercrimeinyourlifetimeThat’salmost3outof4peopleincountriesaroundtheworld69%
57MILLIONAMERICANSreceivescamemailsayear1OUTOF3hacksoriginatedintheUSA47%OFIDENTITYTHEFTSareperpetratedbysomeonethevictimk...
HOW DO HACKERSGET YOUR INFORMATION?sortthroughyourpersonalcomputerortrash60% hackorscamyouwhileonline25%stealyourwallet15%...
TACTICSFORHACKINGUSERACCOUNTSONLINEBAITINGsomeone gives you a usb drive or otherelectronic media that is preloaded withmal...
SOCIALENGINEERINGstrategic use of conversation toextract information from peoplewithout giving them the feelingthey are be...
HOW MANYACCOUNTS HAVEBEEN COMPROMISEDIN SINGLE ATTACKS100,000,000NETFLIX18,000,000WORDPRESS6,500,000LINKEDIN1,500,000VISA&...
THEMOSTTARGETEDWEBSITESFORHACKERSTwitterFacebookRetailMediaTechEcommerceInternetServiceProviderSearchEnginesLawEnforcement...
usealockorpasswordforyourcomputerandphoneskeepyourpasswordsatleast8characterslongandavoidusingwordsfoundinadictionaryaddon...
SOURCES:http://mashable.com/2012/06/06/6-5-million-linkedin-passwordshttp://www.cnn.com/2012/07/12/tech/web/yahoo-users-ha...
Upcoming SlideShare
Loading in …5
×
Upcoming SlideShare
Online Security for Kids
Next
Download to read offline and view in fullscreen.

35

Share

Download to read offline

Are You a Hacker's Target?

Download to read offline

Are you a hacker’s target? How do they get your information? In the world of network security, cybercrime and information warfare, it’s important to protect yourself. Check out the infographic below and let us know: how have you been a hacker’s target?

Related Books

Free with a 30 day trial from Scribd

See all

Related Audiobooks

Free with a 30 day trial from Scribd

See all

Are You a Hacker's Target?

  1. HACKER’STARGET?ARE YOU A
  2. Youhavea69%chanceoffallingvictimtocybercrimeinyourlifetimeThat’salmost3outof4peopleincountriesaroundtheworld69%
  3. 57MILLIONAMERICANSreceivescamemailsayear1OUTOF3hacksoriginatedintheUSA47%OFIDENTITYTHEFTSareperpetratedbysomeonethevictimknew$8.9MILLIONthecostofcybercrimeperbusinessintheU.S.in2012
  4. HOW DO HACKERSGET YOUR INFORMATION?sortthroughyourpersonalcomputerortrash60% hackorscamyouwhileonline25%stealyourwallet15%clickonaspamlink19%disclosefinancialinformationbyaccident3%THOSE WHO GET THEIRINFORMATION STOLEN
  5. TACTICSFORHACKINGUSERACCOUNTSONLINEBAITINGsomeone gives you a usb drive or otherelectronic media that is preloaded withmalware. Plug it into your computerand you’ve given them the backdoor toyour personal information!CLICKJACKINGconcealing hyperlinks beneathlegitimate clickable content which,when clicked, gets you to downloadmalware or perform actionsCROSS-SITESCRIPTINGmalicious code is injected into awebsite you trustDOXINGpublicly releasing a personssensitive, identifying information,typically retrieved from socialnetworking site profiles
  6. SOCIALENGINEERINGstrategic use of conversation toextract information from peoplewithout giving them the feelingthey are being interrogatedPHARMINGredirecting users from legitimatewebsites to fraudulent ones forthe purpose of extractingconfidential dataPHISHINGusually an email that looks like it isfrom a legitimate organization orperson, but actually contains a linkor file with malwareSPOOFINGdeceiving computers or users byhiding or faking ones identity.Email spoofing utilizes a fakeemail address or simulates agenuine email addressTACTICSFORHACKINGUSERACCOUNTSONLINE(CONTINUED)
  7. HOW MANYACCOUNTS HAVEBEEN COMPROMISEDIN SINGLE ATTACKS100,000,000NETFLIX18,000,000WORDPRESS6,500,000LINKEDIN1,500,000VISA&MASTERCARD600,000DAILYFACEBOOK450,000YAHOO250,000TWITTER120,000UNIVERSITIES24,000,000ZAPPOS
  8. THEMOSTTARGETEDWEBSITESFORHACKERSTwitterFacebookRetailMediaTechEcommerceInternetServiceProviderSearchEnginesLawEnforcementGovernmentPoliticalFinancial1.FLORIDA 2.ARIZONA 3.CALIFORNIATOPSTATESINTHEUSTHATAREVICTIMSOFCYBERCRIME1.CHINA 2.BRAZIL/INDIA 3.USATOPCOUNTRIESTHATAREVICTIMSOFCYBERCRIME
  9. usealockorpasswordforyourcomputerandphoneskeepyourpasswordsatleast8characterslongandavoidusingwordsfoundinadictionaryaddoneuppercaseletterandasymboltoyourpassword—itwilltakehackers200yearstocrackitvs.2hoursifyouusealllowercaseletterslogoutofyouraccountsandclosebrowserwindowsLogOutgopaperless—paperbankstatementsare8xmorelikelytobestolenthanpaperlessstatementsTIPS TO INCREASEYOUR SECURITYwhenyoureceiveemailsfromyourbank,godirectlytotheirwebsite—dontclickonanylinksintheemail
  10. SOURCES:http://mashable.com/2012/06/06/6-5-million-linkedin-passwordshttp://www.cnn.com/2012/07/12/tech/web/yahoo-users-hackedhttp://www.symantec.com/about/news/release/article.jsp?prid=20110907_02https://www.fbi.gov/about-us/investigate/counterintelligence/internet-social-networking-riskshttp://www.cbsnews.com/8301-505124_162-57359700/zappos-hacked-24-million-accounts-at-riskhttp://www.escapistmagazine.com/forums/read/7.320322-600-000-Facebook-Accounts-Get-Hacked-Dailyhttp://www.huffingtonpost.com/2012/10/04/hacktivists-college-records-dump-team-ghostshell_n_1940388.htmlhttp://social4ce.com/blog/2013/02/11/social-media-bytes-hacking-social-media-hoax-and-stats-about-arab-online-usershttp://live.wsj.com/video/visa-15m-accounts-were-hacked/46E45A62-7C71-4B1A-AA98-05637A288D2A.html#!46E45A62-7C71-4B1A-AA98-05637A288D2ABROUGHT TO YOU BY:WWW.SOLERANETWORKS.COM
  • Mohammed1Najjar

    Dec. 15, 2014
  • alexbahy5

    Mar. 10, 2014
  • polme

    Mar. 9, 2014
  • cybrarian-one

    Mar. 8, 2014
  • oddz

    Mar. 7, 2014
  • charliecarpio

    Mar. 6, 2014
  • ReinaLopez1

    Mar. 5, 2014
  • ssusereff90f

    Mar. 5, 2014
  • chrisdemons1

    Mar. 5, 2014
  • JeanJaderMartins

    Mar. 5, 2014
  • marisfromparis

    Jul. 17, 2013
  • xiaochen77

    May. 9, 2013
  • mhaworth123

    Apr. 29, 2013
  • lific

    Apr. 25, 2013
  • NiciElmore

    Apr. 25, 2013
  • geoen

    Apr. 25, 2013
  • j0lyn

    Apr. 24, 2013
  • arin00dyk

    Apr. 24, 2013
  • gabrielfort

    Apr. 24, 2013
  • jeromeatahias

    Apr. 24, 2013

Are you a hacker’s target? How do they get your information? In the world of network security, cybercrime and information warfare, it’s important to protect yourself. Check out the infographic below and let us know: how have you been a hacker’s target?

Views

Total views

40,865

On Slideshare

0

From embeds

0

Number of embeds

672

Actions

Downloads

309

Shares

0

Comments

0

Likes

35

×