SlideShare a Scribd company logo
24 March 2017
Protecting your digital personal life
Personal cybersecurity for high value targets
Protecting your digital personal life | Congressional Briefing
What do hackers want?
• Money
• Banking
• Identity
• Intellectual Property
• Market manipulation
• Force Change
• Popularity- bragging rights
• Public opinion
• Policy
• Promote an ideology
• Espionage
• Compromise physical security
• Types of hackers:
• Researchers
• Hacktivists
• Anarchists
• Criminals
• Terrorists
• Nation States
Protecting your digital personal life | Congressional Briefing
What is a high value target ?
• Celebrities
• Athletes
• Actors
• Musicians
• Politicians & Political Appointees
• Local
• State
• National
• High Net-Worth Individuals
• High-Profile business executives
• Family offices
• Subject of more sophisticated
attackers
• Increased impact of compromise
• In many cases, easier marks
• lots of public info
• broader network
Why are you different?
Protecting your digital personal life | Congressional Briefing
Colleen Bridges – Step 1: malicious email
colleen.bridges@gmail.com
Protecting your digital personal life | Congressional Briefing
Colleen Bridges – Step 2: email account take over
colleen.bridges@gmail.com
Protecting your digital personal life | Congressional Briefing
Colleen Bridges – Step 3: Pivot & Exploit
Protecting your digital personal life | Congressional Briefing
Colleen Bridges - Results
• Compromised information:
• Email account
• MyQ portal account – garage door
and any other connected devices
• Home address
• ….
• With this information he can:
• Read, archive, and delete
Colleen’s email
• Pivot attack - send emails to
Colleen’s friends, family, &
colleagues to try to compromise
their email accounts
• Remotely monitor & control
Colleen’s garage door
• Physical compromise - theft or
violence
Protecting your digital personal life | Congressional Briefing
Joe Mandolo – Step 1: website compromise
1
Protecting your digital personal life | Congressional Briefing
Joe Mandolo – Step 2: passwords for sale
1
2
10k Email, Full Name, Password Cache
BTC 3.00000
BTC 0.00000
BTC 3.00000
Protecting your digital personal life | Congressional Briefing
Joe Mandolo – Step 3: automate the hack
2
Username
password
Protecting your digital personal life | Congressional Briefing
Joe Mandolo – Step 4: exploit
1
2
Protecting your digital personal life | Congressional Briefing
Joe Mandolo - Results
• Compromised information:
• Banking information
• Email accounts
• Intellectual property
• Private conversations
• ….
• With this information she can:
• Steal Joe’s money
• Read, archive, and delete Joe’s
email
• Pivot attack - send emails to Joe’s
friends, family, staff & colleagues
to try to compromise their accounts
• Blackmail or publicly embarrass
Joe
Protecting your digital personal life | Congressional Briefing
What do these scenarios have in common?
• Both leverage some form of social engineering
• Neither of them use sophisticated malware or exploit complex vulnerabilities
• These scenarios are just examples - there are an infinite number of ways hackers
can creatively compromise your security
But, there is some good news
• These attacks, and the vast majority like them, can be avoided through a
combination of simple and effective security measures
• Security is measured on a continuum
• Important, old saw: you don’t have to outrun the bear
• You can make it a lot harder on the hackers, and raise the cost of compromise
Protecting your digital personal life | Congressional Briefing
So what can you do about it?
Top ten list…
10. Avoid “open” networks – anyone can pretend to be Starbucks and get your phone to connect automatically
9. Use Encryption – documents, backups, communications (messaging, voice, email)
8. Update – always install the latest software and OS updates and patches (across all your devices)
7. Monitor your home network – there are a lot of attacks that antivirus won’t see
6. Back up. No. Really, backup!
5. Two factor anything you can – email, bank accounts, social media
4. Know what your clicking on – avoid links in emails, you can always type the URL into your web browser
3. Email attachments – only open attachments you are expecting from sources you trust
2. Password & security question hygiene – don’t reuse, don’t write it down, don’t memorize
1. Talk with your kids, family, staff (or boss) - Good security practices are like vaccinations – they work best when done
by everyone – you need to surround yourself with healthy people
Don’t go it alone – rely on the security community to help you
(standards, guidance and best practices, and hiring experts)

More Related Content

What's hot

Cyber crime final round (3rd rank)
Cyber crime final round (3rd rank)Cyber crime final round (3rd rank)
Cyber crime final round (3rd rank)
Hîmãlåy Làdhä
 
Cyber crime lecture pp update
Cyber crime lecture pp updateCyber crime lecture pp update
Cyber crime lecture pp update
yahooteacher
 
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
Rushabh Shah
 
Cyber Crime-The New War of the 21st Century
Cyber Crime-The New War of the 21st CenturyCyber Crime-The New War of the 21st Century
Cyber Crime-The New War of the 21st Century
United International University
 
Ethical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldEthical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is Cyberworld
Amae OlFato
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Atchaya Thalapathy
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
Abdullah Khosa
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
Mohit Dholakiya
 
IT Ethics
IT EthicsIT Ethics
IT Ethics
Keith Putnam
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
muhammad-Sulaiman
 
Social Media Marketing 04 08 10
Social Media Marketing 04 08 10Social Media Marketing 04 08 10
Social Media Marketing 04 08 10
Matthew Asbell
 
Cyber security; one banker s perspective
Cyber security; one banker s perspectiveCyber security; one banker s perspective
Cyber security; one banker s perspective
Mohammad Ibrahim Fheili
 
Hacking presentation
Hacking presentation Hacking presentation
Hacking presentation
Ajith Reddy
 
Huiyun zhang
Huiyun zhangHuiyun zhang
Huiyun zhang
Sophie Huiyun
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Ade Ismail Isnan
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyright
Adyns
 
Digital property rights
Digital property rightsDigital property rights
Digital property rights
Himanshu Pathak
 

What's hot (20)

Cyber crime final round (3rd rank)
Cyber crime final round (3rd rank)Cyber crime final round (3rd rank)
Cyber crime final round (3rd rank)
 
Cyber crime lecture pp update
Cyber crime lecture pp updateCyber crime lecture pp update
Cyber crime lecture pp update
 
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
LAW PPT-LAWS IN DIGITAL AGE/SOCIAL MEDIA.
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Cyber Crime-The New War of the 21st Century
Cyber Crime-The New War of the 21st CenturyCyber Crime-The New War of the 21st Century
Cyber Crime-The New War of the 21st Century
 
Ethical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is CyberworldEthical Dilemma/Issues is Cyberworld
Ethical Dilemma/Issues is Cyberworld
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
GuardianGabriel
GuardianGabrielGuardianGabriel
GuardianGabriel
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
 
C3 and digital citizenship
C3 and digital citizenshipC3 and digital citizenship
C3 and digital citizenship
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
IT Ethics
IT EthicsIT Ethics
IT Ethics
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
 
Social Media Marketing 04 08 10
Social Media Marketing 04 08 10Social Media Marketing 04 08 10
Social Media Marketing 04 08 10
 
Cyber security; one banker s perspective
Cyber security; one banker s perspectiveCyber security; one banker s perspective
Cyber security; one banker s perspective
 
Hacking presentation
Hacking presentation Hacking presentation
Hacking presentation
 
Huiyun zhang
Huiyun zhangHuiyun zhang
Huiyun zhang
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyright
 
Digital property rights
Digital property rightsDigital property rights
Digital property rights
 

Viewers also liked

Ch#12 journal bearings lubrication
Ch#12 journal bearings lubricationCh#12 journal bearings lubrication
Ch#12 journal bearings lubrication
Engr Dalil Muhammad
 
InduSoft Web Studio 8.0 + SP1 + Patch One Review
InduSoft Web Studio 8.0 + SP1 + Patch One ReviewInduSoft Web Studio 8.0 + SP1 + Patch One Review
InduSoft Web Studio 8.0 + SP1 + Patch One Review
AVEVA
 
Lessons in Resilience - International Women's Day Keynote @ Brooklyn College
Lessons in Resilience - International Women's Day Keynote @ Brooklyn CollegeLessons in Resilience - International Women's Day Keynote @ Brooklyn College
Lessons in Resilience - International Women's Day Keynote @ Brooklyn College
Kaitlin Thaney
 
XLIV FESTIVAL AVIV, PROGRAMACIÓN
XLIV FESTIVAL AVIV, PROGRAMACIÓNXLIV FESTIVAL AVIV, PROGRAMACIÓN
XLIV FESTIVAL AVIV, PROGRAMACIÓN
Centro Deportivo Israelita
 
Livret 100% énergies renouvelables
Livret 100% énergies renouvelablesLivret 100% énergies renouvelables
Livret 100% énergies renouvelables
david zentao
 
Slideshare with animations
Slideshare with animationsSlideshare with animations
Slideshare with animations
Daniel Gomez-Prado
 
Pharmaceutical microbiology west coast
Pharmaceutical microbiology west coastPharmaceutical microbiology west coast
Pharmaceutical microbiology west coast
Alia Malick
 
Secret encoder ring
Secret encoder ringSecret encoder ring
Secret encoder ring
Toby Jaffey
 
Prise en charge du lymphoedème en hospitalisation complète
Prise en charge du lymphoedème en hospitalisation complètePrise en charge du lymphoedème en hospitalisation complète
Prise en charge du lymphoedème en hospitalisation complète
Maxime Blanc-Fontes
 
The Crazy Cuban's Secret
The  Crazy Cuban's   SecretThe  Crazy Cuban's   Secret
The Crazy Cuban's Secret
Lazaro Almenares
 
SP.Matveev.IComp.Cover.AUG2016
SP.Matveev.IComp.Cover.AUG2016SP.Matveev.IComp.Cover.AUG2016
SP.Matveev.IComp.Cover.AUG2016Alex Matveev
 
11 flowers gifts which are perfect for allergy sufferers
11 flowers gifts which are perfect for allergy sufferers11 flowers gifts which are perfect for allergy sufferers
11 flowers gifts which are perfect for allergy sufferers
Celine Wilson
 
Forum IA BX mars 2016 - Blade Runner
Forum IA BX mars 2016 - Blade RunnerForum IA BX mars 2016 - Blade Runner
Forum IA BX mars 2016 - Blade Runner
Armelle Gilliard
 
Dementia: An Overview
Dementia: An OverviewDementia: An Overview
Dementia: An Overview
Irene Ryan
 
Зерна пам’яті
Зерна пам’ятіЗерна пам’яті
437 King Lear Drive Charles Town WV 25414
437 King Lear Drive Charles Town WV 25414437 King Lear Drive Charles Town WV 25414
437 King Lear Drive Charles Town WV 25414
ERA Liberty Realty
 
ISOPLYO20 DOS MODELOS
ISOPLYO20 DOS MODELOSISOPLYO20 DOS MODELOS
ISOPLYO20 DOS MODELOS
ITALY COFFEE TEA STORE
 
تعليم Css
تعليم Cssتعليم Css
تعليم Css
Fataho Ali
 

Viewers also liked (18)

Ch#12 journal bearings lubrication
Ch#12 journal bearings lubricationCh#12 journal bearings lubrication
Ch#12 journal bearings lubrication
 
InduSoft Web Studio 8.0 + SP1 + Patch One Review
InduSoft Web Studio 8.0 + SP1 + Patch One ReviewInduSoft Web Studio 8.0 + SP1 + Patch One Review
InduSoft Web Studio 8.0 + SP1 + Patch One Review
 
Lessons in Resilience - International Women's Day Keynote @ Brooklyn College
Lessons in Resilience - International Women's Day Keynote @ Brooklyn CollegeLessons in Resilience - International Women's Day Keynote @ Brooklyn College
Lessons in Resilience - International Women's Day Keynote @ Brooklyn College
 
XLIV FESTIVAL AVIV, PROGRAMACIÓN
XLIV FESTIVAL AVIV, PROGRAMACIÓNXLIV FESTIVAL AVIV, PROGRAMACIÓN
XLIV FESTIVAL AVIV, PROGRAMACIÓN
 
Livret 100% énergies renouvelables
Livret 100% énergies renouvelablesLivret 100% énergies renouvelables
Livret 100% énergies renouvelables
 
Slideshare with animations
Slideshare with animationsSlideshare with animations
Slideshare with animations
 
Pharmaceutical microbiology west coast
Pharmaceutical microbiology west coastPharmaceutical microbiology west coast
Pharmaceutical microbiology west coast
 
Secret encoder ring
Secret encoder ringSecret encoder ring
Secret encoder ring
 
Prise en charge du lymphoedème en hospitalisation complète
Prise en charge du lymphoedème en hospitalisation complètePrise en charge du lymphoedème en hospitalisation complète
Prise en charge du lymphoedème en hospitalisation complète
 
The Crazy Cuban's Secret
The  Crazy Cuban's   SecretThe  Crazy Cuban's   Secret
The Crazy Cuban's Secret
 
SP.Matveev.IComp.Cover.AUG2016
SP.Matveev.IComp.Cover.AUG2016SP.Matveev.IComp.Cover.AUG2016
SP.Matveev.IComp.Cover.AUG2016
 
11 flowers gifts which are perfect for allergy sufferers
11 flowers gifts which are perfect for allergy sufferers11 flowers gifts which are perfect for allergy sufferers
11 flowers gifts which are perfect for allergy sufferers
 
Forum IA BX mars 2016 - Blade Runner
Forum IA BX mars 2016 - Blade RunnerForum IA BX mars 2016 - Blade Runner
Forum IA BX mars 2016 - Blade Runner
 
Dementia: An Overview
Dementia: An OverviewDementia: An Overview
Dementia: An Overview
 
Зерна пам’яті
Зерна пам’ятіЗерна пам’яті
Зерна пам’яті
 
437 King Lear Drive Charles Town WV 25414
437 King Lear Drive Charles Town WV 25414437 King Lear Drive Charles Town WV 25414
437 King Lear Drive Charles Town WV 25414
 
ISOPLYO20 DOS MODELOS
ISOPLYO20 DOS MODELOSISOPLYO20 DOS MODELOS
ISOPLYO20 DOS MODELOS
 
تعليم Css
تعليم Cssتعليم Css
تعليم Css
 

Similar to protecting your digital personal life

Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR Chapter
Jose L. Quiñones-Borrero
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptx
ShubhamGupta833557
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
Lourdes Paloma Gimenez
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
Justin Denton
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
Kirsten Thompson
 
How to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsHow to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scams
Gabor Szathmari
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
Gabor Szathmari
 
Cyber Security Motivation
Cyber Security MotivationCyber Security Motivation
Cyber Security Motivation
Suman Thapaliya
 
Spam as social engineering presentation.
Spam as social engineering presentation.Spam as social engineering presentation.
Spam as social engineering presentation.
fificoco
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
xenhalo561
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
OoXair
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
MansoorAhmed57263
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
jaenjenny
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayanehaz
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Steve Poole
 
Social engineering The Good and Bad
Social engineering The Good and BadSocial engineering The Good and Bad
Social engineering The Good and Bad
Tzar Umang
 
[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides
NathanielCarlson2
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
Nicholas Davis
 

Similar to protecting your digital personal life (20)

Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR Chapter
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptx
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 
How to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsHow to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scams
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
 
Cyber Security Motivation
Cyber Security MotivationCyber Security Motivation
Cyber Security Motivation
 
Spam as social engineering presentation.
Spam as social engineering presentation.Spam as social engineering presentation.
Spam as social engineering presentation.
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 
Social engineering The Good and Bad
Social engineering The Good and BadSocial engineering The Good and Bad
Social engineering The Good and Bad
 
[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
 
Drooger, jack cyber security
Drooger, jack   cyber securityDrooger, jack   cyber security
Drooger, jack cyber security
 

Recently uploaded

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 

protecting your digital personal life

  • 1. 24 March 2017 Protecting your digital personal life Personal cybersecurity for high value targets
  • 2. Protecting your digital personal life | Congressional Briefing What do hackers want? • Money • Banking • Identity • Intellectual Property • Market manipulation • Force Change • Popularity- bragging rights • Public opinion • Policy • Promote an ideology • Espionage • Compromise physical security • Types of hackers: • Researchers • Hacktivists • Anarchists • Criminals • Terrorists • Nation States
  • 3. Protecting your digital personal life | Congressional Briefing What is a high value target ? • Celebrities • Athletes • Actors • Musicians • Politicians & Political Appointees • Local • State • National • High Net-Worth Individuals • High-Profile business executives • Family offices • Subject of more sophisticated attackers • Increased impact of compromise • In many cases, easier marks • lots of public info • broader network Why are you different?
  • 4. Protecting your digital personal life | Congressional Briefing Colleen Bridges – Step 1: malicious email colleen.bridges@gmail.com
  • 5. Protecting your digital personal life | Congressional Briefing Colleen Bridges – Step 2: email account take over colleen.bridges@gmail.com
  • 6. Protecting your digital personal life | Congressional Briefing Colleen Bridges – Step 3: Pivot & Exploit
  • 7. Protecting your digital personal life | Congressional Briefing Colleen Bridges - Results • Compromised information: • Email account • MyQ portal account – garage door and any other connected devices • Home address • …. • With this information he can: • Read, archive, and delete Colleen’s email • Pivot attack - send emails to Colleen’s friends, family, & colleagues to try to compromise their email accounts • Remotely monitor & control Colleen’s garage door • Physical compromise - theft or violence
  • 8. Protecting your digital personal life | Congressional Briefing Joe Mandolo – Step 1: website compromise 1
  • 9. Protecting your digital personal life | Congressional Briefing Joe Mandolo – Step 2: passwords for sale 1 2 10k Email, Full Name, Password Cache BTC 3.00000 BTC 0.00000 BTC 3.00000
  • 10. Protecting your digital personal life | Congressional Briefing Joe Mandolo – Step 3: automate the hack 2 Username password
  • 11. Protecting your digital personal life | Congressional Briefing Joe Mandolo – Step 4: exploit 1 2
  • 12. Protecting your digital personal life | Congressional Briefing Joe Mandolo - Results • Compromised information: • Banking information • Email accounts • Intellectual property • Private conversations • …. • With this information she can: • Steal Joe’s money • Read, archive, and delete Joe’s email • Pivot attack - send emails to Joe’s friends, family, staff & colleagues to try to compromise their accounts • Blackmail or publicly embarrass Joe
  • 13. Protecting your digital personal life | Congressional Briefing What do these scenarios have in common? • Both leverage some form of social engineering • Neither of them use sophisticated malware or exploit complex vulnerabilities • These scenarios are just examples - there are an infinite number of ways hackers can creatively compromise your security But, there is some good news • These attacks, and the vast majority like them, can be avoided through a combination of simple and effective security measures • Security is measured on a continuum • Important, old saw: you don’t have to outrun the bear • You can make it a lot harder on the hackers, and raise the cost of compromise
  • 14. Protecting your digital personal life | Congressional Briefing So what can you do about it? Top ten list… 10. Avoid “open” networks – anyone can pretend to be Starbucks and get your phone to connect automatically 9. Use Encryption – documents, backups, communications (messaging, voice, email) 8. Update – always install the latest software and OS updates and patches (across all your devices) 7. Monitor your home network – there are a lot of attacks that antivirus won’t see 6. Back up. No. Really, backup! 5. Two factor anything you can – email, bank accounts, social media 4. Know what your clicking on – avoid links in emails, you can always type the URL into your web browser 3. Email attachments – only open attachments you are expecting from sources you trust 2. Password & security question hygiene – don’t reuse, don’t write it down, don’t memorize 1. Talk with your kids, family, staff (or boss) - Good security practices are like vaccinations – they work best when done by everyone – you need to surround yourself with healthy people Don’t go it alone – rely on the security community to help you (standards, guidance and best practices, and hiring experts)

Editor's Notes

  1. From the most banal to the most insidious, hackers are motivated by Money or Change. Hackers can be grouped into one of these types (roughly in order of badness & sophistication).
  2. Colleen Bridges receives an email from Google telling her that she may have been hacked and to click a link (to a google.com page) to see the suspicious activity. - She clicks on the link and gets a Google login screen. She enters her gmail address and password. - She sees the supposedly suspicious activity. It’s just her last login session. She ignores it. - The hacker who sent her the email now has her email password and access to her account.
  3. He logs in and changes her password, then enables two-factor authentication. He also looks at her recovery email address. As an aside, there’s a good chance the email he just got access to is the recovery address for the other one. Regardless, he can change the backup email and phone number Now Colleen is locked out of her email
  4. Now our hacker runs a script (basically a light-weight piece of custom software) that searches Colleen’s email for interesting information: sites she gets email from, shipping addresses, phone numbers, and usernames. First it hits a recent order from Macy’s which gives our hacker Colleen’s home address Next it hits the jackpot: He finds that Colleen uses a MyQ Internet-connected garage door opener He goes to the MyQ website and clicks “forgot password”. It sends a password reset email to her email address. He can now open and close her garage door over the Internet, and get notifications when the door opens and closes.
  5. Now our hacker runs a script (basically a light-weight piece of custom software) that searches Colleen’s email for interesting information: sites she gets email from, shipping addresses, phone numbers, and usernames. He hits the jackpot: He finds that Colleen uses a MyQ Internet-connected garage door opener. He goes to the MyQ website and clicks “forgot password”. It sends a password reset email to her email address. He can now open and close her garage door over the Internet, and get notifications when the door opens and closes.
  6. Joe Mandolo uses the same password for all of his accounts—email, banking, Amazon, everything else—but it’s a really strong password that no one would ever be able to guess. One of the sites where Joe used that password – oldschoolhats.com gets hacked, and all of the users’ usernames, passwords, and email addresses get stolen.  Oldschoolhats.com has no idea how to protect passwords (e.g. allowing SQL injection, storing passwords in plaintext, or using unsalted hashes), so the hackers can read all the users’ passwords easily.
  7. A week later, a list of all of those usernames, passwords, and email addresses—10,000 of them—shows up on the black market, for sale to the highest bidder.
  8. Now our second hacker uses the list as input for a simple program he’s written: It takes those usernames, email addresses, and passwords, and tries using each combination of them to login to each of the 5,000 most popular websites in the world. It lets him know whenever it succeeds. Because Joe used the same password at oldschoolhats.com that he used at important websites, the hacker gets into many of joes accounts
  9. Now our hacker goes into “exploit” mode and starts to steal Joe’s money (draining his accounts to buy bit coin at different exchanges) and any compromising information from his email
  10. Because Joe used the same password at oldschoolhats.com that he used at important websites like his email and bank account, the hacker’s program gets into all of Joe’s accounts. With access to Joe’s Paypal, the hacker is able to spend money on Joe’s credit card and bank accounts. With access to Joe’s email, the hacker is able to send phishing emails to all of Joe’s friends—from Joe’s address—to try to trick them into giving up their passwords or sending the hacker money. The hacker also changes all of Joe’s passwords and the answers to his security questions, and adds two-factor authentication. Now Joe can’t even get back into his own accounts.
  11. Monitor your home network - as a high value target, antivirus is really insufficient Avoid ”open” networks… your phone is configured to automatically connect to your “trusted” network. Most people add commonly used networks (starbucks or att) Backup! This is the only way to defend against cryto attacks