SlideShare ist ein Scribd-Unternehmen logo
1 von 11
AISCON 2016
PAUL BABILA MBUA BENGYELLA
Executive Director/Founder Zixtech Organization
CEO / Founder Entrepreneurs Initiative
JCI Limbe Atlantic President 2017
EMAIL ATTACKS / PHISHING ATTACKS
DECEPTIVE PHISHING
• Impersonate a legitimate company and
attempt to steal people’s personal information
or login credentials. THEY USE THREATS
AND SENSE OF URGENCY
• THEY ACT AS A LEGITIMATE COMPANY
SPEAR PHISHING
• It uses target’s name, position, company, work
phone number and other information in an
attempt to trick the recipient into believing that
they have a connection with the sender.
• THEY ACT AS A THEY KNOW YOU, THEY PROVIDE
SOME INFOS ABOUT YOU
• cybersecurity firm Kaspersky. Billion stolen from
100banks in 30 countries in 2015
http://money.cnn.com/2015/02/16/technology/bank-hack-kaspersky/index.html?section=money_topstories
WHAT IS PHISHING
• LEARN MORE FROM THIS VIDEO
HOW TO DETECT IT
• Don’t trust the display name
• Don’t be in a haste to click every link
• Check for spelling mistakes
• Analyze the salutation (Vague Greetings)
• Don’t give up personal information
• Beware of urgent or threatening language in
the subject line
• Don’t click on attachments
DON’T BELIEVE EVERYTHING YOU SEE
HOW TO PREVENT IT
• Conduct security awareness training for staff
• (2SV) Two-step verification,
• Enter sensitive information only on ‘https://
RUN GENUINE ANTIVIRUS (Virus + malware), Firewall
Windows or others (Updated)
• Never Go to Your Bank’s Website by Clicking on
Links Included in Emails
• Be careful of too good to be true
• Be careful of WEBSITES YOU OPEN/LINKS U CLICK
ATM ATTACKS
SHIMMING ATTACK
 Billions of francs is lost to Shimming attacks
Shimming technology changes rapidly
SHIMMING?
• A shimmer is a device that's placed inside the
ATM to intercept communications between
the chip card and the chip reader.
(All card details stolen)
PREVENTION
• INSPECT ATM MACHINE (User and Bank)
• ALWAYS CHECK ACCOUNT BALANCE
• SMS TRANSACTION NOTIFICATION
THANK YOU
FOLLOW ME Facebook @paulbabz Twitter @zixtechorg
www.zixtechorganization.org
www.business.zixtechorganization.org
www.entrepreneursinitiative.com
www.jci.cc

Weitere ähnliche Inhalte

Was ist angesagt?

Joseph Carson. How a Lightbulb Almost Stopped Christmas
Joseph Carson. How a Lightbulb Almost Stopped ChristmasJoseph Carson. How a Lightbulb Almost Stopped Christmas
Joseph Carson. How a Lightbulb Almost Stopped ChristmasIT Arena
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanControlScan, Inc.
 
Powerpoint
PowerpointPowerpoint
PowerpointWhoya11
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threatsourav newatia
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Homejaysonstreet
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing AttacksSysCloud
 
Phishing exposed
Phishing exposedPhishing exposed
Phishing exposedtamfin
 
Shape Security @ WaffleJS October 16
Shape Security @ WaffleJS October 16Shape Security @ WaffleJS October 16
Shape Security @ WaffleJS October 16Jarrod Overson
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafeCheapSSLsecurity
 
How to identify unsafe websites
How to identify unsafe websitesHow to identify unsafe websites
How to identify unsafe websitesmaha5960
 
The Life of Breached Data & The Dark Side of Security
The Life of Breached Data & The Dark Side of SecurityThe Life of Breached Data & The Dark Side of Security
The Life of Breached Data & The Dark Side of SecurityJarrod Overson
 
The Dark Side of Security
The Dark Side of SecurityThe Dark Side of Security
The Dark Side of SecurityJarrod Overson
 
RSA Monthly Online Fraud Report -- August 2013
RSA Monthly Online Fraud Report -- August 2013RSA Monthly Online Fraud Report -- August 2013
RSA Monthly Online Fraud Report -- August 2013EMC
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing AttacksJagan Mohan
 

Was ist angesagt? (20)

Joseph Carson. How a Lightbulb Almost Stopped Christmas
Joseph Carson. How a Lightbulb Almost Stopped ChristmasJoseph Carson. How a Lightbulb Almost Stopped Christmas
Joseph Carson. How a Lightbulb Almost Stopped Christmas
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
Phishing
PhishingPhishing
Phishing
 
Phishing Technology
Phishing TechnologyPhishing Technology
Phishing Technology
 
Phishing exposed
Phishing exposedPhishing exposed
Phishing exposed
 
Shape Security @ WaffleJS October 16
Shape Security @ WaffleJS October 16Shape Security @ WaffleJS October 16
Shape Security @ WaffleJS October 16
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 
Phishing
PhishingPhishing
Phishing
 
How to identify unsafe websites
How to identify unsafe websitesHow to identify unsafe websites
How to identify unsafe websites
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
The Life of Breached Data & The Dark Side of Security
The Life of Breached Data & The Dark Side of SecurityThe Life of Breached Data & The Dark Side of Security
The Life of Breached Data & The Dark Side of Security
 
The Dark Side of Security
The Dark Side of SecurityThe Dark Side of Security
The Dark Side of Security
 
RSA Monthly Online Fraud Report -- August 2013
RSA Monthly Online Fraud Report -- August 2013RSA Monthly Online Fraud Report -- August 2013
RSA Monthly Online Fraud Report -- August 2013
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
 

Andere mochten auch

Ibn breakfast meeting, jumeirah emirates towers
Ibn breakfast meeting, jumeirah emirates towersIbn breakfast meeting, jumeirah emirates towers
Ibn breakfast meeting, jumeirah emirates towersjaison431
 
El cine de Eric Rohmer
El cine de Eric RohmerEl cine de Eric Rohmer
El cine de Eric RohmerBiblioCINETICA
 
Informationen: Fördernde Mitglieder von FNM Austria
Informationen: Fördernde Mitglieder von FNM AustriaInformationen: Fördernde Mitglieder von FNM Austria
Informationen: Fördernde Mitglieder von FNM AustriaFNM Austria
 
Presentación1 electiva v
Presentación1 electiva vPresentación1 electiva v
Presentación1 electiva vMaria Contreras
 
You've Got Mail (And More Customers!) With Email Marketing Talk
You've Got Mail (And More Customers!) With Email Marketing TalkYou've Got Mail (And More Customers!) With Email Marketing Talk
You've Got Mail (And More Customers!) With Email Marketing TalkStreetSmart Coaching
 
Top 5 reasons our people love to work at Western Power
Top 5 reasons our people love to work at Western PowerTop 5 reasons our people love to work at Western Power
Top 5 reasons our people love to work at Western PowerJoanne Petch
 
WEEC in Gothenburg and Greater Burlington updates, Thomas Hudspeth
WEEC in Gothenburg and Greater Burlington updates, Thomas Hudspeth WEEC in Gothenburg and Greater Burlington updates, Thomas Hudspeth
WEEC in Gothenburg and Greater Burlington updates, Thomas Hudspeth ESD UNU-IAS
 
Como añadir un formulario de contacto en un blog de blogger
Como añadir un formulario de contacto en un blog de bloggerComo añadir un formulario de contacto en un blog de blogger
Como añadir un formulario de contacto en un blog de bloggerIPAE
 
WebCenter Imaging using KFI and OFR - INSYNC Conference Perth 2013
WebCenter Imaging using KFI and OFR - INSYNC Conference Perth 2013WebCenter Imaging using KFI and OFR - INSYNC Conference Perth 2013
WebCenter Imaging using KFI and OFR - INSYNC Conference Perth 2013LansenConsulting
 
La audiencia de la radio actual por Nacho Gallego de la UC3M @ Radio 2.0 Madr...
La audiencia de la radio actual por Nacho Gallego de la UC3M @ Radio 2.0 Madr...La audiencia de la radio actual por Nacho Gallego de la UC3M @ Radio 2.0 Madr...
La audiencia de la radio actual por Nacho Gallego de la UC3M @ Radio 2.0 Madr...ACTUONDA
 
Guia de uso de la pluma precargada OVITRELLE
Guia de uso de la pluma precargada OVITRELLEGuia de uso de la pluma precargada OVITRELLE
Guia de uso de la pluma precargada OVITRELLEInstituto FIVIR
 

Andere mochten auch (20)

Ibn breakfast meeting, jumeirah emirates towers
Ibn breakfast meeting, jumeirah emirates towersIbn breakfast meeting, jumeirah emirates towers
Ibn breakfast meeting, jumeirah emirates towers
 
El cine de Eric Rohmer
El cine de Eric RohmerEl cine de Eric Rohmer
El cine de Eric Rohmer
 
Cap6 aminoácidos
Cap6 aminoácidosCap6 aminoácidos
Cap6 aminoácidos
 
VALENCIA CLUB DE COCINA
VALENCIA CLUB DE COCINAVALENCIA CLUB DE COCINA
VALENCIA CLUB DE COCINA
 
Informationen: Fördernde Mitglieder von FNM Austria
Informationen: Fördernde Mitglieder von FNM AustriaInformationen: Fördernde Mitglieder von FNM Austria
Informationen: Fördernde Mitglieder von FNM Austria
 
Curriculumvitae
CurriculumvitaeCurriculumvitae
Curriculumvitae
 
Presentación1 electiva v
Presentación1 electiva vPresentación1 electiva v
Presentación1 electiva v
 
Verbundprojekt PRIDE
Verbundprojekt PRIDEVerbundprojekt PRIDE
Verbundprojekt PRIDE
 
You've Got Mail (And More Customers!) With Email Marketing Talk
You've Got Mail (And More Customers!) With Email Marketing TalkYou've Got Mail (And More Customers!) With Email Marketing Talk
You've Got Mail (And More Customers!) With Email Marketing Talk
 
Top 5 reasons our people love to work at Western Power
Top 5 reasons our people love to work at Western PowerTop 5 reasons our people love to work at Western Power
Top 5 reasons our people love to work at Western Power
 
Gc2 telefono
Gc2 telefonoGc2 telefono
Gc2 telefono
 
DJ Steve Aoki
DJ Steve AokiDJ Steve Aoki
DJ Steve Aoki
 
Cuaderno afrodescendientes sept-oct_2011
Cuaderno afrodescendientes sept-oct_2011Cuaderno afrodescendientes sept-oct_2011
Cuaderno afrodescendientes sept-oct_2011
 
WEEC in Gothenburg and Greater Burlington updates, Thomas Hudspeth
WEEC in Gothenburg and Greater Burlington updates, Thomas Hudspeth WEEC in Gothenburg and Greater Burlington updates, Thomas Hudspeth
WEEC in Gothenburg and Greater Burlington updates, Thomas Hudspeth
 
Como añadir un formulario de contacto en un blog de blogger
Como añadir un formulario de contacto en un blog de bloggerComo añadir un formulario de contacto en un blog de blogger
Como añadir un formulario de contacto en un blog de blogger
 
WebCenter Imaging using KFI and OFR - INSYNC Conference Perth 2013
WebCenter Imaging using KFI and OFR - INSYNC Conference Perth 2013WebCenter Imaging using KFI and OFR - INSYNC Conference Perth 2013
WebCenter Imaging using KFI and OFR - INSYNC Conference Perth 2013
 
Catalog door handles Colombo Design
Catalog door handles Colombo DesignCatalog door handles Colombo Design
Catalog door handles Colombo Design
 
La audiencia de la radio actual por Nacho Gallego de la UC3M @ Radio 2.0 Madr...
La audiencia de la radio actual por Nacho Gallego de la UC3M @ Radio 2.0 Madr...La audiencia de la radio actual por Nacho Gallego de la UC3M @ Radio 2.0 Madr...
La audiencia de la radio actual por Nacho Gallego de la UC3M @ Radio 2.0 Madr...
 
Guia de uso de la pluma precargada OVITRELLE
Guia de uso de la pluma precargada OVITRELLEGuia de uso de la pluma precargada OVITRELLE
Guia de uso de la pluma precargada OVITRELLE
 
Grupo jacaranda
Grupo jacarandaGrupo jacaranda
Grupo jacaranda
 

Ähnlich wie Email attacks and shimming attack

Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessOWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessMaherHamza9
 
IT2252_Presentation_Group03.pptx
IT2252_Presentation_Group03.pptxIT2252_Presentation_Group03.pptx
IT2252_Presentation_Group03.pptxNLFunnyFunky
 
Protecting Your Business from Cybercrime - Cybersecurity 101
Protecting Your Business from Cybercrime - Cybersecurity 101Protecting Your Business from Cybercrime - Cybersecurity 101
Protecting Your Business from Cybercrime - Cybersecurity 101David J Rosenthal
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)aleeya91
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxStephen Jesukanth Martin
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayMichele Chubirka
 
Cyber Crime Campain Messages_Poster_Final
Cyber Crime Campain Messages_Poster_FinalCyber Crime Campain Messages_Poster_Final
Cyber Crime Campain Messages_Poster_FinalSiphiwe Msibi
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBCapyn
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?Entrance Exam Info
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfMansoorAhmed57263
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptOoXair
 
Chapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyChapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyAnjan Mahanta
 

Ähnlich wie Email attacks and shimming attack (20)

Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
 
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessOWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
 
IT2252_Presentation_Group03.pptx
IT2252_Presentation_Group03.pptxIT2252_Presentation_Group03.pptx
IT2252_Presentation_Group03.pptx
 
Protecting Your Business from Cybercrime - Cybersecurity 101
Protecting Your Business from Cybercrime - Cybersecurity 101Protecting Your Business from Cybercrime - Cybersecurity 101
Protecting Your Business from Cybercrime - Cybersecurity 101
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
 
CYBER SECURITY _ PHISHING
CYBER SECURITY _ PHISHINGCYBER SECURITY _ PHISHING
CYBER SECURITY _ PHISHING
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Phishing and prevention
Phishing and preventionPhishing and prevention
Phishing and prevention
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
 
Cyber Crime Campain Messages_Poster_Final
Cyber Crime Campain Messages_Poster_FinalCyber Crime Campain Messages_Poster_Final
Cyber Crime Campain Messages_Poster_Final
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Day 2
Day 2Day 2
Day 2
 
Chapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyChapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & Safety
 

Mehr von Paul Mbua

THE POWER OF DIGITAL TECHNOLOGIES AND POSITIVE TRANSFORMATION ON BUSINESSES.pdf
THE POWER OF DIGITAL TECHNOLOGIES AND POSITIVE TRANSFORMATION ON BUSINESSES.pdfTHE POWER OF DIGITAL TECHNOLOGIES AND POSITIVE TRANSFORMATION ON BUSINESSES.pdf
THE POWER OF DIGITAL TECHNOLOGIES AND POSITIVE TRANSFORMATION ON BUSINESSES.pdfPaul Mbua
 
Personal Development and Self discovery
Personal Development and Self discovery Personal Development and Self discovery
Personal Development and Self discovery Paul Mbua
 
How to Pitch a Business.pptx
How to Pitch a Business.pptxHow to Pitch a Business.pptx
How to Pitch a Business.pptxPaul Mbua
 
Formation business model - French
Formation business model - FrenchFormation business model - French
Formation business model - FrenchPaul Mbua
 
Building Cash flow model
Building Cash flow modelBuilding Cash flow model
Building Cash flow modelPaul Mbua
 
Startups and entrepreneurship
Startups and entrepreneurshipStartups and entrepreneurship
Startups and entrepreneurshipPaul Mbua
 
Passion is not Enough but Commitment - Our view: Zixtech Organization
Passion is not Enough but Commitment - Our view: Zixtech OrganizationPassion is not Enough but Commitment - Our view: Zixtech Organization
Passion is not Enough but Commitment - Our view: Zixtech OrganizationPaul Mbua
 
Presentation going green for entrepreneurs
Presentation going green for entrepreneursPresentation going green for entrepreneurs
Presentation going green for entrepreneursPaul Mbua
 

Mehr von Paul Mbua (8)

THE POWER OF DIGITAL TECHNOLOGIES AND POSITIVE TRANSFORMATION ON BUSINESSES.pdf
THE POWER OF DIGITAL TECHNOLOGIES AND POSITIVE TRANSFORMATION ON BUSINESSES.pdfTHE POWER OF DIGITAL TECHNOLOGIES AND POSITIVE TRANSFORMATION ON BUSINESSES.pdf
THE POWER OF DIGITAL TECHNOLOGIES AND POSITIVE TRANSFORMATION ON BUSINESSES.pdf
 
Personal Development and Self discovery
Personal Development and Self discovery Personal Development and Self discovery
Personal Development and Self discovery
 
How to Pitch a Business.pptx
How to Pitch a Business.pptxHow to Pitch a Business.pptx
How to Pitch a Business.pptx
 
Formation business model - French
Formation business model - FrenchFormation business model - French
Formation business model - French
 
Building Cash flow model
Building Cash flow modelBuilding Cash flow model
Building Cash flow model
 
Startups and entrepreneurship
Startups and entrepreneurshipStartups and entrepreneurship
Startups and entrepreneurship
 
Passion is not Enough but Commitment - Our view: Zixtech Organization
Passion is not Enough but Commitment - Our view: Zixtech OrganizationPassion is not Enough but Commitment - Our view: Zixtech Organization
Passion is not Enough but Commitment - Our view: Zixtech Organization
 
Presentation going green for entrepreneurs
Presentation going green for entrepreneursPresentation going green for entrepreneurs
Presentation going green for entrepreneurs
 

Kürzlich hochgeladen

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Email attacks and shimming attack

  • 1. AISCON 2016 PAUL BABILA MBUA BENGYELLA Executive Director/Founder Zixtech Organization CEO / Founder Entrepreneurs Initiative JCI Limbe Atlantic President 2017
  • 2. EMAIL ATTACKS / PHISHING ATTACKS DECEPTIVE PHISHING • Impersonate a legitimate company and attempt to steal people’s personal information or login credentials. THEY USE THREATS AND SENSE OF URGENCY • THEY ACT AS A LEGITIMATE COMPANY
  • 3. SPEAR PHISHING • It uses target’s name, position, company, work phone number and other information in an attempt to trick the recipient into believing that they have a connection with the sender. • THEY ACT AS A THEY KNOW YOU, THEY PROVIDE SOME INFOS ABOUT YOU • cybersecurity firm Kaspersky. Billion stolen from 100banks in 30 countries in 2015 http://money.cnn.com/2015/02/16/technology/bank-hack-kaspersky/index.html?section=money_topstories
  • 4. WHAT IS PHISHING • LEARN MORE FROM THIS VIDEO
  • 5. HOW TO DETECT IT • Don’t trust the display name • Don’t be in a haste to click every link • Check for spelling mistakes • Analyze the salutation (Vague Greetings) • Don’t give up personal information • Beware of urgent or threatening language in the subject line • Don’t click on attachments DON’T BELIEVE EVERYTHING YOU SEE
  • 6. HOW TO PREVENT IT • Conduct security awareness training for staff • (2SV) Two-step verification, • Enter sensitive information only on ‘https:// RUN GENUINE ANTIVIRUS (Virus + malware), Firewall Windows or others (Updated) • Never Go to Your Bank’s Website by Clicking on Links Included in Emails • Be careful of too good to be true • Be careful of WEBSITES YOU OPEN/LINKS U CLICK
  • 7. ATM ATTACKS SHIMMING ATTACK  Billions of francs is lost to Shimming attacks Shimming technology changes rapidly
  • 8. SHIMMING? • A shimmer is a device that's placed inside the ATM to intercept communications between the chip card and the chip reader. (All card details stolen)
  • 9.
  • 10. PREVENTION • INSPECT ATM MACHINE (User and Bank) • ALWAYS CHECK ACCOUNT BALANCE • SMS TRANSACTION NOTIFICATION
  • 11. THANK YOU FOLLOW ME Facebook @paulbabz Twitter @zixtechorg www.zixtechorganization.org www.business.zixtechorganization.org www.entrepreneursinitiative.com www.jci.cc