Cyber crime is causing tens of billions of dollars in damage per year and awareness of the need to protect yourself is growing.
This Workshop addresses issues related to new security challenges in the digital age for small and medium-sized businesses.
Program
- Identity on the WEB
- Nobody knows you are a dog
- Websites know a lot more about us than we do about sites.
- Identity of the interlocutor: how complex it can be to establish it with certainty
- Notes on how SSL certifications work and the real meaning of “validation
- Practical tips: how to perform some basic checks with publicly available tools Phishing/Spear Phishing
- Differences between the various types of Phishing
- Common phishing templates (paypal, COVID-related, … )
- How to recognize a phishing attempt
- Spear Phishing: techniques used
- OSINT: how our information can be collected and used to trick us
- How to deal with suspicious files
- Using online services
- Hashing (what it means, how to do it)
- The treatment of suspicious situations, the various cases, when how to use them:
- local VMs
- local sandboxes
- disposable system
- Personal information display
- cookies and third-party-cookies
- Use of Web Containers
- My IP
- Tracking information
- Mobile security
- Security in official stores
- Use of Alternative Markets
- Infection/compromise techniques used
- Advice on the approach to mobile device security: the less, the better
- Rooted Phones Considerations
- Considerations on “security” applications: firewalls, stalkware, etc Epic fails: some cases of compromised security