By Viral Parmar
Who AM I
Viral Parmar aka SkyF!r3
Founder of ComExpo Cyber Security
Ethical Hacker
Cyber Security Consultant
Cyber Security Researcher
Given seminar’s and workshop more then 20+ colleges.
Honourable member of DSCI
Chairperson OWASP Gandhinagar
Always remember: Know hAckiNG, but no HaCKing.
Agenda
1. Cyber Crime Stats & Impacts
2. Protect your Identity
3. Trusted Source
4. Secure Communication
Major Attacks and their losses
56 million records stolen over all revenue loss $150 Million
85 million records stolen $45 million
56 million records stolen
5 million 145 million user
4.6 million
7.5 million user 10 million user data
BSNL - 30 million
TRAI, OLA, Control of defence, Narendra modi, Ravi Shankar Prasad
Cyber Crime Stats
• 1st rank United States
• 2nd rank United Kingdom
• 3rd India on because of online malicious activity and is on top the cyber war
between India-Pakistan
• India became the second most targeted country in the world for social media
scams in 2015.
• 107% CAGR of cyber crime in India with 5lakh cases.
• 90 % mobile apps are vul.
Lack of knowledge in cyber security
• 70 % of vulnerabilities exist at the application layer nor the network
• 30000 websites are hacked everyday to distribute malware
• 96 % of tested application have vul.
• 86 % of all website have at least 1 serious vul.
https://cybermap.kaspersky.com/
https://www.fireeye.com/cyber-map/threat-map.html
http://map.norsecorp.com/
• Banking Financial Services
and Insurance (BFSI)
• 94% of companies faced
cyber crime as a major threat
• 41 % companies have cyber
crime as a board agenda only
• 72 % companies faced cyber
attack over the past year
• 63 % respondents indicated
that cyber crime amounted to
financial loss while 55 % also
mention theft of sensitive
information
Protect Your Identity
1. Don’t talk to Unknown people on Internet .
2. Don't give your Information about yourself like:
I. Full name
II. Parents name
III. Date of birth
IV. Address
V. Phone number
VI. Don’t share photos
to anyone online that you don't trust or know.
Cyber Stalking, Cyber bullying, Cyber harassment
IT act 2008 Section 66C Identity theft 3 years jail and 5 lakh
IT act 2008 Section 66A sending Offensive message
IT act 2008 Section 66D cheating by personation
Trusted Sources
1. Operating Systems - based on its security and vulnerability
update your operating system with security updates - use
Linux Ubuntu, remove unwanted programs .
2. Web browser- most malware will come through via your web
browser. Google Chrome is more secure and has a sandbox
feature, Don’t save password in web browser remove addons .
3. Downloading software- use a trusted source (Play Store, App
Store, softpedia, sourceforge) or your repository if you are
using Linux.
4. Read carefully-When you sign up for newsletters, install
programs, or agree to anything, read the fine print.
5. Use an anti-virus program, an anti-spyware program, and a
firewall. Surfing the internet without these things is unsafe and
invites spam, hackers, and viruses onto your computer.
6. Always check for secure transaction info.-Secure URLs begin
with https:// instead of http://. This means the transmission is
encrypted to and from the web server
Ransomeware
Secure Communication
www.streak.com/securegmail
SIGAINT, Ruggedinbox, Mail2Tor, SAFe-mail
Signal, Surespot, Threema
Hotspot Shield
Tunnel Bear
VPN
Any Questions
Contact Me
in.linkedin.com/in/viralparmarhacker
viralparmarhacker@gmail.com
facebook.com/viralparmarhacker
twitter.com/viralparmarhack
Stay Connected
Stay Safe
+91 8980808222
Mozilla
Thank You

Mozilla - Let's take back the web

  • 1.
  • 2.
    Who AM I ViralParmar aka SkyF!r3 Founder of ComExpo Cyber Security Ethical Hacker Cyber Security Consultant Cyber Security Researcher Given seminar’s and workshop more then 20+ colleges. Honourable member of DSCI Chairperson OWASP Gandhinagar Always remember: Know hAckiNG, but no HaCKing.
  • 3.
    Agenda 1. Cyber CrimeStats & Impacts 2. Protect your Identity 3. Trusted Source 4. Secure Communication
  • 7.
    Major Attacks andtheir losses 56 million records stolen over all revenue loss $150 Million 85 million records stolen $45 million 56 million records stolen 5 million 145 million user 4.6 million 7.5 million user 10 million user data BSNL - 30 million TRAI, OLA, Control of defence, Narendra modi, Ravi Shankar Prasad
  • 9.
    Cyber Crime Stats •1st rank United States • 2nd rank United Kingdom • 3rd India on because of online malicious activity and is on top the cyber war between India-Pakistan • India became the second most targeted country in the world for social media scams in 2015. • 107% CAGR of cyber crime in India with 5lakh cases. • 90 % mobile apps are vul.
  • 10.
    Lack of knowledgein cyber security • 70 % of vulnerabilities exist at the application layer nor the network • 30000 websites are hacked everyday to distribute malware • 96 % of tested application have vul. • 86 % of all website have at least 1 serious vul. https://cybermap.kaspersky.com/ https://www.fireeye.com/cyber-map/threat-map.html http://map.norsecorp.com/
  • 11.
    • Banking FinancialServices and Insurance (BFSI) • 94% of companies faced cyber crime as a major threat • 41 % companies have cyber crime as a board agenda only • 72 % companies faced cyber attack over the past year • 63 % respondents indicated that cyber crime amounted to financial loss while 55 % also mention theft of sensitive information
  • 12.
    Protect Your Identity 1.Don’t talk to Unknown people on Internet . 2. Don't give your Information about yourself like: I. Full name II. Parents name III. Date of birth IV. Address V. Phone number VI. Don’t share photos to anyone online that you don't trust or know. Cyber Stalking, Cyber bullying, Cyber harassment
  • 15.
    IT act 2008Section 66C Identity theft 3 years jail and 5 lakh IT act 2008 Section 66A sending Offensive message IT act 2008 Section 66D cheating by personation
  • 17.
    Trusted Sources 1. OperatingSystems - based on its security and vulnerability update your operating system with security updates - use Linux Ubuntu, remove unwanted programs . 2. Web browser- most malware will come through via your web browser. Google Chrome is more secure and has a sandbox feature, Don’t save password in web browser remove addons . 3. Downloading software- use a trusted source (Play Store, App Store, softpedia, sourceforge) or your repository if you are using Linux.
  • 18.
    4. Read carefully-Whenyou sign up for newsletters, install programs, or agree to anything, read the fine print. 5. Use an anti-virus program, an anti-spyware program, and a firewall. Surfing the internet without these things is unsafe and invites spam, hackers, and viruses onto your computer. 6. Always check for secure transaction info.-Secure URLs begin with https:// instead of http://. This means the transmission is encrypted to and from the web server
  • 19.
  • 22.
    Secure Communication www.streak.com/securegmail SIGAINT, Ruggedinbox,Mail2Tor, SAFe-mail Signal, Surespot, Threema
  • 23.
  • 24.
  • 25.