Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Mathy Vanhoef - @vanhoefmTEDxUHasselt Salon
Student @                                                      Intern @             Computer Security!This presentation co...
   First a few real examples   Goal: Show how a criminal could attack you   Realistic example using white hat security ...
   Stratfor     Around 30,000 stolen credit cards   Ikee.B     Attacks ING Direct Bank SMS authentication
Hacking is child’s play, but monetizing it?цена 10% от баланса = Price is 10% of balance
   Target: TEDxUHasselt attendees   Practice: Twitter followers   Manipulate targets into clicking a link
   Looks like official website   But also contains a virus!
Let’s see this in action!  Remember, this is just a simulation.
TEDxUHasselt Salon: How you can be hacked
TEDxUHasselt Salon: How you can be hacked
TEDxUHasselt Salon: How you can be hacked
TEDxUHasselt Salon: How you can be hacked
Upcoming SlideShare
Loading in …5
×

TEDxUHasselt Salon: How you can be hacked

3,026 views

Published on

Published in: Technology, Economy & Finance
  • Be the first to comment

  • Be the first to like this

TEDxUHasselt Salon: How you can be hacked

  1. 1. Mathy Vanhoef - @vanhoefmTEDxUHasselt Salon
  2. 2. Student @ Intern @ Computer Security!This presentation contains my own personal opinions. My views do not necessarily reflect those of Universiteit Hasselt or Ernst & Young.
  3. 3.  First a few real examples Goal: Show how a criminal could attack you Realistic example using white hat security tools
  4. 4.  Stratfor  Around 30,000 stolen credit cards Ikee.B  Attacks ING Direct Bank SMS authentication
  5. 5. Hacking is child’s play, but monetizing it?цена 10% от баланса = Price is 10% of balance
  6. 6.  Target: TEDxUHasselt attendees Practice: Twitter followers Manipulate targets into clicking a link
  7. 7.  Looks like official website But also contains a virus!
  8. 8. Let’s see this in action! Remember, this is just a simulation.

×