How spam change
the world?
Farhaan Bukhsh
What is Security?
Security refers to freedom from, or resilience against, potential harm
(or other unwanted coercive change) from external forces.
Beneficiaries (technically referents) of security may be persons and
social groups, objects and institutions, ecosystems, and any other
entity or phenomenon vulnerable to unwanted change by its
environment.
- Wikipedia
Well, now you can relate to Cyber
security?
Basically security of all your digital devices and
information.
Who are Hackers and what is Hacking ?
In computing, a hacker is any skilled computer expert that uses their
technical knowledge to overcome a problem. While "hacker" can
refer to any skilled computer programmer, the term has become
associated in popular culture with a "security hacker", someone who,
with their technical knowledge, uses bugs or exploits to break into
computer systems.
- Wikipedia
Now, since things are clear let’s come to the
real question.
What is spam?
Spam is ...
Spam is sort of shorthand for cybercrime. You can’t get cybercrime
done these days hardly without spam. Look at some of the biggest
data breaches that have leaked out over the past year: Target, Home
Depot—well, we still haven’t really heard how Home Depot went
down—J.P. Morgan, and a lot of these big ones started with a
malicious email. Most people think about annoying ads when they
think about spam, but malware is primarily disseminated through
spam. So it’s still a huge vector for a ridiculous amount of cybercrime
that gets perpetrated each day.
- Brian Krebs
What is in there for spammers?
1. Money
2. Reputation
3. Sometimes Life
Meet the Spammers!
The best place to find out:
Spamhaus -
https://www.spamhaus.org/statistics/spammers/
What are botnets?
A botnet is a number of Internet-connected devices, each of which is
running one or more bots. Botnets can be used to perform
distributed denial-of-service attack (DDoS attack), steal data, send
spam, and allow the attacker access to the device and its connection.
The owner can control the botnet using command and control (C&C)
software.[2] The word "botnet" is a combination of the words "robot"
and "network". The term is usually used with a negative or malicious
connotation.
- One and Only - Wikipedia
How are botnets used?
1. Carrying out DDoS attack
2. Sending out spams
3. Getting more machines in the botnets
4. Creating more and more of Zombie Computers
The ANTIS
ANTIS are companies who tried to stand against the spammer and
tries to spam them.
This can not be completely stopped but can only be prevented.
“Blue Frogs” of “Blue Security” - A curious case of spammer winning
the battle.
Bulletproof Hosting
A botnet is a number of Internet-connected devices, each of which is
running one or more bots. Botnets can be used to perform
distributed denial-of-service attack (DDoS attack), steal data, send
spam, and allow the attacker access to the device and its connection.
The owner can control the botnet using command and control (C&C)
software. The word "botnet" is a combination of the words "robot"
and "network". The term is usually used with a negative or malicious
connotation.
- Wikipedia
How does spam affects economy?
Spammers buy penny stocks and play the game of pump and dump.
(Rings a bell?)
How they fool people to buy into them?
There comes our amazing friend - Black SEO
Black SEO is a way of injecting the malicious link in
top ranking sites to make the link look legitimate.
Pharma Wars
1. What is Pharma Wars?
2. What happened ?
3. How it ended?
How can spam keep affecting us?
1. ICO
2. Cryptocurrency
3. Bank Frauds
4. Identity Theft
Thank You!
Questions Please?
Farhaan Bukhsh
Email: farhaan@fedoraproject.org
Twitter: @fhackdroid

More Related Content

DOCX
Final Copy Cyber Crime Research Essay
PDF
Security, Copyright and the Law
PPTX
Social Media Cyber Security Awareness Briefing
DOCX
Cyber security
PPTX
What is a 0 day exploit?
PPTX
Cyberterrorism
PPTX
Cyber Crime and Social Media Security
PPT
Cybercrime
Final Copy Cyber Crime Research Essay
Security, Copyright and the Law
Social Media Cyber Security Awareness Briefing
Cyber security
What is a 0 day exploit?
Cyberterrorism
Cyber Crime and Social Media Security
Cybercrime

What's hot (20)

DOCX
Stalking2
DOCX
Crime & technology
PPTX
Cyber threats
PPTX
Cyber terrorism
PDF
Cyber Security | Patricia Watson
PPTX
Revision Terrorist And Rebel Use Of It (David & Jorge)
PPTX
Cyber crime lecture pp update
PDF
Social Media & Crime
PDF
SOCIAL NETWORK SECURITY
PPTX
Dark side presentation lwhippedtc515
PPT
Cyber security
PPTX
Cyber Terrorism
PPTX
Riza 9 a
PPT
Social media & cyber crime
PPTX
Cyber crime: A Quick Survey
PPTX
Cyber crime
PPTX
Amir bouker
PPTX
ppt on child pornography and cyber crime
DOCX
Cybersecurity awesome mix vol. II
PPTX
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Stalking2
Crime & technology
Cyber threats
Cyber terrorism
Cyber Security | Patricia Watson
Revision Terrorist And Rebel Use Of It (David & Jorge)
Cyber crime lecture pp update
Social Media & Crime
SOCIAL NETWORK SECURITY
Dark side presentation lwhippedtc515
Cyber security
Cyber Terrorism
Riza 9 a
Social media & cyber crime
Cyber crime: A Quick Survey
Cyber crime
Amir bouker
ppt on child pornography and cyber crime
Cybersecurity awesome mix vol. II
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Ad

Similar to How spam change the world (20)

PPTX
Cyber crime
PPTX
Mcs2453 aniq mc101053-assignment1
PPTX
Guest Lecture-Computer and Cyber Security.pptx
PPT
Botnet
PPTX
Botnet
PDF
Ransomware hostage rescue manual
PDF
Cyber crime report
DOCX
Cyber crime
DOCX
Cyber crime
TXT
Cyber crime
PPTX
TC160_PowerPoint_presentation_gbraga
PDF
Cybersecurity -Terms.
DOCX
trojon horse Seminar report
PPT
PPTX
e-Security and malwares(virus, trojan and adware)
PPTX
Cybercrime: A Seminar Report
PPTX
Botnets
PPTX
Cyber crime against property
PDF
BOTNETS
PDF
BOTNET
Cyber crime
Mcs2453 aniq mc101053-assignment1
Guest Lecture-Computer and Cyber Security.pptx
Botnet
Botnet
Ransomware hostage rescue manual
Cyber crime report
Cyber crime
Cyber crime
Cyber crime
TC160_PowerPoint_presentation_gbraga
Cybersecurity -Terms.
trojon horse Seminar report
e-Security and malwares(virus, trojan and adware)
Cybercrime: A Seminar Report
Botnets
Cyber crime against property
BOTNETS
BOTNET
Ad

Recently uploaded (20)

PPTX
Feature types and data preprocessing steps
PDF
First part_B-Image Processing - 1 of 2).pdf
PPTX
Amdahl’s law is explained in the above power point presentations
PPTX
CN_Unite_1 AI&DS ENGGERING SPPU PUNE UNIVERSITY
PPTX
Information Storage and Retrieval Techniques Unit III
PPTX
Management Information system : MIS-e-Business Systems.pptx
PPTX
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
PPTX
PRASUNET_20240614003_231416_0000[1].pptx
PDF
Computer System Architecture 3rd Edition-M Morris Mano.pdf
PPTX
tack Data Structure with Array and Linked List Implementation, Push and Pop O...
PPTX
Software Engineering and software moduleing
PPTX
CONTRACTS IN CONSTRUCTION PROJECTS: TYPES
PDF
Unit I -OPERATING SYSTEMS_SRM_KATTANKULATHUR.pptx.pdf
PPTX
Chapter 2 -Technology and Enginerring Materials + Composites.pptx
PDF
Soil Improvement Techniques Note - Rabbi
PDF
Exploratory_Data_Analysis_Fundamentals.pdf
PPTX
"Array and Linked List in Data Structures with Types, Operations, Implementat...
PPTX
Module 8- Technological and Communication Skills.pptx
PDF
Unit1 - AIML Chapter 1 concept and ethics
PPTX
wireless networks, mobile computing.pptx
Feature types and data preprocessing steps
First part_B-Image Processing - 1 of 2).pdf
Amdahl’s law is explained in the above power point presentations
CN_Unite_1 AI&DS ENGGERING SPPU PUNE UNIVERSITY
Information Storage and Retrieval Techniques Unit III
Management Information system : MIS-e-Business Systems.pptx
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
PRASUNET_20240614003_231416_0000[1].pptx
Computer System Architecture 3rd Edition-M Morris Mano.pdf
tack Data Structure with Array and Linked List Implementation, Push and Pop O...
Software Engineering and software moduleing
CONTRACTS IN CONSTRUCTION PROJECTS: TYPES
Unit I -OPERATING SYSTEMS_SRM_KATTANKULATHUR.pptx.pdf
Chapter 2 -Technology and Enginerring Materials + Composites.pptx
Soil Improvement Techniques Note - Rabbi
Exploratory_Data_Analysis_Fundamentals.pdf
"Array and Linked List in Data Structures with Types, Operations, Implementat...
Module 8- Technological and Communication Skills.pptx
Unit1 - AIML Chapter 1 concept and ethics
wireless networks, mobile computing.pptx

How spam change the world

  • 1. How spam change the world? Farhaan Bukhsh
  • 2. What is Security? Security refers to freedom from, or resilience against, potential harm (or other unwanted coercive change) from external forces. Beneficiaries (technically referents) of security may be persons and social groups, objects and institutions, ecosystems, and any other entity or phenomenon vulnerable to unwanted change by its environment. - Wikipedia
  • 3. Well, now you can relate to Cyber security? Basically security of all your digital devices and information.
  • 4. Who are Hackers and what is Hacking ? In computing, a hacker is any skilled computer expert that uses their technical knowledge to overcome a problem. While "hacker" can refer to any skilled computer programmer, the term has become associated in popular culture with a "security hacker", someone who, with their technical knowledge, uses bugs or exploits to break into computer systems. - Wikipedia
  • 5. Now, since things are clear let’s come to the real question. What is spam?
  • 6. Spam is ... Spam is sort of shorthand for cybercrime. You can’t get cybercrime done these days hardly without spam. Look at some of the biggest data breaches that have leaked out over the past year: Target, Home Depot—well, we still haven’t really heard how Home Depot went down—J.P. Morgan, and a lot of these big ones started with a malicious email. Most people think about annoying ads when they think about spam, but malware is primarily disseminated through spam. So it’s still a huge vector for a ridiculous amount of cybercrime that gets perpetrated each day. - Brian Krebs
  • 7. What is in there for spammers? 1. Money 2. Reputation 3. Sometimes Life
  • 8. Meet the Spammers! The best place to find out: Spamhaus - https://www.spamhaus.org/statistics/spammers/
  • 9. What are botnets? A botnet is a number of Internet-connected devices, each of which is running one or more bots. Botnets can be used to perform distributed denial-of-service attack (DDoS attack), steal data, send spam, and allow the attacker access to the device and its connection. The owner can control the botnet using command and control (C&C) software.[2] The word "botnet" is a combination of the words "robot" and "network". The term is usually used with a negative or malicious connotation. - One and Only - Wikipedia
  • 10. How are botnets used? 1. Carrying out DDoS attack 2. Sending out spams 3. Getting more machines in the botnets 4. Creating more and more of Zombie Computers
  • 11. The ANTIS ANTIS are companies who tried to stand against the spammer and tries to spam them. This can not be completely stopped but can only be prevented. “Blue Frogs” of “Blue Security” - A curious case of spammer winning the battle.
  • 12. Bulletproof Hosting A botnet is a number of Internet-connected devices, each of which is running one or more bots. Botnets can be used to perform distributed denial-of-service attack (DDoS attack), steal data, send spam, and allow the attacker access to the device and its connection. The owner can control the botnet using command and control (C&C) software. The word "botnet" is a combination of the words "robot" and "network". The term is usually used with a negative or malicious connotation. - Wikipedia
  • 13. How does spam affects economy? Spammers buy penny stocks and play the game of pump and dump. (Rings a bell?)
  • 14. How they fool people to buy into them? There comes our amazing friend - Black SEO Black SEO is a way of injecting the malicious link in top ranking sites to make the link look legitimate.
  • 15. Pharma Wars 1. What is Pharma Wars? 2. What happened ? 3. How it ended?
  • 16. How can spam keep affecting us? 1. ICO 2. Cryptocurrency 3. Bank Frauds 4. Identity Theft