Download - Are You a Hacker's Target?
![Page 1: Are You a Hacker's Target?](https://reader036.vdocument.in/reader036/viewer/2022082702/5555ea36d8b42ad3548b4b54/html5/thumbnails/1.jpg)
HACKER’S TARGET?A R E YO U A
![Page 2: Are You a Hacker's Target?](https://reader036.vdocument.in/reader036/viewer/2022082702/5555ea36d8b42ad3548b4b54/html5/thumbnails/2.jpg)
You have a 69% chance of falling victim to cybercrime
in your lifetime
That’s almost 3 out of 4 people in countries around the world69%
![Page 3: Are You a Hacker's Target?](https://reader036.vdocument.in/reader036/viewer/2022082702/5555ea36d8b42ad3548b4b54/html5/thumbnails/3.jpg)
57 MILLION AMERICANSreceive scam emails a year
1 OUT OF 3hacks originatedin the USA
47% OF IDENTITY THEFTSare perpetrated by someonethe victim knew
$8.9 MILLIONthe cost of cybercrime perbusiness in the U.S. in 2012
![Page 4: Are You a Hacker's Target?](https://reader036.vdocument.in/reader036/viewer/2022082702/5555ea36d8b42ad3548b4b54/html5/thumbnails/4.jpg)
H O W D O H A C K E R SG E T YO U R I N F O R M AT I O N ?
sort through your personal computer or trash60% hack or scam
you while online25%
steal your wallet15%
click on a spam link19%
disclose financial information by accident3%
T H O S E W H O G E T T H E I R I N F O R M AT I O N S T O L E N
![Page 5: Are You a Hacker's Target?](https://reader036.vdocument.in/reader036/viewer/2022082702/5555ea36d8b42ad3548b4b54/html5/thumbnails/5.jpg)
TACTICS FOR HACKING USER ACCOUNTS ONLINE
BAITINGsomeone gives you a usb drive or other electronic media that is preloaded with malware. Plug it into your computer and you’ve given them the backdoor to your personal information!
CLICKJACKINGconcealing hyperlinks beneath legitimate clickable content which, when clicked, gets you to download malware or perform actions
CROSS-SITE SCRIPTING malicious code is injected into a website you trust
DOXINGpublicly releasing a person's sensitive, identifying information, typically retrieved from social networking site profiles
![Page 6: Are You a Hacker's Target?](https://reader036.vdocument.in/reader036/viewer/2022082702/5555ea36d8b42ad3548b4b54/html5/thumbnails/6.jpg)
SOCIAL ENGINEERINGstrategic use of conversation to extract information from people without giving them the feeling they are being interrogated
PHARMINGredirecting users from legitimate websites to fraudulent ones for the purpose of extracting confidential data
PHISHINGusually an email that looks like it is from a legitimate organization or person, but actually contains a link or file with malware
SPOOFINGdeceiving computers or users by hiding or faking one's identity. Email spoofing utilizes a fake email address or simulates a genuine email address
TACTICS FOR HACKING USER ACCOUNTS ONLINE (CONTINUED)
![Page 7: Are You a Hacker's Target?](https://reader036.vdocument.in/reader036/viewer/2022082702/5555ea36d8b42ad3548b4b54/html5/thumbnails/7.jpg)
H O W M A N Y A C C O U N TS H AV E B E E N C O M P R O M I S E D I N S I N G L E AT TA C K S
100,000,000NETFLIX
18,000,000WORDPRESS
6,500,000
1,500,000
VISA & MASTERCARD
600,000DAILY
450,000
YAHOO250,000
TWITTER120,000
UNIVERSITIES
24,000,000ZAPPOS
![Page 8: Are You a Hacker's Target?](https://reader036.vdocument.in/reader036/viewer/2022082702/5555ea36d8b42ad3548b4b54/html5/thumbnails/8.jpg)
THE MOST TARGETED WEBSITES FOR HACKERSTwitter
Retail
Media Tech
Ecommerce
Internet Service ProviderSearch Engines
Law EnforcementGovernment
Political
Financial
1. FLORIDA 2. ARIZONA 3. CALIFORNIA
TOP STATES IN THE US THAT ARE VICTIMS OF CYBERCRIME
1. CHINA 2. BRAZIL/INDIA 3. USA
TOP COUNTRIES THAT ARE VICTIMS OF CYBERCRIME
![Page 9: Are You a Hacker's Target?](https://reader036.vdocument.in/reader036/viewer/2022082702/5555ea36d8b42ad3548b4b54/html5/thumbnails/9.jpg)
use a lock or password for your computer and phones
keep your passwords at least 8 characters long and avoid using
words found in a dictionary
add one uppercase letter and a symbol to your password—it will take hackers 200 years to crack it vs. 2 hours if you
use all lowercase letters
log out of your accounts and close browser windows
Log Out
go paperless—paper bank statements are 8x more likely to be stolen than paperless statements
T I P S T O I N C R E A S E YO U R S E C U R I T Y
when you receive emails from yourbank, go directly to their website—don't
click on any links in the email
![Page 10: Are You a Hacker's Target?](https://reader036.vdocument.in/reader036/viewer/2022082702/5555ea36d8b42ad3548b4b54/html5/thumbnails/10.jpg)
SOURCES:http://mashable.com/2012/06/06/6-5-million-linkedin-passwordshttp://www.cnn.com/2012/07/12/tech/web/yahoo-users-hackedhttp://www.symantec.com/about/news/release/article.jsp?prid=20110907_02https://www.fbi.gov/about-us/investigate/counterintelligence/internet-social-networking-riskshttp://www.cbsnews.com/8301-505124_162-57359700/zappos-hacked-24-million-accounts-at-riskhttp://www.escapistmagazine.com/forums/read/7.320322-600-000-Facebook-Accounts-Get-Hacked-Dailyhttp://www.hu�ngtonpost.com/2012/10/04/hacktivists-college-records-dump-team-ghostshell_n_1940388.htmlhttp://social4ce.com/blog/2013/02/11/social-media-bytes-hacking-social-media-hoax-and-stats-about-arab-online-usershttp://live.wsj.com/video/visa-15m-accounts-were-hacked/46E45A62-7C71-4B1A-AA98-05637A288D2A.html#!46E45A62-7C71-4B1A-AA98-05637A288D2A
BROUGHT TO YOU BY:
WWW.SOLERANETWORKS.COM