SlideShare a Scribd company logo
HACKER’STARGET?
ARE YOU A
Youhavea69%chanceof
fallingvictimtocybercrime
inyourlifetime
That’salmost3outof4people
incountriesaroundtheworld
69%
57MILLIONAMERICANS
receivescamemailsayear
1OUTOF3
hacksoriginated
intheUSA
47%OFIDENTITYTHEFTS
areperpetratedbysomeone
thevictimknew
$8.9MILLION
thecostofcybercrimeper
businessintheU.S.in2012
HOW DO HACKERS
GET YOUR INFORMATION?
sortthroughyourpersonal
computerortrash60% hackorscam
youwhileonline25%
stealyour
wallet15%
clickona
spamlink19%
disclosefinancial
informationbyaccident3%
THOSE WHO GET THEIR
INFORMATION STOLEN
TACTICSFORHACKINGUSERACCOUNTSONLINE
BAITING
someone gives you a usb drive or other
electronic media that is preloaded with
malware. Plug it into your computer
and you’ve given them the backdoor to
your personal information!
CLICKJACKING
concealing hyperlinks beneath
legitimate clickable content which,
when clicked, gets you to download
malware or perform actions
CROSS-SITESCRIPTING
malicious code is injected into a
website you trust
DOXING
publicly releasing a person's
sensitive, identifying information,
typically retrieved from social
networking site profiles
SOCIALENGINEERING
strategic use of conversation to
extract information from people
without giving them the feeling
they are being interrogated
PHARMING
redirecting users from legitimate
websites to fraudulent ones for
the purpose of extracting
confidential data
PHISHING
usually an email that looks like it is
from a legitimate organization or
person, but actually contains a link
or file with malware
SPOOFING
deceiving computers or users by
hiding or faking one's identity.
Email spoofing utilizes a fake
email address or simulates a
genuine email address
TACTICSFORHACKINGUSERACCOUNTSONLINE(CONTINUED)
HOW MANY
ACCOUNTS HAVE
BEEN COMPROMISED
IN SINGLE ATTACKS
100,000,000
NETFLIX
18,000,000
WORDPRESS
6,500,000
LINKEDIN
1,500,000
VISA&MASTERCARD
600,000
DAILY
FACEBOOK
450,000
YAHOO
250,000
TWITTER
120,000
UNIVERSITIES
24,000,000
ZAPPOS
THEMOSTTARGETEDWEBSITESFORHACKERS
Twitter
Facebook
Retail
MediaTech
Ecommerce
InternetServiceProvider
SearchEngines
LawEnforcement
Government
Political
Financial
1.FLORIDA 2.ARIZONA 3.CALIFORNIA
TOPSTATESINTHEUSTHAT
AREVICTIMSOFCYBERCRIME
1.CHINA 2.BRAZIL/INDIA 3.USA
TOPCOUNTRIESTHATARE
VICTIMSOFCYBERCRIME
usealockorpasswordfor
yourcomputerandphones
keepyourpasswordsatleast8
characterslongandavoidusing
wordsfoundinadictionary
addoneuppercaseletterandasymbol
toyourpassword—itwilltakehackers
200yearstocrackitvs.2hoursifyou
usealllowercaseletters
logoutofyouraccounts
andclosebrowserwindows
LogOut
gopaperless—paperbank
statementsare8xmorelikelytobe
stolenthanpaperlessstatements
TIPS TO INCREASE
YOUR SECURITY
whenyoureceiveemailsfromyour
bank,godirectlytotheirwebsite—don't
clickonanylinksintheemail
SOURCES:
http://mashable.com/2012/06/06/6-5-million-linkedin-passwords
http://www.cnn.com/2012/07/12/tech/web/yahoo-users-hacked
http://www.symantec.com/about/news/release/article.jsp?prid=20110907_02
https://www.fbi.gov/about-us/investigate/counterintelligence/internet-social-networking-risks
http://www.cbsnews.com/8301-505124_162-57359700/zappos-hacked-24-million-accounts-at-risk
http://www.escapistmagazine.com/forums/read/7.320322-600-000-Facebook-Accounts-Get-Hacked-Daily
http://www.huffingtonpost.com/2012/10/04/hacktivists-college-records-dump-team-ghostshell_n_1940388.html
http://social4ce.com/blog/2013/02/11/social-media-bytes-hacking-social-media-hoax-and-stats-about-arab-online-users
http://live.wsj.com/video/visa-15m-accounts-were-hacked/46E45A62-7C71-4B1A-AA98-05637A288D2A.html#!46E45A62-7C71-4B1A-AA98-05637A288D2A
BROUGHT TO YOU BY:
WWW.SOLERANETWORKS.COM

More Related Content

PDF
Education is the Key to Fighting Cyber Crime
PDF
PhishingBox Presents 'What is Phishing' 2017
PPTX
Tha security awareness training
PDF
Phishing Awareness
PDF
How and Why to Make Email Everyone's Business
PPTX
Phishing technique tanish khilani
PPTX
Anti phishing presentation
PPTX
Cyber Attacks
Education is the Key to Fighting Cyber Crime
PhishingBox Presents 'What is Phishing' 2017
Tha security awareness training
Phishing Awareness
How and Why to Make Email Everyone's Business
Phishing technique tanish khilani
Anti phishing presentation
Cyber Attacks

What's hot (20)

PPTX
Email phishing and countermeasures
PPTX
Cyber attack
PPTX
4 Facts Every Business Should Know About Phishing
PPTX
Phishing ppt
PPT
Ict H A C K I N G
PPTX
The COVID-19 Phishing Threats to Watch Out For
PPTX
Phishing Incident Response Playbook
PPTX
Symantec Report On Rogue Security Software
PPTX
Phishing ppt
PPTX
Phishing - A modern web attack
PDF
13 Ransomware Statistics That Will Make You Rethink Data Protection
PPTX
PDF
Anatomy of a cyber-attack
PDF
Top Cyber Threats of 2009
PDF
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
PDF
Cybersecurity Awareness Infographics
PPTX
Phishing and hacking
PDF
RSA Monthly Online Fraud Report -- August 2013
 
PPTX
NASA Cyber Security Webinar: Phishing Detection Strategies
PPTX
Phishing attack seminar presentation
Email phishing and countermeasures
Cyber attack
4 Facts Every Business Should Know About Phishing
Phishing ppt
Ict H A C K I N G
The COVID-19 Phishing Threats to Watch Out For
Phishing Incident Response Playbook
Symantec Report On Rogue Security Software
Phishing ppt
Phishing - A modern web attack
13 Ransomware Statistics That Will Make You Rethink Data Protection
Anatomy of a cyber-attack
Top Cyber Threats of 2009
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
Cybersecurity Awareness Infographics
Phishing and hacking
RSA Monthly Online Fraud Report -- August 2013
 
NASA Cyber Security Webinar: Phishing Detection Strategies
Phishing attack seminar presentation

Viewers also liked (19)

PPTX
Online Security for Kids
PDF
hackers
PDF
Online Security
PDF
Hackers and Hacking a brief overview 5-26-2016
PDF
What teenage girls are to follow
PDF
Hackers and Harm Reduction / 29c3 / CCC
PDF
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
PDF
Teenage Girls: Who are they?
PPT
Hackers The Anarchists Of Our Time
PPT
The parable of the ten teenage girls
PDF
The Teenage Girl as Consumer and Communicator
PPTX
Peer to Peer Teen Dating Violence Prevention Training
PDF
Privacy and Security in Online Social Media : Intro to course
PDF
Privacy and Security in Online Social Media : Policing and Social Media - Part 2
PPTX
Hack the Hackers 2012: Client Side Hacking – Targeting the User
PDF
4G LTE Security - What hackers know?
PPT
Course on Ehtical Hacking - Introduction
PDF
Internet privacy ethics and online security
PPTX
Computer Hacking - An Introduction
Online Security for Kids
hackers
Online Security
Hackers and Hacking a brief overview 5-26-2016
What teenage girls are to follow
Hackers and Harm Reduction / 29c3 / CCC
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
Teenage Girls: Who are they?
Hackers The Anarchists Of Our Time
The parable of the ten teenage girls
The Teenage Girl as Consumer and Communicator
Peer to Peer Teen Dating Violence Prevention Training
Privacy and Security in Online Social Media : Intro to course
Privacy and Security in Online Social Media : Policing and Social Media - Part 2
Hack the Hackers 2012: Client Side Hacking – Targeting the User
4G LTE Security - What hackers know?
Course on Ehtical Hacking - Introduction
Internet privacy ethics and online security
Computer Hacking - An Introduction

Similar to Are You a Hacker's Target? (20)

PPTX
HACKING AND PHISHING
PPTX
HACKING presentation by Team Shivam.pptx
PPTX
Cyber security ATTACK on Retired Personnel, MITIGATION and Best Practices
PPTX
Hack your way into
PPT
Social Engineering: "The Cyber-Con"
PPTX
Ethical Hacking Overview
PPTX
Phishing Whaling and Hacking Case Studies.pptx
PPTX
Hacking
PPT
hacking
PPTX
Hacking Presentation v2 By Raffi
PPTX
Hacking intro
ODP
Introduction To Hacking
PPTX
Online safety, security, ethics & etiquette
PDF
Cyber Crime and Ethical Hacking
PPT
Information security Presentation
PPSX
Cyber Crime and Ethical Hacking
PPTX
Cyber Crime and Ethical Hacking
PDF
Ethical Hacking Module 1 Notes by Hackopedia
PPTX
What is cyber security
PPSX
Hacking
HACKING AND PHISHING
HACKING presentation by Team Shivam.pptx
Cyber security ATTACK on Retired Personnel, MITIGATION and Best Practices
Hack your way into
Social Engineering: "The Cyber-Con"
Ethical Hacking Overview
Phishing Whaling and Hacking Case Studies.pptx
Hacking
hacking
Hacking Presentation v2 By Raffi
Hacking intro
Introduction To Hacking
Online safety, security, ethics & etiquette
Cyber Crime and Ethical Hacking
Information security Presentation
Cyber Crime and Ethical Hacking
Cyber Crime and Ethical Hacking
Ethical Hacking Module 1 Notes by Hackopedia
What is cyber security
Hacking

More from Blue Coat (12)

PDF
What is Heartbleed?
PDF
Infographic: Stop Attacks Hiding Under the Cover of SSL Encryption
PDF
Empowering the Campus Network
PDF
Revolutionizing Advanced Threat Protection
PDF
Why Your Mobile Device Isn’t As Secure As You Think
PDF
CAS MAA Infographic
PPTX
Content Analysis System and Advanced Threat Protection
PPTX
Advanced Threat Protection - Sandboxing 101
PDF
Advanced Threat Protection Lifecycle Infographic
PDF
How Safe Is YOUR Social Network?
PDF
Big Data Security Intelligence and Analytics for Advanced Threat Protection
PDF
How To Catch A Hidden Spammer
What is Heartbleed?
Infographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Empowering the Campus Network
Revolutionizing Advanced Threat Protection
Why Your Mobile Device Isn’t As Secure As You Think
CAS MAA Infographic
Content Analysis System and Advanced Threat Protection
Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection Lifecycle Infographic
How Safe Is YOUR Social Network?
Big Data Security Intelligence and Analytics for Advanced Threat Protection
How To Catch A Hidden Spammer

Recently uploaded (20)

PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
KodekX | Application Modernization Development
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Modernizing your data center with Dell and AMD
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPT
Teaching material agriculture food technology
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
A Presentation on Artificial Intelligence
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Electronic commerce courselecture one. Pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
DOCX
The AUB Centre for AI in Media Proposal.docx
Reach Out and Touch Someone: Haptics and Empathic Computing
Diabetes mellitus diagnosis method based random forest with bat algorithm
KodekX | Application Modernization Development
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Modernizing your data center with Dell and AMD
20250228 LYD VKU AI Blended-Learning.pptx
NewMind AI Monthly Chronicles - July 2025
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Teaching material agriculture food technology
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
A Presentation on Artificial Intelligence
Digital-Transformation-Roadmap-for-Companies.pptx
Electronic commerce courselecture one. Pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
The AUB Centre for AI in Media Proposal.docx

Are You a Hacker's Target?