Diese Präsentation wurde erfolgreich gemeldet.
Die SlideShare-Präsentation wird heruntergeladen. ×

Are You a Hacker's Target?

Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Wird geladen in …3
×

Hier ansehen

1 von 10 Anzeige

Are You a Hacker's Target?

Herunterladen, um offline zu lesen

Are you a hacker’s target? How do they get your information? In the world of network security, cybercrime and information warfare, it’s important to protect yourself. Check out the infographic below and let us know: how have you been a hacker’s target?

Are you a hacker’s target? How do they get your information? In the world of network security, cybercrime and information warfare, it’s important to protect yourself. Check out the infographic below and let us know: how have you been a hacker’s target?

Anzeige
Anzeige

Weitere Verwandte Inhalte

Diashows für Sie (20)

Andere mochten auch (19)

Anzeige
Anzeige

Aktuellste (20)

Are You a Hacker's Target?

  1. HACKER’STARGET? ARE YOU A
  2. Youhavea69%chanceof fallingvictimtocybercrime inyourlifetime That’salmost3outof4people incountriesaroundtheworld 69%
  3. 57MILLIONAMERICANS receivescamemailsayear 1OUTOF3 hacksoriginated intheUSA 47%OFIDENTITYTHEFTS areperpetratedbysomeone thevictimknew $8.9MILLION thecostofcybercrimeper businessintheU.S.in2012
  4. HOW DO HACKERS GET YOUR INFORMATION? sortthroughyourpersonal computerortrash60% hackorscam youwhileonline25% stealyour wallet15% clickona spamlink19% disclosefinancial informationbyaccident3% THOSE WHO GET THEIR INFORMATION STOLEN
  5. TACTICSFORHACKINGUSERACCOUNTSONLINE BAITING someone gives you a usb drive or other electronic media that is preloaded with malware. Plug it into your computer and you’ve given them the backdoor to your personal information! CLICKJACKING concealing hyperlinks beneath legitimate clickable content which, when clicked, gets you to download malware or perform actions CROSS-SITESCRIPTING malicious code is injected into a website you trust DOXING publicly releasing a person's sensitive, identifying information, typically retrieved from social networking site profiles
  6. SOCIALENGINEERING strategic use of conversation to extract information from people without giving them the feeling they are being interrogated PHARMING redirecting users from legitimate websites to fraudulent ones for the purpose of extracting confidential data PHISHING usually an email that looks like it is from a legitimate organization or person, but actually contains a link or file with malware SPOOFING deceiving computers or users by hiding or faking one's identity. Email spoofing utilizes a fake email address or simulates a genuine email address TACTICSFORHACKINGUSERACCOUNTSONLINE(CONTINUED)
  7. HOW MANY ACCOUNTS HAVE BEEN COMPROMISED IN SINGLE ATTACKS 100,000,000 NETFLIX 18,000,000 WORDPRESS 6,500,000 LINKEDIN 1,500,000 VISA&MASTERCARD 600,000 DAILY FACEBOOK 450,000 YAHOO 250,000 TWITTER 120,000 UNIVERSITIES 24,000,000 ZAPPOS
  8. THEMOSTTARGETEDWEBSITESFORHACKERS Twitter Facebook Retail MediaTech Ecommerce InternetServiceProvider SearchEngines LawEnforcement Government Political Financial 1.FLORIDA 2.ARIZONA 3.CALIFORNIA TOPSTATESINTHEUSTHAT AREVICTIMSOFCYBERCRIME 1.CHINA 2.BRAZIL/INDIA 3.USA TOPCOUNTRIESTHATARE VICTIMSOFCYBERCRIME
  9. usealockorpasswordfor yourcomputerandphones keepyourpasswordsatleast8 characterslongandavoidusing wordsfoundinadictionary addoneuppercaseletterandasymbol toyourpassword—itwilltakehackers 200yearstocrackitvs.2hoursifyou usealllowercaseletters logoutofyouraccounts andclosebrowserwindows LogOut gopaperless—paperbank statementsare8xmorelikelytobe stolenthanpaperlessstatements TIPS TO INCREASE YOUR SECURITY whenyoureceiveemailsfromyour bank,godirectlytotheirwebsite—don't clickonanylinksintheemail
  10. SOURCES: http://mashable.com/2012/06/06/6-5-million-linkedin-passwords http://www.cnn.com/2012/07/12/tech/web/yahoo-users-hacked http://www.symantec.com/about/news/release/article.jsp?prid=20110907_02 https://www.fbi.gov/about-us/investigate/counterintelligence/internet-social-networking-risks http://www.cbsnews.com/8301-505124_162-57359700/zappos-hacked-24-million-accounts-at-risk http://www.escapistmagazine.com/forums/read/7.320322-600-000-Facebook-Accounts-Get-Hacked-Daily http://www.huffingtonpost.com/2012/10/04/hacktivists-college-records-dump-team-ghostshell_n_1940388.html http://social4ce.com/blog/2013/02/11/social-media-bytes-hacking-social-media-hoax-and-stats-about-arab-online-users http://live.wsj.com/video/visa-15m-accounts-were-hacked/46E45A62-7C71-4B1A-AA98-05637A288D2A.html#!46E45A62-7C71-4B1A-AA98-05637A288D2A BROUGHT TO YOU BY: WWW.SOLERANETWORKS.COM

×