Title: Rakshit Tandon
1Om sai ram
- Presented By
- Rakshit Tandon
- Consultant IAMAI- Safe Surfing
- Advisor Cyber Complaint Cell, UP Police , Agra
How Safe Are We ?
Fourth India Digital Summit 2009
2Started March 2009 Covered 22 Cities , 10
States , 100 schools Covered 1.75 lac
students Much more to go.
3(No Transcript)
4Major Threats on Internet for users
- Malware
- Phishing
- Internet Connection Security
- Cyber Stalking/ Cyber Defamation
- Email Scams
- Financial Frauds
- VOIP Calls
Rakshit Tandon
5Malware
- Downloading pirated content.
- Social Networking sites are a target.
- Fake Anti Virus Software's.
- Web Attacks.
- Consumer Needs
- Major youth visit sites for Bollywood songs ,
wallpapers, games and screensavers, mobile
ringtones and mobile applications - We are so conditioned to click on links, and the
bad guys know this, The email lures, the
enticements and the personalization of malware
attacks are getting much better. Social
engineering attacks on social networks are
beginning to explode and will only get worse. -
Rakshit Tandon
6Popular sites among youth.
Rakshit Tandon
7Phishing
- Major Victims
- Banks
- Email Service Providers
- Social Networking Sites
Rakshit Tandon
8Vishing
- Vishing is the criminal practice of using social
engineering and Voice over IP(VoIP) to gain
access to private personal and financial
information from the public for the purpose of
financial reward. - Vishing is typically used to steal credit card
numbers or other information used in identity
theft schemes from individuals.
Rakshit Tandon
9Broad band ConnectionSecurity Wi-Fi Hacking
- Problems
- High Usage Bills.
- Crime Done by others Internet Connection.
- Users not educated about Changing default
passwords of Modem and Internet Connection.
Rakshit Tandon
10WI-FI (Internet Hacking)
Rakshit Tandon
11Wi-Fi Hacked
- After the Ahmedabad bomb blasts where terrorists
hacked the wi-fi system of an American in Mumbai,
A terror e-mail claiming responsibility for the
Ahmedabad bomb blasts was sent to some private
new channels on July 27 from US national
Haywood's computer. - Criminals using WAR DRIVING Technique.
Rakshit Tandon
12Cyber Defamation / Cyber Stalking
- Students are major victim of Cyber Stalking /
Defamation -
- Security issue on Social Networking Sites
- a. Data Theft
- b. Impersonation
- c. Defamatory Content
- d. Fake Applications and fake links to
Malwares. - New Security Measures to be added to Social
Networking Sites.
Rakshit Tandon
13Email Threats
Rakshit Tandon
14Credit Card Cloning
SKIMMERS
How Skimmers are used
Writers to Duplicate Cards
Rakshit Tandon
15VOIP Calls
- When voice is digitized, encoded, compressed
into packets and exchanged over IP networks, it
is susceptible to misuse. - Cyber criminals will be drawn to the VoIP medium
to engage in voice fraud, data theft and other
scamssimilar to the problems email has
experienced. - The Intelligence Bureau has asked the
communication ministry to block all internet
telephony (VoIP) services to and from the country
until the Department of Telecom (DoT) puts in
place a mechanism to track such calls. - 15 Sep, 2009,TNN
Rakshit Tandon
16Major threats for Mobile Users
- SIM Cloning
- Duplicating IMEI Numbers on Unbranded Sets
- Mobile Viruses
- Mobile Data Security
- Identity Verification and Procurement of
Connections - Mobile Payments / Banking
- Caller ID/SMS Spoofing
Rakshit Tandon
17Mobile security
- PIN LOCKING
- MEMORY CARD LOCKING
- PHONE LOCKING
- PHONE LOCK IF SIM CHANGED
- APPLICATION LOCKING
- REMOTE LOCKING
- Mobile Trackers ( Third Party Applications)
Rakshit Tandon
18Mobile Tracker
Rakshit Tandon
19Mobile Threats
- Every mobile handset has a unique factory-coded
Electronic Serial Number (ESN) and a Mobile
Identification Number (MIN). - Cell phone cloning is copying the identity of one
mobile telephone to another mobile telephone. - Result
- You could run up huge bills, and worse, your
mobile phone number could be misused for criminal
activities.
Rakshit Tandon
20Mobile Viruses
- Cabir / Mabir
- MOS Trojan Sends Automated SMS on high cost
centres. - The Trojan.Mos virus is included on the MOSQUITO
game. When you install this game, (maybe not from
the original one) the virus will also be
installed on your system's folder.The affect of
this virus is it will use your SMS gateway to
send messages to a high cost number, hence you
will be charged. - If you place antivirus software on a mobile
device, it will run the battery down, so mobile
security will require new approaches and
partnerships between manufacturers, carriers and
application developers
Rakshit Tandon
21Challenges to Law Enforcement Agencies
- Surveillance of Mobile Phones
- Tracing VOIP Calls
- Tracking IP Details from Service Providers
- Fake Identity of connections
- Fake Accounts in Banks
Rakshit Tandon
22Thank You
Rakshit Tandon Email rakshittandon_at_yahoo.co.in C
ell 91-9760010017