SlideShare a Scribd company logo
1 of 11
AISCON 2016
PAUL BABILA MBUA BENGYELLA
Executive Director/Founder Zixtech Organization
CEO / Founder Entrepreneurs Initiative
JCI Limbe Atlantic President 2017
EMAIL ATTACKS / PHISHING ATTACKS
DECEPTIVE PHISHING
• Impersonate a legitimate company and
attempt to steal people’s personal information
or login credentials. THEY USE THREATS
AND SENSE OF URGENCY
• THEY ACT AS A LEGITIMATE COMPANY
SPEAR PHISHING
• It uses target’s name, position, company, work
phone number and other information in an
attempt to trick the recipient into believing that
they have a connection with the sender.
• THEY ACT AS A THEY KNOW YOU, THEY PROVIDE
SOME INFOS ABOUT YOU
• cybersecurity firm Kaspersky. Billion stolen from
100banks in 30 countries in 2015
http://money.cnn.com/2015/02/16/technology/bank-hack-kaspersky/index.html?section=money_topstories
WHAT IS PHISHING
• LEARN MORE FROM THIS VIDEO
HOW TO DETECT IT
• Don’t trust the display name
• Don’t be in a haste to click every link
• Check for spelling mistakes
• Analyze the salutation (Vague Greetings)
• Don’t give up personal information
• Beware of urgent or threatening language in
the subject line
• Don’t click on attachments
DON’T BELIEVE EVERYTHING YOU SEE
HOW TO PREVENT IT
• Conduct security awareness training for staff
• (2SV) Two-step verification,
• Enter sensitive information only on ‘https://
RUN GENUINE ANTIVIRUS (Virus + malware), Firewall
Windows or others (Updated)
• Never Go to Your Bank’s Website by Clicking on
Links Included in Emails
• Be careful of too good to be true
• Be careful of WEBSITES YOU OPEN/LINKS U CLICK
ATM ATTACKS
SHIMMING ATTACK
 Billions of francs is lost to Shimming attacks
Shimming technology changes rapidly
SHIMMING?
• A shimmer is a device that's placed inside the
ATM to intercept communications between
the chip card and the chip reader.
(All card details stolen)
PREVENTION
• INSPECT ATM MACHINE (User and Bank)
• ALWAYS CHECK ACCOUNT BALANCE
• SMS TRANSACTION NOTIFICATION
THANK YOU
FOLLOW ME Facebook @paulbabz Twitter @zixtechorg
www.zixtechorganization.org
www.business.zixtechorganization.org
www.entrepreneursinitiative.com
www.jci.cc

More Related Content

What's hot

Joseph Carson. How a Lightbulb Almost Stopped Christmas
Joseph Carson. How a Lightbulb Almost Stopped ChristmasJoseph Carson. How a Lightbulb Almost Stopped Christmas
Joseph Carson. How a Lightbulb Almost Stopped ChristmasIT Arena
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanControlScan, Inc.
 
Powerpoint
PowerpointPowerpoint
PowerpointWhoya11
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threatsourav newatia
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Homejaysonstreet
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing AttacksSysCloud
 
Phishing exposed
Phishing exposedPhishing exposed
Phishing exposedtamfin
 
Shape Security @ WaffleJS October 16
Shape Security @ WaffleJS October 16Shape Security @ WaffleJS October 16
Shape Security @ WaffleJS October 16Jarrod Overson
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafeCheapSSLsecurity
 
How to identify unsafe websites
How to identify unsafe websitesHow to identify unsafe websites
How to identify unsafe websitesmaha5960
 
The Life of Breached Data & The Dark Side of Security
The Life of Breached Data & The Dark Side of SecurityThe Life of Breached Data & The Dark Side of Security
The Life of Breached Data & The Dark Side of SecurityJarrod Overson
 
The Dark Side of Security
The Dark Side of SecurityThe Dark Side of Security
The Dark Side of SecurityJarrod Overson
 
RSA Monthly Online Fraud Report -- August 2013
RSA Monthly Online Fraud Report -- August 2013RSA Monthly Online Fraud Report -- August 2013
RSA Monthly Online Fraud Report -- August 2013EMC
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing AttacksJagan Mohan
 

What's hot (20)

Joseph Carson. How a Lightbulb Almost Stopped Christmas
Joseph Carson. How a Lightbulb Almost Stopped ChristmasJoseph Carson. How a Lightbulb Almost Stopped Christmas
Joseph Carson. How a Lightbulb Almost Stopped Christmas
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
Phishing
PhishingPhishing
Phishing
 
Phishing Technology
Phishing TechnologyPhishing Technology
Phishing Technology
 
Phishing exposed
Phishing exposedPhishing exposed
Phishing exposed
 
Shape Security @ WaffleJS October 16
Shape Security @ WaffleJS October 16Shape Security @ WaffleJS October 16
Shape Security @ WaffleJS October 16
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 
Phishing
PhishingPhishing
Phishing
 
How to identify unsafe websites
How to identify unsafe websitesHow to identify unsafe websites
How to identify unsafe websites
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
The Life of Breached Data & The Dark Side of Security
The Life of Breached Data & The Dark Side of SecurityThe Life of Breached Data & The Dark Side of Security
The Life of Breached Data & The Dark Side of Security
 
The Dark Side of Security
The Dark Side of SecurityThe Dark Side of Security
The Dark Side of Security
 
RSA Monthly Online Fraud Report -- August 2013
RSA Monthly Online Fraud Report -- August 2013RSA Monthly Online Fraud Report -- August 2013
RSA Monthly Online Fraud Report -- August 2013
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
 

Viewers also liked

Ibn breakfast meeting, jumeirah emirates towers
Ibn breakfast meeting, jumeirah emirates towersIbn breakfast meeting, jumeirah emirates towers
Ibn breakfast meeting, jumeirah emirates towersjaison431
 
El cine de Eric Rohmer
El cine de Eric RohmerEl cine de Eric Rohmer
El cine de Eric RohmerBiblioCINETICA
 
Informationen: Fördernde Mitglieder von FNM Austria
Informationen: Fördernde Mitglieder von FNM AustriaInformationen: Fördernde Mitglieder von FNM Austria
Informationen: Fördernde Mitglieder von FNM AustriaFNM Austria
 
Presentación1 electiva v
Presentación1 electiva vPresentación1 electiva v
Presentación1 electiva vMaria Contreras
 
You've Got Mail (And More Customers!) With Email Marketing Talk
You've Got Mail (And More Customers!) With Email Marketing TalkYou've Got Mail (And More Customers!) With Email Marketing Talk
You've Got Mail (And More Customers!) With Email Marketing TalkStreetSmart Coaching
 
Top 5 reasons our people love to work at Western Power
Top 5 reasons our people love to work at Western PowerTop 5 reasons our people love to work at Western Power
Top 5 reasons our people love to work at Western PowerJoanne Petch
 
WEEC in Gothenburg and Greater Burlington updates, Thomas Hudspeth
WEEC in Gothenburg and Greater Burlington updates, Thomas Hudspeth WEEC in Gothenburg and Greater Burlington updates, Thomas Hudspeth
WEEC in Gothenburg and Greater Burlington updates, Thomas Hudspeth ESD UNU-IAS
 
Como añadir un formulario de contacto en un blog de blogger
Como añadir un formulario de contacto en un blog de bloggerComo añadir un formulario de contacto en un blog de blogger
Como añadir un formulario de contacto en un blog de bloggerIPAE
 
WebCenter Imaging using KFI and OFR - INSYNC Conference Perth 2013
WebCenter Imaging using KFI and OFR - INSYNC Conference Perth 2013WebCenter Imaging using KFI and OFR - INSYNC Conference Perth 2013
WebCenter Imaging using KFI and OFR - INSYNC Conference Perth 2013LansenConsulting
 
La audiencia de la radio actual por Nacho Gallego de la UC3M @ Radio 2.0 Madr...
La audiencia de la radio actual por Nacho Gallego de la UC3M @ Radio 2.0 Madr...La audiencia de la radio actual por Nacho Gallego de la UC3M @ Radio 2.0 Madr...
La audiencia de la radio actual por Nacho Gallego de la UC3M @ Radio 2.0 Madr...ACTUONDA
 
Guia de uso de la pluma precargada OVITRELLE
Guia de uso de la pluma precargada OVITRELLEGuia de uso de la pluma precargada OVITRELLE
Guia de uso de la pluma precargada OVITRELLEInstituto FIVIR
 

Viewers also liked (20)

Ibn breakfast meeting, jumeirah emirates towers
Ibn breakfast meeting, jumeirah emirates towersIbn breakfast meeting, jumeirah emirates towers
Ibn breakfast meeting, jumeirah emirates towers
 
El cine de Eric Rohmer
El cine de Eric RohmerEl cine de Eric Rohmer
El cine de Eric Rohmer
 
Cap6 aminoácidos
Cap6 aminoácidosCap6 aminoácidos
Cap6 aminoácidos
 
VALENCIA CLUB DE COCINA
VALENCIA CLUB DE COCINAVALENCIA CLUB DE COCINA
VALENCIA CLUB DE COCINA
 
Informationen: Fördernde Mitglieder von FNM Austria
Informationen: Fördernde Mitglieder von FNM AustriaInformationen: Fördernde Mitglieder von FNM Austria
Informationen: Fördernde Mitglieder von FNM Austria
 
Curriculumvitae
CurriculumvitaeCurriculumvitae
Curriculumvitae
 
Presentación1 electiva v
Presentación1 electiva vPresentación1 electiva v
Presentación1 electiva v
 
Verbundprojekt PRIDE
Verbundprojekt PRIDEVerbundprojekt PRIDE
Verbundprojekt PRIDE
 
You've Got Mail (And More Customers!) With Email Marketing Talk
You've Got Mail (And More Customers!) With Email Marketing TalkYou've Got Mail (And More Customers!) With Email Marketing Talk
You've Got Mail (And More Customers!) With Email Marketing Talk
 
Top 5 reasons our people love to work at Western Power
Top 5 reasons our people love to work at Western PowerTop 5 reasons our people love to work at Western Power
Top 5 reasons our people love to work at Western Power
 
Gc2 telefono
Gc2 telefonoGc2 telefono
Gc2 telefono
 
DJ Steve Aoki
DJ Steve AokiDJ Steve Aoki
DJ Steve Aoki
 
Cuaderno afrodescendientes sept-oct_2011
Cuaderno afrodescendientes sept-oct_2011Cuaderno afrodescendientes sept-oct_2011
Cuaderno afrodescendientes sept-oct_2011
 
WEEC in Gothenburg and Greater Burlington updates, Thomas Hudspeth
WEEC in Gothenburg and Greater Burlington updates, Thomas Hudspeth WEEC in Gothenburg and Greater Burlington updates, Thomas Hudspeth
WEEC in Gothenburg and Greater Burlington updates, Thomas Hudspeth
 
Como añadir un formulario de contacto en un blog de blogger
Como añadir un formulario de contacto en un blog de bloggerComo añadir un formulario de contacto en un blog de blogger
Como añadir un formulario de contacto en un blog de blogger
 
WebCenter Imaging using KFI and OFR - INSYNC Conference Perth 2013
WebCenter Imaging using KFI and OFR - INSYNC Conference Perth 2013WebCenter Imaging using KFI and OFR - INSYNC Conference Perth 2013
WebCenter Imaging using KFI and OFR - INSYNC Conference Perth 2013
 
Catalog door handles Colombo Design
Catalog door handles Colombo DesignCatalog door handles Colombo Design
Catalog door handles Colombo Design
 
La audiencia de la radio actual por Nacho Gallego de la UC3M @ Radio 2.0 Madr...
La audiencia de la radio actual por Nacho Gallego de la UC3M @ Radio 2.0 Madr...La audiencia de la radio actual por Nacho Gallego de la UC3M @ Radio 2.0 Madr...
La audiencia de la radio actual por Nacho Gallego de la UC3M @ Radio 2.0 Madr...
 
Guia de uso de la pluma precargada OVITRELLE
Guia de uso de la pluma precargada OVITRELLEGuia de uso de la pluma precargada OVITRELLE
Guia de uso de la pluma precargada OVITRELLE
 
Grupo jacaranda
Grupo jacarandaGrupo jacaranda
Grupo jacaranda
 

Similar to Email attacks and shimming attack

Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessOWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessMaherHamza9
 
IT2252_Presentation_Group03.pptx
IT2252_Presentation_Group03.pptxIT2252_Presentation_Group03.pptx
IT2252_Presentation_Group03.pptxNLFunnyFunky
 
Protecting Your Business from Cybercrime - Cybersecurity 101
Protecting Your Business from Cybercrime - Cybersecurity 101Protecting Your Business from Cybercrime - Cybersecurity 101
Protecting Your Business from Cybercrime - Cybersecurity 101David J Rosenthal
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)aleeya91
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxStephen Jesukanth Martin
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayMichele Chubirka
 
Cyber Crime Campain Messages_Poster_Final
Cyber Crime Campain Messages_Poster_FinalCyber Crime Campain Messages_Poster_Final
Cyber Crime Campain Messages_Poster_FinalSiphiwe Msibi
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBCapyn
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?Entrance Exam Info
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfMansoorAhmed57263
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptOoXair
 
Chapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyChapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyAnjan Mahanta
 

Similar to Email attacks and shimming attack (20)

Cyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools TacticsCyber Security and Fraud Prevention Tools Tactics
Cyber Security and Fraud Prevention Tools Tactics
 
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessOWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
 
IT2252_Presentation_Group03.pptx
IT2252_Presentation_Group03.pptxIT2252_Presentation_Group03.pptx
IT2252_Presentation_Group03.pptx
 
Protecting Your Business from Cybercrime - Cybersecurity 101
Protecting Your Business from Cybercrime - Cybersecurity 101Protecting Your Business from Cybercrime - Cybersecurity 101
Protecting Your Business from Cybercrime - Cybersecurity 101
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
 
CYBER SECURITY _ PHISHING
CYBER SECURITY _ PHISHINGCYBER SECURITY _ PHISHING
CYBER SECURITY _ PHISHING
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Phishing and prevention
Phishing and preventionPhishing and prevention
Phishing and prevention
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
 
Cyber Crime Campain Messages_Poster_Final
Cyber Crime Campain Messages_Poster_FinalCyber Crime Campain Messages_Poster_Final
Cyber Crime Campain Messages_Poster_Final
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Day 2
Day 2Day 2
Day 2
 
Chapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyChapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & Safety
 

More from Paul Mbua

THE POWER OF DIGITAL TECHNOLOGIES AND POSITIVE TRANSFORMATION ON BUSINESSES.pdf
THE POWER OF DIGITAL TECHNOLOGIES AND POSITIVE TRANSFORMATION ON BUSINESSES.pdfTHE POWER OF DIGITAL TECHNOLOGIES AND POSITIVE TRANSFORMATION ON BUSINESSES.pdf
THE POWER OF DIGITAL TECHNOLOGIES AND POSITIVE TRANSFORMATION ON BUSINESSES.pdfPaul Mbua
 
Personal Development and Self discovery
Personal Development and Self discovery Personal Development and Self discovery
Personal Development and Self discovery Paul Mbua
 
How to Pitch a Business.pptx
How to Pitch a Business.pptxHow to Pitch a Business.pptx
How to Pitch a Business.pptxPaul Mbua
 
Formation business model - French
Formation business model - FrenchFormation business model - French
Formation business model - FrenchPaul Mbua
 
Building Cash flow model
Building Cash flow modelBuilding Cash flow model
Building Cash flow modelPaul Mbua
 
Startups and entrepreneurship
Startups and entrepreneurshipStartups and entrepreneurship
Startups and entrepreneurshipPaul Mbua
 
Passion is not Enough but Commitment - Our view: Zixtech Organization
Passion is not Enough but Commitment - Our view: Zixtech OrganizationPassion is not Enough but Commitment - Our view: Zixtech Organization
Passion is not Enough but Commitment - Our view: Zixtech OrganizationPaul Mbua
 
Presentation going green for entrepreneurs
Presentation going green for entrepreneursPresentation going green for entrepreneurs
Presentation going green for entrepreneursPaul Mbua
 

More from Paul Mbua (8)

THE POWER OF DIGITAL TECHNOLOGIES AND POSITIVE TRANSFORMATION ON BUSINESSES.pdf
THE POWER OF DIGITAL TECHNOLOGIES AND POSITIVE TRANSFORMATION ON BUSINESSES.pdfTHE POWER OF DIGITAL TECHNOLOGIES AND POSITIVE TRANSFORMATION ON BUSINESSES.pdf
THE POWER OF DIGITAL TECHNOLOGIES AND POSITIVE TRANSFORMATION ON BUSINESSES.pdf
 
Personal Development and Self discovery
Personal Development and Self discovery Personal Development and Self discovery
Personal Development and Self discovery
 
How to Pitch a Business.pptx
How to Pitch a Business.pptxHow to Pitch a Business.pptx
How to Pitch a Business.pptx
 
Formation business model - French
Formation business model - FrenchFormation business model - French
Formation business model - French
 
Building Cash flow model
Building Cash flow modelBuilding Cash flow model
Building Cash flow model
 
Startups and entrepreneurship
Startups and entrepreneurshipStartups and entrepreneurship
Startups and entrepreneurship
 
Passion is not Enough but Commitment - Our view: Zixtech Organization
Passion is not Enough but Commitment - Our view: Zixtech OrganizationPassion is not Enough but Commitment - Our view: Zixtech Organization
Passion is not Enough but Commitment - Our view: Zixtech Organization
 
Presentation going green for entrepreneurs
Presentation going green for entrepreneursPresentation going green for entrepreneurs
Presentation going green for entrepreneurs
 

Recently uploaded

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

Email attacks and shimming attack

  • 1. AISCON 2016 PAUL BABILA MBUA BENGYELLA Executive Director/Founder Zixtech Organization CEO / Founder Entrepreneurs Initiative JCI Limbe Atlantic President 2017
  • 2. EMAIL ATTACKS / PHISHING ATTACKS DECEPTIVE PHISHING • Impersonate a legitimate company and attempt to steal people’s personal information or login credentials. THEY USE THREATS AND SENSE OF URGENCY • THEY ACT AS A LEGITIMATE COMPANY
  • 3. SPEAR PHISHING • It uses target’s name, position, company, work phone number and other information in an attempt to trick the recipient into believing that they have a connection with the sender. • THEY ACT AS A THEY KNOW YOU, THEY PROVIDE SOME INFOS ABOUT YOU • cybersecurity firm Kaspersky. Billion stolen from 100banks in 30 countries in 2015 http://money.cnn.com/2015/02/16/technology/bank-hack-kaspersky/index.html?section=money_topstories
  • 4. WHAT IS PHISHING • LEARN MORE FROM THIS VIDEO
  • 5. HOW TO DETECT IT • Don’t trust the display name • Don’t be in a haste to click every link • Check for spelling mistakes • Analyze the salutation (Vague Greetings) • Don’t give up personal information • Beware of urgent or threatening language in the subject line • Don’t click on attachments DON’T BELIEVE EVERYTHING YOU SEE
  • 6. HOW TO PREVENT IT • Conduct security awareness training for staff • (2SV) Two-step verification, • Enter sensitive information only on ‘https:// RUN GENUINE ANTIVIRUS (Virus + malware), Firewall Windows or others (Updated) • Never Go to Your Bank’s Website by Clicking on Links Included in Emails • Be careful of too good to be true • Be careful of WEBSITES YOU OPEN/LINKS U CLICK
  • 7. ATM ATTACKS SHIMMING ATTACK  Billions of francs is lost to Shimming attacks Shimming technology changes rapidly
  • 8. SHIMMING? • A shimmer is a device that's placed inside the ATM to intercept communications between the chip card and the chip reader. (All card details stolen)
  • 9.
  • 10. PREVENTION • INSPECT ATM MACHINE (User and Bank) • ALWAYS CHECK ACCOUNT BALANCE • SMS TRANSACTION NOTIFICATION
  • 11. THANK YOU FOLLOW ME Facebook @paulbabz Twitter @zixtechorg www.zixtechorganization.org www.business.zixtechorganization.org www.entrepreneursinitiative.com www.jci.cc