SlideShare a Scribd company logo
Guest Editor
Samantha Davison (@sam_e_davison) is the
Security Awareness and Education Program
Manager at Uber, educating their employees in
over 350 cities around the globe.
Overview
We know you care about protecting your computer
and mobile devices and take steps to secure them.
However, no matter how securely you use technology,
you may eventually be hacked or “compromised.” In
this newsletter, you will learn how to determine if your
computer or mobile device has been hacked and, if so,
what you can do about it. Ultimately, the quicker you
detect something is wrong and the faster you respond,
the more likely you can reduce the harm a cyber attacker can cause.
Clues You Have Been Hacked
hackers usually leave several clues, often called indicators. The closer your system matches any of these clues, the
more likely it has been hacked:
• Your anti-virus program has triggered an alert that your system is infected, particularly if it says that it was
• Your browser’s homepage has unexpectedly changed or your browser is taking you to websites that you did
not want to go to.
• There are new accounts on your computer or device that you did not create, or new programs running that
you did not install.
• Your computer or applications are constantly crashing, there are icons for unknown apps, or strange windows
keep popping up.
• A program requests your authorization to make changes to your system, though you’re not actively installing
or updating any of your applications.
• Overview
• Clues You Have Been Hacked
• How to Respond
IN THIS ISSUE...
I’m Hacked, Now What?
OUCH! | April 2016
Sooner or later, your computer or device
may be compromised. The faster you
detect an incident and the sooner you
respond, the better.
• Your password no longer works when you try to
log into your system or an online account, even
though you know your password is correct.
• Friends ask you why you are spamming them
with emails that you know you never sent.
• Your mobile device is causing unauthorized
charges to premium SMS numbers.
• Your mobile device suddenly has unexplained
very high data or battery usage.
How to Respond
If you believe your computer or device has been hacked,
the sooner you respond the better. If the computer or
device was provided to you by your employer or is used
can you cause more harm than good, but you could
also destroy valuable evidence that can be used for an
investigation. Instead, report the incident to your employer right away, usually by contacting your help desk, security
team, or supervisor. If for some reason you cannot contact your organization, or you are concerned about a delay,
disconnect your computer or device from the network and then put it in sleep, suspend, or airplane mode. Even if you
are not sure if you have been hacked, it is far better to report it just in case. If the computer or device is your own for
personal use, here are some steps you can take:
• Change Your Passwords: This includes not only changing the passwords on your computers and mobile
devices, but for all of your online accounts. Be sure you do not use the hacked computer to change the
passwords. Instead, use a different computer or device that you know is secure to change the passwords.
• Anti-Virus
is not possible, then delete it.
• Rebuilding
secure option is to rebuild it. For computers, follow your system manufacturer’s instructions. In most cases,
this will mean using the built-in utilities to reinstall the operating system. If these utilities are missing, corrupted,
I’m Hacked, Now What?
OUCH! | April 2016
or infected, then contact your manufacturer for guidance or visit their website. Do not reinstall the operating
system from backups; they may have the same vulnerabilities that allowed the hacker to originally gain access.
Backups should only be used for recovering your data. For mobile devices, follow the instructions from your
device manufacturer or service provider, these should be on their website. In many cases, this may be as simple
as restoring your mobile device to factory default. If you feel uncomfortable with the rebuilding process, consider
using a professional service to help you. Or, if your computer or device is old, it may be easier and even cheaper
to purchase a new one. Finally, once you have rebuilt your computer or device (or purchased a new one) make
sure it is fully updated and current and enable automatic updating whenever possible.
• Backups: The most important step you can take to protecting yourself is to prepare ahead of time with
regular backups. The more often you back up, the better. Some solutions will automatically back up any new
being hacked.
• Law Enforcement: If you feel in any way threatened, report the incident to local law enforcement.
Tip of the Day
Day. A new security tip is posted every day. https://www.sans.org/tip-of-the-day
Resources
Backups: https://securingthehuman.sans.org/ouch/2015#august2015
Passphrases: https://securingthehuman.sans.org/ouch/2015#april2015
What Is Malware?: https://securingthehuman.sans.org/ouch/2016#march2016
https://securingthehuman.sans.org/ouch/2016#january2016
License
.
You are free to share or distribute this newsletter as long as you do not sell or modify it. For past editions or translated versions, visit
https://www.securingthehuman.org/ouch/archives. Editorial Board: Bill Wyman, Walt Scrivens, Phil Hoffman, Bob Rudis
securingthehuman.org/blog /securethehuman @securethehuman securingthehuman.org/gplus
I’m Hacked, Now What?
OUCH! | April 2016

More Related Content

What's hot

The Human Side of Security
The Human Side of SecurityThe Human Side of Security
The Human Side of Security
Randy Earl
 
Safe computing (circa 2004)
Safe computing (circa 2004)Safe computing (circa 2004)
Safe computing (circa 2004)
Azmi Mohd Tamil
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
Nikki Shree
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
Mukul Kumar
 
Efective computing
Efective computingEfective computing
Efective computingNaveen Sihag
 
Malware 10 minute presentation
Malware 10 minute presentationMalware 10 minute presentation
Malware 10 minute presentation
David Lombrozo
 
4 a module virus and spyware
4 a module virus and spyware4 a module virus and spyware
4 a module virus and spywareRozell Sneede
 
Safe Computing
Safe ComputingSafe Computing
Lesson 1 computer safety and maintenance
Lesson 1   computer safety and maintenanceLesson 1   computer safety and maintenance
Lesson 1 computer safety and maintenance
School
 
IT Security Basics For Managers
IT Security Basics For ManagersIT Security Basics For Managers
IT Security Basics For Managers
Daniel Owens
 
How To Protect Yourself and Your Computer Online
How To Protect Yourself and Your Computer OnlineHow To Protect Yourself and Your Computer Online
How To Protect Yourself and Your Computer Online
Charles Anderson
 
W01p2virus wayman robert
W01p2virus wayman robertW01p2virus wayman robert
W01p2virus wayman robertrobsworld
 
Awesome Tips for Data Security
Awesome Tips for Data SecurityAwesome Tips for Data Security
Awesome Tips for Data Security
Millennium Systems International
 
Computer Investigation on Employees
Computer Investigation on EmployeesComputer Investigation on Employees
Computer Investigation on Employees
SwiftTech Solutions, Inc.
 
Bug bounty hunting
Bug bounty huntingBug bounty hunting
Bug bounty hunting
redteamacademypromo
 
Bug Bounty
Bug BountyBug Bounty
Bug Bounty
Hariprasad KA
 

What's hot (19)

The Human Side of Security
The Human Side of SecurityThe Human Side of Security
The Human Side of Security
 
Safe computing (circa 2004)
Safe computing (circa 2004)Safe computing (circa 2004)
Safe computing (circa 2004)
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
 
10
10 10
10
 
Spyware
SpywareSpyware
Spyware
 
Spyware
SpywareSpyware
Spyware
 
Efective computing
Efective computingEfective computing
Efective computing
 
Malware 10 minute presentation
Malware 10 minute presentationMalware 10 minute presentation
Malware 10 minute presentation
 
4 a module virus and spyware
4 a module virus and spyware4 a module virus and spyware
4 a module virus and spyware
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Lesson 1 computer safety and maintenance
Lesson 1   computer safety and maintenanceLesson 1   computer safety and maintenance
Lesson 1 computer safety and maintenance
 
IT Security Basics For Managers
IT Security Basics For ManagersIT Security Basics For Managers
IT Security Basics For Managers
 
How To Protect Yourself and Your Computer Online
How To Protect Yourself and Your Computer OnlineHow To Protect Yourself and Your Computer Online
How To Protect Yourself and Your Computer Online
 
W01p2virus wayman robert
W01p2virus wayman robertW01p2virus wayman robert
W01p2virus wayman robert
 
Awesome Tips for Data Security
Awesome Tips for Data SecurityAwesome Tips for Data Security
Awesome Tips for Data Security
 
Computer Investigation on Employees
Computer Investigation on EmployeesComputer Investigation on Employees
Computer Investigation on Employees
 
Bug bounty hunting
Bug bounty huntingBug bounty hunting
Bug bounty hunting
 
Bug Bounty
Bug BountyBug Bounty
Bug Bounty
 

Similar to SANS OUCH Newsletter April 2016

How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
Nordic Backup
 
The 10 Commandments of Computer Security
The 10 Commandments of Computer SecurityThe 10 Commandments of Computer Security
The 10 Commandments of Computer Security
Techvera
 
Executive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfExecutive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdf
TechSoup
 
FBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from RansomwareFBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from Ransomware
David Sweigert
 
Secure End User
Secure End UserSecure End User
Secure End User
Muhammad Salahuddien
 
Internet security
Internet securityInternet security
Internet security
rfukunaga
 
7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked
Cyware
 
Staying Safe on the Computer and Online
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Online
cat509
 
Stackfield Cloud Security 101
Stackfield Cloud Security 101Stackfield Cloud Security 101
Stackfield Cloud Security 101
Stackfield
 
Cyber Security Magazine
Cyber Security MagazineCyber Security Magazine
Cyber Security Magazine
Quentin Brown
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitioners
Danny Doobay
 
In computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfIn computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdf
anandanand521251
 
Limbtec Computer Security Presentation
Limbtec Computer Security PresentationLimbtec Computer Security Presentation
Limbtec Computer Security Presentation
limbtec
 
Free Report 16 Critical Questions You Must Ask Before Hiring Any IT Company -...
Free Report 16 Critical Questions You Must Ask Before Hiring Any IT Company -...Free Report 16 Critical Questions You Must Ask Before Hiring Any IT Company -...
Free Report 16 Critical Questions You Must Ask Before Hiring Any IT Company -...Ron Pierce
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4leahg118
 
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdfNCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
Policypros.co.uk
 
5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure
Media Sonar
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
Nguyen Xuan Quang
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made Easy
ChristoanSmit
 

Similar to SANS OUCH Newsletter April 2016 (20)

How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
 
The 10 Commandments of Computer Security
The 10 Commandments of Computer SecurityThe 10 Commandments of Computer Security
The 10 Commandments of Computer Security
 
Executive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfExecutive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdf
 
FBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from RansomwareFBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from Ransomware
 
Secure End User
Secure End UserSecure End User
Secure End User
 
Internet security
Internet securityInternet security
Internet security
 
7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked
 
Staying Safe on the Computer and Online
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Online
 
10 things to teach end users
10 things to teach end users10 things to teach end users
10 things to teach end users
 
Stackfield Cloud Security 101
Stackfield Cloud Security 101Stackfield Cloud Security 101
Stackfield Cloud Security 101
 
Cyber Security Magazine
Cyber Security MagazineCyber Security Magazine
Cyber Security Magazine
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitioners
 
In computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfIn computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdf
 
Limbtec Computer Security Presentation
Limbtec Computer Security PresentationLimbtec Computer Security Presentation
Limbtec Computer Security Presentation
 
Free Report 16 Critical Questions You Must Ask Before Hiring Any IT Company -...
Free Report 16 Critical Questions You Must Ask Before Hiring Any IT Company -...Free Report 16 Critical Questions You Must Ask Before Hiring Any IT Company -...
Free Report 16 Critical Questions You Must Ask Before Hiring Any IT Company -...
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdfNCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
 
5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made Easy
 

More from Gene Ferro

Lehigh Valley Business_Digital Transformation
Lehigh Valley Business_Digital TransformationLehigh Valley Business_Digital Transformation
Lehigh Valley Business_Digital Transformation
Gene Ferro
 
Business Continuity - Weidenhammer
Business Continuity - WeidenhammerBusiness Continuity - Weidenhammer
Business Continuity - Weidenhammer
Gene Ferro
 
Weidenhammer Digital Transformation Presentation
Weidenhammer Digital Transformation PresentationWeidenhammer Digital Transformation Presentation
Weidenhammer Digital Transformation Presentation
Gene Ferro
 
Weidenhammer Cloud Solution Infographic
Weidenhammer Cloud Solution InfographicWeidenhammer Cloud Solution Infographic
Weidenhammer Cloud Solution Infographic
Gene Ferro
 
Weidenhammer Consulting Booklet
Weidenhammer Consulting BookletWeidenhammer Consulting Booklet
Weidenhammer Consulting Booklet
Gene Ferro
 
Ehrlich Case Study_SharePoint
Ehrlich Case Study_SharePointEhrlich Case Study_SharePoint
Ehrlich Case Study_SharePointGene Ferro
 
Intranet Solutions_Sales & Marketing
Intranet Solutions_Sales & MarketingIntranet Solutions_Sales & Marketing
Intranet Solutions_Sales & MarketingGene Ferro
 
Intranet Solutions_IT
Intranet Solutions_ITIntranet Solutions_IT
Intranet Solutions_ITGene Ferro
 
Intranet Solutions_HR
Intranet Solutions_HRIntranet Solutions_HR
Intranet Solutions_HRGene Ferro
 
Intranet Solutions_Finance & Accounting
Intranet Solutions_Finance & AccountingIntranet Solutions_Finance & Accounting
Intranet Solutions_Finance & AccountingGene Ferro
 
Weidenhammer Billboards!
Weidenhammer Billboards!Weidenhammer Billboards!
Weidenhammer Billboards!Gene Ferro
 
Weidenhammer Oktoberfest Hammer Happy Hour
Weidenhammer Oktoberfest Hammer Happy HourWeidenhammer Oktoberfest Hammer Happy Hour
Weidenhammer Oktoberfest Hammer Happy HourGene Ferro
 
Business Transformation Consultant
Business Transformation ConsultantBusiness Transformation Consultant
Business Transformation ConsultantGene Ferro
 
401Creative Website Launch!
401Creative Website Launch!401Creative Website Launch!
401Creative Website Launch!Gene Ferro
 
.Net Developer - Solutions Delivery
.Net Developer - Solutions Delivery.Net Developer - Solutions Delivery
.Net Developer - Solutions DeliveryGene Ferro
 
Technical Architect - Solutions Delivery
Technical Architect - Solutions DeliveryTechnical Architect - Solutions Delivery
Technical Architect - Solutions DeliveryGene Ferro
 
Web Project Manager
Web Project ManagerWeb Project Manager
Web Project ManagerGene Ferro
 
401! Creative Capabilities
401! Creative Capabilities401! Creative Capabilities
401! Creative CapabilitiesGene Ferro
 
Mobile Portfolio - 401! Creative, a division of Weidenhammer
Mobile Portfolio - 401! Creative, a division of WeidenhammerMobile Portfolio - 401! Creative, a division of Weidenhammer
Mobile Portfolio - 401! Creative, a division of WeidenhammerGene Ferro
 

More from Gene Ferro (20)

Lehigh Valley Business_Digital Transformation
Lehigh Valley Business_Digital TransformationLehigh Valley Business_Digital Transformation
Lehigh Valley Business_Digital Transformation
 
Business Continuity - Weidenhammer
Business Continuity - WeidenhammerBusiness Continuity - Weidenhammer
Business Continuity - Weidenhammer
 
Weidenhammer Digital Transformation Presentation
Weidenhammer Digital Transformation PresentationWeidenhammer Digital Transformation Presentation
Weidenhammer Digital Transformation Presentation
 
Weidenhammer Cloud Solution Infographic
Weidenhammer Cloud Solution InfographicWeidenhammer Cloud Solution Infographic
Weidenhammer Cloud Solution Infographic
 
Weidenhammer Consulting Booklet
Weidenhammer Consulting BookletWeidenhammer Consulting Booklet
Weidenhammer Consulting Booklet
 
Ehrlich Case Study_SharePoint
Ehrlich Case Study_SharePointEhrlich Case Study_SharePoint
Ehrlich Case Study_SharePoint
 
Intranet Solutions_Sales & Marketing
Intranet Solutions_Sales & MarketingIntranet Solutions_Sales & Marketing
Intranet Solutions_Sales & Marketing
 
Intranet Solutions_IT
Intranet Solutions_ITIntranet Solutions_IT
Intranet Solutions_IT
 
Intranet Solutions_HR
Intranet Solutions_HRIntranet Solutions_HR
Intranet Solutions_HR
 
Intranet Solutions_Finance & Accounting
Intranet Solutions_Finance & AccountingIntranet Solutions_Finance & Accounting
Intranet Solutions_Finance & Accounting
 
PHP Developer
PHP DeveloperPHP Developer
PHP Developer
 
Weidenhammer Billboards!
Weidenhammer Billboards!Weidenhammer Billboards!
Weidenhammer Billboards!
 
Weidenhammer Oktoberfest Hammer Happy Hour
Weidenhammer Oktoberfest Hammer Happy HourWeidenhammer Oktoberfest Hammer Happy Hour
Weidenhammer Oktoberfest Hammer Happy Hour
 
Business Transformation Consultant
Business Transformation ConsultantBusiness Transformation Consultant
Business Transformation Consultant
 
401Creative Website Launch!
401Creative Website Launch!401Creative Website Launch!
401Creative Website Launch!
 
.Net Developer - Solutions Delivery
.Net Developer - Solutions Delivery.Net Developer - Solutions Delivery
.Net Developer - Solutions Delivery
 
Technical Architect - Solutions Delivery
Technical Architect - Solutions DeliveryTechnical Architect - Solutions Delivery
Technical Architect - Solutions Delivery
 
Web Project Manager
Web Project ManagerWeb Project Manager
Web Project Manager
 
401! Creative Capabilities
401! Creative Capabilities401! Creative Capabilities
401! Creative Capabilities
 
Mobile Portfolio - 401! Creative, a division of Weidenhammer
Mobile Portfolio - 401! Creative, a division of WeidenhammerMobile Portfolio - 401! Creative, a division of Weidenhammer
Mobile Portfolio - 401! Creative, a division of Weidenhammer
 

Recently uploaded

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 

Recently uploaded (20)

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 

SANS OUCH Newsletter April 2016

  • 1. Guest Editor Samantha Davison (@sam_e_davison) is the Security Awareness and Education Program Manager at Uber, educating their employees in over 350 cities around the globe. Overview We know you care about protecting your computer and mobile devices and take steps to secure them. However, no matter how securely you use technology, you may eventually be hacked or “compromised.” In this newsletter, you will learn how to determine if your computer or mobile device has been hacked and, if so, what you can do about it. Ultimately, the quicker you detect something is wrong and the faster you respond, the more likely you can reduce the harm a cyber attacker can cause. Clues You Have Been Hacked hackers usually leave several clues, often called indicators. The closer your system matches any of these clues, the more likely it has been hacked: • Your anti-virus program has triggered an alert that your system is infected, particularly if it says that it was • Your browser’s homepage has unexpectedly changed or your browser is taking you to websites that you did not want to go to. • There are new accounts on your computer or device that you did not create, or new programs running that you did not install. • Your computer or applications are constantly crashing, there are icons for unknown apps, or strange windows keep popping up. • A program requests your authorization to make changes to your system, though you’re not actively installing or updating any of your applications. • Overview • Clues You Have Been Hacked • How to Respond IN THIS ISSUE... I’m Hacked, Now What? OUCH! | April 2016
  • 2. Sooner or later, your computer or device may be compromised. The faster you detect an incident and the sooner you respond, the better. • Your password no longer works when you try to log into your system or an online account, even though you know your password is correct. • Friends ask you why you are spamming them with emails that you know you never sent. • Your mobile device is causing unauthorized charges to premium SMS numbers. • Your mobile device suddenly has unexplained very high data or battery usage. How to Respond If you believe your computer or device has been hacked, the sooner you respond the better. If the computer or device was provided to you by your employer or is used can you cause more harm than good, but you could also destroy valuable evidence that can be used for an investigation. Instead, report the incident to your employer right away, usually by contacting your help desk, security team, or supervisor. If for some reason you cannot contact your organization, or you are concerned about a delay, disconnect your computer or device from the network and then put it in sleep, suspend, or airplane mode. Even if you are not sure if you have been hacked, it is far better to report it just in case. If the computer or device is your own for personal use, here are some steps you can take: • Change Your Passwords: This includes not only changing the passwords on your computers and mobile devices, but for all of your online accounts. Be sure you do not use the hacked computer to change the passwords. Instead, use a different computer or device that you know is secure to change the passwords. • Anti-Virus is not possible, then delete it. • Rebuilding secure option is to rebuild it. For computers, follow your system manufacturer’s instructions. In most cases, this will mean using the built-in utilities to reinstall the operating system. If these utilities are missing, corrupted, I’m Hacked, Now What? OUCH! | April 2016
  • 3. or infected, then contact your manufacturer for guidance or visit their website. Do not reinstall the operating system from backups; they may have the same vulnerabilities that allowed the hacker to originally gain access. Backups should only be used for recovering your data. For mobile devices, follow the instructions from your device manufacturer or service provider, these should be on their website. In many cases, this may be as simple as restoring your mobile device to factory default. If you feel uncomfortable with the rebuilding process, consider using a professional service to help you. Or, if your computer or device is old, it may be easier and even cheaper to purchase a new one. Finally, once you have rebuilt your computer or device (or purchased a new one) make sure it is fully updated and current and enable automatic updating whenever possible. • Backups: The most important step you can take to protecting yourself is to prepare ahead of time with regular backups. The more often you back up, the better. Some solutions will automatically back up any new being hacked. • Law Enforcement: If you feel in any way threatened, report the incident to local law enforcement. Tip of the Day Day. A new security tip is posted every day. https://www.sans.org/tip-of-the-day Resources Backups: https://securingthehuman.sans.org/ouch/2015#august2015 Passphrases: https://securingthehuman.sans.org/ouch/2015#april2015 What Is Malware?: https://securingthehuman.sans.org/ouch/2016#march2016 https://securingthehuman.sans.org/ouch/2016#january2016 License . You are free to share or distribute this newsletter as long as you do not sell or modify it. For past editions or translated versions, visit https://www.securingthehuman.org/ouch/archives. Editorial Board: Bill Wyman, Walt Scrivens, Phil Hoffman, Bob Rudis securingthehuman.org/blog /securethehuman @securethehuman securingthehuman.org/gplus I’m Hacked, Now What? OUCH! | April 2016