You are on page 1of 24

Module-3

Cybercrime:
Mobile and
Wireless
Devices
Topic: 3.1, 3.2, 3.3, 3.4, 3.8
• Wireless networks, allowing communications from
any device, anywhere and anytime
• Manufacturing
• Healthcare
• Military

3.1 • personal entertainment


• Remote connection extended from fixed dial-in to

Introduction wireless-on-the-move devices.


• Smartphones + Wireless and mobile devices =
Business Tool
• Research in Motion [RIM] Blackberry Wireless
Hand-held device.
3.2 • Years ago, the Choice was
Proliferation between wireless phone and
simple PDA, but now the trend
of Mobile and need high-end PDA.
Wireless
Devices
• Portable Computers

Types of • Tablet PC
• Internet Tablet
Mobile • Personal Digital Assistant
Computers • Ultramobile PC
• Smartphone
3.3
Trends in
Mobility
Key Findings of Mobile
Computing Security Scenario

• With usage experience, awareness of mobile


uses gets enhanced
• People continue to remain the weakest link
for laptop security
• Wireless connectivity does little to increase
burden of managing Laptop.
• Laptop experience changes the view of
starting a smart hand-held pilot
• There is naivety and/or neglect in smart
handheld security
• Rules rather than technology keep smart
handhelds usage in check
Popular • Malwares, Virus and Worms
• Skull Trojan

attacks
• Cabir Worm
• Mosquito Trojan
• Denial-of-Service
against 3G • Overbilling Attack

Mobile
• Spoofed Policy Development Process
• Signaling Level Attack

Networks
• Trends coming-up with mobile computing:
• M-Commerce
3.4 • M-Banking

Credit Card • Mobile Credit Card transactions are very common with
low cost mobile technology with point of scale terminal
Frauds in • Anywhere Anytime Computing

Mobile and • Wireless Credit Card processing helps to process


transactions from mobile locations
Computing
Era
Online Environment in Credit Card Transactions
Tips to prevent Credit Card Frauds

• DO’s
Tips to prevent Credit Card Frauds
• Dont’s
Merchant sends a transaction to bank

The bank transmits the request to the


Closed Loop authorized cardholder
Environment The Cardholder approves or rejects
for Wireless
[CLEW] The bank/Merchant is notified

The credit card transaction is


completed
Types and Techniques of Credit Card
Fraud
• Paper based Fraud – application fraud[1. ID Theft, 2. Financial Fraud]
• Skimming the information on magnetic strip or data
stored on the smart chip

Modern • Phishing- Site cloning or creating false merchant sites


• Triangulation:
Technique: • Discounted goods and appears to be a legitimate
merchandise website.
Triangulation • Customer registers and provides Credit Card details.
• The criminal orders from the legitimate website
with the Customers details.
• The goods are shipped to the customer and the
transaction is done.
• The criminal keeps purchasing using stolen Credit
Cards of different customers till the criminal closes
the website and starts a new one.
Credit Card • Software that creates valid credit card
numbers and expiry dates.
Generators
Attacks on Mobile/ Cellphone

• Outbreak on mobile devices:


• Enough target terminals
• Enough functionality
• Enough connectivity
• Mobile Viruses
• Mishing
• Smishing
• Vishing
• Hacking Blutooth
Mobile Viruses

How to protect:
• Download or Accept programs from only trusted sites.
• If a mobile is equipped with Bluetooth, turn it OFF or
set it to non discoverable mode when not in use.
• If the mobile is equipped with beam, allow it to receive
incoming beams, only from the trusted source.
• Download and install antivirus software for mobile
devices.
Mishing

Mobile_Phone + Phishing = M-Commerce has its


Mishing contribution
Vishing

Using Social Vishing includes:


Engineering to gain • ID Theft
access to personal • Purchasing luxury
and financial goods and services
• Transferring money or
information from funds
the public for • Monitoring the victims
reward. bank accounts.
How Vishing Works

Internet E-mail Mobile text Voice mail Direct Phone call


messaging
• SMS Phishing
• Reward SMS/ Gaming SMS

• How to protect from Smishing attack:


Smishing • Do not respond to any message asking for
personal information
• Avoid calling any number as mentioned in
the message.
• Never click on any link if the SMS is sent by
an unknown number.
Hacking • Open Wireless technology standard over
short distance.

Bluetooth
• Bluetooth Hacking Tool
Thank You

You might also like