SlideShare a Scribd company logo
Submitted to:
Mr. Mahesh Joshi
Submitted by:
Rajat Gupta
11EGJIT041
 Spoofing is a security attack that allows an adversary
to observe and modify all web pages sent to the
victim's machine, and observe all information entered
into forms by the victim.
 The attacker can observe and modify all web pages
and form submissions, even when the browser's
"secure connection" indicator is lit. The user sees no
indication that anything is wrong.
 After your browser has been fooled, the spoofed web
server can send you fake web pages or prompt you
to provide personal information such as login Id,
password, or even credit card or bank account
numbers.
 IP Spoof
 E-mail Spoof
 Web Spoofing
 Non Technical Spoof
 The creation of IP packets with a forged source. The purpose of it is to
conceal the identity of the sender or impersonating another computing
system.
 Some upper layer protocols provide their own defense against IP
spoofing.
 For example, TCP uses sequence numbers negotiate with the remote
machine to ensure that the arriving packets are part of an established
connection. Since the attacker normally cant see any reply packets,
he has to guess the sequence number in order to hijack the
connection.
 IP spoofing is almost always used in what is currently one of
the most difficult attacks to defend against – denial of service
attacks, or DoS. Since hrackers are concerned only with
consuming bandwidth and resources, they need not worry
about properly completing handshakes and transactions.
Rather, they wish to flood the victim with as many packets as
possible in a short amount of time. In order to prolong the
effectiveness of the attack, they spoof source IP addresses
to make tracing and stopping the DoS as difficult as possible.
When multiple compromised hosts are participating in the
attack, all sending spoofed traffic; it is very challenging to
quickly block traffic.
 E-mail spoofing is the forgery of an e-mail header so
that the message appears to have originated from
someone or somewhere other than the actual source.
 It has happened that the media printed false
stories based on spoofed e-mails.
 In October 2013, an e-mail which looked like
it was from the Swedish company Fingerprint
Cards was sent to a news agency, saying
that Samsung offered to purchase the
company. The news spread and the stock
exchange rate surged by 50%. But the e-
mail was from someone else.
 Don’t click links in emails instead always copy and
paste, or even better manually type the URL in.
 When entering personal or sensitive information, verify
the URL is as you expect, and the site’s SSL certificate
matches that URL.
 Look at the IP information of the email header. If an
email originated from inside your network, the sender
should have very similar IP address.
 Pretending to be a legitimate site
 Attacker creates convincing but false copy of the
site
 Stealing personal information such as login ID,
password, credit card, bank account, and much
more. aka Phishing attack
 False Web looks and feels like the real one
 Attacker controls the false web by surveillance
 Modifying integrity of the data from the victims
 These non-computer based techniques are
commonly referred to as social engineering. This can
be as simple as the attacker calling someone on the
phone saying that he is a certain person.
 Web spoofing is increasing at a rapid pace
› According to a study by Gartner Research
› Two million users gave such information to
spoofed web sites.
› About $1.2 billion direct losses to U.S. Bank and
credit card issuers in 2003
› And about $400 million to $1 billion losses from
the victims
Under Information Technology (Amendment) Act, 2008,
Section 66-D and Section 417, 419 & 465 of Indian
Penal Code, 1860 also applicable. Spoofing offence is
cognizable, bailable, compoundable with permission of
the court before which the prosecution of such offence
is pending and triable by any magistrate.
 WASHINGTON (Reuters) - High-frequency trader
Michael Coscia was charged with manipulating
commodity futures prices in the first U.S. federal
criminal prosecution of the practice of "spoofing," the
Justice Department said on Thursday.
 Coscia and his high-speed trading firm, Panther Energy
Trading, were fined $3.1 million by regulators in the
United States and Britain in July 2013 for market
manipulation and ordered to disgorge $2.7 million in
profits.
 It was the first criminal federal prosecution for
'spoofing' - creating the false impression of
market demand by rapidly placing orders and
then canceling them - which is explicitly banned
by the 2010 Dodd-Frank Wall Street reform act.
 "In August 2011, Coscia began a high-frequency
trading strategy in which he entered large-volume
orders that he intended to immediately cancel
before they could (be) filled by other traders," the
Department of Justice said.
 "By entering large orders that he ... canceled
before other traders could fill them, Coscia
made a profit by buying 14 contracts at 14288
ticks and selling them at 14289 ticks less than
one second later," the Department said.
 Futures markets, regulated by the Commodity
Futures Trading Commission, are a common
hunting ground for high-speed traders, and the
agency is probing the sector for any breaches.
 Follow a three part strategy:
 Disable JavaScript in your browser so the attacker will be
unable to hide the evidence of the attack;
 Make sure your browser’s location line is always visible;
 Pay attention to the URLs displayed on your browser’s
location line, making sure they always point to the server
you think you are connected to.
 We should remain updated in this fields.
 Daily there will be new challenges as the
hackers seek out weakness and vulnerabilities
in our systems.
 ANY QUERIES???
rajat_ppt

More Related Content

What's hot

P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
temi
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
Quick Heal Technologies Ltd.
 
Topshop potential threats
Topshop potential threatsTopshop potential threats
Topshop potential threats
daisy_maggs
 
Phishing
PhishingPhishing
Phishing
Syahida
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniques
Sushil Kumar
 
Asto card into
Asto card intoAsto card into
Asto card into
IB Kang
 
Phishing
PhishingPhishing
Phishing
Kiran Patil
 
Phishing
PhishingPhishing
Phishing
oitaoming
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
Sachin Saini
 
Phishing
PhishingPhishing
Phishing
rahmataiman1
 
ELECTRONIC FRAUD TACTICS
ELECTRONIC FRAUD TACTICS ELECTRONIC FRAUD TACTICS
ELECTRONIC FRAUD TACTICS
ICFAI Business School
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharks
Nalneesh Gaur
 
Identity Theft business
Identity Theft businessIdentity Theft business
Identity Theft business
Matt Smith
 
Phishing
PhishingPhishing
Phishing
Syeda Javeria
 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacks
Sreejith.D. Menon
 
ICT-phishing
ICT-phishingICT-phishing
ICT-phishing
MH BS
 
Internet fraud #scichallenge2017
Internet fraud #scichallenge2017Internet fraud #scichallenge2017
Internet fraud #scichallenge2017
N F
 
e-Fraud ppt
e-Fraud ppte-Fraud ppt
e-Fraud ppt
jasonsirmon
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
SysCloud
 

What's hot (19)

P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
Topshop potential threats
Topshop potential threatsTopshop potential threats
Topshop potential threats
 
Phishing
PhishingPhishing
Phishing
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniques
 
Asto card into
Asto card intoAsto card into
Asto card into
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Phishing
PhishingPhishing
Phishing
 
ELECTRONIC FRAUD TACTICS
ELECTRONIC FRAUD TACTICS ELECTRONIC FRAUD TACTICS
ELECTRONIC FRAUD TACTICS
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharks
 
Identity Theft business
Identity Theft businessIdentity Theft business
Identity Theft business
 
Phishing
PhishingPhishing
Phishing
 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacks
 
ICT-phishing
ICT-phishingICT-phishing
ICT-phishing
 
Internet fraud #scichallenge2017
Internet fraud #scichallenge2017Internet fraud #scichallenge2017
Internet fraud #scichallenge2017
 
e-Fraud ppt
e-Fraud ppte-Fraud ppt
e-Fraud ppt
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 

Viewers also liked

Introduction to Managing Cancer Living Meaningfully (CALM)
Introduction to Managing Cancer Living Meaningfully (CALM) Introduction to Managing Cancer Living Meaningfully (CALM)
Introduction to Managing Cancer Living Meaningfully (CALM)
Global Institute GIPPEC
 
01 Mid-term Assignment - Christmas Land Project_khawar_v3
01 Mid-term Assignment - Christmas Land Project_khawar_v301 Mid-term Assignment - Christmas Land Project_khawar_v3
01 Mid-term Assignment - Christmas Land Project_khawar_v3
Reza Khawar
 
Portafolio virtua lalbertaponte
Portafolio virtua lalbertapontePortafolio virtua lalbertaponte
Portafolio virtua lalbertaponte
uftsaia
 
El valor de la escucha
El valor de la escuchaEl valor de la escucha
El valor de la escucha
carolinahc25
 
Mu0013 hr audit
Mu0013 hr auditMu0013 hr audit
Mu0013 hr audit
consult4solutions
 
Characters
CharactersCharacters
Characters
Kim Hutton-Brown
 
Mk0016 advertising management and sales
Mk0016 advertising management and salesMk0016 advertising management and sales
Mk0016 advertising management and sales
consult4solutions
 
Mb0050 research methodology
Mb0050 research methodologyMb0050 research methodology
Mb0050 research methodology
consult4solutions
 
FlexDealer Automotive Digital Marketing Agency Presentation
FlexDealer Automotive Digital Marketing Agency PresentationFlexDealer Automotive Digital Marketing Agency Presentation
FlexDealer Automotive Digital Marketing Agency Presentation
Jason Prud'homme
 
Mf0011 mergers & acquisitions
Mf0011 mergers & acquisitionsMf0011 mergers & acquisitions
Mf0011 mergers & acquisitions
consult4solutions
 
ACC 491 Week 4 Learning Team Assignment Apollo Shoes Case Assignment (1) 2015...
ACC 491 Week 4 Learning Team Assignment Apollo Shoes Case Assignment (1) 2015...ACC 491 Week 4 Learning Team Assignment Apollo Shoes Case Assignment (1) 2015...
ACC 491 Week 4 Learning Team Assignment Apollo Shoes Case Assignment (1) 2015...
amoryatlanta
 
Mk0018 international marketing
Mk0018 international marketingMk0018 international marketing
Mk0018 international marketing
consult4solutions
 
Luyen viet tieng thai
Luyen viet tieng thaiLuyen viet tieng thai
Luyen viet tieng thai
Trung Nguyen
 
Mi0035 computer networks
Mi0035 computer networksMi0035 computer networks
Mi0035 computer networks
consult4solutions
 
Under ground dams design
Under ground dams designUnder ground dams design
Under ground dams design
Amro Elfeki
 
Projektverzögerungen - Welche Verteidigungsstrategien gibt es gegen Verzugver...
Projektverzögerungen - Welche Verteidigungsstrategien gibt es gegen Verzugver...Projektverzögerungen - Welche Verteidigungsstrategien gibt es gegen Verzugver...
Projektverzögerungen - Welche Verteidigungsstrategien gibt es gegen Verzugver...
Thomas Hofbauer
 
Board Comunicação Integrada
Board Comunicação IntegradaBoard Comunicação Integrada
Board Comunicação Integrada
Fernanda Sobral
 
Mk0018 international marketing
Mk0018 international marketingMk0018 international marketing
Mk0018 international marketing
consult4solutions
 
Gratis schnittmuster 06-59_44
Gratis schnittmuster 06-59_44Gratis schnittmuster 06-59_44
Gratis schnittmuster 06-59_44
Luis Fernando Gomes
 
Construction companies in qatar
Construction companies in qatarConstruction companies in qatar
Construction companies in qatar
qatpedia
 

Viewers also liked (20)

Introduction to Managing Cancer Living Meaningfully (CALM)
Introduction to Managing Cancer Living Meaningfully (CALM) Introduction to Managing Cancer Living Meaningfully (CALM)
Introduction to Managing Cancer Living Meaningfully (CALM)
 
01 Mid-term Assignment - Christmas Land Project_khawar_v3
01 Mid-term Assignment - Christmas Land Project_khawar_v301 Mid-term Assignment - Christmas Land Project_khawar_v3
01 Mid-term Assignment - Christmas Land Project_khawar_v3
 
Portafolio virtua lalbertaponte
Portafolio virtua lalbertapontePortafolio virtua lalbertaponte
Portafolio virtua lalbertaponte
 
El valor de la escucha
El valor de la escuchaEl valor de la escucha
El valor de la escucha
 
Mu0013 hr audit
Mu0013 hr auditMu0013 hr audit
Mu0013 hr audit
 
Characters
CharactersCharacters
Characters
 
Mk0016 advertising management and sales
Mk0016 advertising management and salesMk0016 advertising management and sales
Mk0016 advertising management and sales
 
Mb0050 research methodology
Mb0050 research methodologyMb0050 research methodology
Mb0050 research methodology
 
FlexDealer Automotive Digital Marketing Agency Presentation
FlexDealer Automotive Digital Marketing Agency PresentationFlexDealer Automotive Digital Marketing Agency Presentation
FlexDealer Automotive Digital Marketing Agency Presentation
 
Mf0011 mergers & acquisitions
Mf0011 mergers & acquisitionsMf0011 mergers & acquisitions
Mf0011 mergers & acquisitions
 
ACC 491 Week 4 Learning Team Assignment Apollo Shoes Case Assignment (1) 2015...
ACC 491 Week 4 Learning Team Assignment Apollo Shoes Case Assignment (1) 2015...ACC 491 Week 4 Learning Team Assignment Apollo Shoes Case Assignment (1) 2015...
ACC 491 Week 4 Learning Team Assignment Apollo Shoes Case Assignment (1) 2015...
 
Mk0018 international marketing
Mk0018 international marketingMk0018 international marketing
Mk0018 international marketing
 
Luyen viet tieng thai
Luyen viet tieng thaiLuyen viet tieng thai
Luyen viet tieng thai
 
Mi0035 computer networks
Mi0035 computer networksMi0035 computer networks
Mi0035 computer networks
 
Under ground dams design
Under ground dams designUnder ground dams design
Under ground dams design
 
Projektverzögerungen - Welche Verteidigungsstrategien gibt es gegen Verzugver...
Projektverzögerungen - Welche Verteidigungsstrategien gibt es gegen Verzugver...Projektverzögerungen - Welche Verteidigungsstrategien gibt es gegen Verzugver...
Projektverzögerungen - Welche Verteidigungsstrategien gibt es gegen Verzugver...
 
Board Comunicação Integrada
Board Comunicação IntegradaBoard Comunicação Integrada
Board Comunicação Integrada
 
Mk0018 international marketing
Mk0018 international marketingMk0018 international marketing
Mk0018 international marketing
 
Gratis schnittmuster 06-59_44
Gratis schnittmuster 06-59_44Gratis schnittmuster 06-59_44
Gratis schnittmuster 06-59_44
 
Construction companies in qatar
Construction companies in qatarConstruction companies in qatar
Construction companies in qatar
 

Similar to rajat_ppt

ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
KALPITKALPIT1
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad
 
IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
Write My Essay
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
OmprakashRaut
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
Aswani34
 
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docxRunning head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx
todd521
 
Databreach forecast
Databreach forecastDatabreach forecast
Databreach forecast
Suresh Kesavan
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
Business.com
 
Web spoofing hacking
Web spoofing hackingWeb spoofing hacking
Web spoofing hacking
jignesh khunt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Nitin Kanaujia
 
Phish phry operation
Phish phry operationPhish phry operation
Phish phry operation
Mohamed Zahran
 
Phishing.pdf
Phishing.pdfPhishing.pdf
Phishing.pdf
MariGogokhia
 
Cyber crime
Cyber crimeCyber crime
Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftPreventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity Theft
Diane M. Metcalf
 
The Current State of Cybercrime 2014
The Current State of Cybercrime 2014The Current State of Cybercrime 2014
The Current State of Cybercrime 2014
EMC
 
A Review on Antiphishing Framework
A Review on Antiphishing FrameworkA Review on Antiphishing Framework
A Review on Antiphishing Framework
IJAEMSJORNAL
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
infantemiliya
 
A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity Theft
Martha Brown
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
FloroRaphaell
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Renu Verma
 

Similar to rajat_ppt (20)

ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docxRunning head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx
 
Databreach forecast
Databreach forecastDatabreach forecast
Databreach forecast
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
 
Web spoofing hacking
Web spoofing hackingWeb spoofing hacking
Web spoofing hacking
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Phish phry operation
Phish phry operationPhish phry operation
Phish phry operation
 
Phishing.pdf
Phishing.pdfPhishing.pdf
Phishing.pdf
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftPreventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity Theft
 
The Current State of Cybercrime 2014
The Current State of Cybercrime 2014The Current State of Cybercrime 2014
The Current State of Cybercrime 2014
 
A Review on Antiphishing Framework
A Review on Antiphishing FrameworkA Review on Antiphishing Framework
A Review on Antiphishing Framework
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity Theft
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

rajat_ppt

  • 1. Submitted to: Mr. Mahesh Joshi Submitted by: Rajat Gupta 11EGJIT041
  • 2.  Spoofing is a security attack that allows an adversary to observe and modify all web pages sent to the victim's machine, and observe all information entered into forms by the victim.  The attacker can observe and modify all web pages and form submissions, even when the browser's "secure connection" indicator is lit. The user sees no indication that anything is wrong.  After your browser has been fooled, the spoofed web server can send you fake web pages or prompt you to provide personal information such as login Id, password, or even credit card or bank account numbers.
  • 3.  IP Spoof  E-mail Spoof  Web Spoofing  Non Technical Spoof
  • 4.  The creation of IP packets with a forged source. The purpose of it is to conceal the identity of the sender or impersonating another computing system.  Some upper layer protocols provide their own defense against IP spoofing.  For example, TCP uses sequence numbers negotiate with the remote machine to ensure that the arriving packets are part of an established connection. Since the attacker normally cant see any reply packets, he has to guess the sequence number in order to hijack the connection.
  • 5.
  • 6.  IP spoofing is almost always used in what is currently one of the most difficult attacks to defend against – denial of service attacks, or DoS. Since hrackers are concerned only with consuming bandwidth and resources, they need not worry about properly completing handshakes and transactions. Rather, they wish to flood the victim with as many packets as possible in a short amount of time. In order to prolong the effectiveness of the attack, they spoof source IP addresses to make tracing and stopping the DoS as difficult as possible. When multiple compromised hosts are participating in the attack, all sending spoofed traffic; it is very challenging to quickly block traffic.
  • 7.  E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source.
  • 8.
  • 9.  It has happened that the media printed false stories based on spoofed e-mails.  In October 2013, an e-mail which looked like it was from the Swedish company Fingerprint Cards was sent to a news agency, saying that Samsung offered to purchase the company. The news spread and the stock exchange rate surged by 50%. But the e- mail was from someone else.
  • 10.  Don’t click links in emails instead always copy and paste, or even better manually type the URL in.  When entering personal or sensitive information, verify the URL is as you expect, and the site’s SSL certificate matches that URL.  Look at the IP information of the email header. If an email originated from inside your network, the sender should have very similar IP address.
  • 11.  Pretending to be a legitimate site  Attacker creates convincing but false copy of the site  Stealing personal information such as login ID, password, credit card, bank account, and much more. aka Phishing attack  False Web looks and feels like the real one  Attacker controls the false web by surveillance  Modifying integrity of the data from the victims
  • 12.
  • 13.  These non-computer based techniques are commonly referred to as social engineering. This can be as simple as the attacker calling someone on the phone saying that he is a certain person.
  • 14.
  • 15.  Web spoofing is increasing at a rapid pace › According to a study by Gartner Research › Two million users gave such information to spoofed web sites. › About $1.2 billion direct losses to U.S. Bank and credit card issuers in 2003 › And about $400 million to $1 billion losses from the victims
  • 16. Under Information Technology (Amendment) Act, 2008, Section 66-D and Section 417, 419 & 465 of Indian Penal Code, 1860 also applicable. Spoofing offence is cognizable, bailable, compoundable with permission of the court before which the prosecution of such offence is pending and triable by any magistrate.
  • 17.  WASHINGTON (Reuters) - High-frequency trader Michael Coscia was charged with manipulating commodity futures prices in the first U.S. federal criminal prosecution of the practice of "spoofing," the Justice Department said on Thursday.  Coscia and his high-speed trading firm, Panther Energy Trading, were fined $3.1 million by regulators in the United States and Britain in July 2013 for market manipulation and ordered to disgorge $2.7 million in profits.
  • 18.  It was the first criminal federal prosecution for 'spoofing' - creating the false impression of market demand by rapidly placing orders and then canceling them - which is explicitly banned by the 2010 Dodd-Frank Wall Street reform act.  "In August 2011, Coscia began a high-frequency trading strategy in which he entered large-volume orders that he intended to immediately cancel before they could (be) filled by other traders," the Department of Justice said.
  • 19.  "By entering large orders that he ... canceled before other traders could fill them, Coscia made a profit by buying 14 contracts at 14288 ticks and selling them at 14289 ticks less than one second later," the Department said.  Futures markets, regulated by the Commodity Futures Trading Commission, are a common hunting ground for high-speed traders, and the agency is probing the sector for any breaches.
  • 20.  Follow a three part strategy:  Disable JavaScript in your browser so the attacker will be unable to hide the evidence of the attack;  Make sure your browser’s location line is always visible;  Pay attention to the URLs displayed on your browser’s location line, making sure they always point to the server you think you are connected to.
  • 21.  We should remain updated in this fields.  Daily there will be new challenges as the hackers seek out weakness and vulnerabilities in our systems.