1 1 SMSishing Attacks Jim Horwath July 2012 GIAC GSE, GCUX, GCIA, GCIH, GREM, GSEC, GSIP.

Slides:



Advertisements
Similar presentations
What Are Scams? Scams are designed to trick you into giving away your money or your personal details. Scams come to you in many forms – by mail, ,
Advertisements

CYBER SECURITY-PHISHING: DON’T BECOME A VICTIM OF FRAUD
Results from a Mobile Finance Survey. 2 2 Second survey sponsored by CheckFree with fieldwork in April 2008; First survey completed in March ,007.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Today’s Agenda… Knowledge Check What is Cyber Crime? Identity Theft Phishing Common Scams inc. online and mobile phone scams Prevention Methods.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
What is Identity Theft, and how can you protect yourself from it?
“You Really Can Stay One Step Ahead of The Bad Guys” Presented by: Keystone Computer Concepts Inc.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
I Can…BR….  Understand what identity theft is and why it is important to guard against it.  Learn to recognize strategies that scam artists use to access.
What is identity theft, and how can you protect yourself from it?
INTERNET SAFETY FOR STUDENTS
David Abarca, Instructor Del Mar College Computer Corner Phishing, Pharming, Spear-Phishing, and now…. Vishing.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Internet Phishing Not the kind of Fishing you are used to.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
INTERNET SAFETY FOR STUDENTS
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
What Every Parent Needs to Know! Internet Safety Information for Parents Purpose: Provide practical information parents can use at home Present safety.
Security Issues: Phishing, Pharming, and Spam
Social impacts of the use of it By: Mohamed Abdalla.
Day 3 Cybersafety Presented by FJUHSD Teacher Librarian.
JMU GenCyber Boot Camp Summer, Cyberspace Risks and Defenses Facebook Snapchat P2P filesharing Apps Craigslist Scams JMU GenCyber Boot Camp© 2015.
Have Fun, Be Safe Strategies for Internet and Social Media Safety.
Reliability & Desirability of Data
Scams & Schemes Common Sense Media.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
100 Internet Safety Jeopardy Social Network Sites Online Shopping Words & Pictures Cyber- bullying Internet Scams.
Becoming a Digital Citizen Acknowledgments Thanks to UNC: The Graduate School for this PowerPoint Layout, Microsoft gallery for photos, and Commonsense.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
CCT355H5 F Presentation: Phishing November Jennifer Li.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
Don’t Be “Phooled” By Phishing Federal Trade Commission National Consumers League Microsoft Corporation March 31, 2005.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
And more……. ‘Leadership and communication are inseparable. You can’t have one without the other.’ ---Claude I. Taylor.
What is Spam? d min.
MXit is a mobile application that allows people to chat to their friends at a much cheaper rate than normal text messages. You can contact anyone anywhere.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Threats to IT security Jordan pilcher. phishing Phishing is when companies or people from other people who think they can get away with scamming you for.
Phishing and online fraud What parents need to know.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
5 different ways to get tricked on the internet. 1. Viruses A virus is a computer malware program that copies it’s files to the computer. This may allow.
The graph shows how questions that I have asked the people around me. Every one that I asked has a cell phone and they text a lot. Most of them text a.
FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    1 Overall Classification of this Briefing is UNCLASSIFIED//FOUO Phishing.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Fall Phishing - attempt to acquire sensitive information, like bank account information or an account password, by posing as a legitimate entity.
Take the Quiz and find out more!
Important Information Provided by Information Technology Center
Topic 4: E-safety, Health and Safety
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Mrs. Esman Computer Special
Phishing, identity theft, and more
Learn how to protect yourself against common attacks
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Lesson 3 Safe Computing.
Information Security and Privacy Pertaining to Phishing and Internet Scams Brian Corl COSC 316 Information Security and Privacy.
Information Security 101 Richard Davis, Rob Laltrello.
Cybersecurity Awareness
Scams and Schemes.
Personal IT Security Cyber Security – Basic Steps
DON’T GET HOOKED! YOU MAY BE UNAWARE BUT YOU ARE A PHISHING TARGET FOR CYBER CRIMINALS. A. Unknown sender address B. Offer too good to be true &
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

1 1 SMSishing Attacks Jim Horwath July 2012 GIAC GSE, GCUX, GCIA, GCIH, GREM, GSEC, GSIP

2 What is SMSishing? SMSishing: Is criminal activity similar to phishing where SMS messages are sent to a mobile phone trying to scam users into responding to bogus messages (links/phone numbers/text messages). The SMS messages entice people to divulge personal information. Result: After user responds to the bogus message, charges start accumulating on the user’s cellular bill. Why: Most phone contracts do not have clauses in them protecting users from SMSishing scams. The attackers and cellular providers each profit from this scam.

3 Why Do SMSishing Attacks Work? Human Emotion Fear: –Fear of loosing money –Fear of false accusations –Fear of harm to friends and loved ones –Fear of dark secret revelation The Weak Link: –Mobile devices lack protections to spot malicious messages –People think mobile devices are safe –Most recipients do not think twice about clicking on links in text messages

4 How to Protect Against SMSishing Common Sense Approaches  Review bank and credit card policies on sending text messages  If you receive a message – ask if it sounds too good to be true  If you receive a message – ask if it is trying to instill fear in you  Use Text Alias Feature of cell providers  Enable “block texts from the Internet” feature is available from your cellular provider  Look carefully at the message for mistakes such as spelling and grammar errors

5 SMSishing Summary Criminals will find the easiest and most lucrative way to make money Mobile devices are common among all demographics Mobile devices are a perfect target for criminals Mobile devices lack protection against SMSishing Leverage available controls from cellular companies Use common sense when sending and receiving text Review cellular contracts for “scam protection” clauses Know policies of financial companies you use Educate family and friends to SMSishing attacks