Agenda Identity – Identity Theft Phishing/Pharming and variants Other Threats Theft Incidents What...

24

Transcript of Agenda Identity – Identity Theft Phishing/Pharming and variants Other Threats Theft Incidents What...

Page 1: Agenda Identity – Identity Theft Phishing/Pharming and variants Other Threats Theft Incidents What is the US doing that we should think about Conclusions.
Page 2: Agenda Identity – Identity Theft Phishing/Pharming and variants Other Threats Theft Incidents What is the US doing that we should think about Conclusions.

Agenda

• Identity – Identity Theft

• Phishing/Pharming and variants

• Other Threats

• Theft Incidents

• What is the US doing that we should think about

• Conclusions

• Recommendations

Page 3: Agenda Identity – Identity Theft Phishing/Pharming and variants Other Threats Theft Incidents What is the US doing that we should think about Conclusions.

This is Me!

Page 4: Agenda Identity – Identity Theft Phishing/Pharming and variants Other Threats Theft Incidents What is the US doing that we should think about Conclusions.

This is also Me, well sort of!

Page 5: Agenda Identity – Identity Theft Phishing/Pharming and variants Other Threats Theft Incidents What is the US doing that we should think about Conclusions.
Page 6: Agenda Identity – Identity Theft Phishing/Pharming and variants Other Threats Theft Incidents What is the US doing that we should think about Conclusions.
Page 7: Agenda Identity – Identity Theft Phishing/Pharming and variants Other Threats Theft Incidents What is the US doing that we should think about Conclusions.

This is Where I work

Page 8: Agenda Identity – Identity Theft Phishing/Pharming and variants Other Threats Theft Incidents What is the US doing that we should think about Conclusions.

Corporate Information at WhiteHat IncRosaleen Citron Chief Executive Officer, WhiteHat Inc. Rosaleen Citron is theChief Executive Officer of WhiteHat Inc., an industry leading Information ...www.whitehatinc.com/corporate/profiles/ - 29k - Cached - Similar pages

Media Room at WhiteHat IncFeatured WhiteHat personnel: Rosaleen Citron, CEO and Tom Slodichak, CSO.Inquiries in Remote Access Tools Explode because of SARS Scare ...www.whitehatinc.com/media/tv_and_radio/ - 35k - Cached - Similar pages[ More results from www.whitehatinc.com ]

[DOC] Rosaleen CitronFile Format: Microsoft Word 2000 - View as HTMLRosaleen Citron is the Chief Executive Officer of WhiteHat Inc., ... Most recentlyCRN Magazine, names Rosaleen Citron #2 in the 5 Canadian Innovators worth ...www.asisottawa.com/text/citron-bio.doc - Similar pages

ASIS International Ottawa Chapter #140 Committee - MeetingEVENT: Rosaleen Citron and Chris Voice - Identity Theft ... Rosaleen Citron isthe Chief Executive Officer of WhiteHat Inc., an industry leading Information ...www.asisottawa.com/meeting.html - 17k - Cached - Similar pages

Rosaleen Citron -- 2005 e-Financial WorldExpoRosaleen Citron Chief Executive Officer, Whitehat Inc. ... Rosaleen Citron isthe Chief Executive Officer of WhiteHat Inc., an industry leading Information ...e-financial.wowgao.com/presentation_ proposals/pre_show.php?subjectid=389 - 4k - Cached - Similar pages

Results 1 - 10 of about 615 for Rosaleen Citron. (0.03 seconds) 

Page 9: Agenda Identity – Identity Theft Phishing/Pharming and variants Other Threats Theft Incidents What is the US doing that we should think about Conclusions.

Highlights• Number of unique phishing reports received in November: 16882• Number of unique phishing sites received in November: 4630• Number of brands hijacked by phishing campaigns in November: 93• Number of brands comprising the top 80% of phishing campaigns in November: 6• Country hosting the most phishing websites in November: United States• Contain some form of target name in URL: 49 %• No hostname just IP address: 33 %• Percentage of sites not using port 80: 6 %• Average time online for site: 5.5 days• Longest time online for site: 30 days

Phishing Statistics November 05

Phishing Targets

Page 10: Agenda Identity – Identity Theft Phishing/Pharming and variants Other Threats Theft Incidents What is the US doing that we should think about Conclusions.

Three Pressure Points

• Home Computer Users• E-Commerce Portal Operators• Data Aggregators

Page 11: Agenda Identity – Identity Theft Phishing/Pharming and variants Other Threats Theft Incidents What is the US doing that we should think about Conclusions.

Spyware Threat Landscape

• Crimeware• Key stroke loggers• Redirectors• Man in the Middle Phishing (Pharming)• Other

• Typo attacks

• Search Engine Poisoning

Page 12: Agenda Identity – Identity Theft Phishing/Pharming and variants Other Threats Theft Incidents What is the US doing that we should think about Conclusions.

Phishing Tactics

Page 13: Agenda Identity – Identity Theft Phishing/Pharming and variants Other Threats Theft Incidents What is the US doing that we should think about Conclusions.

Phishing Email Reports And Phishing Site Trends

Page 14: Agenda Identity – Identity Theft Phishing/Pharming and variants Other Threats Theft Incidents What is the US doing that we should think about Conclusions.
Page 15: Agenda Identity – Identity Theft Phishing/Pharming and variants Other Threats Theft Incidents What is the US doing that we should think about Conclusions.
Page 16: Agenda Identity – Identity Theft Phishing/Pharming and variants Other Threats Theft Incidents What is the US doing that we should think about Conclusions.
Page 17: Agenda Identity – Identity Theft Phishing/Pharming and variants Other Threats Theft Incidents What is the US doing that we should think about Conclusions.
Page 18: Agenda Identity – Identity Theft Phishing/Pharming and variants Other Threats Theft Incidents What is the US doing that we should think about Conclusions.

More Sophisticated Trojans and Infection Methods

Page 19: Agenda Identity – Identity Theft Phishing/Pharming and variants Other Threats Theft Incidents What is the US doing that we should think about Conclusions.

Code discovered in IFRAME

Page 20: Agenda Identity – Identity Theft Phishing/Pharming and variants Other Threats Theft Incidents What is the US doing that we should think about Conclusions.

2005 Hall of Shame• Card Systems• Bank of America• Choice Point• DSW Shoe Warehouse• Federal Deposit

Insurance Corp. (FDIC)

• Lexis-Nexis• Polo Ralph Lauren• UPS• University of

Colorado• Wachovia

Page 21: Agenda Identity – Identity Theft Phishing/Pharming and variants Other Threats Theft Incidents What is the US doing that we should think about Conclusions.

Example of U.S. Programs• Stop, Think, Click• Cyber Security workshops• Cyber Safety Multi Media events• Cyber Security Awareness programs• Declaring a Cyber Security Awareness month

Page 22: Agenda Identity – Identity Theft Phishing/Pharming and variants Other Threats Theft Incidents What is the US doing that we should think about Conclusions.

8 Tips posted on all relevant sites• Protect your personal informati

on. It's valuable.• Know who you're dealing with

online.• Use anti-virus software, a

firewall, and anti-spyware software to help keep your computer safe and secure.

• Be sure to set up your operating system and Web browser software properly, and update them regularly.

• Use strong passwords or strong authentication technology to help protect your personal information.

• Back up important files.• Learn what to do if something

goes wrong.• Protect your children online.

Page 23: Agenda Identity – Identity Theft Phishing/Pharming and variants Other Threats Theft Incidents What is the US doing that we should think about Conclusions.

Web sites for Statistics.

• www.fraud.org

• www.staysafeonline.org

• www.antiphishing.org

• www.phonebusters.com

• www.RCMP-grc.gc.ca

Page 24: Agenda Identity – Identity Theft Phishing/Pharming and variants Other Threats Theft Incidents What is the US doing that we should think about Conclusions.

Thank You !