IOANNIS CHALKIADIS CERNIT SECURITY TEAM How to hack,earn money and stay out of jail. IT LIGHTNING TALK 04.12.15 CERN 1.

Slides:



Advertisements
Similar presentations
Thank you for putting cell phone on silent Please Response Encourage Success – refrain from criticisms Affiliate Network Platform Make Money Online Presented.
Advertisements

Chapter 1 We’ve Got Problems…. Four Horsemen  … of the electronic apocalypse  Spam --- unsolicited bulk o Over 70% of traffic  Bugs ---
Privacy: Facebook, Twitter
Ethics CSE 591 – Security and Vulnerability Analysis Spring 2015 Adam Doupé Arizona State University
7 Effective Habits when using the Internet Philip O’Kane 1.
Top Questions Executives and Board Members Should be Asking About IT and Cloud Risks.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
Security for Internet Every Day Use Standard Security Practices and New Threats.
Computer Security And Computer Crimes. Problem under consideration A software flaw was found in a national bank's web site that allows anyone who knows.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.
Boost your network security with NETASQ Vulnerability Manager.
Sage Insights 2015 Using the mobile and social benefits of Sage CRM to enhance your business. Ocean Helberg. Senior CRM Consultant.
FACEBOOK BY:GARSAN THAYANANTHAN. What is Facebook? Facebook is a social networking site that allows people to communicate and connect to family, friends.
Get Complete IT Compliance: Reduce Risk and Cost Jonathan CISO, Qualys Seth Automation Specialist, BMC.
Sam Cook April 18, Overview What is penetration testing? Performing a penetration test Styles of penetration testing Tools of the trade.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Viruses.
Geoff Holt Getting your message out there…. The Buying Cycle Awareness Knowledge Liking Preference Conviction Purchase Comfort.
Marketing Your Business Through Social Media. FSC Interactive Online and Interactive Marketing Agency located in New Orleans, La. Specialize in Social.
An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2.
Information Systems Security LAÏMOUCHE El Hadj, DAVY Benjamin 1source :
Introduction Position your online or offline business Quickly and safely grow a huge army of potential clients Productively interact with your new and.
FaceBook and Your Business Women in Technology in Nigeria Presented by Mrs M.O Alade Women in Technology in Nigeria
Social Media – Facebook Vs. Twitter Twitter asks its users to regularly publish short updates about what they’re doing or thinking. Its users answer the.
-Tyler. Social/Ethical Concern Security -Sony’s Playstation Network (PSN) hacked in April Hacker gained access to personal information -May have.
Cyber Edition:.
Security Issues of Cloud Computing in Healthcare.
Internet Safety Objectives  To be aware of the risks of using the Internet  To use the Internet safely Thursday, October.
By JD Large & Edwin Moore. Most People & the Internet Most PeopleThe Internet.
Security. Security Flaws Errors that can be exploited by attackers Constantly exploited.
Microsoft Security Response Center Presented by Fan Chiang, Chun-Wei( 范姜竣韋 ) 2015/11/14 1 NTUIM.
Facebook ([ ˈ fe ɪ s ˌ b ʊ k])-Social Network, founded in 2004 by Mark Zuckerberg and his roommates while studying at Harvard University, including.
Webmail security.. Webmail security should be of interest to you, because using web based programs like: Gmail, Hotmail, Yahoo, MSN, Rocket, basically.
Using Social Media for Fundraising and Communication with Supporters Lindsay Boyle – Communications & Research Coordinator Claire Chapman – Information.
Computer and Internet Security By: Steven Siggers Instructor: Dr. Marko Puljic.
Convenience product security Collin Busch. What is a convenience product? A convenience product is a device or application that makes your life easier.
© Young Scot 2008 Creating Your Own Social Network
“2 million Facebook, Gmail and Twitter passwords stolen in massive hack”
Ethics CSE 591 – Security and Vulnerability Analysis Spring 2015 Adam Doupé Arizona State University
按一下以編輯母片文字樣式 第二層 第三層 第四層 第五層 Microsoft Security Response Center Presented by Fan Chiang, Chun-Wei( 范姜竣韋 ) 2016/2/16 1 OPLab, NTUIM.
Security Mindset Lesson Introduction Why is cyber security important?
XSS VULNERABILITIES Nicole Coppola. XSS - Capabilities Cookie Theft – Session Hijacking Keylogging – addEventListener; passwords, credit cards, etc. Phishing.
The hold seems to be with the administration… 85% of students surveyed have no problem using Facebook to communicate according to PEW research.
Computer and Internet Security (How to protect your computer from Threats) By: Steven Siggers Instructor: Dr. Marko Puljic.
2012 Malnet Report: Breaking the Vicious Cycle Grant Asplund Senior Technology Evangelist.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
We offer assistance via toll free Yahoo support UK. We’re an excellent Yahoo Technical Support company and providing leading help.
AN INTRODUCTION TO FACEBOOK. Learning Objectives A brief introduction to the social networking site Facebook. Instructions to create an account. How to.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Visit us at- support.html.
November 14, 2016 bit.ly/nercomp_defendingyourdata16
Apple Privacy Policy As of: 12 September 2016
And Digital Bait How content theft sites and malware are exploited by cybercriminals to hack into internet users’ computers and personal data.
Module 3 (Ground Rules and Rules of Engagement)
Ethics CSE 591 – Security and Vulnerability Analysis Spring 2017
Juno Technical Support Number
Google Allowing Third Party Developers to Scan Your Gmail Inboxes The Tech giant Google has recently stated that there are still many third party developers.
Yahoo Toll-free | Unable to Login to Yahoo account U.S.A
Juno Technical Support Number
Yahoo Tech Support Number Yahoo Customer Care
E-Commerce and Social Networks
Ethics CSE 545 – Software Security Spring 2018 Adam Doupé
Security Metrics That Don’t Suck
What is computer hacking?
Luxury Images copyrighted to:
WELCOME How to Setup Yahoo Account Key Feature in Browser? CONTACT US
SECURITY DREAMS AND NIGHTMARES
Presentation transcript:

IOANNIS CHALKIADIS CERNIT SECURITY TEAM How to hack,earn money and stay out of jail. IT LIGHTNING TALK CERN 1

Hacking started about curiosity and knowledge, now it is just business. 2

How much is the global spending in IT Security?  Up to 77$ Billion in 2015*.  Is it enough? 3 *

I ask you again is it enough? 4

5

CompanyUsers JP Morgan Chase Sony Ebay Adobe Apple US Military Yahoo Biggest data breaches in the last decade * 6 *

24 year old Algerian –ZEUS BOTNET million infected machines 70 million $$ loss Hacking and arrests 7

27 year old Russian –BLACKHOLE EXPLOIT KIT- 97% of 2014 browser threats was from blackhole. (AVG) Was making $ per month selling his kit  He was smart huh? You know how he got arrested? He posted this picture in his Facebook profile.. Meh.. 8

What is bug bounty, terms/rules You report ->They reply -> Fix or will not fix -> Reward/Thank you 9

99% of the companies have this list of rules: Do not cause DOS (Denial of service) to their services. The vulnerability should not affect the user data or critical information. Responsible and ethical disclosure to the company. Do not share it with any third parties. Rules*Rules* 10

11

12

Google : Contacted them Got Response Triaged Situation ( implementing fix) Fixed Reward $$ and thank you My Personal Adventures 13

14

Western union : Contacted them Got Response Triaged Situation ( implementing fix) Fixed Reward $$ and thank you My Personal Adventures 15

16

Sites that host bug bounty programs

Want to learn more and improve? 18

Questions 19