1 / 0

Contents

Contents. Survey results: why this stuff matters Case study: Mat Honan hacking case Social Networking safety Examples Tech demo. Social Media. Form of communication in which users create online communities to share info, ideas, personal messages, etc.

nonnie
Download Presentation

Contents

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Contents Survey results: why this stuff matters Case study: Mat Honan hacking case Social Networking safety Examples Tech demo
  2. Social Media Form of communication in which users create online communities to share info, ideas, personal messages, etc.
  3. Your lives are only going to get more complicated. Now is the time to build good habits and learn to be safe and secure.
  4. Case Study Mat Honan hack Customer service transcript Prevention
  5. Mat Honan Wired.com
  6. Add a fake credit card number to account Call back, tell them you’re locked out of account Use that fake CC number to verify your identity Lets you see last 4 digits of all credit cards on account Which is all you need to reset your account with…
  7. Gained access to Apple account Remote device wipes Use @me.com email to reset passwords. Like…
  8. Another password reset Entire account deleted What was their final goal?
  9. Twitter account: @mat Load up wall with racist, homophobic tweets Deleted Gmail and wiped devices to keep Mat from regaining access to Twitter
  10. One weak link can let someone into your entire digital life. And often that weak link is convenience.
  11. People really do this.
  12. DON’T
  13. Security Convenience and …are not friends.
  14. Convenience will always betray security.
  15. Taken from a January 2012 live chat between Apple online support and a hacker posing as a real Apple customer Source: http://www.wired.com/gadgetlab/2012/11/ff-mat-honan-password-hacker/2/ Apple: Can you answer a question from the account? Name of your best friend? Hacker: I think that is “Kevin” or “Austin” or “Max.” Apple: None of those answers are correct. Do you think you may have entered last names with the answer?
  16. Apple: The last four of the card are incorrect. Do you have another card? Hacker: Can you check again? I’m looking at my Visa here, the last 4 is “5555.” Apple: Yes, I have checked again. 5555 is not what is on the account. Did you try to reset online and choose email authentication?
  17. Apple: You want to try the first and last name for the best friend question? Hacker: Here, I’m back. I think the answer might be Chris? He’s a good friend. Apple: I am sorry, Brian, but that answer is incorrect. Hacker: Christopher A********h is the full name. Another possibility is Raymond M*******r. Apple: Both of those are incorrect as well.
  18. Hacker: I’m just gonna list off some friends that might be haha. Brian C**a. Bryan Y***t. Steven M***y. Apple: How about this. Give me the name of one of your custom mail folders. Hacker: “Google” “Gmail” “Apple” I think. I’m a programmer at Google. Apple: OK, “Apple” is correct. Can I have an alternate email address for you?
  19. Hacker: The alternate email I used when I made the account? Apple: I will need an email address to send you the password reset. Hacker: Can you send it to “toe@aol.com”? Apple: The email has been sent. Hacker: Thanks!
  20. What can prevent this sort of hack? Two-factor authentication (as of March 22, 2013)
  21. Password Managers LastPass 1Password RoboForm
  22. Lock down your cell phone! Passcode lock Use remote tracking/wiping
  23. Find my iPhone (or iPad…or MacBook)
  24. SeekDroid Cerberus
  25. Common SENSE
  26. Social Networking Safety Don’t overshare Remember your audience Crime + Facebook = BAD
  27. Sharing Too Much Personal Information Address, Phone Number, Password Social Plans Negative Attitude Complaints, Criticism, Threats
  28. Fired because of Facebook Woman blasts her boss with Facebook post Turns out her boss was a Facebook friend She was immediately fired
  29. Fired because of Facebook Waitress fired for complaining about customers Ashley Johnson, a former waitress at Brixx, a pizza restaurant, claims she was fired from her job for complaining about customers on her Facebook account. 
  30. Self-Incrimination
  31. Choose your friends wisely Never be online friends with someone you don’t know in real life Online predators Cyber-stalking Cat-fishing
  32. COMMON SENSE
  33. Examples Phishing Malicious advertising Scareware
  34. Phishing Email pretending to be from legitimate companies to trick you into revealing personal information
  35. Bad grammar
  36. False sense of urgency
  37. http://www.daycomsolutions.com
  38. http://www.daycomsolutions.com
  39. http://www.daycomsolutions.com
  40. Fake Ads Common on piracy/warez/porn sites Try to mine your personal information or install malware
  41. Suspicious Websites Offer free downloads Many Annoying Ads and Pop-ups Tacky Appearance Asks you to download plug-ins
  42. Live TV Cafe
  43. 4Shared
  44. Softonic
  45. Use Sites Like These:
  46. Hulu
  47. Scareware Pretends to be system messages or antivirus programs. Takes advantage of less savvy users.
  48. DEMO Sub7 “remote administration” tool Worst-case malware
More Related