NewCo Logo Keystroke Guard The technology that everybody needs October 15 th, 2014.

Slides:



Advertisements
Similar presentations
HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.
Advertisements

The Integritas System to enforce Integrity in Academic Environments Prof Basie von Solms Mr Jaco du Toit Prof Basie Von Solms Academy for IT University.
7 Effective Habits when using the Internet Philip O’Kane 1.
Cyber Security and the Global Business Environment Jeremy Schaar:)
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
New trends on cyber security - Cyber Espionage & Identity theft By K S Yash, CRO 1.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Security for Today’s Threat Landscape Kat Pelak 1.
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
PEOPLE’S REPUBLIC OF HACKING By: Lani N, Ashley R, Michael R, Gregory R.
@NEXTXPERT Improvements that Microsoft has made in the Windows platforms have driven BAD GUYS to new tactics.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
By Ashlee Parton, Kimmy McCoy, & Labdhi Shah
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Building Trust in Digital Online World Dr. Shekhar Kirani Vice President VeriSign India 5th June 2009 IBA Conference.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
FIT3105 Security and Identity Management Lecture 1.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Threats and Attacks Principles of Information Security, 2nd Edition
Norman SecureSurf Protect your users when surfing the Internet.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
INTRODUCTION Coined in 1996 by computer hackers. Hackers use to fish the internet hoping to hook users into supplying them the logins, passwords.
October The Insider Financial Crime and Identity Theft Hacktivists Piracy Cyber Espionage and Sabotage.
Securing Information Systems
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Cyber Crimes.
Viruses.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
BUSINESS B1 Information Security.
Staying Safe Online Keep your Information Secure.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
AUGUST 25, 2015 Cyber Insurance:
Computer & Internet Security Sean Lanham, CISSP - ISO University of Texas at Arlington Information Security Office.
© 2015 ForeScout Technologies, Page 2 Source: Identity Theft Resource Center Annual number of data breaches Breaches reported Average annual cost of security.
Managing Information in a Global World
Types of Electronic Infection
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
The Changing World of Endpoint Protection
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Friday, October 23, Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer Security By Duncan Hall.
Network Security.  With an increasing amount of people getting connected to networks, the security threats that cause massive harm are increasing also.
Information Security: Current Threats Marc Scarborough Information Security Officer
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Global Mobile Anti-malware Market WEBSITE Single User License: US$ 2500 No of Pages: 55 Corporate User License: US$
NADAV PELEG HEAD OF MOBILE SECURITY The Mobile Threat: Consumer Devices Business Risks David Parkinson MOBILE SECURITY SPECIALIST, NER.
©2016 Check Point Software Technologies Ltd. 1 Latest threats…. Rolando Panez | Security Engineer RANSOMWARE.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
Centre of Expertise - Security Securing your business against cybercrime Or surely we do not have anything to worry about...do we?
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Security Risks Todays Lesson Security Risks Security Precautions
Want to be secure? Eliminate passwords.
Today’s Risk. Today’s Solutions. Cyber security and
Las Positas College Flex Day
Presentation transcript:

NewCo Logo Keystroke Guard The technology that everybody needs October 15 th, 2014

About us  NBBI: Strategic Worldwide Marketing & Distribution Partner  StrikeForce Technologies, Inc. (Edison, NJ)  Founded in 2001  CEO was former CIO at JP Morgan – 26 years  CTO was Chief Scientist at Bell Labs, Bell Core, & CSC  Chairman - Steve Cooper (1st - CIO of DHS)  Products – Protecting over 70 Million Computers countries  Own 5 key cyber security patents, three additional patents are pending: –Multi-Factor Out-of-Band Authentication (OOBA) –Keystroke Encryption for PCs & Macs –Keystroke Encryption for Mobile Device Browsers (Apple & Android) –Keystroke Encryption for Mobile Applications (Apple & Android)

The Digital War has Begun! The global battle to steal your secrets is turning hackers into arms dealers. July, 2014

Hackers are Targeting: Banking Industry – Large Dollar Transactions Banking Industry – Large Dollar Transactions Retailers – Large Quantities of Credit Cards Retailers – Large Quantities of Credit Cards Corporations – Intellectual Property Corporations – Intellectual Property Consumers – Identity Theft Consumers – Identity Theft Government – Secrets & Espionage Government – Secrets & Espionage Healthcare – Personal Health Information Healthcare – Personal Health Information

Recent Breaches

Target The forensics report showed that Target was breached because a hacker sent an infected to Target’s third-party HVAC vendor. The infected contained a keylogger that stole the vendor’s login credentials.

People familiar with the investigation said the evidence gathered so far revealed that hackers were able to make a significant foray into J.P. Morgan's computer system. People with knowledge of the probe said it appeared between two and five U.S. financial institutions may have been affected. The names of all targeted banks couldn't be immediately determined. J.P. Morgan and federal cyber investigators are in discussions as they examine the apparent attack on the bank's computer system, forensics revealed that Malware was the cause. "Companies of our size unfortunately experience cyberattacks nearly every day," said Trish Wexler, a J.P. Morgan spokeswoman said Wednesday. "We have multiple layers of defense to counteract any threats and constantly monitor fraud levels." JP Morgan Chase FBI probes hacking incident at J.P. Morgan. Attack appears to have been caused by malicious computer code.

Home Depot Forensics revealed that keylogging malware was found on employees’ computer systems.

Oregon Employment Dept. Malware was used to attack the company’s computer systems.

Community Health Systems The APT Group used highly sophisticated malware to attack the company’s computer systems.

Breach Commonalities Malware was used to steal credentials and remotely login or steal data.

Explosive Admission! On May 7 th, 2014, Symantec's senior vice president for information security, Brian Dye, told the Wall Street Journal that “anti-virus is dead". He is leading Symantec towards a new approach that focuses on spotting hackers within a system and minimizing damage from them instead of trying to keep them out. "We don't think of antivirus as a moneymaker in any way," he told the Journal.

Our Computers are Under Attack! In the last 12 months, 401 million viruses were introduced on Internet. Best Anti-Virus software has 20 million known viruses. 1.1 million viruses are added per day. It takes an Anti-Virus software company an average of days before it can address a known virus it finds.

The New Battleground is the Keyboard % of all breaches contained malware. 69% of all breaches contained malware. 98% of malware breaches used a keylogger. 98% of malware breaches used a keylogger. AV Software cannot stop a zero-day attack. AV Software cannot stop a zero-day attack. Successful keylogger breaches include: Successful keylogger breaches include:

Web Server SSL Connection Internet Application Level Browsers Message Filter Keyboard Driver Normal data route without Keystroke Guard SSL Connection Messaging Service Message Filter How Does Keystroke Guard Work?

Web Server SSL Connection Internet Application Level Message Filter Keyboard Driver Normal data route without Keystroke Guard Keylogging Vulnerability Message Hooking Message Filtering Replacing Driver SSL Connection Messaging Service Message Filter How Does Keystroke Guard Work? Browsers

Web Server SSL Connection Internet Application Level Message Filter Keyboard Driver Normal data route without Keystroke Guard Keylogging Vulnerability Message Hooking Message Filtering Replacing Driver SSL Connection Messaging Service Message Filter How Does Keystroke Guard Work? “Out-of-Band” pathway for encrypted keystrokes circumventing 99.9% of all keylogging Browsers

Mobile Devices’ Vulnerabilities & Limitations Downloaded apps & files fail to detect malware Downloaded apps & files fail to detect malware Doesn’t include an encrypted password vault Doesn’t include an encrypted password vault Anti-Virus cannot scan the mobile device’s kernel Anti-Virus cannot scan the mobile device’s kernel Data dictionaries & keyboard cache files not Data dictionaries & keyboard cache files notprotected

By late 2014, 50% of all internet transactions will be conducted on mobile devices. AES 256 Bit Encrypted Password Vault Encrypted Keyboard & Browser User-Definable Strong Password Generator One-Time- Password (OTP) Generator

Conclusion NBBI & StrikeForce are Industry leaders in developing and marketing cyber security solutions for the prevention of data breaches & identity theft. Our Solutions Protect: The network from unwanted access The network from unwanted access The desktop from keylogging malware The desktop from keylogging malware Mobile device browsers from keyloggers and data leakage Mobile device browsers from keyloggers and data leakage Mobile applications from keyloggers and data leakage Mobile applications from keyloggers and data leakage