SlideShare ist ein Scribd-Unternehmen logo
1 von 10
The AP Fake Tweet
&
Other Social Media Risks
Philip Alexander CISSP-ISSMP, CEH, CHFI
Founder - Data Privacy Network
Agenda
 Fake AP Tweet Rattles Stock Market
 Cyber Warfare
 Social Media’s Impact on Core Industries
 Phishing for the Weakest Link
 People & Politics
 BYOD
 Questions
Fake AP Tweet Rattles Stock Market
 FAKE Tweet from AP Twitter account: 1:07PM – 23 Apr 13
Breaking: Two Explosions in the White House and Barack Obama is
Injured
 Dow plunged more than 140 points with minutes
 Was seen by nearly 2,000,000 followers
 Was re-Tweeted nearly 1,500 times
Cyber Warfare
 Impact of Cyber Warfare (Hacking)
 Rattles investors faith in US Stock Market
 Syrian Electronic Army
 Claimed responsibility for posting fake Tweet
 They also claimed to target:

NPR

Reuters

BBC

Al Jazeera
Social Media’s Impact on Core Industries
 Dow impacted even though it wasn’t hacked.
**Companies that outsource security to Social Networking sites
Phishing for the Weakest Link
 AP reports receiving Phishing email prior to fake Tweet
 Attachments
 Links
 People & Politics: A hole in a strong Defense-in-Depth posture
 RSA’s SecurID Breach Started with a Phishing Email: April 2011
***OSI Layers 8 & 9.
People & Politics
 Education & Awareness
 Did the AP change their Twitter account password?

Twitter reported being hacked back in February 2013
 Least-Privileged Access
 From the CEO on down
 Web Filtering
 Block access to risky web sites
***Security is not just the Security Guy’s job!
BYOD
 Support & Data Leakage (DLP) challenges associated with BYOD
 Thumb Drives

Do your systems allow USB Drives to be used?
 Smart Phones

Can your employees send/receive work emails from their personal Cell
Phones?
 iPad – iPod

Are personal devices allowed at work?
Questions
Philip Alexander CISSP – ISSMP, CEH – CHFI
Founder – Data Privacy Network
phil@dataprivacynetwork.com
http://www.dataprivacynetwork.com
https://www.facebook.com/DataPrivacyNetwork
https://twitter.com/DataPrivacyNtwk
 

Weitere ähnliche Inhalte

Was ist angesagt?

Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017Accelerate Tech
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeAdeel Rasheed
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidLookout
 
Preventing Cybercrime in Libraries
Preventing Cybercrime in LibrariesPreventing Cybercrime in Libraries
Preventing Cybercrime in LibrariesMary Rayme
 
Cyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationCyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationBenjamin Morley
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Moumita Chatterjee
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2NetLockSmith
 
Security In A Connected Society
Security In A Connected SocietySecurity In A Connected Society
Security In A Connected SocietyCentraComm
 
Unit+four+ +principles+of+cybersecurity
Unit+four+ +principles+of+cybersecurityUnit+four+ +principles+of+cybersecurity
Unit+four+ +principles+of+cybersecurityErdo Deshiant Garnaby
 
InfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security TipsInfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security TipsLiberteks
 
Name parul
Name parulName parul
Name parulParul231
 
Social engineering(nulldubai)
Social engineering(nulldubai)Social engineering(nulldubai)
Social engineering(nulldubai)Muhammad Samaak
 
chapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crimechapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crimemuhammad awais
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick SurveyArindam Sarkar
 

Was ist angesagt? (20)

Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber Crime
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to Avoid
 
Preventing Cybercrime in Libraries
Preventing Cybercrime in LibrariesPreventing Cybercrime in Libraries
Preventing Cybercrime in Libraries
 
Cyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationCyber Security in the Age of Globalization
Cyber Security in the Age of Globalization
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 
Facebook
FacebookFacebook
Facebook
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
Security In A Connected Society
Security In A Connected SocietySecurity In A Connected Society
Security In A Connected Society
 
Unit+four+ +principles+of+cybersecurity
Unit+four+ +principles+of+cybersecurityUnit+four+ +principles+of+cybersecurity
Unit+four+ +principles+of+cybersecurity
 
InfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security TipsInfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security Tips
 
Name parul
Name parulName parul
Name parul
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Social engineering(nulldubai)
Social engineering(nulldubai)Social engineering(nulldubai)
Social engineering(nulldubai)
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
chapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crimechapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crime
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick Survey
 
Cybercrime (sociology)
Cybercrime (sociology)Cybercrime (sociology)
Cybercrime (sociology)
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 

Ähnlich wie Ap fake tweet

Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Alisha Deboer
 
Computer System Security PPT’s | ESHAN COLLEGE OF ENGINEERING
Computer System Security  PPT’s | ESHAN COLLEGE OF ENGINEERINGComputer System Security  PPT’s | ESHAN COLLEGE OF ENGINEERING
Computer System Security PPT’s | ESHAN COLLEGE OF ENGINEERINGsudoherogit
 
INFORMATION ASSURANCE AND SECURITY 1.pdf
INFORMATION ASSURANCE AND SECURITY 1.pdfINFORMATION ASSURANCE AND SECURITY 1.pdf
INFORMATION ASSURANCE AND SECURITY 1.pdfEarlvonDeiparine1
 
List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022ndcmanagement
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 aMark Henshaw
 
It presentation cyber crime
It presentation cyber crimeIt presentation cyber crime
It presentation cyber crimeAshish Ojha
 
Ce hv8 module 09 social engineering
Ce hv8 module 09 social engineeringCe hv8 module 09 social engineering
Ce hv8 module 09 social engineeringMehrdad Jingoism
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness trainingAbdalrhmanTHassan
 
Case 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxCase 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxtidwellveronique
 
Top data breaches in 2013
Top data breaches in 2013Top data breaches in 2013
Top data breaches in 2013Shoplet_
 
Top data breaches in 2013
Top data breaches in 2013Top data breaches in 2013
Top data breaches in 2013post_it
 
Data Breach on social platform Presentation
Data Breach on social platform PresentationData Breach on social platform Presentation
Data Breach on social platform Presentationvandna609
 
CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1Brett L. Scott
 

Ähnlich wie Ap fake tweet (20)

Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
June NOW 2014
June NOW 2014June NOW 2014
June NOW 2014
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Computer System Security PPT’s | ESHAN COLLEGE OF ENGINEERING
Computer System Security  PPT’s | ESHAN COLLEGE OF ENGINEERINGComputer System Security  PPT’s | ESHAN COLLEGE OF ENGINEERING
Computer System Security PPT’s | ESHAN COLLEGE OF ENGINEERING
 
INFORMATION ASSURANCE AND SECURITY 1.pdf
INFORMATION ASSURANCE AND SECURITY 1.pdfINFORMATION ASSURANCE AND SECURITY 1.pdf
INFORMATION ASSURANCE AND SECURITY 1.pdf
 
pp.pptx
pp.pptxpp.pptx
pp.pptx
 
List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 a
 
Cyber security.pptx
Cyber security.pptxCyber security.pptx
Cyber security.pptx
 
It presentation cyber crime
It presentation cyber crimeIt presentation cyber crime
It presentation cyber crime
 
Cyber security mis
Cyber security  misCyber security  mis
Cyber security mis
 
Ce hv8 module 09 social engineering
Ce hv8 module 09 social engineeringCe hv8 module 09 social engineering
Ce hv8 module 09 social engineering
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
Case 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxCase 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docx
 
Top data breaches in 2013
Top data breaches in 2013Top data breaches in 2013
Top data breaches in 2013
 
Top data breaches in 2013
Top data breaches in 2013Top data breaches in 2013
Top data breaches in 2013
 
Data Breach on social platform Presentation
Data Breach on social platform PresentationData Breach on social platform Presentation
Data Breach on social platform Presentation
 
CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1
 
Social Networking Security
Social Networking SecuritySocial Networking Security
Social Networking Security
 

Kürzlich hochgeladen

Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Kürzlich hochgeladen (20)

Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Ap fake tweet

  • 1. The AP Fake Tweet & Other Social Media Risks Philip Alexander CISSP-ISSMP, CEH, CHFI Founder - Data Privacy Network
  • 2. Agenda  Fake AP Tweet Rattles Stock Market  Cyber Warfare  Social Media’s Impact on Core Industries  Phishing for the Weakest Link  People & Politics  BYOD  Questions
  • 3. Fake AP Tweet Rattles Stock Market  FAKE Tweet from AP Twitter account: 1:07PM – 23 Apr 13 Breaking: Two Explosions in the White House and Barack Obama is Injured  Dow plunged more than 140 points with minutes  Was seen by nearly 2,000,000 followers  Was re-Tweeted nearly 1,500 times
  • 4. Cyber Warfare  Impact of Cyber Warfare (Hacking)  Rattles investors faith in US Stock Market  Syrian Electronic Army  Claimed responsibility for posting fake Tweet  They also claimed to target:  NPR  Reuters  BBC  Al Jazeera
  • 5. Social Media’s Impact on Core Industries  Dow impacted even though it wasn’t hacked. **Companies that outsource security to Social Networking sites
  • 6. Phishing for the Weakest Link  AP reports receiving Phishing email prior to fake Tweet  Attachments  Links  People & Politics: A hole in a strong Defense-in-Depth posture  RSA’s SecurID Breach Started with a Phishing Email: April 2011 ***OSI Layers 8 & 9.
  • 7. People & Politics  Education & Awareness  Did the AP change their Twitter account password?  Twitter reported being hacked back in February 2013  Least-Privileged Access  From the CEO on down  Web Filtering  Block access to risky web sites ***Security is not just the Security Guy’s job!
  • 8. BYOD  Support & Data Leakage (DLP) challenges associated with BYOD  Thumb Drives  Do your systems allow USB Drives to be used?  Smart Phones  Can your employees send/receive work emails from their personal Cell Phones?  iPad – iPod  Are personal devices allowed at work?
  • 9.
  • 10. Questions Philip Alexander CISSP – ISSMP, CEH – CHFI Founder – Data Privacy Network phil@dataprivacynetwork.com http://www.dataprivacynetwork.com https://www.facebook.com/DataPrivacyNetwork https://twitter.com/DataPrivacyNtwk  

Hinweis der Redaktion

  1. “ I forward this file to you for review,” the unsigned email, sent to four employees of RSA's parent company EMC, stated. “Please open and view it.” 1 of the 4 retrieved the email from their junk mail folder, and opened the Excel file “2011 Recruitment plan.xls”, that contained a malicious Adobe Flash object,