CINXE.COM

IEEE Cybersecurity 2017

<!DOCTYPE html> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta name="viewport" content="width=device-width, initial-scale=1.0" /> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /><script type="text/javascript">(window.NREUM||(NREUM={})).init={ajax:{deny_list:["bam.nr-data.net"]}};(window.NREUM||(NREUM={})).loader_config={licenseKey:"054b97878e",applicationID:"19376273"};;/*! For license information please see nr-loader-rum-1.274.0.min.js.LICENSE.txt */ (()=>{var e,t,r={8122:(e,t,r)=>{"use strict";r.d(t,{a:()=>i});var n=r(944);function i(e,t){try{if(!e||"object"!=typeof e)return(0,n.R)(3);if(!t||"object"!=typeof t)return(0,n.R)(4);const r=Object.create(Object.getPrototypeOf(t),Object.getOwnPropertyDescriptors(t)),o=0===Object.keys(r).length?e:r;for(let a in o)if(void 0!==e[a])try{if(null===e[a]){r[a]=null;continue}Array.isArray(e[a])&&Array.isArray(t[a])?r[a]=Array.from(new Set([...e[a],...t[a]])):"object"==typeof e[a]&&"object"==typeof t[a]?r[a]=i(e[a],t[a]):r[a]=e[a]}catch(e){(0,n.R)(1,e)}return r}catch(e){(0,n.R)(2,e)}}},2555:(e,t,r)=>{"use strict";r.d(t,{Vp:()=>c,fn:()=>s,x1:()=>u});var n=r(384),i=r(8122);const o={beacon:n.NT.beacon,errorBeacon:n.NT.errorBeacon,licenseKey:void 0,applicationID:void 0,sa:void 0,queueTime:void 0,applicationTime:void 0,ttGuid:void 0,user:void 0,account:void 0,product:void 0,extra:void 0,jsAttributes:{},userAttributes:void 0,atts:void 0,transactionName:void 0,tNamePlain:void 0},a={};function s(e){try{const t=c(e);return!!t.licenseKey&&!!t.errorBeacon&&!!t.applicationID}catch(e){return!1}}function c(e){if(!e)throw new Error("All info objects require an agent identifier!");if(!a[e])throw new Error("Info for ".concat(e," was never set"));return a[e]}function u(e,t){if(!e)throw new Error("All info objects require an agent identifier!");a[e]=(0,i.a)(t,o);const r=(0,n.nY)(e);r&&(r.info=a[e])}},9417:(e,t,r)=>{"use strict";r.d(t,{D0:()=>g,gD:()=>h,xN:()=>p});var n=r(993);const i=e=>{if(!e||"string"!=typeof e)return!1;try{document.createDocumentFragment().querySelector(e)}catch{return!1}return!0};var o=r(2614),a=r(944),s=r(384),c=r(8122);const u="[data-nr-mask]",d=()=>{const e={mask_selector:"*",block_selector:"[data-nr-block]",mask_input_options:{color:!1,date:!1,"datetime-local":!1,email:!1,month:!1,number:!1,range:!1,search:!1,tel:!1,text:!1,time:!1,url:!1,week:!1,textarea:!1,select:!1,password:!0}};return{ajax:{deny_list:void 0,block_internal:!0,enabled:!0,harvestTimeSeconds:10,autoStart:!0},distributed_tracing:{enabled:void 0,exclude_newrelic_header:void 0,cors_use_newrelic_header:void 0,cors_use_tracecontext_headers:void 0,allowed_origins:void 0},feature_flags:[],generic_events:{enabled:!0,harvestTimeSeconds:30,autoStart:!0},harvest:{tooManyRequestsDelay:60},jserrors:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},logging:{enabled:!0,harvestTimeSeconds:10,autoStart:!0,level:n.p_.INFO},metrics:{enabled:!0,autoStart:!0},obfuscate:void 0,page_action:{enabled:!0},page_view_event:{enabled:!0,autoStart:!0},page_view_timing:{enabled:!0,harvestTimeSeconds:30,autoStart:!0},performance:{capture_marks:!1,capture_measures:!1},privacy:{cookies_enabled:!0},proxy:{assets:void 0,beacon:void 0},session:{expiresMs:o.wk,inactiveMs:o.BB},session_replay:{autoStart:!0,enabled:!1,harvestTimeSeconds:60,preload:!1,sampling_rate:10,error_sampling_rate:100,collect_fonts:!1,inline_images:!1,fix_stylesheets:!0,mask_all_inputs:!0,get mask_text_selector(){return e.mask_selector},set mask_text_selector(t){i(t)?e.mask_selector="".concat(t,",").concat(u):""===t||null===t?e.mask_selector=u:(0,a.R)(5,t)},get block_class(){return"nr-block"},get ignore_class(){return"nr-ignore"},get mask_text_class(){return"nr-mask"},get block_selector(){return e.block_selector},set block_selector(t){i(t)?e.block_selector+=",".concat(t):""!==t&&(0,a.R)(6,t)},get mask_input_options(){return e.mask_input_options},set mask_input_options(t){t&&"object"==typeof t?e.mask_input_options={...t,password:!0}:(0,a.R)(7,t)}},session_trace:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},soft_navigations:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},spa:{enabled:!0,harvestTimeSeconds:10,autoStart:!0},ssl:void 0,user_actions:{enabled:!0}}},l={},f="All configuration objects require an agent identifier!";function g(e){if(!e)throw new Error(f);if(!l[e])throw new Error("Configuration for ".concat(e," was never set"));return l[e]}function p(e,t){if(!e)throw new Error(f);l[e]=(0,c.a)(t,d());const r=(0,s.nY)(e);r&&(r.init=l[e])}function h(e,t){if(!e)throw new Error(f);var r=g(e);if(r){for(var n=t.split("."),i=0;i<n.length-1;i++)if("object"!=typeof(r=r[n[i]]))return;r=r[n[n.length-1]]}return r}},3371:(e,t,r)=>{"use strict";r.d(t,{V:()=>f,f:()=>l});var n=r(8122),i=r(384),o=r(6154),a=r(9324);let s=0;const c={buildEnv:a.F3,distMethod:a.Xs,version:a.xv,originTime:o.WN},u={customTransaction:void 0,disabled:!1,isolatedBacklog:!1,loaderType:void 0,maxBytes:3e4,onerror:void 0,ptid:void 0,releaseIds:{},appMetadata:{},session:void 0,denyList:void 0,timeKeeper:void 0,obfuscator:void 0},d={};function l(e){if(!e)throw new Error("All runtime objects require an agent identifier!");if(!d[e])throw new Error("Runtime for ".concat(e," was never set"));return d[e]}function f(e,t){if(!e)throw new Error("All runtime objects require an agent identifier!");d[e]={...(0,n.a)(t,u),...c},Object.hasOwnProperty.call(d[e],"harvestCount")||Object.defineProperty(d[e],"harvestCount",{get:()=>++s});const r=(0,i.nY)(e);r&&(r.runtime=d[e])}},9324:(e,t,r)=>{"use strict";r.d(t,{F3:()=>i,Xs:()=>o,xv:()=>n});const n="1.274.0",i="PROD",o="CDN"},6154:(e,t,r)=>{"use strict";r.d(t,{OF:()=>c,RI:()=>i,WN:()=>d,bv:()=>o,gm:()=>a,mw:()=>s,sb:()=>u});var n=r(1863);const i="undefined"!=typeof window&&!!window.document,o="undefined"!=typeof WorkerGlobalScope&&("undefined"!=typeof self&&self instanceof WorkerGlobalScope&&self.navigator instanceof WorkerNavigator||"undefined"!=typeof globalThis&&globalThis instanceof WorkerGlobalScope&&globalThis.navigator instanceof WorkerNavigator),a=i?window:"undefined"!=typeof WorkerGlobalScope&&("undefined"!=typeof self&&self instanceof WorkerGlobalScope&&self||"undefined"!=typeof globalThis&&globalThis instanceof WorkerGlobalScope&&globalThis),s=Boolean("hidden"===a?.document?.visibilityState),c=/iPad|iPhone|iPod/.test(a.navigator?.userAgent),u=c&&"undefined"==typeof SharedWorker,d=((()=>{const e=a.navigator?.userAgent?.match(/Firefox[/\s](\d+\.\d+)/);Array.isArray(e)&&e.length>=2&&e[1]})(),Date.now()-(0,n.t)())},1687:(e,t,r)=>{"use strict";r.d(t,{Ak:()=>c,Ze:()=>l,x3:()=>u});var n=r(7836),i=r(3606),o=r(860),a=r(2646);const s={};function c(e,t){const r={staged:!1,priority:o.P3[t]||0};d(e),s[e].get(t)||s[e].set(t,r)}function u(e,t){e&&s[e]&&(s[e].get(t)&&s[e].delete(t),g(e,t,!1),s[e].size&&f(e))}function d(e){if(!e)throw new Error("agentIdentifier required");s[e]||(s[e]=new Map)}function l(e="",t="feature",r=!1){if(d(e),!e||!s[e].get(t)||r)return g(e,t);s[e].get(t).staged=!0,f(e)}function f(e){const t=Array.from(s[e]);t.every((([e,t])=>t.staged))&&(t.sort(((e,t)=>e[1].priority-t[1].priority)),t.forEach((([t])=>{s[e].delete(t),g(e,t)})))}function g(e,t,r=!0){const o=e?n.ee.get(e):n.ee,s=i.i.handlers;if(!o.aborted&&o.backlog&&s){if(r){const e=o.backlog[t],r=s[t];if(r){for(let t=0;e&&t<e.length;++t)p(e[t],r);Object.entries(r).forEach((([e,t])=>{Object.values(t||{}).forEach((t=>{t[0]?.on&&t[0]?.context()instanceof a.y&&t[0].on(e,t[1])}))}))}}o.isolatedBacklog||delete s[t],o.backlog[t]=null,o.emit("drain-"+t,[])}}function p(e,t){var r=e[1];Object.values(t[r]||{}).forEach((t=>{var r=e[0];if(t[0]===r){var n=t[1],i=e[3],o=e[2];n.apply(i,o)}}))}},7836:(e,t,r)=>{"use strict";r.d(t,{P:()=>c,ee:()=>u});var n=r(384),i=r(8990),o=r(3371),a=r(2646),s=r(5607);const c="nr@context:".concat(s.W),u=function e(t,r){var n={},s={},d={},l=!1;try{l=16===r.length&&(0,o.f)(r).isolatedBacklog}catch(e){}var f={on:p,addEventListener:p,removeEventListener:function(e,t){var r=n[e];if(!r)return;for(var i=0;i<r.length;i++)r[i]===t&&r.splice(i,1)},emit:function(e,r,n,i,o){!1!==o&&(o=!0);if(u.aborted&&!i)return;t&&o&&t.emit(e,r,n);for(var a=g(n),c=h(e),d=c.length,l=0;l<d;l++)c[l].apply(a,r);var p=m()[s[e]];p&&p.push([f,e,r,a]);return a},get:v,listeners:h,context:g,buffer:function(e,t){const r=m();if(t=t||"feature",f.aborted)return;Object.entries(e||{}).forEach((([e,n])=>{s[n]=t,t in r||(r[t]=[])}))},abort:function(){f._aborted=!0,Object.keys(f.backlog).forEach((e=>{delete f.backlog[e]}))},isBuffering:function(e){return!!m()[s[e]]},debugId:r,backlog:l?{}:t&&"object"==typeof t.backlog?t.backlog:{},isolatedBacklog:l};return Object.defineProperty(f,"aborted",{get:()=>{let e=f._aborted||!1;return e||(t&&(e=t.aborted),e)}}),f;function g(e){return e&&e instanceof a.y?e:e?(0,i.I)(e,c,(()=>new a.y(c))):new a.y(c)}function p(e,t){n[e]=h(e).concat(t)}function h(e){return n[e]||[]}function v(t){return d[t]=d[t]||e(f,t)}function m(){return f.backlog}}(void 0,"globalEE"),d=(0,n.Zm)();d.ee||(d.ee=u)},2646:(e,t,r)=>{"use strict";r.d(t,{y:()=>n});class n{constructor(e){this.contextId=e}}},9908:(e,t,r)=>{"use strict";r.d(t,{d:()=>n,p:()=>i});var n=r(7836).ee.get("handle");function i(e,t,r,i,o){o?(o.buffer([e],i),o.emit(e,t,r)):(n.buffer([e],i),n.emit(e,t,r))}},3606:(e,t,r)=>{"use strict";r.d(t,{i:()=>o});var n=r(9908);o.on=a;var i=o.handlers={};function o(e,t,r,o){a(o||n.d,i,e,t,r)}function a(e,t,r,i,o){o||(o="feature"),e||(e=n.d);var a=t[o]=t[o]||{};(a[r]=a[r]||[]).push([e,i])}},3878:(e,t,r)=>{"use strict";function n(e,t){return{capture:e,passive:!1,signal:t}}function i(e,t,r=!1,i){window.addEventListener(e,t,n(r,i))}function o(e,t,r=!1,i){document.addEventListener(e,t,n(r,i))}r.d(t,{DD:()=>o,jT:()=>n,sp:()=>i})},5607:(e,t,r)=>{"use strict";r.d(t,{W:()=>n});const n=(0,r(9566).bz)()},9566:(e,t,r)=>{"use strict";r.d(t,{LA:()=>s,bz:()=>a});var n=r(6154);const i="xxxxxxxx-xxxx-4xxx-yxxx-xxxxxxxxxxxx";function o(e,t){return e?15&e[t]:16*Math.random()|0}function a(){const e=n.gm?.crypto||n.gm?.msCrypto;let t,r=0;return e&&e.getRandomValues&&(t=e.getRandomValues(new Uint8Array(30))),i.split("").map((e=>"x"===e?o(t,r++).toString(16):"y"===e?(3&o()|8).toString(16):e)).join("")}function s(e){const t=n.gm?.crypto||n.gm?.msCrypto;let r,i=0;t&&t.getRandomValues&&(r=t.getRandomValues(new Uint8Array(e)));const a=[];for(var s=0;s<e;s++)a.push(o(r,i++).toString(16));return a.join("")}},2614:(e,t,r)=>{"use strict";r.d(t,{BB:()=>a,H3:()=>n,g:()=>u,iL:()=>c,tS:()=>s,uh:()=>i,wk:()=>o});const n="NRBA",i="SESSION",o=144e5,a=18e5,s={STARTED:"session-started",PAUSE:"session-pause",RESET:"session-reset",RESUME:"session-resume",UPDATE:"session-update"},c={SAME_TAB:"same-tab",CROSS_TAB:"cross-tab"},u={OFF:0,FULL:1,ERROR:2}},1863:(e,t,r)=>{"use strict";function n(){return Math.floor(performance.now())}r.d(t,{t:()=>n})},944:(e,t,r)=>{"use strict";function n(e,t){"function"==typeof console.debug&&console.debug("New Relic Warning: https://github.com/newrelic/newrelic-browser-agent/blob/main/docs/warning-codes.md#".concat(e),t)}r.d(t,{R:()=>n})},5284:(e,t,r)=>{"use strict";r.d(t,{t:()=>c,B:()=>s});var n=r(7836),i=r(6154);const o="newrelic";const a=new Set,s={};function c(e,t){const r=n.ee.get(t);s[t]??={},e&&"object"==typeof e&&(a.has(t)||(r.emit("rumresp",[e]),s[t]=e,a.add(t),function(e={}){try{i.gm.dispatchEvent(new CustomEvent(o,{detail:e}))}catch(e){}}({loaded:!0})))}},8990:(e,t,r)=>{"use strict";r.d(t,{I:()=>i});var n=Object.prototype.hasOwnProperty;function i(e,t,r){if(n.call(e,t))return e[t];var i=r();if(Object.defineProperty&&Object.keys)try{return Object.defineProperty(e,t,{value:i,writable:!0,enumerable:!1}),i}catch(e){}return e[t]=i,i}},6389:(e,t,r)=>{"use strict";function n(e,t=500,r={}){const n=r?.leading||!1;let i;return(...r)=>{n&&void 0===i&&(e.apply(this,r),i=setTimeout((()=>{i=clearTimeout(i)}),t)),n||(clearTimeout(i),i=setTimeout((()=>{e.apply(this,r)}),t))}}function i(e){let t=!1;return(...r)=>{t||(t=!0,e.apply(this,r))}}r.d(t,{J:()=>i,s:()=>n})},5289:(e,t,r)=>{"use strict";r.d(t,{GG:()=>o,sB:()=>a});var n=r(3878);function i(){return"undefined"==typeof document||"complete"===document.readyState}function o(e,t){if(i())return e();(0,n.sp)("load",e,t)}function a(e){if(i())return e();(0,n.DD)("DOMContentLoaded",e)}},384:(e,t,r)=>{"use strict";r.d(t,{NT:()=>o,US:()=>d,Zm:()=>a,bQ:()=>c,dV:()=>s,nY:()=>u,pV:()=>l});var n=r(6154),i=r(1863);const o={beacon:"bam.nr-data.net",errorBeacon:"bam.nr-data.net"};function a(){return n.gm.NREUM||(n.gm.NREUM={}),void 0===n.gm.newrelic&&(n.gm.newrelic=n.gm.NREUM),n.gm.NREUM}function s(){let e=a();return e.o||(e.o={ST:n.gm.setTimeout,SI:n.gm.setImmediate,CT:n.gm.clearTimeout,XHR:n.gm.XMLHttpRequest,REQ:n.gm.Request,EV:n.gm.Event,PR:n.gm.Promise,MO:n.gm.MutationObserver,FETCH:n.gm.fetch,WS:n.gm.WebSocket}),e}function c(e,t){let r=a();r.initializedAgents??={},t.initializedAt={ms:(0,i.t)(),date:new Date},r.initializedAgents[e]=t}function u(e){let t=a();return t.initializedAgents?.[e]}function d(e,t){a()[e]=t}function l(){return function(){let e=a();const t=e.info||{};e.info={beacon:o.beacon,errorBeacon:o.errorBeacon,...t}}(),function(){let e=a();const t=e.init||{};e.init={...t}}(),s(),function(){let e=a();const t=e.loader_config||{};e.loader_config={...t}}(),a()}},2843:(e,t,r)=>{"use strict";r.d(t,{u:()=>i});var n=r(3878);function i(e,t=!1,r,i){(0,n.DD)("visibilitychange",(function(){if(t)return void("hidden"===document.visibilityState&&e());e(document.visibilityState)}),r,i)}},3434:(e,t,r)=>{"use strict";r.d(t,{YM:()=>c});var n=r(7836),i=r(5607);const o="nr@original:".concat(i.W);var a=Object.prototype.hasOwnProperty,s=!1;function c(e,t){return e||(e=n.ee),r.inPlace=function(e,t,n,i,o){n||(n="");const a="-"===n.charAt(0);for(let s=0;s<t.length;s++){const c=t[s],u=e[c];d(u)||(e[c]=r(u,a?c+n:n,i,c,o))}},r.flag=o,r;function r(t,r,n,s,c){return d(t)?t:(r||(r=""),nrWrapper[o]=t,function(e,t,r){if(Object.defineProperty&&Object.keys)try{return Object.keys(e).forEach((function(r){Object.defineProperty(t,r,{get:function(){return e[r]},set:function(t){return e[r]=t,t}})})),t}catch(e){u([e],r)}for(var n in e)a.call(e,n)&&(t[n]=e[n])}(t,nrWrapper,e),nrWrapper);function nrWrapper(){var o,a,d,l;try{a=this,o=[...arguments],d="function"==typeof n?n(o,a):n||{}}catch(t){u([t,"",[o,a,s],d],e)}i(r+"start",[o,a,s],d,c);try{return l=t.apply(a,o)}catch(e){throw i(r+"err",[o,a,e],d,c),e}finally{i(r+"end",[o,a,l],d,c)}}}function i(r,n,i,o){if(!s||t){var a=s;s=!0;try{e.emit(r,n,i,t,o)}catch(t){u([t,r,n,i],e)}s=a}}}function u(e,t){t||(t=n.ee);try{t.emit("internal-error",e)}catch(e){}}function d(e){return!(e&&"function"==typeof e&&e.apply&&!e[o])}},993:(e,t,r)=>{"use strict";r.d(t,{ET:()=>o,p_:()=>i});var n=r(860);const i={ERROR:"ERROR",WARN:"WARN",INFO:"INFO",DEBUG:"DEBUG",TRACE:"TRACE"},o="log";n.K7.logging},3969:(e,t,r)=>{"use strict";r.d(t,{TZ:()=>n,XG:()=>s,rs:()=>i,xV:()=>a,z_:()=>o});const n=r(860).K7.metrics,i="sm",o="cm",a="storeSupportabilityMetrics",s="storeEventMetrics"},6630:(e,t,r)=>{"use strict";r.d(t,{T:()=>n});const n=r(860).K7.pageViewEvent},782:(e,t,r)=>{"use strict";r.d(t,{T:()=>n});const n=r(860).K7.pageViewTiming},6344:(e,t,r)=>{"use strict";r.d(t,{G4:()=>i});var n=r(2614);r(860).K7.sessionReplay;const i={RECORD:"recordReplay",PAUSE:"pauseReplay",REPLAY_RUNNING:"replayRunning",ERROR_DURING_REPLAY:"errorDuringReplay"};n.g.ERROR,n.g.FULL,n.g.OFF},4234:(e,t,r)=>{"use strict";r.d(t,{W:()=>o});var n=r(7836),i=r(1687);class o{constructor(e,t){this.agentIdentifier=e,this.ee=n.ee.get(e),this.featureName=t,this.blocked=!1}deregisterDrain(){(0,i.x3)(this.agentIdentifier,this.featureName)}}},7603:(e,t,r)=>{"use strict";r.d(t,{j:()=>P});var n=r(860),i=r(2555),o=r(3371),a=r(9908),s=r(7836),c=r(1687),u=r(5289),d=r(6154),l=r(944),f=r(3969),g=r(384),p=r(6344);const h=["setErrorHandler","finished","addToTrace","addRelease","addPageAction","setCurrentRouteName","setPageViewName","setCustomAttribute","interaction","noticeError","setUserId","setApplicationVersion","start",p.G4.RECORD,p.G4.PAUSE,"log","wrapLogger"],v=["setErrorHandler","finished","addToTrace","addRelease"];var m=r(1863),b=r(2614),y=r(993);var w=r(2646),A=r(3434);function R(e,t,r,n){if("object"!=typeof t||!t||"string"!=typeof r||!r||"function"!=typeof t[r])return(0,l.R)(29);const i=function(e){return(e||s.ee).get("logger")}(e),o=(0,A.YM)(i),a=new w.y(s.P);return a.level=n.level,a.customAttributes=n.customAttributes,o.inPlace(t,[r],"wrap-logger-",a),i}function E(){const e=(0,g.pV)();h.forEach((t=>{e[t]=(...r)=>function(t,...r){let n=[];return Object.values(e.initializedAgents).forEach((e=>{e&&e.api?e.exposed&&e.api[t]&&n.push(e.api[t](...r)):(0,l.R)(38,t)})),n.length>1?n:n[0]}(t,...r)}))}const x={};function _(e,t,g=!1){t||(0,c.Ak)(e,"api");const h={};var w=s.ee.get(e),A=w.get("tracer");x[e]=b.g.OFF,w.on(p.G4.REPLAY_RUNNING,(t=>{x[e]=t}));var E="api-",_=E+"ixn-";function N(t,r,n,o){const a=(0,i.Vp)(e);return null===r?delete a.jsAttributes[t]:(0,i.x1)(e,{...a,jsAttributes:{...a.jsAttributes,[t]:r}}),j(E,n,!0,o||null===r?"session":void 0)(t,r)}function T(){}h.log=function(e,{customAttributes:t={},level:r=y.p_.INFO}={}){(0,a.p)(f.xV,["API/log/called"],void 0,n.K7.metrics,w),function(e,t,r={},i=y.p_.INFO){(0,a.p)(f.xV,["API/logging/".concat(i.toLowerCase(),"/called")],void 0,n.K7.metrics,e),(0,a.p)(y.ET,[(0,m.t)(),t,r,i],void 0,n.K7.logging,e)}(w,e,t,r)},h.wrapLogger=(e,t,{customAttributes:r={},level:i=y.p_.INFO}={})=>{(0,a.p)(f.xV,["API/wrapLogger/called"],void 0,n.K7.metrics,w),R(w,e,t,{customAttributes:r,level:i})},v.forEach((e=>{h[e]=j(E,e,!0,"api")})),h.addPageAction=j(E,"addPageAction",!0,n.K7.genericEvents),h.setPageViewName=function(t,r){if("string"==typeof t)return"/"!==t.charAt(0)&&(t="/"+t),(0,o.f)(e).customTransaction=(r||"http://custom.transaction")+t,j(E,"setPageViewName",!0)()},h.setCustomAttribute=function(e,t,r=!1){if("string"==typeof e){if(["string","number","boolean"].includes(typeof t)||null===t)return N(e,t,"setCustomAttribute",r);(0,l.R)(40,typeof t)}else(0,l.R)(39,typeof e)},h.setUserId=function(e){if("string"==typeof e||null===e)return N("enduser.id",e,"setUserId",!0);(0,l.R)(41,typeof e)},h.setApplicationVersion=function(e){if("string"==typeof e||null===e)return N("application.version",e,"setApplicationVersion",!1);(0,l.R)(42,typeof e)},h.start=()=>{try{(0,a.p)(f.xV,["API/start/called"],void 0,n.K7.metrics,w),w.emit("manual-start-all")}catch(e){(0,l.R)(23,e)}},h[p.G4.RECORD]=function(){(0,a.p)(f.xV,["API/recordReplay/called"],void 0,n.K7.metrics,w),(0,a.p)(p.G4.RECORD,[],void 0,n.K7.sessionReplay,w)},h[p.G4.PAUSE]=function(){(0,a.p)(f.xV,["API/pauseReplay/called"],void 0,n.K7.metrics,w),(0,a.p)(p.G4.PAUSE,[],void 0,n.K7.sessionReplay,w)},h.interaction=function(e){return(new T).get("object"==typeof e?e:{})};const S=T.prototype={createTracer:function(e,t){var r={},i=this,o="function"==typeof t;return(0,a.p)(f.xV,["API/createTracer/called"],void 0,n.K7.metrics,w),g||(0,a.p)(_+"tracer",[(0,m.t)(),e,r],i,n.K7.spa,w),function(){if(A.emit((o?"":"no-")+"fn-start",[(0,m.t)(),i,o],r),o)try{return t.apply(this,arguments)}catch(e){const t="string"==typeof e?new Error(e):e;throw A.emit("fn-err",[arguments,this,t],r),t}finally{A.emit("fn-end",[(0,m.t)()],r)}}}};function j(e,t,r,i){return function(){return(0,a.p)(f.xV,["API/"+t+"/called"],void 0,n.K7.metrics,w),i&&(0,a.p)(e+t,[(0,m.t)(),...arguments],r?null:this,i,w),r?void 0:this}}function k(){r.e(296).then(r.bind(r,8778)).then((({setAPI:t})=>{t(e),(0,c.Ze)(e,"api")})).catch((e=>{(0,l.R)(27,e),w.abort()}))}return["actionText","setName","setAttribute","save","ignore","onEnd","getContext","end","get"].forEach((e=>{S[e]=j(_,e,void 0,g?n.K7.softNav:n.K7.spa)})),h.setCurrentRouteName=g?j(_,"routeName",void 0,n.K7.softNav):j(E,"routeName",!0,n.K7.spa),h.noticeError=function(t,r){"string"==typeof t&&(t=new Error(t)),(0,a.p)(f.xV,["API/noticeError/called"],void 0,n.K7.metrics,w),(0,a.p)("err",[t,(0,m.t)(),!1,r,!!x[e]],void 0,n.K7.jserrors,w)},d.RI?(0,u.GG)((()=>k()),!0):k(),h}var N=r(9417),T=r(8122);const S={accountID:void 0,trustKey:void 0,agentID:void 0,licenseKey:void 0,applicationID:void 0,xpid:void 0},j={};var k=r(5284);const I=e=>{const t=e.startsWith("http");e+="/",r.p=t?e:"https://"+e};let O=!1;function P(e,t={},r,n){let{init:a,info:c,loader_config:u,runtime:l={},exposed:f=!0}=t;l.loaderType=r;const p=(0,g.pV)();c||(a=p.init,c=p.info,u=p.loader_config),(0,N.xN)(e.agentIdentifier,a||{}),function(e,t){if(!e)throw new Error("All loader-config objects require an agent identifier!");j[e]=(0,T.a)(t,S);const r=(0,g.nY)(e);r&&(r.loader_config=j[e])}(e.agentIdentifier,u||{}),c.jsAttributes??={},d.bv&&(c.jsAttributes.isWorker=!0),(0,i.x1)(e.agentIdentifier,c);const h=(0,N.D0)(e.agentIdentifier),v=[c.beacon,c.errorBeacon];O||(h.proxy.assets&&(I(h.proxy.assets),v.push(h.proxy.assets)),h.proxy.beacon&&v.push(h.proxy.beacon),E(),(0,g.US)("activatedFeatures",k.B),e.runSoftNavOverSpa&&=!0===h.soft_navigations.enabled&&h.feature_flags.includes("soft_nav")),l.denyList=[...h.ajax.deny_list||[],...h.ajax.block_internal?v:[]],l.ptid=e.agentIdentifier,(0,o.V)(e.agentIdentifier,l),e.ee=s.ee.get(e.agentIdentifier),void 0===e.api&&(e.api=_(e.agentIdentifier,n,e.runSoftNavOverSpa)),void 0===e.exposed&&(e.exposed=f),O=!0}},8374:(e,t,r)=>{r.nc=(()=>{try{return document?.currentScript?.nonce}catch(e){}return""})()},860:(e,t,r)=>{"use strict";r.d(t,{$J:()=>o,K7:()=>n,P3:()=>i});const n={ajax:"ajax",genericEvents:"generic_events",jserrors:"jserrors",logging:"logging",metrics:"metrics",pageAction:"page_action",pageViewEvent:"page_view_event",pageViewTiming:"page_view_timing",sessionReplay:"session_replay",sessionTrace:"session_trace",softNav:"soft_navigations",spa:"spa"},i={[n.pageViewEvent]:1,[n.pageViewTiming]:2,[n.metrics]:3,[n.jserrors]:4,[n.spa]:5,[n.ajax]:6,[n.sessionTrace]:7,[n.softNav]:8,[n.sessionReplay]:9,[n.logging]:10,[n.genericEvents]:11},o={[n.pageViewTiming]:"events",[n.ajax]:"events",[n.spa]:"events",[n.softNav]:"events",[n.metrics]:"jserrors",[n.jserrors]:"jserrors",[n.sessionTrace]:"browser/blobs",[n.sessionReplay]:"browser/blobs",[n.logging]:"browser/logs",[n.genericEvents]:"ins"}}},n={};function i(e){var t=n[e];if(void 0!==t)return t.exports;var o=n[e]={exports:{}};return r[e](o,o.exports,i),o.exports}i.m=r,i.d=(e,t)=>{for(var r in t)i.o(t,r)&&!i.o(e,r)&&Object.defineProperty(e,r,{enumerable:!0,get:t[r]})},i.f={},i.e=e=>Promise.all(Object.keys(i.f).reduce(((t,r)=>(i.f[r](e,t),t)),[])),i.u=e=>"nr-rum-1.274.0.min.js",i.o=(e,t)=>Object.prototype.hasOwnProperty.call(e,t),e={},t="NRBA-1.274.0.PROD:",i.l=(r,n,o,a)=>{if(e[r])e[r].push(n);else{var s,c;if(void 0!==o)for(var u=document.getElementsByTagName("script"),d=0;d<u.length;d++){var l=u[d];if(l.getAttribute("src")==r||l.getAttribute("data-webpack")==t+o){s=l;break}}if(!s){c=!0;var f={296:"sha512-gkYkZDAwQ9PwaDXs2YM+rNIdRej1Ac1mupWobRJ8eahQcXz6/sunGZCKklrzi5kWxhOGRZr2tn0rEKuLTXzfAA=="};(s=document.createElement("script")).charset="utf-8",s.timeout=120,i.nc&&s.setAttribute("nonce",i.nc),s.setAttribute("data-webpack",t+o),s.src=r,0!==s.src.indexOf(window.location.origin+"/")&&(s.crossOrigin="anonymous"),f[a]&&(s.integrity=f[a])}e[r]=[n];var g=(t,n)=>{s.onerror=s.onload=null,clearTimeout(p);var i=e[r];if(delete e[r],s.parentNode&&s.parentNode.removeChild(s),i&&i.forEach((e=>e(n))),t)return t(n)},p=setTimeout(g.bind(null,void 0,{type:"timeout",target:s}),12e4);s.onerror=g.bind(null,s.onerror),s.onload=g.bind(null,s.onload),c&&document.head.appendChild(s)}},i.r=e=>{"undefined"!=typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(e,Symbol.toStringTag,{value:"Module"}),Object.defineProperty(e,"__esModule",{value:!0})},i.p="https://js-agent.newrelic.com/",(()=>{var e={840:0,374:0};i.f.j=(t,r)=>{var n=i.o(e,t)?e[t]:void 0;if(0!==n)if(n)r.push(n[2]);else{var o=new Promise(((r,i)=>n=e[t]=[r,i]));r.push(n[2]=o);var a=i.p+i.u(t),s=new Error;i.l(a,(r=>{if(i.o(e,t)&&(0!==(n=e[t])&&(e[t]=void 0),n)){var o=r&&("load"===r.type?"missing":r.type),a=r&&r.target&&r.target.src;s.message="Loading chunk "+t+" failed.\n("+o+": "+a+")",s.name="ChunkLoadError",s.type=o,s.request=a,n[1](s)}}),"chunk-"+t,t)}};var t=(t,r)=>{var n,o,[a,s,c]=r,u=0;if(a.some((t=>0!==e[t]))){for(n in s)i.o(s,n)&&(i.m[n]=s[n]);if(c)c(i)}for(t&&t(r);u<a.length;u++)o=a[u],i.o(e,o)&&e[o]&&e[o][0](),e[o]=0},r=self["webpackChunk:NRBA-1.274.0.PROD"]=self["webpackChunk:NRBA-1.274.0.PROD"]||[];r.forEach(t.bind(null,0)),r.push=t.bind(null,r.push.bind(r))})(),(()=>{"use strict";i(8374);var e=i(944),t=i(6344),r=i(9566);class n{agentIdentifier;constructor(e=(0,r.LA)(16)){this.agentIdentifier=e}#e(t,...r){if("function"==typeof this.api?.[t])return this.api[t](...r);(0,e.R)(35,t)}addPageAction(e,t){return this.#e("addPageAction",e,t)}setPageViewName(e,t){return this.#e("setPageViewName",e,t)}setCustomAttribute(e,t,r){return this.#e("setCustomAttribute",e,t,r)}noticeError(e,t){return this.#e("noticeError",e,t)}setUserId(e){return this.#e("setUserId",e)}setApplicationVersion(e){return this.#e("setApplicationVersion",e)}setErrorHandler(e){return this.#e("setErrorHandler",e)}addRelease(e,t){return this.#e("addRelease",e,t)}log(e,t){return this.#e("log",e,t)}}class o extends n{#e(t,...r){if("function"==typeof this.api?.[t])return this.api[t](...r);(0,e.R)(35,t)}start(){return this.#e("start")}finished(e){return this.#e("finished",e)}recordReplay(){return this.#e(t.G4.RECORD)}pauseReplay(){return this.#e(t.G4.PAUSE)}addToTrace(e){return this.#e("addToTrace",e)}setCurrentRouteName(e){return this.#e("setCurrentRouteName",e)}interaction(){return this.#e("interaction")}wrapLogger(e,t,r){return this.#e("wrapLogger",e,t,r)}}var a=i(860),s=i(9417);const c=Object.values(a.K7);function u(e){const t={};return c.forEach((r=>{t[r]=function(e,t){return!0===(0,s.gD)(t,"".concat(e,".enabled"))}(r,e)})),t}var d=i(7603);var l=i(1687),f=i(4234),g=i(5289),p=i(6154),h=i(384);const v=e=>p.RI&&!0===(0,s.gD)(e,"privacy.cookies_enabled");function m(e){return!!(0,h.dV)().o.MO&&v(e)&&!0===(0,s.gD)(e,"session_trace.enabled")}var b=i(6389);class y extends f.W{constructor(e,t,r=!0){super(e.agentIdentifier,t),this.auto=r,this.abortHandler=void 0,this.featAggregate=void 0,this.onAggregateImported=void 0,!1===e.init[this.featureName].autoStart&&(this.auto=!1),this.auto?(0,l.Ak)(e.agentIdentifier,t):this.ee.on("manual-start-all",(0,b.J)((()=>{(0,l.Ak)(e.agentIdentifier,this.featureName),this.auto=!0,this.importAggregator(e)})))}importAggregator(t,r={}){if(this.featAggregate||!this.auto)return;let n;this.onAggregateImported=new Promise((e=>{n=e}));const o=async()=>{let o;try{if(v(this.agentIdentifier)){const{setupAgentSession:e}=await i.e(296).then(i.bind(i,3861));o=e(t)}}catch(t){(0,e.R)(20,t),this.ee.emit("internal-error",[t]),this.featureName===a.K7.sessionReplay&&this.abortHandler?.()}try{if(t.sharedAggregator)await t.sharedAggregator;else{t.sharedAggregator=i.e(296).then(i.bind(i,9337));const{EventAggregator:e}=await t.sharedAggregator;t.sharedAggregator=new e}if(!this.#t(this.featureName,o))return(0,l.Ze)(this.agentIdentifier,this.featureName),void n(!1);const{lazyFeatureLoader:e}=await i.e(296).then(i.bind(i,6103)),{Aggregate:a}=await e(this.featureName,"aggregate");this.featAggregate=new a(t,r),n(!0)}catch(t){(0,e.R)(34,t),this.abortHandler?.(),(0,l.Ze)(this.agentIdentifier,this.featureName,!0),n(!1),this.ee&&this.ee.abort()}};p.RI?(0,g.GG)((()=>o()),!0):o()}#t(e,t){switch(e){case a.K7.sessionReplay:return m(this.agentIdentifier)&&!!t;case a.K7.sessionTrace:return!!t;default:return!0}}}var w=i(6630);class A extends y{static featureName=w.T;constructor(e,t=!0){super(e,w.T,t),this.importAggregator(e)}}var R=i(9908),E=i(2843),x=i(3878),_=i(782),N=i(1863);class T extends y{static featureName=_.T;constructor(e,t=!0){super(e,_.T,t),p.RI&&((0,E.u)((()=>(0,R.p)("docHidden",[(0,N.t)()],void 0,_.T,this.ee)),!0),(0,x.sp)("pagehide",(()=>(0,R.p)("winPagehide",[(0,N.t)()],void 0,_.T,this.ee))),this.importAggregator(e))}}var S=i(3969);class j extends y{static featureName=S.TZ;constructor(e,t=!0){super(e,S.TZ,t),this.importAggregator(e)}}new class extends o{constructor(t,r){super(r),p.gm?(this.features={},(0,h.bQ)(this.agentIdentifier,this),this.desiredFeatures=new Set(t.features||[]),this.desiredFeatures.add(A),this.runSoftNavOverSpa=[...this.desiredFeatures].some((e=>e.featureName===a.K7.softNav)),(0,d.j)(this,t,t.loaderType||"agent"),this.run()):(0,e.R)(21)}get config(){return{info:this.info,init:this.init,loader_config:this.loader_config,runtime:this.runtime}}run(){try{const t=u(this.agentIdentifier),r=[...this.desiredFeatures];r.sort(((e,t)=>a.P3[e.featureName]-a.P3[t.featureName])),r.forEach((r=>{if(!t[r.featureName]&&r.featureName!==a.K7.pageViewEvent)return;if(this.runSoftNavOverSpa&&r.featureName===a.K7.spa)return;if(!this.runSoftNavOverSpa&&r.featureName===a.K7.softNav)return;const n=function(e){switch(e){case a.K7.ajax:return[a.K7.jserrors];case a.K7.sessionTrace:return[a.K7.ajax,a.K7.pageViewEvent];case a.K7.sessionReplay:return[a.K7.sessionTrace];case a.K7.pageViewTiming:return[a.K7.pageViewEvent];default:return[]}}(r.featureName).filter((e=>!(e in this.features)));n.length>0&&(0,e.R)(36,{targetFeature:r.featureName,missingDependencies:n}),this.features[r.featureName]=new r(this)}))}catch(t){(0,e.R)(22,t);for(const e in this.features)this.features[e].abortHandler?.();const r=(0,h.Zm)();delete r.initializedAgents[this.agentIdentifier]?.api,delete r.initializedAgents[this.agentIdentifier]?.features,delete this.sharedAggregator;return r.ee.get(this.agentIdentifier).abort(),!1}}}({features:[A,T,j],loaderType:"lite"})})()})();</script> <title>IEEE Cybersecurity 2017</title> <script>(function(html){html.className = html.className.replace(/\bno-js\b/,'js')})(document.documentElement);</script> <meta name='robots' content='index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1' /> <script type="text/javascript" id="wpp-js" src="https://transmitter.ieee.org/wp-content/plugins/wordpress-popular-posts/assets/js/wpp.min.js?ver=7.1.0" data-sampling="0" data-sampling-rate="100" data-api-url="https://transmitter.ieee.org/wp-json/wordpress-popular-posts" data-post-id="5671" data-token="0687bdd88c" data-lang="en" data-debug="0"></script> <!-- This site is optimized with the Yoast SEO Premium plugin v20.3 (Yoast SEO v23.6) - https://yoast.com/wordpress/plugins/seo/ --> <title>IEEE Cybersecurity 2017 - IEEE Transmitter</title> <link rel="canonical" href="https://transmitter.ieee.org/cybersecurity-2017/" /> <meta property="og:locale" content="en_US" /> <meta property="og:type" content="article" /> <meta property="og:title" content="IEEE Cybersecurity 2017" /> <meta property="og:description" content="Explore today&#039;s biggest cybersecurity threats." /> <meta property="og:url" content="https://transmitter.ieee.org/cybersecurity-2017/" /> <meta property="og:site_name" content="IEEE Transmitter" /> <meta property="article:modified_time" content="2018-06-28T15:44:00+00:00" /> <meta property="og:image" content="https://transmitter.ieee.org/wp-content/uploads/2017/02/cyber.png" /> <meta property="og:image:width" content="1200" /> <meta property="og:image:height" content="630" /> <meta property="og:image:type" content="image/png" /> <meta name="twitter:card" content="summary_large_image" /> <meta name="twitter:title" content="Explore today&#039;s biggest cybersecurity threats." /> <meta name="twitter:description" content="Explore today&#039;s biggest cybersecurity threats." /> <meta name="twitter:image" content="https://dev-ieee-transmitter.pantheonsite.io/wp-content/uploads/2017/02/cyber.png" /> <script type="application/ld+json" class="yoast-schema-graph">{"@context":"https://schema.org","@graph":[{"@type":"WebPage","@id":"https://transmitter.ieee.org/cybersecurity-2017/","url":"https://transmitter.ieee.org/cybersecurity-2017/","name":"IEEE Cybersecurity 2017 - IEEE Transmitter","isPartOf":{"@id":"https://transmitter.ieee.org/#website"},"datePublished":"2017-02-08T11:41:39+00:00","dateModified":"2018-06-28T15:44:00+00:00","breadcrumb":{"@id":"https://transmitter.ieee.org/cybersecurity-2017/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https://transmitter.ieee.org/cybersecurity-2017/"]}]},{"@type":"BreadcrumbList","@id":"https://transmitter.ieee.org/cybersecurity-2017/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://transmitter.ieee.org/"},{"@type":"ListItem","position":2,"name":"IEEE Cybersecurity 2017"}]},{"@type":"WebSite","@id":"https://transmitter.ieee.org/#website","url":"https://transmitter.ieee.org/","name":"IEEE Transmitter","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https://transmitter.ieee.org/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}</script> <!-- / Yoast SEO Premium plugin. --> <script> var MP3jPLAYLISTS = []; var MP3jPLAYERS = []; </script> <script> var addthis_share = { templates: { twitter: 'IEEE Cybersecurity 2017 - {{url}}' }, url_transforms : { shorten: { twitter: 'bitly' } }, shorteners : { bitly : {} } }; </script> <link rel='stylesheet' id='easy_load_more-frontend-css' href='https://transmitter.ieee.org/wp-content/plugins/easy-load-more/assets/css/frontend.css?ver=1.0.0' type='text/css' media='none' onload='this.media="all"' /> <style id='easy_load_more-frontend-inline-css' type='text/css'> .elm-button { background: #009FDA; color: #FFFFFF; } .elm-button:hover, .elm-button:active, .elm-button:focus { background: #33b2e1; } .elm-loading-icon { fill: #FFFFFF; stroke: #FFFFFF; } </style> <link rel='stylesheet' id='sb_instagram_styles-css' href='https://transmitter.ieee.org/wp-content/plugins/instagram-feed-pro/css/sb-instagram.css?ver=4.0.6' type='text/css' media='none' onload='this.media="all"' /> <link rel='stylesheet' id='wordpress-popular-posts-css-css' href='https://transmitter.ieee.org/wp-content/plugins/wordpress-popular-posts/assets/css/wpp.css?ver=7.1.0' type='text/css' media='none' onload='this.media="all"' /> <link rel='stylesheet' id='ieee-style-css' href='https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/style.css?ver=9399867ce1de053ba3582685f4dea188' type='text/css' media='none' onload='this.media="all"' /> <link rel='stylesheet' id='ieee-ionicons-css' href='https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/css/ionicons.css?ver=1732244362' type='text/css' media='none' onload='this.media="all"' /> <link rel='stylesheet' id='fancybox-css' href='https://transmitter.ieee.org/wp-content/plugins/easy-fancybox/fancybox/1.5.4/jquery.fancybox.min.css?ver=9399867ce1de053ba3582685f4dea188' type='text/css' media='none' onload='this.media="screen"' /> <style id='fancybox-inline-css' type='text/css'> #fancybox-content{border-color:#ffffff;}#fancybox-title,#fancybox-title-float-main{color:#fff} </style> <link rel='stylesheet' id='mp3-jplayer-css' href='https://transmitter.ieee.org/wp-content/plugins/mp3-jplayer/css/dark.css?ver=2.7.3' type='text/css' media='none' onload='this.media="all"' /> <link rel='stylesheet' id='wpss-style-css' href='https://transmitter.ieee.org/wp-content/plugins/wordpress-simple-survey/assets/build/css/wpss-pkg.css?ver=9399867ce1de053ba3582685f4dea188' type='text/css' media='none' onload='this.media="all"' /> <link rel='stylesheet' id='wpss-custom-db-style-css' href='https://transmitter.ieee.org/?wpss-routing=custom-css&#038;ver=9399867ce1de053ba3582685f4dea188' type='text/css' media='none' onload='this.media="all"' /> <script type="text/javascript" src="https://transmitter.ieee.org/wp-includes/js/jquery/jquery.min.js?ver=3.7.1" id="jquery-core-js"></script> <script type="text/javascript" defer='defer' src="https://transmitter.ieee.org/wp-includes/js/jquery/jquery-migrate.min.js?ver=3.4.1" id="jquery-migrate-js"></script> <script type="text/javascript" defer='defer' src="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/js/libs.min.js?ver=1732244366" id="ieee-libs-js"></script> <script type="text/javascript" defer='defer' src="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/js/site.min.js?ver=1732244366" id="ieee-site-js"></script> <script type="text/javascript" defer='defer' src="https://transmitter.ieee.org/wp-content/plugins/wordpress-simple-survey/assets/build/js/wpss-pkg.js?ver=3.0.0" id="wpss-pkg-js"></script> <link rel='shortlink' href='https://transmitter.ieee.org/?p=5671' /> <style id="wpp-loading-animation-styles">@-webkit-keyframes bgslide{from{background-position-x:0}to{background-position-x:-200%}}@keyframes bgslide{from{background-position-x:0}to{background-position-x:-200%}}.wpp-widget-block-placeholder,.wpp-shortcode-placeholder{margin:0 auto;width:60px;height:3px;background:#dd3737;background:linear-gradient(90deg,#dd3737 0%,#571313 10%,#dd3737 100%);background-size:200% auto;border-radius:3px;-webkit-animation:bgslide 1s infinite linear;animation:bgslide 1s infinite linear}</style> <style> #fp-nav li:nth-child(3) a { background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/icon-credentials-3.png) center center no-repeat; background-size: 70% auto; } #fp-nav li:nth-child(3) a:hover:after { content: 'COMPROMISED CREDENTIALS'; } #fp-nav li:nth-child(4) a { background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/icon-crosssite-1.png) center center no-repeat; background-size: 70% auto; } #fp-nav li:nth-child(4) a:hover:after { content: 'CROSS-SITE SCRIPTING'; } #fp-nav li:nth-child(5) a { background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/icon-data-breach-2.png) center center no-repeat; background-size: 70% auto; } #fp-nav li:nth-child(5) a:hover:after { content: 'DATA BREACH'; } #fp-nav li:nth-child(6) a { background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/icon-denial-4.png) center center no-repeat; background-size: 70% auto; } #fp-nav li:nth-child(6) a:hover:after { content: 'DISTRIBUTED DENIAL-OF-SERVICE ATTACK'; } #fp-nav li:nth-child(7) a { background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/icon-drone-3.png) center center no-repeat; background-size: 70% auto; } #fp-nav li:nth-child(7) a:hover:after { content: 'DRONES'; } #fp-nav li:nth-child(8) a { background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/icon-malicious-4.png) center center no-repeat; background-size: 70% auto; } #fp-nav li:nth-child(8) a:hover:after { content: 'MALICIOUS INSIDERS'; } #fp-nav li:nth-child(9) a { background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/icon-malware-4.png) center center no-repeat; background-size: 70% auto; } #fp-nav li:nth-child(9) a:hover:after { content: 'MALWARE'; } #fp-nav li:nth-child(10) a { background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/icon-ransomeware-5-1.png) center center no-repeat; background-size: 70% auto; } #fp-nav li:nth-child(10) a:hover:after { content: 'RANSOMWARE'; } #fp-nav li:nth-child(11) a { background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/icon-phishing-1.png) center center no-repeat; background-size: 70% auto; } #fp-nav li:nth-child(11) a:hover:after { content: 'SPEAR PHISHING'; } #fp-nav li:nth-child(12) a { background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/icon-threat-rank.png) center center no-repeat; background-size: 70% auto; } #fp-nav li:nth-child(12) a:hover:after { content: 'THREAT RANKING SURVEY'; } </style> <link rel="shortcut icon" type="image/png" href="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/images/favicon.ico" /> <link rel="icon" type="image/png" href="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/images/ieee-favicon-android-192x192.png" sizes="192x192" /> <link rel="apple-touch-icon" type="image/png" href="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/images/ieee-favicon-apple-180x180.png" sizes="180x180" /> <script> var $ = jQuery.noConflict(); </script> <link rel="stylesheet" type="text/css" href="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/css/jquery.fullPage.css" /> <link rel="stylesheet" type="text/css" href="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/css/examples.css" /> <link rel="stylesheet" type="text/css" href="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/css/site.min.css?1732244363" /> <script>var pageAnchors = ['intro', 'vulnerabilities', 'compromised-credentials', 'cross-site-scripting', 'data-breach', 'distributed-denial-of-service-attack', 'drones', 'malicious-insiders', 'malware', 'ransomware', 'spear-phishing', 'threat-ranking-survey'];</script> <script type="text/javascript" src="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/js/scrolloverflow.js"></script> <script type="text/javascript" src="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/js/libs.min.js?1732244363"></script> <script type="text/javascript" src="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/js/jquery.fullPage.js?1732244363"></script> <script type="text/javascript" src="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/js/site.min.js?1732244363"></script> <link rel="stylesheet" href="https://maxcdn.bootstrapcdn.com/font-awesome/4.4.0/css/font-awesome.min.css"> <link rel="stylesheet" href="https://code.ionicframework.com/ionicons/2.0.1/css/ionicons.min.css"> <link href="https://fonts.googleapis.com/css?family=Roboto+Condensed:400,500, 700" rel="stylesheet"> <link href="https://fonts.googleapis.com/css?family=Roboto:400,500,700" rel="stylesheet"> <script src="https://s7.addthis.com/js/300/addthis_widget.js#pubid=ra-503d10ca4d6becbe"></script> </head> <body class="loading"> <section id="header"> <div class="social"> <div class="addthis_toolbox addthis_default_style addthis_32x32_style">Share <a class="addthis_button_facebook"><i class="fa fa-facebook" aria-hidden="true"></i></a> <a class="addthis_button_twitter"><i class="fa fa-twitter" aria-hidden="true"></i></a> <a class="addthis_button_email"><i class="fa fa-envelope" aria-hidden="true"></i></a> <a class="addthis_button_compact"><i class="fa fa-plus" aria-hidden="true"></i></a> </div> </div> <p class="logo"><a href="#intro" data-menuanchor="intro"><img src="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/images/logo-cs.png" width="222" height="39" alt="IEEE" /></a></p> <p class="ieee"><a href="http://www.ieee.org" target="_blank"><img src="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/images/logo-ieee.svg" width="119" height="36" alt="IEEE" /></a></p> </section> <section id="fade"></section> <div id="myContainer"> <div class="section" id="section0"> <div class="wrapper"> <h1><img src="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/images/logo-cs-big.png" width="644" height="119" alt="IEEE" /></h1> <p>Each year brings new technological developments that improve people’s lives.  Unfortunately, these advances also mean new cybersecurity threats and more attack surfaces.  Indeed, as this IEEE survey <a href="http://transmitter.ieee.org/ieee-cyber-security/#threat-ranking-survey" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?hl=en&amp;q=http://transmitter.ieee.org/ieee-cyber-security/%23threat-ranking-survey&amp;source=gmail&amp;ust=1488054099321000&amp;usg=AFQjCNFISGrpYFjo5ClGQg-a3tg6MX80kA">infographic</a> illustrates, Chief Information Officers and Chief Technology Officers say that their biggest challenge in 2017 will be online security threats.  The following are a few concerns we face today, and what we can do to counter them.</p> <p class="mobile"><a href="http://www.ieee.org" target="_blank"><img src="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/images/logo-ieee.svg" width="119" height="36" alt="IEEE" /></a></p> <p class="start desktop" reposition-element-large-appendTo="#section0 .wrapper" reposition-element-medium-appendTo="#section0 .wrapper" reposition-element-small-insertAfter="#section0 .wrapper" reposition-element><a href="#vulnerabilities" data-menuanchor="vulnerabilities"><i class="ion ion-android-arrow-down bounce"></i><br />Start</a></p> </div> <p class="start mobile" reposition-element-large-appendTo="#section0 .wrapper" reposition-element-medium-appendTo="#section0 .wrapper" reposition-element-small-insertAfter="#section0 .wrapper" reposition-element><a href="#vulnerabilities" data-menuanchor="vulnerabilities"><i class="ion ion-android-arrow-down bounce"></i><br />Start</a></p> <div class="ieee-footer"> <p><a href="/">Home</a> <a href="http://www.ieee.org/sitemap.html">Sitemap</a> <a href="http://www.ieee.org/about/contact_center/index.html">Contact & Support Accessibility</a> <a href="http://www.ieee.org/p9-26.html">Nondiscrimination</a> <a href="http://www.ieee.org/security_privacy.html">Policy Privacy & Opting Out of Cookies</a> <a href="http://www.ieee.org/about/feedback_ieee_site.html?FromPage=/membership_services/membership/renew/index.html">Feedback</a> </p> <p>© Copyright 2017 IEEE &#8211; All rights reserved. Use of this Website signifies your agreement to the <a href="http://www.ieee.org/site_terms_conditions.html" target="_blank" rel="noopener">IEEE Terms and Conditions.</a> <span style="font-weight: 400;">A not-for-profit organization, IEEE is the world&#8217;s largest technical professional organization dedicated to advancing technology for the benefit of humanity.</span></p> </div> </div> <div class="section" id="section1"> <div class="articles"> <div class="row"> <a href="#compromised-credentials" data-menuanchor="compromised-credentials" class="article"><span class="pic" style="background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/photo-credentials-2.jpg) center center no-repeat; background-size: cover;"></span><span class="txt">COMPROMISED CREDENTIALS</span><span class="over"></span></a><a href="#cross-site-scripting" data-menuanchor="cross-site-scripting" class="article"><span class="pic" style="background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/photo-crossscripting-2.jpg) center center no-repeat; background-size: cover;"></span><span class="txt">CROSS-SITE SCRIPTING</span><span class="over"></span></a><a href="#data-breach" data-menuanchor="data-breach" class="article"><span class="pic" style="background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/photo-databreach-2.jpg) center center no-repeat; background-size: cover;"></span><span class="txt">DATA BREACH</span><span class="over"></span></a> </div> <div class="row"> <a href="#distributed-denial-of-service-attack" data-menuanchor="distributed-denial-of-service-attack" class="article"><span class="pic" style="background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/photo-denialservice-2.jpg) center center no-repeat; background-size: cover;"></span><span class="txt">DISTRIBUTED DENIAL-OF-SERVICE ATTACK</span><span class="over"></span></a><a href="#drones" data-menuanchor="drones" class="article"><span class="pic" style="background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/photo-drones-3.jpg) center center no-repeat; background-size: cover;"></span><span class="txt">DRONES</span><span class="over"></span></a><a href="#malicious-insiders" data-menuanchor="malicious-insiders" class="article"><span class="pic" style="background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/photo-malicious-2.jpg) center center no-repeat; background-size: cover;"></span><span class="txt">MALICIOUS INSIDERS</span><span class="over"></span></a> </div> <div class="row"> <a href="#malware" data-menuanchor="malware" class="article"><span class="pic" style="background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/photo-malware-2.jpg) center center no-repeat; background-size: cover;"></span><span class="txt">MALWARE</span><span class="over"></span></a><a href="#ransomware" data-menuanchor="ransomware" class="article"><span class="pic" style="background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/photo-ransomware-2.jpg) center center no-repeat; background-size: cover;"></span><span class="txt">RANSOMWARE</span><span class="over"></span></a><a href="#spear-phishing" data-menuanchor="spear-phishing" class="article"><span class="pic" style="background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/photo-phishing-2.jpg) center center no-repeat; background-size: cover;"></span><span class="txt">SPEAR PHISHING</span><span class="over"></span></a> </div> </div> </div> <div class="section" > <div class="slide" style="background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/photo-credentials-2.jpg) center top no-repeat;"> <div class="indent"> <div class="pagination">1/3</div> <div class="addthis_toolbox addthis_default_style addthis_32x32_style share"> <a class="addthis_button_compact"><img src="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/images/icon-share.png" width="28" height="28" alt="" /> <span>Share</span></a> </div> <h3><span class="icon"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/icon-credentials-3.png" width="30" height="30" alt="" /></span> COMPROMISED CREDENTIALS</h3> <h2>Overview</h2> <div class="vulnerability-content"> <p><span data-sheets-value="{&quot;1&quot;:2,&quot;2&quot;:&quot;During a breach, hackers often raid lists of users' credentials if they can find them. Sometimes it's their main goal, other times it's just a part of a larger data haul. These credentials can then be used for a number of malicious outcomes, including breaking into the systems of affiliated businesses. In more basic cases, attackers may simply guess a user's password, or use a tool to run through thousands of options.&quot;}" data-sheets-userformat="{&quot;2&quot;:899,&quot;3&quot;:{&quot;1&quot;:0},&quot;4&quot;:{&quot;1&quot;:2,&quot;2&quot;:15389148},&quot;10&quot;:0,&quot;11&quot;:4,&quot;12&quot;:0}">During a breach, hackers often raid lists of users&#8217; credentials if they can find them. Sometimes it&#8217;s their main goal; other times it&#8217;s just a part of a larger data haul. These credentials can then be used for a number of malicious <span style="font-weight: 400;">scenarios</span>, including breaking into the systems of affiliated businesses. In more basic cases, attackers may simply guess a user&#8217;s password, or use a tool to run through thousands of options.</span></p> <p>Please click below to listen to IEEE Senior Member Kevin Du speak on cybersecurity and compromised credentials.</p> <p embedcode="&lt;iframe width=&quot;100%&quot; height=&quot;166&quot; scrolling=&quot;no&quot; frameborder=&quot;no&quot; src=&quot;https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/307081260&amp;color=c90000&amp;auto_play=true&amp;hide_related=false&amp;show_comments=true&amp;show_user=true&amp;show_reposts=false&quot;&gt;&lt;/iframe&gt;"> <a href="#" class="embed-placeholder desktop" data-section="compromised-credentials" data-slide="Overview"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/cc-1.jpg" alt=""></a> <a href="#" class="embed-placeholder mobile" data-section="compromised-credentials" data-slide="Overview"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/mb-cc-123.jpg" alt=""></a> </p> </div> <a href="#cross-site-scripting" class="next-section"><i class="ion ion-android-arrow-down"></i><br />Next Vulnerability</a> </div> </div> <div class="slide" style="background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/photo-credentials-2.jpg) center top no-repeat;"> <div class="indent"> <div class="pagination">2/3</div> <div class="addthis_toolbox addthis_default_style addthis_32x32_style share"> <a class="addthis_button_compact"><img src="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/images/icon-share.png" width="28" height="28" alt="" /> <span>Share</span></a> </div> <h3><span class="icon"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/icon-credentials-3.png" width="30" height="30" alt="" /></span> COMPROMISED CREDENTIALS</h3> <h2>Incident</h2> <div class="vulnerability-content"> <p>During the holiday season of 2013, 40 million credit card numbers and 70 million addresses, phone numbers, and other pieces of personal information were stolen from a major retailer&#8217;s servers. Hackers had almost two weeks to harvest the data.</p> <p>The intruders gained access to the retailer&#8217;s system by using stolen credentials from a third-party vendor. <span style="font-weight: 400;">While the vendor’s </span>connection to the servers was only for billing and contracts, intruders were able to exploit holes that ultimately allowed them into siloed customer data.</p> <p>Please click below to listen to IEEE Senior Member Kevin Du speak on cybersecurity and compromised credentials.</p> <p embedcode="&lt;iframe width=&quot;100%&quot; height=&quot;166&quot; scrolling=&quot;no&quot; frameborder=&quot;no&quot; src=&quot;https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/307081256&amp;color=c90000&amp;auto_play=true&amp;hide_related=false&amp;show_comments=true&amp;show_user=true&amp;show_reposts=false&quot;&gt;&lt;/iframe&gt;"> <a href="#" class="embed-placeholder desktop" data-section="compromised-credentials" data-slide="Incident"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/cc-2.jpg" alt=""></a> <a href="#" class="embed-placeholder mobile" data-section="compromised-credentials" data-slide="Incident"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/mb-cc-123.jpg" alt=""></a> </p> <p><a href="https://www.bloomberg.com/news/articles/2014-03-13/target-missed-warnings-in-epic-hack-of-credit-card-data">Case Url</a>&nbsp;&nbsp;&nbsp;|&nbsp;&nbsp;&nbsp;<a href="http://bit.ly/1TIsIml">Outlook</a></p> </div> <a href="#cross-site-scripting" class="next-section"><i class="ion ion-android-arrow-down"></i><br />Next Vulnerability</a> </div> </div> <div class="slide" style="background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/photo-credentials-2.jpg) center top no-repeat;"> <div class="indent"> <div class="pagination">3/3</div> <div class="addthis_toolbox addthis_default_style addthis_32x32_style share"> <a class="addthis_button_compact"><img src="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/images/icon-share.png" width="28" height="28" alt="" /> <span>Share</span></a> </div> <h3><span class="icon"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/icon-credentials-3.png" width="30" height="30" alt="" /></span> COMPROMISED CREDENTIALS</h3> <h2>Threat Outlook</h2> <div class="vulnerability-content"> <p>With so much personal data already compromised, two-factor authentication is a widely suggested option. Some variants include using cell phone location as an automatic second factor. Another idea is issuing a Common Access Card (CAC) to every citizen, like government employees use.</p> <p>Please click below to listen to IEEE Senior Member Kevin Du speak on cybersecurity and compromised credentials.</p> <p embedcode="&lt;iframe width=&quot;100%&quot; height=&quot;166&quot; scrolling=&quot;no&quot; frameborder=&quot;no&quot; src=&quot;https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/307081273&amp;color=c90000&amp;auto_play=true&amp;hide_related=false&amp;show_comments=true&amp;show_user=true&amp;show_reposts=false&quot;&gt;&lt;/iframe&gt;"> <a href="#" class="embed-placeholder desktop" data-section="compromised-credentials" data-slide="Outlook"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/cc-3.jpg" alt=""></a> <a href="#" class="embed-placeholder mobile" data-section="compromised-credentials" data-slide="Outlook"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/mb-cc-123.jpg" alt=""></a> </p> </div> <a href="#cross-site-scripting" class="next-section"><i class="ion ion-android-arrow-down"></i><br />Next Vulnerability</a> </div> </div> </div> <div class="section" > <div class="slide" style="background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/photo-crossscripting-2.jpg) center top no-repeat;"> <div class="indent"> <div class="pagination">1/3</div> <div class="addthis_toolbox addthis_default_style addthis_32x32_style share"> <a class="addthis_button_compact"><img src="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/images/icon-share.png" width="28" height="28" alt="" /> <span>Share</span></a> </div> <h3><span class="icon"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/icon-crosssite-1.png" width="30" height="30" alt="" /></span> CROSS-SITE SCRIPTING (XSS)</h3> <h2>Overview</h2> <div class="vulnerability-content"> <p>XSS is an injection attack carried out on websites that accept input, but don&#8217;t properly separate data and executable code before the input is delivered back to the user’s browser. Since browsers can’t tell valid markup from attacker-controlled markup, attackers can either inject malicious code into the user&#8217;s system or extract the user&#8217;s data.</p> <p>Please click below to listen to IEEE Senior Member Kevin Curran discuss the cybersecurity issue of cross-site scripting.</p> <p embedcode="&lt;iframe width=&quot;100%&quot; height=&quot;166&quot; scrolling=&quot;no&quot; frameborder=&quot;no&quot; src=&quot;https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/307550977&amp;color=c90000&amp;auto_play=true&amp;hide_related=false&amp;show_comments=true&amp;show_user=true&amp;show_reposts=false&quot;&gt;&lt;/iframe&gt;"> <a href="#" class="embed-placeholder desktop" data-section="cross-site-scripting" data-slide="Overview"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/css-1.jpg" alt=""></a> <a href="#" class="embed-placeholder mobile" data-section="cross-site-scripting" data-slide="Overview"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/mb-css-123.jpg" alt=""></a> </p> </div> <a href="#data-breach" class="next-section"><i class="ion ion-android-arrow-down"></i><br />Next Vulnerability</a> </div> </div> <div class="slide" style="background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/photo-crossscripting-2.jpg) center top no-repeat;"> <div class="indent"> <div class="pagination">2/3</div> <div class="addthis_toolbox addthis_default_style addthis_32x32_style share"> <a class="addthis_button_compact"><img src="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/images/icon-share.png" width="28" height="28" alt="" /> <span>Share</span></a> </div> <h3><span class="icon"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/icon-crosssite-1.png" width="30" height="30" alt="" /></span> CROSS-SITE SCRIPTING (XSS)</h3> <h2>Incident</h2> <div class="vulnerability-content"> <p>Implemented using JavaScript, an XSS vulnerability on an online auction website allowed attackers to inject their own malicious form page via an iframe. This made the malicious URL look like it was a legitimate page hosted on the site. As users logged into what they thought was their account, their credentials could be captured in plain text. This flaw persisted for months, and it&#8217;s unclear how many users were affected.</p> <p>Please click below to listen to IEEE Senior Member Kevin Curran discuss the cybersecurity issue of cross-site scripting.</p> <p embedcode="&lt;iframe width=&quot;100%&quot; height=&quot;166&quot; scrolling=&quot;no&quot; frameborder=&quot;no&quot; src=&quot;https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/307550972&amp;color=c90000&amp;auto_play=true&amp;hide_related=false&amp;show_comments=true&amp;show_user=true&amp;show_reposts=false&quot;&gt;&lt;/iframe&gt;"> <a href="#" class="embed-placeholder desktop" data-section="cross-site-scripting" data-slide="Incident"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/css-2.jpg" alt=""></a> <a href="#" class="embed-placeholder mobile" data-section="cross-site-scripting" data-slide="Incident"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/mb-css-123.jpg" alt=""></a> </p> <p><a href="http://www.zdnet.com/article/simple-ebay-security-flaw-exposes-users-to-phishing-campaigns/">Case Url</a>&nbsp;&nbsp;&nbsp;|&nbsp;&nbsp;&nbsp;<a href="http://bit.ly/2kZ9zBk">Outlook</a></p> </div> <a href="#data-breach" class="next-section"><i class="ion ion-android-arrow-down"></i><br />Next Vulnerability</a> </div> </div> <div class="slide" style="background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/photo-crossscripting-2.jpg) center top no-repeat;"> <div class="indent"> <div class="pagination">3/3</div> <div class="addthis_toolbox addthis_default_style addthis_32x32_style share"> <a class="addthis_button_compact"><img src="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/images/icon-share.png" width="28" height="28" alt="" /> <span>Share</span></a> </div> <h3><span class="icon"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/icon-crosssite-1.png" width="30" height="30" alt="" /></span> CROSS-SITE SCRIPTING (XSS)</h3> <h2>Threat Outlook</h2> <div class="vulnerability-content"> <p>XSS vulnerabilities can be avoided by adopting the convention that all HTML markup must be produced by APIs and libraries that guarantee correct, context-specific encoding of data inserted into HTML markup. In many cases, developers just use HTML templating systems to generate HTML markup.</p> <p>Please click below to listen to IEEE Senior Member Kevin Curran discuss the cybersecurity issue of cross-site scripting.</p> <p embedcode="&lt;iframe width=&quot;100%&quot; height=&quot;166&quot; scrolling=&quot;no&quot; frameborder=&quot;no&quot; src=&quot;https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/307550980&amp;color=c90000&amp;auto_play=true&amp;hide_related=false&amp;show_comments=true&amp;show_user=true&amp;show_reposts=false&quot;&gt;&lt;/iframe&gt;"> <a href="#" class="embed-placeholder desktop" data-section="cross-site-scripting" data-slide="Outlook"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/css-3.jpg" alt=""></a> <a href="#" class="embed-placeholder mobile" data-section="cross-site-scripting" data-slide="Outlook"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/mb-css-123.jpg" alt=""></a> </p> </div> <a href="#data-breach" class="next-section"><i class="ion ion-android-arrow-down"></i><br />Next Vulnerability</a> </div> </div> </div> <div class="section" > <div class="slide" style="background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/photo-databreach-2.jpg) center top no-repeat;"> <div class="indent"> <div class="pagination">1/3</div> <div class="addthis_toolbox addthis_default_style addthis_32x32_style share"> <a class="addthis_button_compact"><img src="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/images/icon-share.png" width="28" height="28" alt="" /> <span>Share</span></a> </div> <h3><span class="icon"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/icon-data-breach-2.png" width="30" height="30" alt="" /></span> DATA BREACH</h3> <h2>Overview</h2> <div class="vulnerability-content"> <p><span data-sheets-value="{&quot;1&quot;:2,&quot;2&quot;:&quot;Data stored on servers is a common target in (and motivation for) many attacks. The sensitivity of the data determines how potentially damaging it is to an organization - names, addresses, credit card numbers, health information, trade secrets and intellectual property are constantly sought after.&quot;}" data-sheets-userformat="{&quot;2&quot;:897,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;11&quot;:4,&quot;12&quot;:0}">Data stored on servers is a common target in (and motivation for) many attacks. The sensitivity of the data determines how potentially damaging it is to an organization &#8211; names, addresses, credit card numbers, health information, trade secrets and intellectual property are constantly sought after.</span></p> <p>Please click below to listen to IEEE Senior Member Zhen Wen speak on cybersecurity and data breaches.</p> <p embedcode="&lt;iframe width=&quot;100%&quot; height=&quot;166&quot; scrolling=&quot;no&quot; frameborder=&quot;no&quot; src=&quot;https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/306918072&amp;color=C90000&amp;auto_play=true&amp;hide_related=false&amp;show_comments=true&amp;show_user=true&amp;show_reposts=false&quot;&gt;&lt;/iframe&gt;"> <a href="#" class="embed-placeholder desktop" data-section="data-breach" data-slide="Overview"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/db-1.jpg" alt=""></a> <a href="#" class="embed-placeholder mobile" data-section="data-breach" data-slide="Overview"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/mb-db-1.jpg" alt=""></a> </p> </div> <a href="#distributed-denial-of-service-attack" class="next-section"><i class="ion ion-android-arrow-down"></i><br />Next Vulnerability</a> </div> </div> <div class="slide" style="background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/photo-databreach-2.jpg) center top no-repeat;"> <div class="indent"> <div class="pagination">2/3</div> <div class="addthis_toolbox addthis_default_style addthis_32x32_style share"> <a class="addthis_button_compact"><img src="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/images/icon-share.png" width="28" height="28" alt="" /> <span>Share</span></a> </div> <h3><span class="icon"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/icon-data-breach-2.png" width="30" height="30" alt="" /></span> DATA BREACH</h3> <h2>Incident</h2> <div class="vulnerability-content"> <div dir="ltr"> <div class="input-box" spellcheck="false"> <div id="waffle-rich-text-editor" class="cell-input editable" dir="ltr" tabindex="0"> <p>One of  &#8220;<span style="font-weight: 400;">The Big Three&#8221;</span> credit reporting agencies had its servers hacked in 2015. Attackers took the personal information of 15 million third-party cellular customers who had submitted their information for credit checks. Names, addresses and Social Security numbers were all stolen.</p> <p>Because the information was particularly valuable, it appeared for sale on the dark web extremely quickly. Victims were instructed to place fraud alerts on their credit cards and were later instructed to sign up for identity theft monitoring.</p> </div> </div> </div> <p>Please click below to listen to IEEE Senior Member Zhen Wen speak on cybersecurity and data breaches.</p> <p embedcode="&lt;iframe width=&quot;100%&quot; height=&quot;166&quot; scrolling=&quot;no&quot; frameborder=&quot;no&quot; src=&quot;https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/307079318&amp;color=c90000&amp;auto_play=true&amp;hide_related=false&amp;show_comments=true&amp;show_user=true&amp;show_reposts=false&quot;&gt;&lt;/iframe&gt;"> <a href="#" class="embed-placeholder desktop" data-section="data-breach" data-slide="Incident"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/db-2.jpg" alt=""></a> <a href="#" class="embed-placeholder mobile" data-section="data-breach" data-slide="Incident"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/mb-db-2.jpg" alt=""></a> </p> <p><a href="https://www.bloomberg.com/news/articles/2015-10-07/t-mobile-experian-sued-over-hack-on-15-million-customers">Case Url</a>&nbsp;&nbsp;&nbsp;|&nbsp;&nbsp;&nbsp;<a href="http://bit.ly/2lU8HMl">Outlook</a></p> </div> <a href="#distributed-denial-of-service-attack" class="next-section"><i class="ion ion-android-arrow-down"></i><br />Next Vulnerability</a> </div> </div> <div class="slide" style="background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/photo-databreach-2.jpg) center top no-repeat;"> <div class="indent"> <div class="pagination">3/3</div> <div class="addthis_toolbox addthis_default_style addthis_32x32_style share"> <a class="addthis_button_compact"><img src="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/images/icon-share.png" width="28" height="28" alt="" /> <span>Share</span></a> </div> <h3><span class="icon"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/icon-data-breach-2.png" width="30" height="30" alt="" /></span> DATA BREACH</h3> <h2>Threat Outlook</h2> <div class="vulnerability-content"> <p>More advanced data breach incident reporting &#8211; like detailed criteria for characterizing and grouping incidents &#8211; would help to clarify the probability and impact of specific types of data breaches.</p> <p>Please click below to listen to IEEE Senior Member Kevin Curran speak on cybersecurity and data breaches.</p> <p embedcode="&lt;iframe width=&quot;100%&quot; height=&quot;166&quot; scrolling=&quot;no&quot; frameborder=&quot;no&quot; src=&quot;https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/309397164&amp;color=c90000&amp;auto_play=true&amp;hide_related=false&amp;show_comments=true&amp;show_user=true&amp;show_reposts=false&quot;&gt;&lt;/iframe&gt;"> <a href="#" class="embed-placeholder desktop" data-section="data-breach" data-slide="Outlook"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/db-3.jpg" alt=""></a> <a href="#" class="embed-placeholder mobile" data-section="data-breach" data-slide="Outlook"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/mb-db-3.jpg" alt=""></a> </p> </div> <a href="#distributed-denial-of-service-attack" class="next-section"><i class="ion ion-android-arrow-down"></i><br />Next Vulnerability</a> </div> </div> </div> <div class="section" > <div class="slide" style="background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/photo-denialservice-2.jpg) center top no-repeat;"> <div class="indent"> <div class="pagination">1/3</div> <div class="addthis_toolbox addthis_default_style addthis_32x32_style share"> <a class="addthis_button_compact"><img src="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/images/icon-share.png" width="28" height="28" alt="" /> <span>Share</span></a> </div> <h3><span class="icon"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/icon-denial-4.png" width="30" height="30" alt="" /></span> DISTRIBUTED DENIAL-OF-SERVICE ATTACK</h3> <h2>Overview</h2> <div class="vulnerability-content"> <p>Mobilizing thousands of unique IP addresses as zombie agents, attackers can overwhelm servers and disrupt their ability to function. Traditional methods include infecting computers with controlling malware while newer versions involve unsecured IoT devices and cloud services.</p> <p>Please click below to listen to IEEE Senior Member Sven Dietrich speak on cybersecurity and DDoS attacks.</p> <p embedcode="&lt;iframe width=&quot;100%&quot; height=&quot;166&quot; scrolling=&quot;no&quot; frameborder=&quot;no&quot; src=&quot;https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/307567986&amp;color=c90000&amp;auto_play=true&amp;hide_related=false&amp;show_comments=true&amp;show_user=true&amp;show_reposts=false&quot;&gt;&lt;/iframe&gt;"> <a href="#" class="embed-placeholder desktop" data-section="distributed-denial-of-service-attack" data-slide="Overview"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/ddos-1.jpg" alt=""></a> <a href="#" class="embed-placeholder mobile" data-section="distributed-denial-of-service-attack" data-slide="Overview"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/mb-ddos-1.jpg" alt=""></a> </p> </div> <a href="#drones" class="next-section"><i class="ion ion-android-arrow-down"></i><br />Next Vulnerability</a> </div> </div> <div class="slide" style="background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/photo-denialservice-2.jpg) center top no-repeat;"> <div class="indent"> <div class="pagination">2/3</div> <div class="addthis_toolbox addthis_default_style addthis_32x32_style share"> <a class="addthis_button_compact"><img src="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/images/icon-share.png" width="28" height="28" alt="" /> <span>Share</span></a> </div> <h3><span class="icon"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/icon-denial-4.png" width="30" height="30" alt="" /></span> DISTRIBUTED DENIAL-OF-SERVICE ATTACK</h3> <h2>Incident</h2> <div class="vulnerability-content"> <p>A large Domain Name System (DNS) provider suffered a three-wave distributed denial of service attack last fall. The attack was orchestrated using a weapon called the Mirai botnet, which mobilized IoT devices including digital cameras. Because of the lack of security on these devices, Mirai was able to send traffic from over 100,000 endpoints, making it twice as large as the next-closest attack on record.</p> <p>Since the DNS provides a distributed directory for the internet, it&#8217;s essential to its functionality. While Twitter, Netflix, and Reddit didn&#8217;t suffer direct DDoS attacks on that day, the DNS provider&#8217;s collapse prevented their sites from functioning, making for an extremely widespread denial of service.</p> <p>Please click below to listen to IEEE Senior Member Sven Dietrich speak on cybersecurity and DDoS attacks.</p> <p embedcode="&lt;iframe width=&quot;100%&quot; height=&quot;166&quot; scrolling=&quot;no&quot; frameborder=&quot;no&quot; src=&quot;https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/307567838&amp;color=c90000&amp;auto_play=true&amp;hide_related=false&amp;show_comments=true&amp;show_user=true&amp;show_reposts=false&quot;&gt;&lt;/iframe&gt;"> <a href="#" class="embed-placeholder desktop" data-section="distributed-denial-of-service-attack" data-slide="Incident"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/ddos-2.jpg" alt=""></a> <a href="#" class="embed-placeholder mobile" data-section="distributed-denial-of-service-attack" data-slide="Incident"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/mb-ddos-2.jpg" alt=""></a> </p> <p><a href="https://www.theguardian.com/technology/2016/oct/26/ddos-attack-dyn-mirai-botnet">Case Url</a>&nbsp;&nbsp;&nbsp;|&nbsp;&nbsp;&nbsp;<a href="http://bit.ly/2kThdhe">Outlook</a></p> </div> <a href="#drones" class="next-section"><i class="ion ion-android-arrow-down"></i><br />Next Vulnerability</a> </div> </div> <div class="slide" style="background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/photo-denialservice-2.jpg) center top no-repeat;"> <div class="indent"> <div class="pagination">3/3</div> <div class="addthis_toolbox addthis_default_style addthis_32x32_style share"> <a class="addthis_button_compact"><img src="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/images/icon-share.png" width="28" height="28" alt="" /> <span>Share</span></a> </div> <h3><span class="icon"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/icon-denial-4.png" width="30" height="30" alt="" /></span> DISTRIBUTED DENIAL-OF-SERVICE ATTACK</h3> <h2>Threat Outlook</h2> <div class="vulnerability-content"> <p>Since IoT device manufacturers aren&#8217;t protecting consumers, experts are asking government regulators to step in. Ideas include minimum security standards, interoperability standards, software updates and patches, and placing code in escrow so problems can be managed if a company goes out of business.</p> <p>Please click below to listen to IEEE Senior Member Sven Dietrich speak on cybersecurity and DDoS attacks.</p> <p embedcode="&lt;iframe width=&quot;100%&quot; height=&quot;166&quot; scrolling=&quot;no&quot; frameborder=&quot;no&quot; src=&quot;https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/307567974&amp;color=c90000&amp;auto_play=true&amp;hide_related=false&amp;show_comments=true&amp;show_user=true&amp;show_reposts=false&quot;&gt;&lt;/iframe&gt;"> <a href="#" class="embed-placeholder desktop" data-section="distributed-denial-of-service-attack" data-slide="Outlook"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/ddos-3.jpg" alt=""></a> <a href="#" class="embed-placeholder mobile" data-section="distributed-denial-of-service-attack" data-slide="Outlook"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/mb-ddos-3.jpg" alt=""></a> </p> </div> <a href="#drones" class="next-section"><i class="ion ion-android-arrow-down"></i><br />Next Vulnerability</a> </div> </div> </div> <div class="section" > <div class="slide" style="background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/photo-drones-3.jpg) center top no-repeat;"> <div class="indent"> <div class="pagination">1/3</div> <div class="addthis_toolbox addthis_default_style addthis_32x32_style share"> <a class="addthis_button_compact"><img src="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/images/icon-share.png" width="28" height="28" alt="" /> <span>Share</span></a> </div> <h3><span class="icon"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/icon-drone-3.png" width="30" height="30" alt="" /></span> DRONES</h3> <h2>Overview</h2> <div class="vulnerability-content"> <p>Drones are still very much a developing technology. As a result, they present a number of different security risks. There are many instances of them being hacked, even from long distances, but they&#8217;re also a potential vehicle for hackers to intercept or disrupt corporate communications via unsecured Wi-Fi® and Bluetooth® signals.</p> <p>Please click below to listen to IEEE Senior Member Paul Kostek speak on cybersecurity and drones.</p> <p embedcode="&lt;iframe width=&quot;100%&quot; height=&quot;166&quot; scrolling=&quot;no&quot; frameborder=&quot;no&quot; src=&quot;https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/307085682&amp;color=C90000&amp;auto_play=true&amp;hide_related=false&amp;show_comments=true&amp;show_user=true&amp;show_reposts=false&quot;&gt;&lt;/iframe&gt;"> <a href="#" class="embed-placeholder desktop" data-section="drones" data-slide="Overview"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/dr-1.jpg" alt=""></a> <a href="#" class="embed-placeholder mobile" data-section="drones" data-slide="Overview"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/mb-d-1.jpg" alt=""></a> </p> </div> <a href="#malicious-insiders" class="next-section"><i class="ion ion-android-arrow-down"></i><br />Next Vulnerability</a> </div> </div> <div class="slide" style="background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/photo-drones-3.jpg) center top no-repeat;"> <div class="indent"> <div class="pagination">2/3</div> <div class="addthis_toolbox addthis_default_style addthis_32x32_style share"> <a class="addthis_button_compact"><img src="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/images/icon-share.png" width="28" height="28" alt="" /> <span>Share</span></a> </div> <h3><span class="icon"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/icon-drone-3.png" width="30" height="30" alt="" /></span> DRONES</h3> <h2>Incident</h2> <div class="vulnerability-content"> <p>Connected light bulbs and their linking systems have been the target of lots of experimental hacking. Recently, hackers were able to bypass the built-in safeguards against remote access. They then extracted the key that the manufacturer uses to encrypt and authenticate new firmware. By installing malicious firmware, the hackers were able to make effects like constant flickering or blackouts permanent.</p> <p>What&#8217;s more, the attack is a worm, and can jump from connected device to connected device through the air. One infected bulb could potentially knock out lights in an entire city. And the worm can be delivered by drone &#8211; researchers were able to turn the lights on and off from one flying 350 meters away (roughly a quarter mile).</p> <p>Please click below to listen to IEEE Senior Member Paul Kostek speak on cybersecurity and drones.</p> <p embedcode="&lt;iframe width=&quot;100%&quot; height=&quot;166&quot; scrolling=&quot;no&quot; frameborder=&quot;no&quot; src=&quot;https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/307085684&amp;color=c90000&amp;auto_play=true&amp;hide_related=false&amp;show_comments=true&amp;show_user=true&amp;show_reposts=false&quot;&gt;&lt;/iframe&gt;"> <a href="#" class="embed-placeholder desktop" data-section="drones" data-slide="Incident"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/dr-2.jpg" alt=""></a> <a href="#" class="embed-placeholder mobile" data-section="drones" data-slide="Incident"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/mb-d-2.jpg" alt=""></a> </p> <p><a href="https://www.engadget.com/2016/11/03/hackers-hijack-a-philips-hue-lights-with-a-drone/">Case Url</a>&nbsp;&nbsp;&nbsp;|&nbsp;&nbsp;&nbsp;<a href="http://bit.ly/2kTxtP3">Outlook</a></p> </div> <a href="#malicious-insiders" class="next-section"><i class="ion ion-android-arrow-down"></i><br />Next Vulnerability</a> </div> </div> <div class="slide" style="background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/photo-drones-3.jpg) center top no-repeat;"> <div class="indent"> <div class="pagination">3/3</div> <div class="addthis_toolbox addthis_default_style addthis_32x32_style share"> <a class="addthis_button_compact"><img src="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/images/icon-share.png" width="28" height="28" alt="" /> <span>Share</span></a> </div> <h3><span class="icon"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/icon-drone-3.png" width="30" height="30" alt="" /></span> DRONES</h3> <h2>Threat Outlook</h2> <div class="vulnerability-content"> <p>A group of California drone developers have recently announced they’re creating a drone that is optimized for one single purpose: finding nearby malicious drones, and causing them to crash.</p> <p>Please click below to listen to IEEE Senior Member Paul Kostek speak on cybersecurity and drones.</p> <p embedcode="&lt;iframe width=&quot;100%&quot; height=&quot;166&quot; scrolling=&quot;no&quot; frameborder=&quot;no&quot; src=&quot;https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/307085677&amp;color=c90000&amp;auto_play=true&amp;hide_related=false&amp;show_comments=true&amp;show_user=true&amp;show_reposts=false&quot;&gt;&lt;/iframe&gt;"> <a href="#" class="embed-placeholder desktop" data-section="drones" data-slide="Outlook"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/dr-3.jpg" alt=""></a> <a href="#" class="embed-placeholder mobile" data-section="drones" data-slide="Outlook"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/mb-d-3.jpg" alt=""></a> </p> </div> <a href="#malicious-insiders" class="next-section"><i class="ion ion-android-arrow-down"></i><br />Next Vulnerability</a> </div> </div> </div> <div class="section" > <div class="slide" style="background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/photo-malicious-2.jpg) center top no-repeat;"> <div class="indent"> <div class="pagination">1/3</div> <div class="addthis_toolbox addthis_default_style addthis_32x32_style share"> <a class="addthis_button_compact"><img src="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/images/icon-share.png" width="28" height="28" alt="" /> <span>Share</span></a> </div> <h3><span class="icon"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/icon-malicious-4.png" width="30" height="30" alt="" /></span> MALICIOUS INSIDERS</h3> <h2>Overview</h2> <div class="vulnerability-content"> <p>Despite an organization&#8217;s best effort to mitigate threats, the prospect of a rogue employee is ever-present. Current or former employees, system administrators, contractors or business partners can compromise the system for revenge or personal gain. In fairness, it is easy to misconstrue a bungling attempt to perform a routine job as &#8220;malicious&#8221; insider activity. But almost one-third are actually devious.</p> <p>Please click below to listen to IEEE Senior Member Zhen Wen speak on cybersecurity and malicious insiders.</p> <p embedcode="&lt;iframe width=&quot;100%&quot; height=&quot;166&quot; scrolling=&quot;no&quot; frameborder=&quot;no&quot; src=&quot;https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/307086170&amp;color=C90000&amp;auto_play=true&amp;hide_related=false&amp;show_comments=true&amp;show_user=true&amp;show_reposts=false&quot;&gt;&lt;/iframe&gt;"> <a href="#" class="embed-placeholder desktop" data-section="malicious-insiders" data-slide="Overview"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/mi-1.jpg" alt=""></a> <a href="#" class="embed-placeholder mobile" data-section="malicious-insiders" data-slide="Overview"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/mb-mi-12.jpg" alt=""></a> </p> </div> <a href="#malware" class="next-section"><i class="ion ion-android-arrow-down"></i><br />Next Vulnerability</a> </div> </div> <div class="slide" style="background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/photo-malicious-2.jpg) center top no-repeat;"> <div class="indent"> <div class="pagination">2/3</div> <div class="addthis_toolbox addthis_default_style addthis_32x32_style share"> <a class="addthis_button_compact"><img src="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/images/icon-share.png" width="28" height="28" alt="" /> <span>Share</span></a> </div> <h3><span class="icon"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/icon-malicious-4.png" width="30" height="30" alt="" /></span> MALICIOUS INSIDERS</h3> <h2>Incident</h2> <div class="vulnerability-content"> <p>At several hospitals in East China&#8217;s Shandong Province, the personal information of over 200,000 children who had been processed for receiving vaccinations was leaked. Cell phone numbers and home addresses of parents were taken by the attackers. The data was then offered for sale online for $4,900 USD. The data was obtained in part through unauthorized access, and in part by malicious insiders who collaborated with the attackers. Parents remain worried about the potential ramifications, and in particular, a heightened risk that their children might be kidnapped.</p> <p>Please click below to listen to IEEE Senior Member Zhen Wen speak on cybersecurity and malicious insiders.</p> <p embedcode="&lt;iframe width=&quot;100%&quot; height=&quot;166&quot; scrolling=&quot;no&quot; frameborder=&quot;no&quot; src=&quot;https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/307086215&amp;color=C90000&amp;auto_play=true&amp;hide_related=false&amp;show_comments=true&amp;show_user=true&amp;show_reposts=false&quot;&gt;&lt;/iframe&gt;"> <a href="#" class="embed-placeholder desktop" data-section="malicious-insiders" data-slide="Incident"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/mi-2.jpg" alt=""></a> <a href="#" class="embed-placeholder mobile" data-section="malicious-insiders" data-slide="Incident"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/mb-mi-12.jpg" alt=""></a> </p> <p><a href="http://www.globaltimes.cn/content/977702.shtml">Case Url</a>&nbsp;&nbsp;&nbsp;|&nbsp;&nbsp;&nbsp;<a href="http://bit.ly/2lZYr4t">Outlook</a></p> </div> <a href="#malware" class="next-section"><i class="ion ion-android-arrow-down"></i><br />Next Vulnerability</a> </div> </div> <div class="slide" style="background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/photo-malicious-2.jpg) center top no-repeat;"> <div class="indent"> <div class="pagination">3/3</div> <div class="addthis_toolbox addthis_default_style addthis_32x32_style share"> <a class="addthis_button_compact"><img src="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/images/icon-share.png" width="28" height="28" alt="" /> <span>Share</span></a> </div> <h3><span class="icon"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/icon-malicious-4.png" width="30" height="30" alt="" /></span> MALICIOUS INSIDERS</h3> <h2>Threat Outlook</h2> <div class="vulnerability-content"> <p>Since malicious employees will always be a possibility, reducing risk falls on smart tech practices. One method is simply to reduce the number of insiders. A second is to expand the dimensions of the data, making it larger than the number of insiders.</p> <p embedcode="&lt;iframe width=&quot;100%&quot; height=&quot;166&quot; scrolling=&quot;no&quot; frameborder=&quot;no&quot; src=&quot;https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/307086157&amp;color=C90000&amp;auto_play=true&amp;hide_related=false&amp;show_comments=true&amp;show_user=true&amp;show_reposts=false&quot;&gt;&lt;/iframe&gt;"> <a href="#" class="embed-placeholder desktop" data-section="malicious-insiders" data-slide="Outlook"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/mi-3.jpg" alt=""></a> <a href="#" class="embed-placeholder mobile" data-section="malicious-insiders" data-slide="Outlook"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/mb-mi-12.jpg" alt=""></a> </p> </div> <a href="#malware" class="next-section"><i class="ion ion-android-arrow-down"></i><br />Next Vulnerability</a> </div> </div> </div> <div class="section" > <div class="slide" style="background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/photo-malware-2.jpg) center top no-repeat;"> <div class="indent"> <div class="pagination">1/3</div> <div class="addthis_toolbox addthis_default_style addthis_32x32_style share"> <a class="addthis_button_compact"><img src="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/images/icon-share.png" width="28" height="28" alt="" /> <span>Share</span></a> </div> <h3><span class="icon"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/icon-malware-4.png" width="30" height="30" alt="" /></span> MALWARE</h3> <h2>Overview</h2> <div class="vulnerability-content"> <p>Malware refers to malicious software intended to infiltrate and damage computers and networks. It comes in a variety of forms, and can be delivered in a number of ways. At its most extreme, malware can be used to erase all data on any machine that runs it.</p> <p>Please click below to listen to IEEE Life Senior Member Raul Colcher speak on malware. Please note: the audio is in Portuguese but an English translation can be found <a href="https://dev-ieee-transmitter.pantheonsite.io/wp-content/uploads/2017/02/Malware-IEEESeniorMember-RaulColcher4.pdf" target="_blank" rel="noopener">here.</a></p> <p embedcode="&lt;iframe width=&quot;100%&quot; height=&quot;166&quot; scrolling=&quot;no&quot; frameborder=&quot;no&quot; src=&quot;https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/307094830&amp;color=c90000&amp;auto_play=true&amp;hide_related=false&amp;show_comments=true&amp;show_user=true&amp;show_reposts=false&quot;&gt;&lt;/iframe&gt;"> <a href="#" class="embed-placeholder desktop" data-section="malware" data-slide="Overview"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/mw-1.jpg" alt=""></a> <a href="#" class="embed-placeholder mobile" data-section="malware" data-slide="Overview"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/mb-m-1.jpg" alt=""></a> </p> </div> <a href="#ransomware" class="next-section"><i class="ion ion-android-arrow-down"></i><br />Next Vulnerability</a> </div> </div> <div class="slide" style="background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/photo-malware-2.jpg) center top no-repeat;"> <div class="indent"> <div class="pagination">2/3</div> <div class="addthis_toolbox addthis_default_style addthis_32x32_style share"> <a class="addthis_button_compact"><img src="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/images/icon-share.png" width="28" height="28" alt="" /> <span>Share</span></a> </div> <h3><span class="icon"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/icon-malware-4.png" width="30" height="30" alt="" /></span> MALWARE</h3> <h2>Incident</h2> <div class="vulnerability-content"> <p>After stealing troves of data from a major motion picture company during a breach, attackers unleashed wiper malware on their way out. The variety they used destroys all data on the Windows machines it infects, then spreads itself via network file shares to attack Windows servers. It also erases the software instructions that tell computers how to operate.</p> <p>Most PC malware comes wrapped in an executable “dropper” that installs it and its supporting files. That was the case with this attack, too. After spear phishing their way in, the attackers went undetected for long enough to analyze the network and hardcode the names of the company&#8217;s servers into the malware.</p> <p>Please click below to listen to IEEE Life Senior Member Raul Colcher speak on malware. Please note: the audio is in Portuguese but an English translation can be found <a href="https://dev-ieee-transmitter.pantheonsite.io/wp-content/uploads/2017/02/Malware-IEEESeniorMember-RaulColcher4.pdf" target="_blank" rel="noopener">here.</a></p> <p embedcode="&lt;iframe width=&quot;100%&quot; height=&quot;166&quot; scrolling=&quot;no&quot; frameborder=&quot;no&quot; src=&quot;https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/307094828&amp;color=c90000&amp;auto_play=true&amp;hide_related=false&amp;show_comments=true&amp;show_user=true&amp;show_reposts=false&quot;&gt;&lt;/iframe&gt;"> <a href="#" class="embed-placeholder desktop" data-section="malware" data-slide="Incident"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/mw-2.jpg" alt=""></a> <a href="#" class="embed-placeholder mobile" data-section="malware" data-slide="Incident"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/mb-m-2.jpg" alt=""></a> </p> <p><a href="https://arstechnica.com/security/2014/12/inside-the-wiper-malware-that-brought-sony-pictures-to-its-knees/">Case Url</a>&nbsp;&nbsp;&nbsp;|&nbsp;&nbsp;&nbsp;<a href="http://bit.ly/2lpXHcE">Outlook</a></p> </div> <a href="#ransomware" class="next-section"><i class="ion ion-android-arrow-down"></i><br />Next Vulnerability</a> </div> </div> <div class="slide" style="background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/photo-malware-2.jpg) center top no-repeat;"> <div class="indent"> <div class="pagination">3/3</div> <div class="addthis_toolbox addthis_default_style addthis_32x32_style share"> <a class="addthis_button_compact"><img src="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/images/icon-share.png" width="28" height="28" alt="" /> <span>Share</span></a> </div> <h3><span class="icon"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/icon-malware-4.png" width="30" height="30" alt="" /></span> MALWARE</h3> <h2>Threat Outlook</h2> <div class="vulnerability-content"> <p>All malware consumes power. A company in Virginia has found that the heat signature of malware’s power usage is very different from a chip’s standard operations. They&#8217;ve built a unit that sits outside the CPU and sniffs the chip’s electromagnetic leakage for power consumption patterns indicating abnormal behavior.</p> <p>Please click below to listen to IEEE Life Senior Member Raul Colcher speak on malware. Please note: the audio is in Portuguese but an English translation can be found <a href="https://dev-ieee-transmitter.pantheonsite.io/wp-content/uploads/2017/02/Malware-IEEESeniorMember-RaulColcher4.pdf" target="_blank" rel="noopener">here.</a></p> <p embedcode="&lt;iframe width=&quot;100%&quot; height=&quot;166&quot; scrolling=&quot;no&quot; frameborder=&quot;no&quot; src=&quot;https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/307094778&amp;color=c90000&amp;auto_play=true&amp;hide_related=false&amp;show_comments=true&amp;show_user=true&amp;show_reposts=false&quot;&gt;&lt;/iframe&gt;"> <a href="#" class="embed-placeholder desktop" data-section="malware" data-slide="Outlook"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/mw-1.jpg" alt=""></a> <a href="#" class="embed-placeholder mobile" data-section="malware" data-slide="Outlook"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/mb-m-1.jpg" alt=""></a> </p> </div> <a href="#ransomware" class="next-section"><i class="ion ion-android-arrow-down"></i><br />Next Vulnerability</a> </div> </div> </div> <div class="section" > <div class="slide" style="background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/photo-ransomware-2.jpg) center top no-repeat;"> <div class="indent"> <div class="pagination">1/3</div> <div class="addthis_toolbox addthis_default_style addthis_32x32_style share"> <a class="addthis_button_compact"><img src="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/images/icon-share.png" width="28" height="28" alt="" /> <span>Share</span></a> </div> <h3><span class="icon"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/icon-ransomeware-5-1.png" width="30" height="30" alt="" /></span> RANSOMWARE</h3> <h2>Overview</h2> <div class="vulnerability-content"> <p>Ransomware is a specific type of malware that locks or damages a victim&#8217;s device, then demands a ransom payment to decrypt it and disappear. Victims are then forced to decide whether to pay the price, negotiate, or wait it out. With a lack of security in the IoT, &#8220;jackware&#8221; may become the next frontier of ransomware, where IoT-connected devices can be locked for ransom.</p> <p>Please click below to listen to IEEE Senior Member Kevin Curran discuss the cybersecurity issue of ransomware.</p> <p embedcode="&lt;iframe width=&quot;100%&quot; height=&quot;166&quot; scrolling=&quot;no&quot; frameborder=&quot;no&quot; src=&quot;https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/307551368&amp;color=c90000&amp;auto_play=true&amp;hide_related=false&amp;show_comments=true&amp;show_user=true&amp;show_reposts=false&quot;&gt;&lt;/iframe&gt;"> <a href="#" class="embed-placeholder desktop" data-section="ransomware" data-slide="Overview"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/rw-1.jpg" alt=""></a> <a href="#" class="embed-placeholder mobile" data-section="ransomware" data-slide="Overview"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/mb-rw-1.jpg" alt=""></a> </p> </div> <a href="#spear-phishing" class="next-section"><i class="ion ion-android-arrow-down"></i><br />Next Vulnerability</a> </div> </div> <div class="slide" style="background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/photo-ransomware-2.jpg) center top no-repeat;"> <div class="indent"> <div class="pagination">2/3</div> <div class="addthis_toolbox addthis_default_style addthis_32x32_style share"> <a class="addthis_button_compact"><img src="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/images/icon-share.png" width="28" height="28" alt="" /> <span>Share</span></a> </div> <h3><span class="icon"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/icon-ransomeware-5-1.png" width="30" height="30" alt="" /></span> RANSOMWARE</h3> <h2>Incident</h2> <div class="vulnerability-content"> <p>A ransomware attack shut down a hospital in Los Angeles for almost two weeks, forcing staff to use pen and paper for record-keeping. Hackers encrypted all of the hospital&#8217;s computers and demanded over $3 million USD in Bitcoin. Though patient information and hospital records weren&#8217;t compromised, the hospital relented and paid $17,000 USD to regain access to its computers.</p> <p>While paying the ransom is typically viewed as a bad practice (there’s no guarantee of getting files back and it encourages similar attacks), organizations are sometimes advised to pay the sum in order to get back to business, or in the case of a hospital, continue to provide advanced care.</p> <p>Please click below to listen to IEEE Senior Member Kevin Curran discuss the cybersecurity issue of ransomware.</p> <p embedcode="&lt;iframe width=&quot;100%&quot; height=&quot;166&quot; scrolling=&quot;no&quot; frameborder=&quot;no&quot; src=&quot;https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/307551360&amp;color=c90000&amp;auto_play=true&amp;hide_related=false&amp;show_comments=true&amp;show_user=true&amp;show_reposts=false&quot;&gt;&lt;/iframe&gt;"> <a href="#" class="embed-placeholder desktop" data-section="ransomware" data-slide="Incident"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/rw-2.jpg" alt=""></a> <a href="#" class="embed-placeholder mobile" data-section="ransomware" data-slide="Incident"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/mb-rw-2.jpg" alt=""></a> </p> <p><a href="https://threatpost.com/hollywood-hospital-pays-17k-ransom-to-decrypt-files/116325/">Case Url</a>&nbsp;&nbsp;&nbsp;|&nbsp;&nbsp;&nbsp;<a href="http://bit.ly/2kO8J8B">Outlook</a></p> </div> <a href="#spear-phishing" class="next-section"><i class="ion ion-android-arrow-down"></i><br />Next Vulnerability</a> </div> </div> <div class="slide" style="background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/photo-ransomware-2.jpg) center top no-repeat;"> <div class="indent"> <div class="pagination">3/3</div> <div class="addthis_toolbox addthis_default_style addthis_32x32_style share"> <a class="addthis_button_compact"><img src="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/images/icon-share.png" width="28" height="28" alt="" /> <span>Share</span></a> </div> <h3><span class="icon"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/icon-ransomeware-5-1.png" width="30" height="30" alt="" /></span> RANSOMWARE</h3> <h2>Threat Outlook</h2> <div class="vulnerability-content"> <p>In healthcare, few steps have been taken to solve the problem. Hospitals haven&#8217;t made cybersecurity a priority in their budgets &#8211; an expert estimated that hospitals spend two percent of their budget on IT, and that security might be 10 percent of that sliver.</p> <p>Please click below to listen to IEEE Senior Member Kevin Curran discuss the cybersecurity issue of ransomware.</p> <p embedcode="&lt;iframe width=&quot;100%&quot; height=&quot;166&quot; scrolling=&quot;no&quot; frameborder=&quot;no&quot; src=&quot;https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/307551378&amp;color=c90000&amp;auto_play=true&amp;hide_related=false&amp;show_comments=true&amp;show_user=true&amp;show_reposts=false&quot;&gt;&lt;/iframe&gt;"> <a href="#" class="embed-placeholder desktop" data-section="ransomware" data-slide="Outlook"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/rw-3.jpg" alt=""></a> <a href="#" class="embed-placeholder mobile" data-section="ransomware" data-slide="Outlook"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/mb-rw-3.jpg" alt=""></a> </p> </div> <a href="#spear-phishing" class="next-section"><i class="ion ion-android-arrow-down"></i><br />Next Vulnerability</a> </div> </div> </div> <div class="section" > <div class="slide" style="background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/photo-phishing-2.jpg) center top no-repeat;"> <div class="indent"> <div class="pagination">1/3</div> <div class="addthis_toolbox addthis_default_style addthis_32x32_style share"> <a class="addthis_button_compact"><img src="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/images/icon-share.png" width="28" height="28" alt="" /> <span>Share</span></a> </div> <h3><span class="icon"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/icon-phishing-1.png" width="30" height="30" alt="" /></span> SPEAR PHISHING</h3> <h2>Overview</h2> <div class="vulnerability-content"> <p>Spear phishing is a time-tested form of attack that is centered on sending bogus emails that look authentic but actually direct the recipient to a fake website that steals confidential information, like usernames and passwords to access finances.</p> <p>Please click below to listen to IEEE Senior Member Sven Dietrich speak on cybersecurity and spear phishing.</p> <p embedcode="&lt;iframe width=&quot;100%&quot; height=&quot;166&quot; scrolling=&quot;no&quot; frameborder=&quot;no&quot; src=&quot;https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/307566973&amp;color=c90000&amp;auto_play=true&amp;hide_related=false&amp;show_comments=true&amp;show_user=true&amp;show_reposts=false&quot;&gt;&lt;/iframe&gt;"> <a href="#" class="embed-placeholder desktop" data-section="spear-phishing" data-slide="Overview"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/sf-1.jpg" alt=""></a> <a href="#" class="embed-placeholder mobile" data-section="spear-phishing" data-slide="Overview"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/mb-sp-1.jpg" alt=""></a> </p> </div> <a href="#threat-ranking-survey" class="next-section"><i class="ion ion-android-arrow-down"></i><br />Next Vulnerability</a> </div> </div> <div class="slide" style="background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/photo-phishing-2.jpg) center top no-repeat;"> <div class="indent"> <div class="pagination">2/3</div> <div class="addthis_toolbox addthis_default_style addthis_32x32_style share"> <a class="addthis_button_compact"><img src="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/images/icon-share.png" width="28" height="28" alt="" /> <span>Share</span></a> </div> <h3><span class="icon"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/icon-phishing-1.png" width="30" height="30" alt="" /></span> SPEAR PHISHING</h3> <h2>Incident</h2> <div class="vulnerability-content"> <p>Over the past year, a number of human rights organizations, labor unions, and journalists associated with the 2022 World Cup were targeted in a phishing campaign run out of Qatar. The attacker(s) created a fictional rights activist named Safeena Malik on Facebook, Google, LinkedIn, and Twitter, harvesting details from real accounts.</p> <p>Targets received emails and social media messages from &#8220;Safeena&#8221; asking them to look at documents on Qatari human rights or offering forged requests to talk on Google Hangouts. The Hangouts links went to phishing sites crafted specifically for the targets, showing their Google avatar as part of a page mimicking a Google account login. The document links, after capturing their credentials, forwarded them to a real Google Docs document to reduce suspicion.</p> <p>Please click below to listen to IEEE Senior Member Sven Dietrich speak on cybersecurity and spear phishing.</p> <p embedcode="&lt;iframe width=&quot;100%&quot; height=&quot;166&quot; scrolling=&quot;no&quot; frameborder=&quot;no&quot; src=&quot;https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/307566963&amp;color=c90000&amp;auto_play=true&amp;hide_related=false&amp;show_comments=true&amp;show_user=true&amp;show_reposts=false&quot;&gt;&lt;/iframe&gt;"> <a href="#" class="embed-placeholder desktop" data-section="spear-phishing" data-slide="Incident"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/sf-2.jpg" alt=""></a> <a href="#" class="embed-placeholder mobile" data-section="spear-phishing" data-slide="Incident"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/mb-sp-2.jpg" alt=""></a> </p> <p><a href="https://arstechnica.com/security/2017/02/amnesty-international-uncovers-phishing-campaign-against-human-rights-activists/">Case Url</a>&nbsp;&nbsp;&nbsp;|&nbsp;&nbsp;&nbsp;<a href="http://bit.ly/2kYt64C">Outlook</a></p> </div> <a href="#threat-ranking-survey" class="next-section"><i class="ion ion-android-arrow-down"></i><br />Next Vulnerability</a> </div> </div> <div class="slide" style="background: url(https://transmitter.ieee.org/wp-content/uploads/2017/02/photo-phishing-2.jpg) center top no-repeat;"> <div class="indent"> <div class="pagination">3/3</div> <div class="addthis_toolbox addthis_default_style addthis_32x32_style share"> <a class="addthis_button_compact"><img src="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/images/icon-share.png" width="28" height="28" alt="" /> <span>Share</span></a> </div> <h3><span class="icon"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/icon-phishing-1.png" width="30" height="30" alt="" /></span> SPEAR PHISHING</h3> <h2>Threat Outlook</h2> <div class="vulnerability-content"> <p><span style="font-weight: 400;">Advanced email filters can help eliminate much of the human error that has allowed spear phishing scams to persist. These filters can detect stories, phrases, and contexts typical of phishing emails. If an email triggers one of these detectors, it would be blocked or quarantined.  </span></p> <p>Please click below to listen to IEEE Senior Member Sven Dietrich speak on cybersecurity and spear phishing.</p> <p embedcode="&lt;iframe width=&quot;100%&quot; height=&quot;166&quot; scrolling=&quot;no&quot; frameborder=&quot;no&quot; src=&quot;https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/307566983&amp;color=c90000&amp;auto_play=true&amp;hide_related=false&amp;show_comments=true&amp;show_user=true&amp;show_reposts=false&quot;&gt;&lt;/iframe&gt;"> <a href="#" class="embed-placeholder desktop" data-section="spear-phishing" data-slide="Outlook"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/sf-3.jpg" alt=""></a> <a href="#" class="embed-placeholder mobile" data-section="spear-phishing" data-slide="Outlook"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/mb-sp-3.jpg" alt=""></a> </p> </div> <a href="#threat-ranking-survey" class="next-section"><i class="ion ion-android-arrow-down"></i><br />Next Vulnerability</a> </div> </div> </div> <div class="section" > <div class="slide"> <div class="indent"> <div class="addthis_toolbox addthis_default_style addthis_32x32_style share"> <a class="addthis_button_compact"><img src="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/images/icon-share.png" width="28" height="28" alt="" /> <span>Share</span></a> </div> <h3 style="padding-bottom: 30px"><span class="icon"><img src="https://transmitter.ieee.org/wp-content/uploads/2017/02/icon-threat-rank.png" width="30" height="30" alt="" /></span> VULNERABILITIES RANKED</h3> <div class="vulnerability-content"><div class="red-bg"> <p class="info-util"><a target="_blank" href="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security//pdf/ieee-cybersecurity-infographic.pdf"><i class="fa fa-download"></i></a></p> <img src="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/images/infographic.jpg" width="800" height="2315" alt="" /> </div></div> </div> </div> </div> </div> <section id="footer"> <ul> <li class="intro"><a href="#intro" data-menuanchor="intro"><img src="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/images/icon-intro.svg" width="26" height="25" alt="" /> <span>Intro</span></a></li> <li class="vulnerabilities"><a href="#vulnerabilities" data-menuanchor="vulnerabilities"><img src="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/images/icon-vuln.svg" width="23" height="22" alt="" /> <span>Vulnerabilities</span></a></li> <li class="info"><a href="#"><img src="https://transmitter.ieee.org/wp-content/themes/wp_IEEE_v2/ieee-cyber-security/images/icon-info.svg" width="22" height="22" alt="" /> <span>Info</span></a></li> </ul> </section> <section id="general-footer"> <div class="ieee-footer"> <p><a href="/">Home</a> <a href="http://www.ieee.org/sitemap.html">Sitemap</a> <a href="http://www.ieee.org/about/contact_center/index.html">Contact & Support Accessibility</a> <a href="http://www.ieee.org/p9-26.html">Nondiscrimination</a> <a href="http://www.ieee.org/security_privacy.html">Policy Privacy & Opting Out of Cookies</a> <a href="http://www.ieee.org/about/feedback_ieee_site.html?FromPage=/membership_services/membership/renew/index.html">Feedback</a> </p> <p>© Copyright 2017 IEEE &#8211; All rights reserved. Use of this Website signifies your agreement to the <a href="http://www.ieee.org/site_terms_conditions.html" target="_blank" rel="noopener">IEEE Terms and Conditions.</a> <span style="font-weight: 400;">A not-for-profit organization, IEEE is the world&#8217;s largest technical professional organization dedicated to advancing technology for the benefit of humanity.</span></p> <p><a href="#" class="button full close">Close</a></p> </div> </section> <script>initialSettings();</script> <script type="text/javascript">window.NREUM||(NREUM={});NREUM.info={"beacon":"bam.nr-data.net","licenseKey":"054b97878e","applicationID":"19376273","transactionName":"NVdaNRRUDxAAUURYWQwdeQISXA4NTkJRVlM=","queueTime":0,"applicationTime":1265,"atts":"GRBZQ1xOHB4=","errorBeacon":"bam.nr-data.net","agent":""}</script></body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10