socially engineered attack vectors openings and closings
TRANSCRIPT
Alan W Silberberg
CEO of DIGIJAKS
Presented to California Cyber Security Task Force November 2015.
Presented By Alan W Silberberg to Calfiornia Cyber Security Task Force 2015
1
Opening – Who does this and how do they get in?
Social Engineered Attack as Phishing in Mobile leading to bluejacking, device denial and theft.
Social Engineered Attack using a “Social Graph” as vector to learn more about orgs, people then to commence with phishing, watering-hole and MiTM attacks.
Closing the Barn Door, keeping it shut, while still looking through the window.
Presented By Alan W Silberberg to Calfiornia Cyber Security Task Force 2015
2
3
Presented By Alan W Silberberg to Calfiornia Cyber Security Task Force 2015
Presented By Alan W Silberberg to Calfiornia Cyber Security Task Force 2015
4
Presented By Alan W Silberberg to Calfiornia Cyber Security Task Force 2015
5
Presented By Alan W Silberberg to Calfiornia Cyber Security Task Force 2015
6
Presented By Alan W Silberberg to Calfiornia Cyber Security Task Force 2015
7
8
Presented By Alan W Silberberg to Calfiornia Cyber Security Task Force 2015
Every APP has to be thoroughly vetted even if coming from Apple or Google stores for PUA and Permission Authorities.
Social Media is both the way in and the way to shut them down. It is imperative to be using social media, to be on, and listening but also to have all privacy and safety settings bolted down. True in personal and organizational environments.
Phishing can occur through voice, through SMS, through social media and even through videos and websites.
9
Presented By Alan W Silberberg to Calfiornia Cyber Security Task Force 2015
NODEXL is a free plug in for Microsoft Excel which allows for bulk importation of social media graph data from multiple platforms and allows for complex visualizations to be built using a number of categories including users and hashtags/content.
MENTIONMAPP.COM is excellent for instant social map on twitter.
PAID SERVICES INCLUDE:
RADIAN 6
BOTTLENOSE
Numerous Analytics companies that offer visualizations
10
Presented By Alan W Silberberg to Calfiornia Cyber Security Task Force 2015