We demonstrate how you can be attacked by the use of a simple email. Stealing sensitive information through email attacks is quite common in Cameroon. There are lots of ATM attacks in Cameroon and we need to develop adaptive technology.
1. AISCON 2016
PAUL BABILA MBUA BENGYELLA
Executive Director/Founder Zixtech Organization
CEO / Founder Entrepreneurs Initiative
JCI Limbe Atlantic President 2017
2. EMAIL ATTACKS / PHISHING ATTACKS
DECEPTIVE PHISHING
• Impersonate a legitimate company and
attempt to steal people’s personal information
or login credentials. THEY USE THREATS
AND SENSE OF URGENCY
• THEY ACT AS A LEGITIMATE COMPANY
3. SPEAR PHISHING
• It uses target’s name, position, company, work
phone number and other information in an
attempt to trick the recipient into believing that
they have a connection with the sender.
• THEY ACT AS A THEY KNOW YOU, THEY PROVIDE
SOME INFOS ABOUT YOU
• cybersecurity firm Kaspersky. Billion stolen from
100banks in 30 countries in 2015
http://money.cnn.com/2015/02/16/technology/bank-hack-kaspersky/index.html?section=money_topstories
5. HOW TO DETECT IT
• Don’t trust the display name
• Don’t be in a haste to click every link
• Check for spelling mistakes
• Analyze the salutation (Vague Greetings)
• Don’t give up personal information
• Beware of urgent or threatening language in
the subject line
• Don’t click on attachments
DON’T BELIEVE EVERYTHING YOU SEE
6. HOW TO PREVENT IT
• Conduct security awareness training for staff
• (2SV) Two-step verification,
• Enter sensitive information only on ‘https://
RUN GENUINE ANTIVIRUS (Virus + malware), Firewall
Windows or others (Updated)
• Never Go to Your Bank’s Website by Clicking on
Links Included in Emails
• Be careful of too good to be true
• Be careful of WEBSITES YOU OPEN/LINKS U CLICK
8. SHIMMING?
• A shimmer is a device that's placed inside the
ATM to intercept communications between
the chip card and the chip reader.
(All card details stolen)