InfoSecurity

Phishing?!

 

“The spear phisher thrives on familiarity. He knows your name, your email address, and at least a little about you.”

 

Phishing is a common method of online identity theft and virus spreading. See more computer pictures.

2005 HowStuffWorks

  • Phishing targets your bank account.
  • Mostly by complete custom mails, pretending to be your bank and providing a lot of private information, so you will feel confortable.

 

 

Suppose you check your e-mail one day and find a message from your bank. You've gotten e-mail from them before, but this one seems suspicious, especially since it threatens to close your account if you don't reply immediately. What do you do?

This message and others like it are examples of phishing, a method of online identity theft. In addition to stealing personal and financial data, phishers can infect computers with viruses and convince people to participate unwittingly in money laundering.

Most people associate phishing with e-mail messages that spoof, or mimic, bankscredit cardcompanies or other business likeAmazon and eBay. These messages look authentic and attempt to get victims to reveal their personal information. But e-mail messages are only one small piece of a phishing scam.

From beginning to end, the process involves:

  1. Planning. Phishers decide which business to target and determine how to get e-mail addresses for the customers of that business. They often use the same mass-mailing and address collection techniques as spammers.
  2. Setup. Once they know which business to spoof and who their victims are, phishers create methods for delivering the message and collecting the data. Most often, this involves e-mail addresses and a Web page.
  3. Attack. This is the step people are most familiar with -- the phisher sends a phony message that appears to be from a reputable source.
  4. Collection. Phishers record the information victims enter into Web pages or popup windows.
  5. Identity Theft and Fraud. The phishers use the information they've gathered to make illegal purchases or otherwise commit fraud. As many as a fourth of the victims never fully recover [Source:Information Week].

If the phisher wants to coordinate another attack, he evaluates the successes and failures of the completed scam and begins the cycle again.

Phishing scams take advantages of software and security weaknesses on both the client and server sides. But even the most high-tech phishing scams work like old-fashioned con jobs, in which a hustler convinces his mark that he is reliable and trustworthy. Next, we'll look at the steps phishers take to convince victims that their messages are legitimate.

Be Smart

If a "friend" emails and asks for a password or other information, call or email (in a separate email) that friend to verify that they were really who contacted you. The same goes for banks and businesses. First of all, legitimate businesses won't email you asking for passwords or account numbers. If you think the email might be real, call the bank or business and ask. Or visit the official website. Most banks have an email address to which you can forward suspicious emails for verification.

And always remember: Don't give up too much personal information online, because you never know who might use it against you. Or how.

 

Online info / Checks

  • Palo Alto online services

            Threatvault (info on Virus/Vulnerabilities/Spyware): https://threatvault.paloaltonetworks.com/

            Wildfire test & upload files: https://wildfire.paloaltonetworks.com/wildfire/upload

 

  • Checkpoint online services

            NextGen ThreatCloud: https://threat-cloud.com/ThreatPortal/index2.html

            ThreatEmulation (test & upload files): https://threatemulation.checkpoint.com/teb/login.jsp

 

  • Check a website's reputation online based on URL
            https://www.urlvoid.com/
 
  • Check the reputation of an ip address and the domains hosted on it;
            https://www.ipvoid.com/
 
  • Scan a file online for virusses, trojans etc:
            https://www.virustotal.com/

   

 

 

Palo Alto Next generation firewall buyers guide

Belgian Cybersecurity guide for SMB

The guide;

BCSG.pdf (1540411)

 

10 'Key principles' en 10 'Must Do'-acties:

 

Principle 1: Kijk verder dan technologie

Must Do 1: Organiseer gebruikersopleidingen & bewustmakingsinitiatieven

 

Principle 2: Compliance volstaat niet

Must Do 2: Hou systemen up to date

 

Principle 3: Vertaal je veiligheidsdoelstellingen naar een veiligheidsbeleid

Must Do 3: Bescherm informatie

 

Principle 4: Verzeker de toewijding van het top management

Must Do 4: Beveilig mobiele apparaten

 

Principle 5: Creëer een zichtbare veiligheidsrol in je bedrijf en verander individuele verantwoordelijkheden

Must Do 5: Geef enkel toegang tot informatie op basis van 'need to know'

 

Principle 6: Blijf veilig wanneer je uitbesteedt

Must Do 6: Stel regels op om veilig op internet te surfen en pas ze toe

 

Principle 7: Verzeker dat veiligheid een motor is voor motivatie

Must Do 7: Gebruik sterke paswoorden en hou ze veilig

 

Principle 8: Blijf jezelf uitdagen

Must Do 8: Maak en controleer back-up kopies van bedrijfsgegevens en informatie

 

Principle 9: Behoud focus

Must Do 9: Bestrijd virussen en andere malware vanuit verschillende invalshoeken

 

Principle 10: Wees voorbereid om incidenten aan te pakken

Must Do 10: Voorkom, detecteer en onderneem actie.

Palo Alto - Cybersecurity for dummies - ebook

Checkpoint - Software defined protection - ebook

Software-defined Protection book.pdf (3954177)

 

Check Point Software Technologies, LTD.

       

 

Check Point Software-Defined Protection

       
 

Is your security ready for tomorrow's threats?

As mobile platforms and cloud-based services proliferate across enterprise networks, many organizations find themselves facing IT complexities and evolving threat profiles that are a step ahead of existing security programs.

 

Check Point launched a new security strategy called Software-defined Protection (SDP) to help address these challenges. SDP is a new, modular and dynamic security architecture that envisions a three-layer approach – enforcement, control, and management – that provides operational resilience and real-time, proactive protection. 
 

 

   

 

Cisco's anual security report - 2014

Why and how YOU?

The Kill chain

The Kill Chain

Following is an example how an attack/infiltration is made step by step.

These days targetted attack directly to the information of interest are out of date.

The approach changed to exploiting and infecting the employee / end user and proceeding from there on horizontal or vertical into

the coorperate network.

Which protections can I activate on the KILL CHAIN?

Please find below a summary of which technology can be used were to protect you on the kill chain.

download link

 

Onderdelen 1 - 10 van 10