SlideShare uma empresa Scribd logo
1 de 58
The Dark Side of the Internet
And Why You Shouldn’t Care
CEO of BH Consulting – Independent Information Security Firm
Founder & Head of IRISSCERT – Ireland’s first Computer
Emergency Response Team
Special Advisor on Internet Security Europol's CyberCrime
Centre (EC3)
Expert Advisor to European Network & Information Security
Agency (ENISA)
Adjunct Lecturer at University College Dublin
Regularly comments on media stories –
BBC, Forbes, Bloomberg, FT, Guardian, Sunday Times
Who Am I?
“Because
that's
where
the money
is.”
Willie Sutton
So Why Should I Care?
So Really Why Should I Care?
$1-$6 US Credit card number
$2-$12 UK Credit card number
$5-$50 Medical ID card
$6-$18 Basic identity information
$7 PayPal account with credentials
$50-$500 PayPal verified with balance
$20 DDoS attack from bot army (per hour)
$30 Passwords to consumer credit reports
$50 to $60 Health/medical record
$140 10 million email addresses
$200 Malicious Software Toolkit
$500 20 million SPAMs sent from bot army
$100-$2000 Malware as a Service (MaaS)
$1000-$5000 Online banking accounts with a balance
$10000 0-Day Exploit
Why Should I Care?
CyberCrime
In
Ireland
63% believe their organisation is only partially
equipped.
49% rate their overall readiness as fair or poor.
33% believe detection capabilities are
inadequate.
30% believe evolving technical threats are
biggest challenges.
Irish Computer Society
 33% of organisations experienced a cyber breach in
the past 2 years with 44% of organisations selling
online have experienced a cyber breach
 84% of directors say their organisation will increase
spending on cyber security measures over the next 3
years
 69% of directors claim their organisation is prepared
or very prepared for a cyber breach
Institute of Directors in Ireland
19%
25%
28%
46%
64%
0% 10% 20% 30% 40% 50% 60% 70%
Website Hacked
Data Protection Breach
Email Accounts Hacked
Loss Theft/Mobile Device
Computer Virus
Top Five Breaches
Institute of Directors in Ireland
2014 - Incidents
2015 - Incidents
26,137
2015 - Incidents
Phishing Hosted
7%
Malware
45%
Denial of Service
11%
Botnet C&C Servers
11%
DDOS Outbound
26%
2015 - Incidents
Org Crime,
74%
Other, 26%
Poor Passwords
Missing Patches
Vulnerabilities
Web Applications
Web Platforms
Out of date software (Windows XP)
Out of Date Anti-Virus Software
Lack of Monitoring
Root Causes
 DDoS Extortion
 Ransomware
 CEO Fraud
 SQL Injection
Current Issues/Concerns
To introduce ourselves first:
https://blogs.akamai.com/2014/12/dd4bc-anatomy-of-a-bitcoin-extortion-campaign.html
http://bitcoinbountyhunter.com/bitalo.html
http://cointelegraph.com/news/113499/notorious-hacker-group-involved-in-excoin-theft-owner-accuses-ccedk-of-withholding-info
Recently we were DDoS-ing Neteller:
https://twitter.com/neteller/status/583363894665715712
Yes, our attacks are powerful.
So, it’s your turn!
Your sites are going under attack unless you pay 100 Bitcoin.
Pay to 1XXXXXXXXXXXXXXXXXXXXX
Please note that it will not be easy to mitigate our attack, because our current UDP flood power is 400-500 Gbps, so don't even bother. At least, don't expect cheap services like CloudFlare or Incapsula to help...but you
can try. :)
Right now we are running small demonstrative attack.
Don't worry, it will not be that hard (it shouldn't crash your site) and it will stop in 1 hour. It's just to prove that we are serious.
We are aware that you probably don't have 100 BTC at the moment, so we are giving you 24 hours.
Find the best exchanger for you on
https://localbitcoins.com or
http://howtobuybitcoins.info
You can pay directly through exchanger to our BTC address, you don't even need to have BTC wallet.
Current price of 1 BTC is about 230 USD, so we are cheap, at the moment. But if you ignore us, price will increase.
IMPORTANT: You don’t even have to reply. Just pay 100 BTC to 1XXXXXXXXXXXXXXXXXXXXX – we will know it’s you and you will never hear from us again.
We say it because for big companies it's usually the problem as they don't want that there is proof that they cooperated. If you need to contact us, feel free to use some free email service. Or contact us via Bitmessage:
BM-XXXXXXXXXXXXXXXXXX
But if you ignore us, and don't pay us within a given time, long term attack will start, price to stop will go to 200 BTC and will keep increasing for every hour of attack.
IMPORTANT: It’s a one-time payment. Pay and you will not hear from us ever again!
We do bad things, but we keep our word.
To introduce ourselves first:
https://blogs.akamai.com/2014/12/dd4bc-anatomy-of-a-bitcoin-extortion-campaign.html
http://bitcoinbountyhunter.com/bitalo.html
http://cointelegraph.com/news/113499/notorious-hacker-group-involved-in-excoin-theft-owner-accuses-ccedk-of-withholding-info
Recently we were DDoS-ing Neteller:
https://twitter.com/neteller/status/583363894665715712
Yes, our attacks are powerful.
So, it’s your turn!
Your sites are going under attack unless you pay 100 Bitcoin.
Pay to 1XXXXXXXXXXXXXXXXXXXXX
Please note that it will not be easy to mitigate our attack, because our current UDP flood power is 400-500 Gbps, so don't even bother. At least, don't expect cheap services like CloudFlare or Incapsula to help...but you
can try. :)
Right now we are running small demonstrative attack.
Don't worry, it will not be that hard (it shouldn't crash your site) and it will stop in 1 hour. It's just to prove that we are serious.
We are aware that you probably don't have 100 BTC at the moment, so we are giving you 24 hours.
Find the best exchanger for you on
https://localbitcoins.com or
http://howtobuybitcoins.info
You can pay directly through exchanger to our BTC address, you don't even need to have BTC wallet.
Current price of 1 BTC is about 230 USD, so we are cheap, at the moment. But if you ignore us, price will increase.
IMPORTANT: You don’t even have to reply. Just pay 100 BTC to 1XXXXXXXXXXXXXXXXXXXXX – we will know it’s you and you will never hear from us again.
We say it because for big companies it's usually the problem as they don't want that there is proof that they cooperated. If you need to contact us, feel free to use some free email service. Or contact us via Bitmessage:
BM-XXXXXXXXXXXXXXXXXX
But if you ignore us, and don't pay us within a given time, long term attack will start, price to stop will go to 200 BTC and will keep increasing for every hour of attack.
IMPORTANT: It’s a one-time payment. Pay and you will not hear from us ever again!
We do bad things, but we keep our word.
To introduce ourselves first:
https://blogs.akamai.com/2014/12/dd4bc-anatomy-of-a-bitcoin-extortion-campaign.html
http://bitcoinbountyhunter.com/bitalo.html
http://cointelegraph.com/news/113499/notorious-hacker-group-involved-in-excoin-theft-owner-accuses-ccedk-of-withholding-info
Recently we were DDoS-ing Neteller:
https://twitter.com/neteller/status/583363894665715712
Yes, our attacks are powerful.
So, it’s your turn!
Your sites are going under attack unless you pay 100 Bitcoin.
Pay to 1XXXXXXXXXXXXXXXXXXXXX
Please note that it will not be easy to mitigate our attack, because our current UDP flood power is 400-500 Gbps, so don't even bother. At least, don't expect cheap services like CloudFlare or Incapsula to help...but you
can try. :)
Right now we are running small demonstrative attack.
Don't worry, it will not be that hard (it shouldn't crash your site) and it will stop in 1 hour. It's just to prove that we are serious.
We are aware that you probably don't have 100 BTC at the moment, so we are giving you 24 hours.
Find the best exchanger for you on
https://localbitcoins.com or
http://howtobuybitcoins.info
You can pay directly through exchanger to our BTC address, you don't even need to have BTC wallet.
Current price of 1 BTC is about 230 USD, so we are cheap, at the moment. But if you ignore us, price will increase.
IMPORTANT: You don’t even have to reply. Just pay 100 BTC to 1XXXXXXXXXXXXXXXXXXXXX – we will know it’s you and you will never hear from us again.
We say it because for big companies it's usually the problem as they don't want that there is proof that they cooperated. If you need to contact us, feel free to use some free email service. Or contact us via Bitmessage:
BM-XXXXXXXXXXXXXXXXXX
But if you ignore us, and don't pay us within a given time, long term attack will start, price to stop will go to 200 BTC and will keep increasing for every hour of attack.
IMPORTANT: It’s a one-time payment. Pay and you will not hear from us ever again!
We do bad things, but we keep our word.
To introduce ourselves first:
https://blogs.akamai.com/2014/12/dd4bc-anatomy-of-a-bitcoin-extortion-campaign.html
http://bitcoinbountyhunter.com/bitalo.html
http://cointelegraph.com/news/113499/notorious-hacker-group-involved-in-excoin-theft-owner-accuses-ccedk-of-withholding-info
Recently we were DDoS-ing Neteller:
https://twitter.com/neteller/status/583363894665715712
Yes, our attacks are powerful.
So, it’s your turn!
Your sites are going under attack unless you pay 100
Bitcoin = (€22000)
Pay to 1XXXXXXXXXXXXXXXXXXXXX
Please note that it will not be easy to mitigate our attack,
because our current UDP flood power is 400-500 Gbps, so
don't even bother. At least, don't expect cheap services like CloudFlare or Incapsula to help...but you can try. :)
Right now we are running small demonstrative attack.
Don't worry, it will not be that hard (it shouldn't crash your site) and it will stop in 1 hour. It's just to prove that we are serious.
We are aware that you probably don't have 100 BTC at the moment, so we are giving you 24 hours.
Find the best exchanger for you on
https://localbitcoins.com or
http://howtobuybitcoins.info
You can pay directly through exchanger to our BTC address, you don't even need to have BTC wallet.
Current price of 1 BTC is about 230 USD, so we are cheap, at the moment. But if you ignore us, price will increase.
IMPORTANT: You don’t even have to reply. Just pay 100 BTC to 1XXXXXXXXXXXXXXXXXXXXX – we will know it’s you and you will never hear from us again.
So, it’s your turn!
Your sites are going under attack unless you pay 100 Bitcoin.
Pay to 1XXXXXXXXXXXXXXXXXXXXX
Please note that it will not be easy to mitigate our attack, because our current UDP flood power is 400-500 Gbps, so don't even bother. At least, don't expect cheap services like CloudFlare or Incapsula to help...but you
can try. :)
Right now we are running small demonstrative attack.
Don't worry, it will not be that hard (it shouldn't crash
your site) and it will stop in 1 hour. It's just to prove that
we are serious.
We are aware that you probably don't have 100 BTC at
the moment, so we are giving you 24 hours.
Find the best exchanger for you on
https://localbitcoins.com or
http://howtobuybitcoins.info
You can pay directly through exchanger to our BTC address, you don't even need to have BTC wallet.
Current price of 1 BTC is about 230 USD, so we are cheap, at the moment. But if you ignore us, price will increase.
IMPORTANT: You don’t even have to reply. Just pay 100 BTC to 1XXXXXXXXXXXXXXXXXXXXX – we will know it’s you and you will never hear from us again.
We say it because for big companies it's usually the problem as they don't want that there is proof that they cooperated. If you need to contact us, feel free to use some free email service. Or contact us via Bitmessage:
BM-XXXXXXXXXXXXXXXXXX
But if you ignore us, and don't pay us within a given time, long term attack will start, price to stop will go to 200 BTC and will keep increasing for every hour of attack.
IMPORTANT: It’s a one-time payment. Pay and you will not hear from us ever again!
We do bad things, but we keep our word.
Right now we are running small demonstrative attack.
Don't worry, it will not be that hard (it shouldn't crash your site) and it will stop in 1 hour. It's just to prove that we are serious.
We are aware that you probably don't have 100 BTC at the moment, so we are giving you 24 hours.
Find the best exchanger for you on
https://localbitcoins.com or
http://howtobuybitcoins.info
You can pay directly through exchanger to our BTC address, you don't even need to have BTC wallet.
Current price of 1 BTC is about 230 USD, so we are cheap, at the moment. But if you ignore us, price will increase.
IMPORTANT: You don’t even have to reply. Just pay 100 BTC to 1XXXXXXXXXXXXXXXXXXXXX – we will know it’s you and you will never hear from us again.
We say it because for big companies it's usually the problem as they don't want that there is proof that they cooperated. If you need to contact us, feel free to use some free email service. Or contact us via Bitmessage:
BM-XXXXXXXXXXXXXXXXXX
But if you ignore us, and don't pay us within a given time,
long term attack will start, price to stop will go to 200 BTC
and will keep increasing for every hour of attack.
IMPORTANT: It’s a one-time payment. Pay and you will
not hear from us ever again!
We do bad things, but we keep our word.
Ransomware
CEO Fraud
CEO Fraud
 Criminals Target
Company
 Get Details on Company
 LinkedIn
 About Us Pages
 Press Releases
 News Stories
 Understand Hierarchy
CEO Fraud
 Spoof CEO Email
Address
 Compromise CEO Email
Account
 OWA/Web Based
Email
 Password Guessing
 Password reuse by
CEO from other
breach
 Infect CEO’s PC to
gather Passwords
CEO Fraud
 Send Urgent Email to
CFO as CEO Requesting
 Payment to new
vendor
 Change in existing
vendor payments
 BCC to email account
under Criminal’s control
Criminal acting as
CEO
Criminal’s own
email account
CEO Fraud
 Criminal’s fake account
looks similar to real
account;
ceo@Companyabc.com
ceo@Connpanyabc.com
 Criminal now in control
of conversation
 If still in control of CEO
mailbox, delete emails of
ongoing conversation
CEO Fraud
 Can even take part in
conversation with
supplier
 Monitor emails to
Genuine supplier
account
 Set up fake
supplier email
account
person@supplier.com
person@suppIier.com
(note L in 2nd supplier
address is uppercase i)
CEO Fraud
 Payment is made to Bank account under criminals’
control
How To Defend
Security Is An Enabler
Identify & Value Key Assets
Establish Policies
Security
Awareness
Training
Monitor & Respond
Information Sharing
Secure Coding
Other Mechanisms
 Mobile Device Management (MDM)
Enforce Policies across devices
 Network Access Control
 Data Leakage Prevention
 Digital Rights Management
 Monitor Log Files for Access
 Check Corporate Credit Card Statements
 Encrypted & Secure USB Devices
 End Point Management
 Mobile Malware Protection
@BrianHonan
Brian.honan@bhconsulting.ie
www.bhconsulting.ie

Mais conteúdo relacionado

Mais procurados

Magic bullet theory (assignment based)
Magic bullet theory (assignment based)Magic bullet theory (assignment based)
Magic bullet theory (assignment based)yumna akhtar
 
The effect of personality styles on social media use
The effect of personality styles on social media useThe effect of personality styles on social media use
The effect of personality styles on social media useKrishna De
 
Social Media Power : Positive or Negative
Social Media Power : Positive or NegativeSocial Media Power : Positive or Negative
Social Media Power : Positive or NegativeKunal Gawade, CFE
 
Social Media Trends 2020
Social Media Trends 2020Social Media Trends 2020
Social Media Trends 2020Harsha MV
 
Social Media as a powerful tool for Political parties
Social Media as a powerful tool for Political parties Social Media as a powerful tool for Political parties
Social Media as a powerful tool for Political parties Dr.Aravind TS
 
Surveillance Capitalism
Surveillance  CapitalismSurveillance  Capitalism
Surveillance CapitalismKen Berkun
 
Working With Big Data
Working With Big DataWorking With Big Data
Working With Big DataSeth Familian
 
Uses and impact of social media in political campaigning
Uses and impact of social media in political campaigningUses and impact of social media in political campaigning
Uses and impact of social media in political campaigningVijaykumar Meti
 
Social Network Theory & Analysis
Social Network Theory & Analysis Social Network Theory & Analysis
Social Network Theory & Analysis Susan Chesley Fant
 
Measuring Success on Facebook, Twitter & LinkedIn
Measuring Success on Facebook, Twitter & LinkedInMeasuring Success on Facebook, Twitter & LinkedIn
Measuring Success on Facebook, Twitter & LinkedInBrian Honigman
 
Post truth presentation 3
Post truth presentation 3Post truth presentation 3
Post truth presentation 3CHSGmedia
 
Social Media– Impact on Human Behavior and Society
Social Media– Impact on Human Behavior and SocietySocial Media– Impact on Human Behavior and Society
Social Media– Impact on Human Behavior and SocietyGauri Joshi
 
Social Media's Effect on Our Well Being
Social Media's Effect on Our Well BeingSocial Media's Effect on Our Well Being
Social Media's Effect on Our Well BeingKhalyn Levasseur
 
7 Emerging Trends in Social Media
7 Emerging Trends in Social Media7 Emerging Trends in Social Media
7 Emerging Trends in Social MediaEdward Erasmus
 
Social media analytics
Social media analyticsSocial media analytics
Social media analyticsShekhar Shukla
 
S O C I A L N E T W O R K I N G
S O C I A L  N E T W O R K I N GS O C I A L  N E T W O R K I N G
S O C I A L N E T W O R K I N GPooja Shah
 

Mais procurados (20)

Magic bullet theory (assignment based)
Magic bullet theory (assignment based)Magic bullet theory (assignment based)
Magic bullet theory (assignment based)
 
The effect of personality styles on social media use
The effect of personality styles on social media useThe effect of personality styles on social media use
The effect of personality styles on social media use
 
Social Media Power : Positive or Negative
Social Media Power : Positive or NegativeSocial Media Power : Positive or Negative
Social Media Power : Positive or Negative
 
Social Media Trends 2020
Social Media Trends 2020Social Media Trends 2020
Social Media Trends 2020
 
Impact of Social Media
Impact of Social MediaImpact of Social Media
Impact of Social Media
 
Social Media as a powerful tool for Political parties
Social Media as a powerful tool for Political parties Social Media as a powerful tool for Political parties
Social Media as a powerful tool for Political parties
 
Surveillance Capitalism
Surveillance  CapitalismSurveillance  Capitalism
Surveillance Capitalism
 
Working With Big Data
Working With Big DataWorking With Big Data
Working With Big Data
 
Uses and impact of social media in political campaigning
Uses and impact of social media in political campaigningUses and impact of social media in political campaigning
Uses and impact of social media in political campaigning
 
Social Network Theory & Analysis
Social Network Theory & Analysis Social Network Theory & Analysis
Social Network Theory & Analysis
 
Youth and social media
Youth and social mediaYouth and social media
Youth and social media
 
Social media presentation
Social media presentationSocial media presentation
Social media presentation
 
Measuring Success on Facebook, Twitter & LinkedIn
Measuring Success on Facebook, Twitter & LinkedInMeasuring Success on Facebook, Twitter & LinkedIn
Measuring Success on Facebook, Twitter & LinkedIn
 
Post truth presentation 3
Post truth presentation 3Post truth presentation 3
Post truth presentation 3
 
Social Media– Impact on Human Behavior and Society
Social Media– Impact on Human Behavior and SocietySocial Media– Impact on Human Behavior and Society
Social Media– Impact on Human Behavior and Society
 
Impacts of social media
Impacts of social mediaImpacts of social media
Impacts of social media
 
Social Media's Effect on Our Well Being
Social Media's Effect on Our Well BeingSocial Media's Effect on Our Well Being
Social Media's Effect on Our Well Being
 
7 Emerging Trends in Social Media
7 Emerging Trends in Social Media7 Emerging Trends in Social Media
7 Emerging Trends in Social Media
 
Social media analytics
Social media analyticsSocial media analytics
Social media analytics
 
S O C I A L N E T W O R K I N G
S O C I A L  N E T W O R K I N GS O C I A L  N E T W O R K I N G
S O C I A L N E T W O R K I N G
 

Destaque

Data security brian honan
Data security   brian honanData security   brian honan
Data security brian honanBrian Honan
 
Neira jones pci london january 2013 pdf ready
Neira jones pci london january 2013 pdf readyNeira jones pci london january 2013 pdf ready
Neira jones pci london january 2013 pdf readyNeira Jones
 
Break it while you make it: writing (more) secure software
Break it while you make it: writing (more) secure softwareBreak it while you make it: writing (more) secure software
Break it while you make it: writing (more) secure softwareLeigh Honeywell
 
Tactical Edge - How Much Security Do You Really Need?
Tactical Edge - How Much Security Do You Really Need?Tactical Edge - How Much Security Do You Really Need?
Tactical Edge - How Much Security Do You Really Need?Wendy Nather
 
RSA 2015 Realities of Private Cloud Security
RSA 2015 Realities of Private Cloud SecurityRSA 2015 Realities of Private Cloud Security
RSA 2015 Realities of Private Cloud SecurityScott Carlson
 
How to Make a Decent PowerPoint
How to Make a Decent PowerPointHow to Make a Decent PowerPoint
How to Make a Decent PowerPointAdam Fowler
 
Distributed Denial Of Service Introduction
Distributed Denial Of Service IntroductionDistributed Denial Of Service Introduction
Distributed Denial Of Service Introductionwremes
 
AusCERT - Mikko Hypponen
AusCERT - Mikko HypponenAusCERT - Mikko Hypponen
AusCERT - Mikko HypponenMikko Hypponen
 
Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Scott Carlson
 
Yet Another Dan Kaminsky Talk (Black Ops 2014)
Yet Another Dan Kaminsky Talk (Black Ops 2014)Yet Another Dan Kaminsky Talk (Black Ops 2014)
Yet Another Dan Kaminsky Talk (Black Ops 2014)Dan Kaminsky
 
The InfoSec Avengers
The InfoSec AvengersThe InfoSec Avengers
The InfoSec AvengersTripwire
 
Security Configuration Management for Dummies
Security Configuration Management for DummiesSecurity Configuration Management for Dummies
Security Configuration Management for DummiesTripwire
 
RDF and other linked data standards — how to make use of big localization data
RDF and other linked data standards — how to make use of big localization dataRDF and other linked data standards — how to make use of big localization data
RDF and other linked data standards — how to make use of big localization dataDave Lewis
 
Denver Green Car Presentation
Denver Green Car PresentationDenver Green Car Presentation
Denver Green Car Presentationbanovsky
 
Regina drury firepole marketing presentation
Regina drury firepole marketing presentationRegina drury firepole marketing presentation
Regina drury firepole marketing presentationRegina Drury
 
Oriveden Keskuskoulu - Christmas Greeting from Preschool
Oriveden Keskuskoulu - Christmas Greeting from PreschoolOriveden Keskuskoulu - Christmas Greeting from Preschool
Oriveden Keskuskoulu - Christmas Greeting from PreschoolTiina Sarisalmi
 
Orivesi - Down the Mainstreet
Orivesi - Down the MainstreetOrivesi - Down the Mainstreet
Orivesi - Down the MainstreetTiina Sarisalmi
 
MVT Asia Presentation
MVT Asia PresentationMVT Asia Presentation
MVT Asia Presentationsijojoseph
 

Destaque (20)

Data security brian honan
Data security   brian honanData security   brian honan
Data security brian honan
 
Neira jones pci london january 2013 pdf ready
Neira jones pci london january 2013 pdf readyNeira jones pci london january 2013 pdf ready
Neira jones pci london january 2013 pdf ready
 
Break it while you make it: writing (more) secure software
Break it while you make it: writing (more) secure softwareBreak it while you make it: writing (more) secure software
Break it while you make it: writing (more) secure software
 
Tactical Edge - How Much Security Do You Really Need?
Tactical Edge - How Much Security Do You Really Need?Tactical Edge - How Much Security Do You Really Need?
Tactical Edge - How Much Security Do You Really Need?
 
RSA 2015 Realities of Private Cloud Security
RSA 2015 Realities of Private Cloud SecurityRSA 2015 Realities of Private Cloud Security
RSA 2015 Realities of Private Cloud Security
 
How to Make a Decent PowerPoint
How to Make a Decent PowerPointHow to Make a Decent PowerPoint
How to Make a Decent PowerPoint
 
Distributed Denial Of Service Introduction
Distributed Denial Of Service IntroductionDistributed Denial Of Service Introduction
Distributed Denial Of Service Introduction
 
AusCERT - Mikko Hypponen
AusCERT - Mikko HypponenAusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
 
Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?
 
Yet Another Dan Kaminsky Talk (Black Ops 2014)
Yet Another Dan Kaminsky Talk (Black Ops 2014)Yet Another Dan Kaminsky Talk (Black Ops 2014)
Yet Another Dan Kaminsky Talk (Black Ops 2014)
 
The InfoSec Avengers
The InfoSec AvengersThe InfoSec Avengers
The InfoSec Avengers
 
Security Configuration Management for Dummies
Security Configuration Management for DummiesSecurity Configuration Management for Dummies
Security Configuration Management for Dummies
 
RDF and other linked data standards — how to make use of big localization data
RDF and other linked data standards — how to make use of big localization dataRDF and other linked data standards — how to make use of big localization data
RDF and other linked data standards — how to make use of big localization data
 
Finnish Easter
Finnish EasterFinnish Easter
Finnish Easter
 
Let's go home
Let's go homeLet's go home
Let's go home
 
Denver Green Car Presentation
Denver Green Car PresentationDenver Green Car Presentation
Denver Green Car Presentation
 
Regina drury firepole marketing presentation
Regina drury firepole marketing presentationRegina drury firepole marketing presentation
Regina drury firepole marketing presentation
 
Oriveden Keskuskoulu - Christmas Greeting from Preschool
Oriveden Keskuskoulu - Christmas Greeting from PreschoolOriveden Keskuskoulu - Christmas Greeting from Preschool
Oriveden Keskuskoulu - Christmas Greeting from Preschool
 
Orivesi - Down the Mainstreet
Orivesi - Down the MainstreetOrivesi - Down the Mainstreet
Orivesi - Down the Mainstreet
 
MVT Asia Presentation
MVT Asia PresentationMVT Asia Presentation
MVT Asia Presentation
 

Semelhante a The dark side of the internet

ShowMeCon2016 - Show Me Your Credit Card Tokens
ShowMeCon2016 - Show Me Your Credit Card TokensShowMeCon2016 - Show Me Your Credit Card Tokens
ShowMeCon2016 - Show Me Your Credit Card TokensTim MalcomVetter
 
An Investigator’s Guide to Blockchain, Bitcoin and Wallet Transactions
An Investigator’s Guide to Blockchain, Bitcoin and Wallet TransactionsAn Investigator’s Guide to Blockchain, Bitcoin and Wallet Transactions
An Investigator’s Guide to Blockchain, Bitcoin and Wallet TransactionsCase IQ
 
Bitcoin 101
Bitcoin 101Bitcoin 101
Bitcoin 101InnoTech
 
Bitkingdom- Earn Daily on Bitcoins Invested.
Bitkingdom- Earn Daily on Bitcoins Invested.Bitkingdom- Earn Daily on Bitcoins Invested.
Bitkingdom- Earn Daily on Bitcoins Invested.Oomeysh zk
 
How Secure Is Bitcoin?
How Secure Is Bitcoin?How Secure Is Bitcoin?
How Secure Is Bitcoin?InvestingTips
 
Bitcoin meetup @Santiago de Chile
Bitcoin meetup @Santiago de ChileBitcoin meetup @Santiago de Chile
Bitcoin meetup @Santiago de ChileDalma Berkovics
 
Article - Bitcoin 101.docx
Article - Bitcoin 101.docxArticle - Bitcoin 101.docx
Article - Bitcoin 101.docxAthena yung
 
Bit kingdom { Join Bitkingdom http://bit.ly/1WVBMS8}
Bit kingdom { Join Bitkingdom http://bit.ly/1WVBMS8}Bit kingdom { Join Bitkingdom http://bit.ly/1WVBMS8}
Bit kingdom { Join Bitkingdom http://bit.ly/1WVBMS8}Bitkingdom
 
CS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudCS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudPaige Rasid
 
The UX of Bitcoin
The UX of BitcoinThe UX of Bitcoin
The UX of BitcoinTamim Swaid
 
Build your own block chain
Build your own block chainBuild your own block chain
Build your own block chainBohdan Szymanik
 
Securing your web infrastructure
Securing your web infrastructureSecuring your web infrastructure
Securing your web infrastructureWP Engine
 
Crypto Quantum Leap book
Crypto Quantum Leap bookCrypto Quantum Leap book
Crypto Quantum Leap bookRaguvaran22
 
Binary option 101
Binary option 101Binary option 101
Binary option 101Cherry Xia
 
Introduction to Bitcoin & Blockchain @ darefest16
Introduction to Bitcoin & Blockchain @ darefest16Introduction to Bitcoin & Blockchain @ darefest16
Introduction to Bitcoin & Blockchain @ darefest16Sam Wouters
 
What is Blockchain – a primer for market researchers
What is Blockchain – a primer for market researchersWhat is Blockchain – a primer for market researchers
What is Blockchain – a primer for market researchersRay Poynter
 

Semelhante a The dark side of the internet (20)

ShowMeCon2016 - Show Me Your Credit Card Tokens
ShowMeCon2016 - Show Me Your Credit Card TokensShowMeCon2016 - Show Me Your Credit Card Tokens
ShowMeCon2016 - Show Me Your Credit Card Tokens
 
An Investigator’s Guide to Blockchain, Bitcoin and Wallet Transactions
An Investigator’s Guide to Blockchain, Bitcoin and Wallet TransactionsAn Investigator’s Guide to Blockchain, Bitcoin and Wallet Transactions
An Investigator’s Guide to Blockchain, Bitcoin and Wallet Transactions
 
Bitcoin 101
Bitcoin 101Bitcoin 101
Bitcoin 101
 
Bitkingdom- Earn Daily on Bitcoins Invested.
Bitkingdom- Earn Daily on Bitcoins Invested.Bitkingdom- Earn Daily on Bitcoins Invested.
Bitkingdom- Earn Daily on Bitcoins Invested.
 
How Secure Is Bitcoin?
How Secure Is Bitcoin?How Secure Is Bitcoin?
How Secure Is Bitcoin?
 
Bitcoin meetup @Santiago de Chile
Bitcoin meetup @Santiago de ChileBitcoin meetup @Santiago de Chile
Bitcoin meetup @Santiago de Chile
 
Bitcoin - the Basics
Bitcoin - the BasicsBitcoin - the Basics
Bitcoin - the Basics
 
Article - Bitcoin 101.docx
Article - Bitcoin 101.docxArticle - Bitcoin 101.docx
Article - Bitcoin 101.docx
 
Bit kingdom { Join Bitkingdom http://bit.ly/1WVBMS8}
Bit kingdom { Join Bitkingdom http://bit.ly/1WVBMS8}Bit kingdom { Join Bitkingdom http://bit.ly/1WVBMS8}
Bit kingdom { Join Bitkingdom http://bit.ly/1WVBMS8}
 
Crypto Future
Crypto FutureCrypto Future
Crypto Future
 
CS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudCS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & Fraud
 
The UX of Bitcoin
The UX of BitcoinThe UX of Bitcoin
The UX of Bitcoin
 
Build your own block chain
Build your own block chainBuild your own block chain
Build your own block chain
 
Securing your web infrastructure
Securing your web infrastructureSecuring your web infrastructure
Securing your web infrastructure
 
Crypto Quantum Leap book
Crypto Quantum Leap bookCrypto Quantum Leap book
Crypto Quantum Leap book
 
bitcoin_eng
bitcoin_engbitcoin_eng
bitcoin_eng
 
Binary option 101
Binary option 101Binary option 101
Binary option 101
 
Bitcoin Presentation.pptx
Bitcoin Presentation.pptxBitcoin Presentation.pptx
Bitcoin Presentation.pptx
 
Introduction to Bitcoin & Blockchain @ darefest16
Introduction to Bitcoin & Blockchain @ darefest16Introduction to Bitcoin & Blockchain @ darefest16
Introduction to Bitcoin & Blockchain @ darefest16
 
What is Blockchain – a primer for market researchers
What is Blockchain – a primer for market researchersWhat is Blockchain – a primer for market researchers
What is Blockchain – a primer for market researchers
 

Mais de Brian Honan

Brian honan ipexpo keynote
Brian honan ipexpo keynoteBrian honan ipexpo keynote
Brian honan ipexpo keynoteBrian Honan
 
GDPR & Brexit - What Does the Future Hold?
GDPR & Brexit - What Does the Future Hold?GDPR & Brexit - What Does the Future Hold?
GDPR & Brexit - What Does the Future Hold?Brian Honan
 
Ransomware Prevention Guide
Ransomware Prevention GuideRansomware Prevention Guide
Ransomware Prevention GuideBrian Honan
 
Presentation on EU Directives Impacting Cyber Security for Information Securi...
Presentation on EU Directives Impacting Cyber Security for Information Securi...Presentation on EU Directives Impacting Cyber Security for Information Securi...
Presentation on EU Directives Impacting Cyber Security for Information Securi...Brian Honan
 
Incident Response in the Cloud
Incident Response in the CloudIncident Response in the Cloud
Incident Response in the CloudBrian Honan
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network SecurityBrian Honan
 
Bridging the air gap
Bridging the air gapBridging the air gap
Bridging the air gapBrian Honan
 
Proactive incident response
Proactive incident responseProactive incident response
Proactive incident responseBrian Honan
 
Learning from History
Learning from HistoryLearning from History
Learning from HistoryBrian Honan
 
Incident response cloud
Incident response cloudIncident response cloud
Incident response cloudBrian Honan
 
Preparing for Failure - Best Practise for Incident Response
Preparing for Failure - Best Practise for Incident ResponsePreparing for Failure - Best Practise for Incident Response
Preparing for Failure - Best Practise for Incident ResponseBrian Honan
 
Best practises for log management
Best practises for log managementBest practises for log management
Best practises for log managementBrian Honan
 
Layer 8 Security - Securing the Nut Between the Keyboard & Screen
Layer 8 Security - Securing the Nut Between the Keyboard & ScreenLayer 8 Security - Securing the Nut Between the Keyboard & Screen
Layer 8 Security - Securing the Nut Between the Keyboard & ScreenBrian Honan
 
Creating a CERT at WARP Speed
Creating a CERT at WARP SpeedCreating a CERT at WARP Speed
Creating a CERT at WARP SpeedBrian Honan
 
The Case for Mandatory Data Breach Disclosure Laws
The Case for Mandatory Data Breach Disclosure LawsThe Case for Mandatory Data Breach Disclosure Laws
The Case for Mandatory Data Breach Disclosure LawsBrian Honan
 
Ic Sconf2010presentation Dp Bh
Ic Sconf2010presentation Dp BhIc Sconf2010presentation Dp Bh
Ic Sconf2010presentation Dp BhBrian Honan
 
Knowing Me Knowing You
Knowing Me Knowing YouKnowing Me Knowing You
Knowing Me Knowing YouBrian Honan
 
Scare Ware From Ireland
Scare Ware From IrelandScare Ware From Ireland
Scare Ware From IrelandBrian Honan
 

Mais de Brian Honan (20)

Brian honan ipexpo keynote
Brian honan ipexpo keynoteBrian honan ipexpo keynote
Brian honan ipexpo keynote
 
GDPR & Brexit - What Does the Future Hold?
GDPR & Brexit - What Does the Future Hold?GDPR & Brexit - What Does the Future Hold?
GDPR & Brexit - What Does the Future Hold?
 
Ransomware Prevention Guide
Ransomware Prevention GuideRansomware Prevention Guide
Ransomware Prevention Guide
 
Brian honan
Brian honanBrian honan
Brian honan
 
Presentation on EU Directives Impacting Cyber Security for Information Securi...
Presentation on EU Directives Impacting Cyber Security for Information Securi...Presentation on EU Directives Impacting Cyber Security for Information Securi...
Presentation on EU Directives Impacting Cyber Security for Information Securi...
 
Incident Response in the Cloud
Incident Response in the CloudIncident Response in the Cloud
Incident Response in the Cloud
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 
Bridging the air gap
Bridging the air gapBridging the air gap
Bridging the air gap
 
Proactive incident response
Proactive incident responseProactive incident response
Proactive incident response
 
Learning from History
Learning from HistoryLearning from History
Learning from History
 
Incident response cloud
Incident response cloudIncident response cloud
Incident response cloud
 
Preparing for Failure - Best Practise for Incident Response
Preparing for Failure - Best Practise for Incident ResponsePreparing for Failure - Best Practise for Incident Response
Preparing for Failure - Best Practise for Incident Response
 
Best practises for log management
Best practises for log managementBest practises for log management
Best practises for log management
 
Cloud security
Cloud securityCloud security
Cloud security
 
Layer 8 Security - Securing the Nut Between the Keyboard & Screen
Layer 8 Security - Securing the Nut Between the Keyboard & ScreenLayer 8 Security - Securing the Nut Between the Keyboard & Screen
Layer 8 Security - Securing the Nut Between the Keyboard & Screen
 
Creating a CERT at WARP Speed
Creating a CERT at WARP SpeedCreating a CERT at WARP Speed
Creating a CERT at WARP Speed
 
The Case for Mandatory Data Breach Disclosure Laws
The Case for Mandatory Data Breach Disclosure LawsThe Case for Mandatory Data Breach Disclosure Laws
The Case for Mandatory Data Breach Disclosure Laws
 
Ic Sconf2010presentation Dp Bh
Ic Sconf2010presentation Dp BhIc Sconf2010presentation Dp Bh
Ic Sconf2010presentation Dp Bh
 
Knowing Me Knowing You
Knowing Me Knowing YouKnowing Me Knowing You
Knowing Me Knowing You
 
Scare Ware From Ireland
Scare Ware From IrelandScare Ware From Ireland
Scare Ware From Ireland
 

Último

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Último (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

The dark side of the internet

  • 1. The Dark Side of the Internet And Why You Shouldn’t Care
  • 2. CEO of BH Consulting – Independent Information Security Firm Founder & Head of IRISSCERT – Ireland’s first Computer Emergency Response Team Special Advisor on Internet Security Europol's CyberCrime Centre (EC3) Expert Advisor to European Network & Information Security Agency (ENISA) Adjunct Lecturer at University College Dublin Regularly comments on media stories – BBC, Forbes, Bloomberg, FT, Guardian, Sunday Times Who Am I?
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 10.
  • 11. So Why Should I Care?
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. So Really Why Should I Care?
  • 18. $1-$6 US Credit card number $2-$12 UK Credit card number $5-$50 Medical ID card $6-$18 Basic identity information $7 PayPal account with credentials $50-$500 PayPal verified with balance $20 DDoS attack from bot army (per hour) $30 Passwords to consumer credit reports $50 to $60 Health/medical record $140 10 million email addresses $200 Malicious Software Toolkit $500 20 million SPAMs sent from bot army $100-$2000 Malware as a Service (MaaS) $1000-$5000 Online banking accounts with a balance $10000 0-Day Exploit Why Should I Care?
  • 20. 63% believe their organisation is only partially equipped. 49% rate their overall readiness as fair or poor. 33% believe detection capabilities are inadequate. 30% believe evolving technical threats are biggest challenges. Irish Computer Society
  • 21.  33% of organisations experienced a cyber breach in the past 2 years with 44% of organisations selling online have experienced a cyber breach  84% of directors say their organisation will increase spending on cyber security measures over the next 3 years  69% of directors claim their organisation is prepared or very prepared for a cyber breach Institute of Directors in Ireland
  • 22. 19% 25% 28% 46% 64% 0% 10% 20% 30% 40% 50% 60% 70% Website Hacked Data Protection Breach Email Accounts Hacked Loss Theft/Mobile Device Computer Virus Top Five Breaches Institute of Directors in Ireland
  • 23.
  • 26. 2015 - Incidents Phishing Hosted 7% Malware 45% Denial of Service 11% Botnet C&C Servers 11% DDOS Outbound 26%
  • 27. 2015 - Incidents Org Crime, 74% Other, 26%
  • 28. Poor Passwords Missing Patches Vulnerabilities Web Applications Web Platforms Out of date software (Windows XP) Out of Date Anti-Virus Software Lack of Monitoring Root Causes
  • 29.  DDoS Extortion  Ransomware  CEO Fraud  SQL Injection Current Issues/Concerns
  • 30. To introduce ourselves first: https://blogs.akamai.com/2014/12/dd4bc-anatomy-of-a-bitcoin-extortion-campaign.html http://bitcoinbountyhunter.com/bitalo.html http://cointelegraph.com/news/113499/notorious-hacker-group-involved-in-excoin-theft-owner-accuses-ccedk-of-withholding-info Recently we were DDoS-ing Neteller: https://twitter.com/neteller/status/583363894665715712 Yes, our attacks are powerful. So, it’s your turn! Your sites are going under attack unless you pay 100 Bitcoin. Pay to 1XXXXXXXXXXXXXXXXXXXXX Please note that it will not be easy to mitigate our attack, because our current UDP flood power is 400-500 Gbps, so don't even bother. At least, don't expect cheap services like CloudFlare or Incapsula to help...but you can try. :) Right now we are running small demonstrative attack. Don't worry, it will not be that hard (it shouldn't crash your site) and it will stop in 1 hour. It's just to prove that we are serious. We are aware that you probably don't have 100 BTC at the moment, so we are giving you 24 hours. Find the best exchanger for you on https://localbitcoins.com or http://howtobuybitcoins.info You can pay directly through exchanger to our BTC address, you don't even need to have BTC wallet. Current price of 1 BTC is about 230 USD, so we are cheap, at the moment. But if you ignore us, price will increase. IMPORTANT: You don’t even have to reply. Just pay 100 BTC to 1XXXXXXXXXXXXXXXXXXXXX – we will know it’s you and you will never hear from us again. We say it because for big companies it's usually the problem as they don't want that there is proof that they cooperated. If you need to contact us, feel free to use some free email service. Or contact us via Bitmessage: BM-XXXXXXXXXXXXXXXXXX But if you ignore us, and don't pay us within a given time, long term attack will start, price to stop will go to 200 BTC and will keep increasing for every hour of attack. IMPORTANT: It’s a one-time payment. Pay and you will not hear from us ever again! We do bad things, but we keep our word.
  • 31. To introduce ourselves first: https://blogs.akamai.com/2014/12/dd4bc-anatomy-of-a-bitcoin-extortion-campaign.html http://bitcoinbountyhunter.com/bitalo.html http://cointelegraph.com/news/113499/notorious-hacker-group-involved-in-excoin-theft-owner-accuses-ccedk-of-withholding-info Recently we were DDoS-ing Neteller: https://twitter.com/neteller/status/583363894665715712 Yes, our attacks are powerful. So, it’s your turn! Your sites are going under attack unless you pay 100 Bitcoin. Pay to 1XXXXXXXXXXXXXXXXXXXXX Please note that it will not be easy to mitigate our attack, because our current UDP flood power is 400-500 Gbps, so don't even bother. At least, don't expect cheap services like CloudFlare or Incapsula to help...but you can try. :) Right now we are running small demonstrative attack. Don't worry, it will not be that hard (it shouldn't crash your site) and it will stop in 1 hour. It's just to prove that we are serious. We are aware that you probably don't have 100 BTC at the moment, so we are giving you 24 hours. Find the best exchanger for you on https://localbitcoins.com or http://howtobuybitcoins.info You can pay directly through exchanger to our BTC address, you don't even need to have BTC wallet. Current price of 1 BTC is about 230 USD, so we are cheap, at the moment. But if you ignore us, price will increase. IMPORTANT: You don’t even have to reply. Just pay 100 BTC to 1XXXXXXXXXXXXXXXXXXXXX – we will know it’s you and you will never hear from us again. We say it because for big companies it's usually the problem as they don't want that there is proof that they cooperated. If you need to contact us, feel free to use some free email service. Or contact us via Bitmessage: BM-XXXXXXXXXXXXXXXXXX But if you ignore us, and don't pay us within a given time, long term attack will start, price to stop will go to 200 BTC and will keep increasing for every hour of attack. IMPORTANT: It’s a one-time payment. Pay and you will not hear from us ever again! We do bad things, but we keep our word.
  • 32. To introduce ourselves first: https://blogs.akamai.com/2014/12/dd4bc-anatomy-of-a-bitcoin-extortion-campaign.html http://bitcoinbountyhunter.com/bitalo.html http://cointelegraph.com/news/113499/notorious-hacker-group-involved-in-excoin-theft-owner-accuses-ccedk-of-withholding-info Recently we were DDoS-ing Neteller: https://twitter.com/neteller/status/583363894665715712 Yes, our attacks are powerful. So, it’s your turn! Your sites are going under attack unless you pay 100 Bitcoin. Pay to 1XXXXXXXXXXXXXXXXXXXXX Please note that it will not be easy to mitigate our attack, because our current UDP flood power is 400-500 Gbps, so don't even bother. At least, don't expect cheap services like CloudFlare or Incapsula to help...but you can try. :) Right now we are running small demonstrative attack. Don't worry, it will not be that hard (it shouldn't crash your site) and it will stop in 1 hour. It's just to prove that we are serious. We are aware that you probably don't have 100 BTC at the moment, so we are giving you 24 hours. Find the best exchanger for you on https://localbitcoins.com or http://howtobuybitcoins.info You can pay directly through exchanger to our BTC address, you don't even need to have BTC wallet. Current price of 1 BTC is about 230 USD, so we are cheap, at the moment. But if you ignore us, price will increase. IMPORTANT: You don’t even have to reply. Just pay 100 BTC to 1XXXXXXXXXXXXXXXXXXXXX – we will know it’s you and you will never hear from us again. We say it because for big companies it's usually the problem as they don't want that there is proof that they cooperated. If you need to contact us, feel free to use some free email service. Or contact us via Bitmessage: BM-XXXXXXXXXXXXXXXXXX But if you ignore us, and don't pay us within a given time, long term attack will start, price to stop will go to 200 BTC and will keep increasing for every hour of attack. IMPORTANT: It’s a one-time payment. Pay and you will not hear from us ever again! We do bad things, but we keep our word.
  • 33. To introduce ourselves first: https://blogs.akamai.com/2014/12/dd4bc-anatomy-of-a-bitcoin-extortion-campaign.html http://bitcoinbountyhunter.com/bitalo.html http://cointelegraph.com/news/113499/notorious-hacker-group-involved-in-excoin-theft-owner-accuses-ccedk-of-withholding-info Recently we were DDoS-ing Neteller: https://twitter.com/neteller/status/583363894665715712 Yes, our attacks are powerful. So, it’s your turn! Your sites are going under attack unless you pay 100 Bitcoin = (€22000) Pay to 1XXXXXXXXXXXXXXXXXXXXX Please note that it will not be easy to mitigate our attack, because our current UDP flood power is 400-500 Gbps, so don't even bother. At least, don't expect cheap services like CloudFlare or Incapsula to help...but you can try. :) Right now we are running small demonstrative attack. Don't worry, it will not be that hard (it shouldn't crash your site) and it will stop in 1 hour. It's just to prove that we are serious. We are aware that you probably don't have 100 BTC at the moment, so we are giving you 24 hours. Find the best exchanger for you on https://localbitcoins.com or http://howtobuybitcoins.info You can pay directly through exchanger to our BTC address, you don't even need to have BTC wallet. Current price of 1 BTC is about 230 USD, so we are cheap, at the moment. But if you ignore us, price will increase. IMPORTANT: You don’t even have to reply. Just pay 100 BTC to 1XXXXXXXXXXXXXXXXXXXXX – we will know it’s you and you will never hear from us again.
  • 34. So, it’s your turn! Your sites are going under attack unless you pay 100 Bitcoin. Pay to 1XXXXXXXXXXXXXXXXXXXXX Please note that it will not be easy to mitigate our attack, because our current UDP flood power is 400-500 Gbps, so don't even bother. At least, don't expect cheap services like CloudFlare or Incapsula to help...but you can try. :) Right now we are running small demonstrative attack. Don't worry, it will not be that hard (it shouldn't crash your site) and it will stop in 1 hour. It's just to prove that we are serious. We are aware that you probably don't have 100 BTC at the moment, so we are giving you 24 hours. Find the best exchanger for you on https://localbitcoins.com or http://howtobuybitcoins.info You can pay directly through exchanger to our BTC address, you don't even need to have BTC wallet. Current price of 1 BTC is about 230 USD, so we are cheap, at the moment. But if you ignore us, price will increase. IMPORTANT: You don’t even have to reply. Just pay 100 BTC to 1XXXXXXXXXXXXXXXXXXXXX – we will know it’s you and you will never hear from us again. We say it because for big companies it's usually the problem as they don't want that there is proof that they cooperated. If you need to contact us, feel free to use some free email service. Or contact us via Bitmessage: BM-XXXXXXXXXXXXXXXXXX But if you ignore us, and don't pay us within a given time, long term attack will start, price to stop will go to 200 BTC and will keep increasing for every hour of attack. IMPORTANT: It’s a one-time payment. Pay and you will not hear from us ever again! We do bad things, but we keep our word.
  • 35. Right now we are running small demonstrative attack. Don't worry, it will not be that hard (it shouldn't crash your site) and it will stop in 1 hour. It's just to prove that we are serious. We are aware that you probably don't have 100 BTC at the moment, so we are giving you 24 hours. Find the best exchanger for you on https://localbitcoins.com or http://howtobuybitcoins.info You can pay directly through exchanger to our BTC address, you don't even need to have BTC wallet. Current price of 1 BTC is about 230 USD, so we are cheap, at the moment. But if you ignore us, price will increase. IMPORTANT: You don’t even have to reply. Just pay 100 BTC to 1XXXXXXXXXXXXXXXXXXXXX – we will know it’s you and you will never hear from us again. We say it because for big companies it's usually the problem as they don't want that there is proof that they cooperated. If you need to contact us, feel free to use some free email service. Or contact us via Bitmessage: BM-XXXXXXXXXXXXXXXXXX But if you ignore us, and don't pay us within a given time, long term attack will start, price to stop will go to 200 BTC and will keep increasing for every hour of attack. IMPORTANT: It’s a one-time payment. Pay and you will not hear from us ever again! We do bad things, but we keep our word.
  • 37.
  • 39. CEO Fraud  Criminals Target Company  Get Details on Company  LinkedIn  About Us Pages  Press Releases  News Stories  Understand Hierarchy
  • 40. CEO Fraud  Spoof CEO Email Address  Compromise CEO Email Account  OWA/Web Based Email  Password Guessing  Password reuse by CEO from other breach  Infect CEO’s PC to gather Passwords
  • 41. CEO Fraud  Send Urgent Email to CFO as CEO Requesting  Payment to new vendor  Change in existing vendor payments  BCC to email account under Criminal’s control Criminal acting as CEO Criminal’s own email account
  • 42. CEO Fraud  Criminal’s fake account looks similar to real account; ceo@Companyabc.com ceo@Connpanyabc.com  Criminal now in control of conversation  If still in control of CEO mailbox, delete emails of ongoing conversation
  • 43. CEO Fraud  Can even take part in conversation with supplier  Monitor emails to Genuine supplier account  Set up fake supplier email account person@supplier.com person@suppIier.com (note L in 2nd supplier address is uppercase i)
  • 44. CEO Fraud  Payment is made to Bank account under criminals’ control
  • 45.
  • 46.
  • 48. Security Is An Enabler
  • 49.
  • 50. Identify & Value Key Assets
  • 51.
  • 57. Other Mechanisms  Mobile Device Management (MDM) Enforce Policies across devices  Network Access Control  Data Leakage Prevention  Digital Rights Management  Monitor Log Files for Access  Check Corporate Credit Card Statements  Encrypted & Secure USB Devices  End Point Management  Mobile Malware Protection

Notas do Editor

  1. Rate them in accordance of importance to organisations Do not allow critical assets onto Cloud or devices