SlideShare a Scribd company logo
Delivering	the	best	in	z	services,	software,	hardware	and	training.Delivering	the	best	in	z	services,	software,	hardware	and	training.
World	Class	z	Specialists
Cybercrime,	Inc.
Rui	Miguel	Feio – Technical	Lead
Agenda
• Evolution
• The	next-generation	criminal	organisation
• The	Cybercrime	Inc.	organisation
• Adapt	to	the	new
• Examples
• Technological	targets
• Hackers	– The	bread	and	butter
• Taking	security	seriously	(or	not)
• What	can	we	do?
• Conclusion
• Questions
Introduction
– Technical	lead	at	RSM	Partners
– Been	working	with	mainframes	for	the	past	17	years
– Started	as	an	MVS	Systems	Programmer	with	IBM
– Specialises	in	mainframe	security
– Experience	in	non-mainframe	platforms	as	well
– Been	given	presentations	all	over	the	world
Evolution
In	the	early	years…	not	so	long	ago…
Picture	from	the	short	movie	“KUNG	FURY”
In	the	early	years…	not	so	long	ago…
Technology
• Phones
• PC
• Bulletin	Board	Systems
• Internet
The	‘curious	bunch’
– Phreakers
– Crackers
– Hackers
Today…
In	nowadays…
Technology
• Phones
• PC
• Internet
• Smart	phones
• Tablets
• Dark	Web
• Internet	of	Things	(IoT)
• Advent	of	Robotics
‘Curious	bunch’	turned	Pro
– Phreakers
– Crackers
– Hackers
– Carders
– Nation-states
– Intelligence	Services
– Hacktivists
– Insiders
– Organised	Crime	Groups
Internet,	the	new	frontier
• Tech	evolution	+	Internet	=	New	Business	Opportunities
– Individuals	started	online	businesses
– New	major	companies	have	been	founded:
• Google,	Facebook,	Yahoo,	etc.
– Existing	business	sectors	turned	online	to	increase	their	
earnings:
• Retail,	financial,	insurance,	etc.
Society	has	also	evolved…
• The	internet	allowed	the	creation	of	new	economic	markets	and	
opportunities
• This	new	economic	market	has	no	borders
• A	market	with	hundreds	of	millions	of	users
• An	economic	market	worth…	Trillions	of	Dollars,	Euros,	Pounds…!!
• Many	countries	and	companies	are	now	dependent	on	this	new	
economic	market
Where	there	is	money,	there	is	crime!
• Criminal	gangs	and	organisations	moved	into	the	new	economic	
market:
– Started	recruiting	Hackers
– Started	devising	new	“business	ideas”
– Developed	a	“business	plan”
• Organised	crime	became	professional	in	the	new	internet	world.
Old	boys	in	a	new	age
• Traditional	criminal	organisations	have	‘started’	cybercrime	
divisions:
– Cosa	Nostra	(Italian	Mafia)
– Japanese	Yakuza
– Chinese	Triads
– Russian	Mafia
– Nigerian	mobs
– Mexican	cartels
– …
The	next-generation	of	
criminal	organisation:
CYBERCRIME	INC.
Cybercrime	Inc.
• Highly	profitable	(it’s	always	about	the	money)
• Low	risk	(anonymity	and	geographical	location)
• More	efficient	due	to	technology
• Globally	dispersed,	with	special	concentration	in:
• Ukraine • China • Brazil
• Russia • Indonesia • USA
• Romania • Taiwan • Turkey
• Bulgaria • India • Nigeria
Cybercrime	Inc.
• 80%	of	Hackers	work	with	or	are	part	of	an	organised	crime	group	*
• Highly	organised
• Deeply	sophisticated:
– Business	approach
– Towards	the	‘client’
*	2014	study by	the	Rand	Corporation
Cybercrime	Inc.
Use	typical	corporate	strategies:
– Creative	financing
– Global	logistics
– Supply	chain	management
– ‘Workforce’	management
– ‘Client’	needs
– Business	and	market	analysis
Cybercrime	Inc.	- Business	model	
• Take	advantage	of	‘anonymous’	services	to	advertise	and	sell	their	
‘normal’	products	and	services	online
• Some	of	the	new	‘business’	opportunities:
• Identity	theft
• Intellectual	property	theft
• Trade	secrets
• Industrial	espionage
• Sensitive	data	theft
• Online	extortion
• Financial	crime
• Data	manipulation
Cybercrime	Inc.	- Tactics	used
• Some	of	the	tactics	and	methods	used	by	Cybercrime	Inc:
– Phishing	and	spear	phishing
– Man-in-the-middle
– Vulnerabilities
– Trojan	horse	software
– Spam
– Botnets
– Scareware
– Ransomware
– Malware
– DoS and	DDoS
The	Cybercrime	Inc.	
organisation
A	typical	business	organisation
CEO
CFO
Management
Sales	People
CIO
Management
Researchers Developers Engineers QA	Testers Tech	Support
HR	Director CMO
Management
Distributors Affiliates
The	Cybercrime	Inc.	organisation
CEO
(Boss)
CFO
(Underboss)
Management	
(Lieutenant)
Money	Mules
(Soldiers	&	
Associates)
CIO	
(Underboss)
Management
(Lieutenant)
Researchers	
(Soldiers)
Developers
(Soldiers)
Engineers
(Soldiers)
QA	Testers
(Soldiers)
Tech	Support
(Soldiers)
HR	Director
(Underboss)
CMO	
(Underboss)
Management
(Lieutenant)
Distributors
(Soldiers)
Affiliates
(Associates)
Cybercrime	Inc.	– ‘Business’	roles	(1)
• Chief	Executive	Officer	(CEO)	– Boss
– Responsible	for	decision	making	and	overseeing	operations
• Chief	Financial	Officer	(CFO)	– Underboss
– Deals	with	every	financial	aspect	of	the	cybercrime	org.
• Chief	Information	Officer	(CIO)	- Underboss
– Responsible	for	the	IT	infrastructure	of	the	organization
• Chief	Marketing	Officer	(CMO)	- Underboss
– Designs	effective	advertising	methods	for	products	and	services
Cybercrime	Inc.	– ‘Business’	roles	(2)
• Human	Resources	(HR)	Director	- Underboss
– Recruits	the	criminal	workforce	for	the	organization
• Management	- Lieutenant
– Responsible	for	managing	the	‘criminal’	workforce
• Researchers	- Soldiers
– Look	for	new	exploits	and	‘business’	opportunities
• Developers	&	Engineers	- Soldiers
– The	techies,	aka	the	brains!
Cybercrime	Inc.	– ‘Business’	roles	(3)
• Quality	Assurance	(QA)	Testers	- Soldiers
– Test	all	crimeware to	ensure	it	bypasses	any	security	measures	
of	potential	targets
• Technical	Support	- Soldiers
– Tech	support	to	clients,	affiliates	and	members	of	the	
organization
• Affiliates	- Associates
– Drive	potential	clients	to	Cybercrime	Inc.
Cybercrime	Inc.	– ‘Business’	roles	(4)
• Distributors	– Soldiers
– Help	distribute	malware
• Money	‘Mule’	– Soldiers	&	Associates
– Helps	with	the	money	laundering
Adapt	to	the	new
Cybercrime	Inc.	– Adapts	to	the	New
• Constantly	looking	to	innovate
• Overcome	obstacles
• Meet	market	demands
• Explore	new	‘business’	opportunities
• Use	tools	to	help	measure	levels	of	success	(e.g.	Web	analytics)
Hacking	as	a	service
Some	examples
Cybercrime	Inc.	– Innovative	Inc.
• Innovative	Marketing	Inc.	(aka	IMI)
– Founded	by	Sam	Jain	and	Daniel	Sundin (HQ	in	Ukraine)
– Developed	scareware	rogue	security	programs:
• WinFixer
• WinAntiVirus
– Offices	in	4	continents	with	hundreds	of	employees
– Support	centres	in	Ohio,	Argentina	and	India
– Marketed	products	under	more	than	1,000	different	brands	and	in	9	
languages
– From	2002	to	2008	IMI	generated	hundreds	of	millions	of	dollars	in	
profit.
Cybercrime	Inc.	– Innovative	Inc.
Photograph taken in 2003
BJORN DANIEL SUNDIN
Wire Fraud; Conspiracy to Commit Computer Fraud; Computer Fraud
DESCRIPTION
Alias: David Sundin
Date(s) of Birth Used: August 7, 1978 Place of Birth: Sweden
Hair: Red Eyes: Hazel
Height: 5'10" Weight: 136 pounds
Sex: Male Race: White
Occupation: Internet Entrepreneur Nationality: Swedish
Languages: English, Swedish NCIC: W10511664
REWARD
The FBI is o6ering a reward of up to $20,000 for information leading to the arrest and conviction of Bjorn Daniel Sundin.
REMARKS
Sundin has ties to Sweden and the Ukraine.
CAUTION
Bjorn Daniel Sundin, along with his co-conspirator, Shaileshkumar P. Jain, is wanted for his alleged involvement in an international cybercrime
scheme that caused internet users in more than 60 countries to purchase more than one million bogus software products, resulting in
consumer loss of more than $100 million. It is alleged that from December 2006 to October 2008, through fake advertisements placed on
Cybercrime	Inc.	– RBN
• Russian	Business	Network	(aka	RBN)
– Registered	as	an	internet	site	in	2006
– Based	in	St.	Petersburg,	Russia
– Allegedly	founded	by	the	newphew of	a	powerful	Russian	politician
– Specialises	in:
• Personal	identity	theft	for	resale
• Provides	web	hosting	and	internet	access	to	illegitimate	activities
• DoS attacks
• Delivery	of	exploits	via	fake	anti-spyware	and	anti-malware
• Botnet
Cybercrime	Inc.	– Carbanak Group
• The	Carbanak Group
– Discovered	in	early	2015	by	Kaspersky	Lab
– Used	an	APT-style	campaign	targeting	financial	institutions
– Aim	to	steal	money	from	banks
– Estimated	$1	Billion	dollars	have	been	stolen	in	an	attack	against	100	
banks	and	private	customers
– Targeted	primarily	Russia,	United	States,	Germany,	China	and	Ukraine
Cybercrime	Inc.	– Mexican	Cartels
• Mexican	cartels:
– Targeted	foreign	companies	investing	in	or	with	presence	in	Mexico
– Used	internet	to	identify	high-valued	employees
– Checked	travel	arrangements	to	Mexico
– Replaced	person	at	airport	waiting	for	’high-valued	target’
– Kidnapped	’high-valued	target’
– Demanded	ransom
Cybercrime	Inc.	– Mexican	Cartels
Technological	
Targets
Targeting	- Mobility
• Cybercrime	Inc.	is	focusing	on	mobile	devices:
– Used	by	individuals	on	a	day-to-day	basis:
• Online	banking
• Online	shopping
• Socialising
• Emails
• Store	personal	data
• GPS
– Can	be	easy	to	compromise	and	hack	(e.g.	install	“rootkit”	to	gain	
control	to	all	features	of	the	mobile	device)
Targeting	– The	Cloud
• Cybercrime	Inc.	is	focusing	on	The	Cloud:
– Network	of	computing	resources	
available	online
– The	Cloud	can	be	used	to	store,	manage	
and	process	information
– Companies	are	outsourcing	primary	
business	functions	using	Cloud	services
– Critical	and	confidential	data	is	now	
centralised	in	the	Cloud
– Instead	of	targeting	several	individual	
servers	let’s	focus	on	the	ones	in	the	
cloud	shall	we?
Targeting	- Data
• Cybercrime	Inc.	is	focusing	on	Data:
– Personal	data
– Business	data
– Government	data
– Military	data
– Data	manipulation	and	disinformation:
• Financial	markets
• What	is	displayed	in	our	screens
Targeting	- Internet	of	things	(IoT)
• Cybercrime	Inc.	is	focusing	on	IoT
devices:
– 2013	there	were	13	billion	online	devices
– Cisco	Systems	estimates	50	billion	online	
devices	by	2020
– IoT is	estimated	to	drive	an	additional	
$6.2	trillion	to	the	global	economy	by	
2025	according	to	McKinsey	Global	
Institute
– IoT devices	are	developed	without	having	
security	in	mind
But	Cybercrime	Inc.	can	also	target…
• SCADA	devices
– Supervisory	Control	And	Data	Acquisition	(SCADA)
– Specialised and	often	old	computer	systems
– Being	connected	to	the	broader	internet
– These	systems	were	not	designed	with	security	in	mind
– 2014	study	revealed	that	70%	had	suffered	at	least	one	security	
breach
• GPS	Systems
• Tracking	Systems
• Implanted	medical	devices	(IMDs)
• And	so	many	more!!...
Hackers	– The	bread	
and	butter
Looking	for	a	Hacker
• Hackers	are	not	born	hackers,	they	are	trained
• Enormous	amount	of	free	educational	material	in	the	internet	and	
in	the	underworld	(dark	web)
• PC	games:
– Uplink
– Hacker	Experience
– Torn	City
– Hacknet
– Hackers	(for	iOS	and	Android)
Who	wants	to	be	a	Hacker?
• Anyone	who	feels	attracted	or	enjoys:
– Technology
– Challenge
– The	thrill
– Adventure	
– Danger
– Money
– Respect
– Fame
Taking	security	
seriously	(or	not)
On	a	nice	Sunday	morning…
On	its	TV	screen	facing	the	street
On	a	business	train	trip…
On	a	business	train	trip…
On	a	site,	somewhere	in	Europe…
On	a	site,	somewhere	in	Europe…
What	can	we	do?
What	can	we	do?
• Security	must	be	taken	seriously	by	everyone!
– Governments,	companies,	and	individuals	need	to	be	security	
conscious	and	security	oriented
• Usual	security	recommendations	apply:
– Keep	security	systems	updated	and	up-to-date
– Question	the	origin	of	everything
– Be	mindful	of:
• The	information	you	share	and	make	’publicly’	available
• Free	Wifi hotspots	(free	can	be	become	very	expensive)
What	can	we	do?
• Consider	(as	in	doing!)	regular:
– Security	audits
– Penetration	tests
– Vulnerability	analysis
• Seek	help	for	experts	in	the	field	to	help	to	improve	security
• Keep	informed	(training,	conferences,	articles,	books,	…)
• Don’t	facilitate	(weak	passwords,	use	of	same	password,	…)
What	can	we	do?
• There	must	be	no	at	home	and	at	the	office	attitude.	Security	
awareness	must	always	be	present.
• Read	before	you	‘click’.
• Search,	ask.	
• Ultimately,	if	this	is	too	much.	Just	switch	off	every	electronical	
device	and	go	back	to	pen	and	paper.	But	will	this	be	enough?
Conclusion
Conclusion
• As	always	the	bad	guys	are	ahead	of	the	game:
– They	have	the	money
– They	have	the	resources
– They	are	well	organised
– And	above	all,	they	have	time!
• The	most	important	thing	is	for	every	one	of	us	(the	‘good’	guys)	to	
be	security	aware	and	security	focused
Conclusion
• Ultimately	we	need	to	trust:	
– The	companies	who	sell	us	devices,	and	software
– The	service	providers
– Our	social	network
– The	government
Conclusion	– Most	Important!
• Be	mindful • Be	aware
Questions
Rui	Miguel	Feio,	RSM	Partners	
ruif@rsmpartners.com
mobile:	+44	(0)	7570	911459
linkedin: www.linkedin.com/in/rfeio
www.rsmpartners.com
Contact

More Related Content

What's hot

Voice security and privacy - Today’s solutions and technologies
Voice security and privacy - Today’s solutions and  technologiesVoice security and privacy - Today’s solutions and  technologies
Voice security and privacy - Today’s solutions and technologies
PrivateWave Italia SpA
 
File000159
File000159File000159
File000159
Desmond Devendran
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin
OCTF Industry Engagement
 
Internet .....History to till now
Internet .....History to till nowInternet .....History to till now
Internet .....History to till now
knowldge
 
Hackers
HackersHackers
Piracy
PiracyPiracy
Piracy
Manasa Mona
 
The National Security, IP/Trademark, Human Rights and Data Protection Risks o...
The National Security, IP/Trademark, Human Rights and Data Protection Risks o...The National Security, IP/Trademark, Human Rights and Data Protection Risks o...
The National Security, IP/Trademark, Human Rights and Data Protection Risks o...
Shannon Brandao
 
CST 20363 Session 6 Cyberspace
CST 20363 Session 6 CyberspaceCST 20363 Session 6 Cyberspace
CST 20363 Session 6 Cyberspace
oudesign
 
Uc14 chap16
Uc14 chap16Uc14 chap16
Uc14 chap16
Rashid Yahye
 
Legal Research in the Age of Cloud Computing
Legal Research in the Age of Cloud ComputingLegal Research in the Age of Cloud Computing
Legal Research in the Age of Cloud Computing
Neal Axton
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
Abdullah Khosa
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
kelly kusmulyono
 
File000158
File000158File000158
File000158
Desmond Devendran
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
RoshanMaharjan13
 
Prosecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the WebProsecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the Web
Darius Whelan
 
Digital law
Digital lawDigital law
Digital law
Jennifer Carmack
 
Privacy & Data Breach: 2012 Recap, 2013 Predictions
Privacy & Data Breach: 2012 Recap, 2013 PredictionsPrivacy & Data Breach: 2012 Recap, 2013 Predictions
Privacy & Data Breach: 2012 Recap, 2013 Predictions
Resilient Systems
 
General Aware Ness On Cyber Security & Ethical
General Aware Ness On Cyber Security & EthicalGeneral Aware Ness On Cyber Security & Ethical
General Aware Ness On Cyber Security & Ethical
diwakar sharma
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekar
PravinGhosekar
 
advantages and disadvantages of Internet
advantages and disadvantages of Internetadvantages and disadvantages of Internet
advantages and disadvantages of Internet
Ali Şahin
 

What's hot (20)

Voice security and privacy - Today’s solutions and technologies
Voice security and privacy - Today’s solutions and  technologiesVoice security and privacy - Today’s solutions and  technologies
Voice security and privacy - Today’s solutions and technologies
 
File000159
File000159File000159
File000159
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin
 
Internet .....History to till now
Internet .....History to till nowInternet .....History to till now
Internet .....History to till now
 
Hackers
HackersHackers
Hackers
 
Piracy
PiracyPiracy
Piracy
 
The National Security, IP/Trademark, Human Rights and Data Protection Risks o...
The National Security, IP/Trademark, Human Rights and Data Protection Risks o...The National Security, IP/Trademark, Human Rights and Data Protection Risks o...
The National Security, IP/Trademark, Human Rights and Data Protection Risks o...
 
CST 20363 Session 6 Cyberspace
CST 20363 Session 6 CyberspaceCST 20363 Session 6 Cyberspace
CST 20363 Session 6 Cyberspace
 
Uc14 chap16
Uc14 chap16Uc14 chap16
Uc14 chap16
 
Legal Research in the Age of Cloud Computing
Legal Research in the Age of Cloud ComputingLegal Research in the Age of Cloud Computing
Legal Research in the Age of Cloud Computing
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
 
File000158
File000158File000158
File000158
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Prosecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the WebProsecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the Web
 
Digital law
Digital lawDigital law
Digital law
 
Privacy & Data Breach: 2012 Recap, 2013 Predictions
Privacy & Data Breach: 2012 Recap, 2013 PredictionsPrivacy & Data Breach: 2012 Recap, 2013 Predictions
Privacy & Data Breach: 2012 Recap, 2013 Predictions
 
General Aware Ness On Cyber Security & Ethical
General Aware Ness On Cyber Security & EthicalGeneral Aware Ness On Cyber Security & Ethical
General Aware Ness On Cyber Security & Ethical
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekar
 
advantages and disadvantages of Internet
advantages and disadvantages of Internetadvantages and disadvantages of Internet
advantages and disadvantages of Internet
 

Viewers also liked

Iconos y botones
Iconos y botonesIconos y botones
Iconos y botones
LuisMaTu
 
Decreto PMI 113 13 desapropia área da coelba
Decreto PMI 113 13 desapropia área da coelbaDecreto PMI 113 13 desapropia área da coelba
Decreto PMI 113 13 desapropia área da coelba
Guy Valerio Barros dos Santos
 
Derechos De Los Animales
Derechos De Los Animales Derechos De Los Animales
Derechos De Los Animales
José Hernández
 
Santos y beatos argentinos
Santos y beatos argentinosSantos y beatos argentinos
Santos y beatos argentinos
Patricia Molina
 
Actividad V
Actividad VActividad V
Actividad V
guest834056
 
El oso panda
El oso pandaEl oso panda
El oso panda
JMVILLAA
 
Tastethe joy en
Tastethe joy enTastethe joy en
Tastethe joy en
MyWonderStudio
 
CERTIFICADO
CERTIFICADO CERTIFICADO
CERTIFICADO
Nombre Apellidos
 
Agenda 2
Agenda 2Agenda 2
Agenda 2
Kity Cano
 
Pre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part I
Pre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part IPre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part I
Pre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part I
CA Technologies
 
TIG_Decker_LoL_OnlineImpulsePurchase
TIG_Decker_LoL_OnlineImpulsePurchaseTIG_Decker_LoL_OnlineImpulsePurchase
TIG_Decker_LoL_OnlineImpulsePurchase
Ethan Decker
 
Log Analytics Optimization
Log Analytics OptimizationLog Analytics Optimization
Log Analytics Optimization
Hortonworks
 
Coloring page_The Acts of the Apostles_The Gift of the Holy Spirit
Coloring page_The Acts of the Apostles_The Gift of the Holy SpiritColoring page_The Acts of the Apostles_The Gift of the Holy Spirit
Coloring page_The Acts of the Apostles_The Gift of the Holy Spirit
MyWonderStudio
 
SPRENGNETTER-SmartValue - die Bewertungssoftware für Makler
SPRENGNETTER-SmartValue - die Bewertungssoftware für MaklerSPRENGNETTER-SmartValue - die Bewertungssoftware für Makler
SPRENGNETTER-SmartValue - die Bewertungssoftware für Makler
Sprengnetter_Immobilienbewertung
 

Viewers also liked (15)

Iconos y botones
Iconos y botonesIconos y botones
Iconos y botones
 
Tawhee
TawheeTawhee
Tawhee
 
Decreto PMI 113 13 desapropia área da coelba
Decreto PMI 113 13 desapropia área da coelbaDecreto PMI 113 13 desapropia área da coelba
Decreto PMI 113 13 desapropia área da coelba
 
Derechos De Los Animales
Derechos De Los Animales Derechos De Los Animales
Derechos De Los Animales
 
Santos y beatos argentinos
Santos y beatos argentinosSantos y beatos argentinos
Santos y beatos argentinos
 
Actividad V
Actividad VActividad V
Actividad V
 
El oso panda
El oso pandaEl oso panda
El oso panda
 
Tastethe joy en
Tastethe joy enTastethe joy en
Tastethe joy en
 
CERTIFICADO
CERTIFICADO CERTIFICADO
CERTIFICADO
 
Agenda 2
Agenda 2Agenda 2
Agenda 2
 
Pre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part I
Pre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part IPre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part I
Pre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part I
 
TIG_Decker_LoL_OnlineImpulsePurchase
TIG_Decker_LoL_OnlineImpulsePurchaseTIG_Decker_LoL_OnlineImpulsePurchase
TIG_Decker_LoL_OnlineImpulsePurchase
 
Log Analytics Optimization
Log Analytics OptimizationLog Analytics Optimization
Log Analytics Optimization
 
Coloring page_The Acts of the Apostles_The Gift of the Holy Spirit
Coloring page_The Acts of the Apostles_The Gift of the Holy SpiritColoring page_The Acts of the Apostles_The Gift of the Holy Spirit
Coloring page_The Acts of the Apostles_The Gift of the Holy Spirit
 
SPRENGNETTER-SmartValue - die Bewertungssoftware für Makler
SPRENGNETTER-SmartValue - die Bewertungssoftware für MaklerSPRENGNETTER-SmartValue - die Bewertungssoftware für Makler
SPRENGNETTER-SmartValue - die Bewertungssoftware für Makler
 

Similar to Cybercrime Inc. v2.2

Cyber security lifting the veil of hacking webinar
Cyber security   lifting the veil of hacking webinarCyber security   lifting the veil of hacking webinar
Cyber security lifting the veil of hacking webinar
Association for Project Management
 
2017 - Cibersecurity v1.0 (English version)
2017 - Cibersecurity v1.0 (English version)2017 - Cibersecurity v1.0 (English version)
2017 - Cibersecurity v1.0 (English version)
Rui Miguel Feio
 
Digital Age-Preparing Yourself
Digital Age-Preparing YourselfDigital Age-Preparing Yourself
Digital Age-Preparing Yourself
jkl0202
 
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Benjamin Ang
 
IBC 2016 Presentation - Breaking bad habits - Security Challenges for Public ...
IBC 2016 Presentation - Breaking bad habits - Security Challenges for Public ...IBC 2016 Presentation - Breaking bad habits - Security Challenges for Public ...
IBC 2016 Presentation - Breaking bad habits - Security Challenges for Public ...
John Moylan
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
Vicky Shah
 
Cyber Threat Landscape
Cyber Threat LandscapeCyber Threat Landscape
Cyber Threat Landscape
Ernest (E.J.) Hilbert
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
Nader Alkeinay
 
Cyber security best practices
Cyber security best practicesCyber security best practices
Cyber security best practices
John Moylan
 
Isaca june 19, 2010
Isaca june 19, 2010Isaca june 19, 2010
Isaca june 19, 2010
Vicky Shah
 
Cyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptxCyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptx
SahilMishra81
 
Cyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxCyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptx
SahilMishra81
 
Stop in the name of norton
Stop in the name of nortonStop in the name of norton
Stop in the name of norton
wacko07
 
Stop in the name of norton
Stop in the name of nortonStop in the name of norton
Stop in the name of norton
spkiely
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Chaya Sorir
 
How the Surveillance State Changes IT Security Forever
How the Surveillance State Changes IT Security ForeverHow the Surveillance State Changes IT Security Forever
How the Surveillance State Changes IT Security Forever
Richard Stiennon
 
Gus Hunt's Work-Bench Enterprise Security Summit Keynote
Gus Hunt's Work-Bench Enterprise Security Summit KeynoteGus Hunt's Work-Bench Enterprise Security Summit Keynote
Gus Hunt's Work-Bench Enterprise Security Summit Keynote
Work-Bench
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
Gol D Roger
 
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
Rui Miguel Feio
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
SANTANU KUMAR DAS
 

Similar to Cybercrime Inc. v2.2 (20)

Cyber security lifting the veil of hacking webinar
Cyber security   lifting the veil of hacking webinarCyber security   lifting the veil of hacking webinar
Cyber security lifting the veil of hacking webinar
 
2017 - Cibersecurity v1.0 (English version)
2017 - Cibersecurity v1.0 (English version)2017 - Cibersecurity v1.0 (English version)
2017 - Cibersecurity v1.0 (English version)
 
Digital Age-Preparing Yourself
Digital Age-Preparing YourselfDigital Age-Preparing Yourself
Digital Age-Preparing Yourself
 
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
 
IBC 2016 Presentation - Breaking bad habits - Security Challenges for Public ...
IBC 2016 Presentation - Breaking bad habits - Security Challenges for Public ...IBC 2016 Presentation - Breaking bad habits - Security Challenges for Public ...
IBC 2016 Presentation - Breaking bad habits - Security Challenges for Public ...
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 
Cyber Threat Landscape
Cyber Threat LandscapeCyber Threat Landscape
Cyber Threat Landscape
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 
Cyber security best practices
Cyber security best practicesCyber security best practices
Cyber security best practices
 
Isaca june 19, 2010
Isaca june 19, 2010Isaca june 19, 2010
Isaca june 19, 2010
 
Cyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptxCyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptx
 
Cyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxCyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptx
 
Stop in the name of norton
Stop in the name of nortonStop in the name of norton
Stop in the name of norton
 
Stop in the name of norton
Stop in the name of nortonStop in the name of norton
Stop in the name of norton
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
How the Surveillance State Changes IT Security Forever
How the Surveillance State Changes IT Security ForeverHow the Surveillance State Changes IT Security Forever
How the Surveillance State Changes IT Security Forever
 
Gus Hunt's Work-Bench Enterprise Security Summit Keynote
Gus Hunt's Work-Bench Enterprise Security Summit KeynoteGus Hunt's Work-Bench Enterprise Security Summit Keynote
Gus Hunt's Work-Bench Enterprise Security Summit Keynote
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
 
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 

More from Rui Miguel Feio

(2017) GDPR – What Does It Mean For The Mainframe v0.2
(2017) GDPR – What Does It Mean For The Mainframe v0.2(2017) GDPR – What Does It Mean For The Mainframe v0.2
(2017) GDPR – What Does It Mean For The Mainframe v0.2
Rui Miguel Feio
 
(2017) Cybercrime, Inc. (v3.2)
(2017) Cybercrime, Inc. (v3.2)(2017) Cybercrime, Inc. (v3.2)
(2017) Cybercrime, Inc. (v3.2)
Rui Miguel Feio
 
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.2
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.22017 - A New Look at Mainframe Hacking and Penetration Testing v2.2
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.2
Rui Miguel Feio
 
2017 - Data Privacy and GDPR (v1.1)
2017 - Data Privacy and GDPR (v1.1)2017 - Data Privacy and GDPR (v1.1)
2017 - Data Privacy and GDPR (v1.1)
Rui Miguel Feio
 
Network and Endpoint Security v1.0 (2017)
Network and Endpoint Security v1.0 (2017)Network and Endpoint Security v1.0 (2017)
Network and Endpoint Security v1.0 (2017)
Rui Miguel Feio
 
RACF - The Basics (v1.2)
RACF - The Basics (v1.2)RACF - The Basics (v1.2)
RACF - The Basics (v1.2)
Rui Miguel Feio
 
2017 - Ciberseguranca v1.0 (versao em Portugues)
2017 - Ciberseguranca v1.0 (versao em Portugues)2017 - Ciberseguranca v1.0 (versao em Portugues)
2017 - Ciberseguranca v1.0 (versao em Portugues)
Rui Miguel Feio
 
Tackling the cyber security threat (2016 - v1.0)
Tackling the cyber security threat (2016 - v1.0)Tackling the cyber security threat (2016 - v1.0)
Tackling the cyber security threat (2016 - v1.0)
Rui Miguel Feio
 
Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)
Rui Miguel Feio
 
Security Audit on the Mainframe (v1.0 - 2016)
Security Audit on the Mainframe (v1.0 - 2016)Security Audit on the Mainframe (v1.0 - 2016)
Security Audit on the Mainframe (v1.0 - 2016)
Rui Miguel Feio
 
How to Improve RACF Performance (v0.2 - 2016)
How to Improve RACF Performance (v0.2 - 2016)How to Improve RACF Performance (v0.2 - 2016)
How to Improve RACF Performance (v0.2 - 2016)
Rui Miguel Feio
 
Mainframe Security - It's not just about your ESM v2.2
Mainframe Security - It's not just about your ESM v2.2Mainframe Security - It's not just about your ESM v2.2
Mainframe Security - It's not just about your ESM v2.2
Rui Miguel Feio
 
Challenges of Outsourcing the Mainframe (v1.2)
Challenges of Outsourcing the Mainframe (v1.2)Challenges of Outsourcing the Mainframe (v1.2)
Challenges of Outsourcing the Mainframe (v1.2)
Rui Miguel Feio
 
How to Protect Your Mainframe from Hackers (v1.0)
How to Protect Your Mainframe from Hackers (v1.0)How to Protect Your Mainframe from Hackers (v1.0)
How to Protect Your Mainframe from Hackers (v1.0)
Rui Miguel Feio
 
IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)
Rui Miguel Feio
 
The Billion Dollar Product - Online Privacy (v2.2)
The Billion Dollar Product - Online Privacy (v2.2)The Billion Dollar Product - Online Privacy (v2.2)
The Billion Dollar Product - Online Privacy (v2.2)
Rui Miguel Feio
 
Cyber security and the mainframe (v1.3)
Cyber security and the mainframe (v1.3)Cyber security and the mainframe (v1.3)
Cyber security and the mainframe (v1.3)
Rui Miguel Feio
 
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)
Rui Miguel Feio
 
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)
Rui Miguel Feio
 

More from Rui Miguel Feio (19)

(2017) GDPR – What Does It Mean For The Mainframe v0.2
(2017) GDPR – What Does It Mean For The Mainframe v0.2(2017) GDPR – What Does It Mean For The Mainframe v0.2
(2017) GDPR – What Does It Mean For The Mainframe v0.2
 
(2017) Cybercrime, Inc. (v3.2)
(2017) Cybercrime, Inc. (v3.2)(2017) Cybercrime, Inc. (v3.2)
(2017) Cybercrime, Inc. (v3.2)
 
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.2
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.22017 - A New Look at Mainframe Hacking and Penetration Testing v2.2
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.2
 
2017 - Data Privacy and GDPR (v1.1)
2017 - Data Privacy and GDPR (v1.1)2017 - Data Privacy and GDPR (v1.1)
2017 - Data Privacy and GDPR (v1.1)
 
Network and Endpoint Security v1.0 (2017)
Network and Endpoint Security v1.0 (2017)Network and Endpoint Security v1.0 (2017)
Network and Endpoint Security v1.0 (2017)
 
RACF - The Basics (v1.2)
RACF - The Basics (v1.2)RACF - The Basics (v1.2)
RACF - The Basics (v1.2)
 
2017 - Ciberseguranca v1.0 (versao em Portugues)
2017 - Ciberseguranca v1.0 (versao em Portugues)2017 - Ciberseguranca v1.0 (versao em Portugues)
2017 - Ciberseguranca v1.0 (versao em Portugues)
 
Tackling the cyber security threat (2016 - v1.0)
Tackling the cyber security threat (2016 - v1.0)Tackling the cyber security threat (2016 - v1.0)
Tackling the cyber security threat (2016 - v1.0)
 
Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)
 
Security Audit on the Mainframe (v1.0 - 2016)
Security Audit on the Mainframe (v1.0 - 2016)Security Audit on the Mainframe (v1.0 - 2016)
Security Audit on the Mainframe (v1.0 - 2016)
 
How to Improve RACF Performance (v0.2 - 2016)
How to Improve RACF Performance (v0.2 - 2016)How to Improve RACF Performance (v0.2 - 2016)
How to Improve RACF Performance (v0.2 - 2016)
 
Mainframe Security - It's not just about your ESM v2.2
Mainframe Security - It's not just about your ESM v2.2Mainframe Security - It's not just about your ESM v2.2
Mainframe Security - It's not just about your ESM v2.2
 
Challenges of Outsourcing the Mainframe (v1.2)
Challenges of Outsourcing the Mainframe (v1.2)Challenges of Outsourcing the Mainframe (v1.2)
Challenges of Outsourcing the Mainframe (v1.2)
 
How to Protect Your Mainframe from Hackers (v1.0)
How to Protect Your Mainframe from Hackers (v1.0)How to Protect Your Mainframe from Hackers (v1.0)
How to Protect Your Mainframe from Hackers (v1.0)
 
IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)
 
The Billion Dollar Product - Online Privacy (v2.2)
The Billion Dollar Product - Online Privacy (v2.2)The Billion Dollar Product - Online Privacy (v2.2)
The Billion Dollar Product - Online Privacy (v2.2)
 
Cyber security and the mainframe (v1.3)
Cyber security and the mainframe (v1.3)Cyber security and the mainframe (v1.3)
Cyber security and the mainframe (v1.3)
 
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)
 
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)
 

Recently uploaded

7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
Trending Blogers
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
AanSulistiyo
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
saathvikreddy2003
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
ukwwuq
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 

Recently uploaded (20)

7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 

Cybercrime Inc. v2.2