尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
How to prevent
spear phishing attacks
Jorge Luis Sierra
Knight International Journalism Fellow
What is a spear phishing attack?
  Spear phishing is a type of cyberattack carefully crafted to
deceive a person and steal online personal information.
  Spear phishing attacks tend to be personalized with features
that tempt journalists to click on a link or open a document
that, in fact, are malicious programs.
  Journalists can lose not only private information, but also
contact lists, research plans, confidential documents, names
and contact information of sensitive sources.
Preventative steps
  Always keep your computer
and mobile devices updated.
  Install robust antivirus
software. You can use Avira,
Clam AV, Immunet, Avast,
Symantec, AVG or
Kaspersky. Other tools are:
Spybot and Prozen software.
  Do a diligence process
before before clicking any
link or opening any file.
  Use your common sense to
identify a smear phishing
attack: look for misspellings,
fake email addresses, any
signal of something weird in
the message.
  Avoid plugging in your
devices to charge batteries in
unreliable offices.
Preventive steps
  Avoid using WiFi networks
controlled by non reliable
people.
  Use your own mobile
hotspots or mobile modems
to connect to the internet or
to send data.
  Always use several layers of
encryption to share sensitive
information.
  You can use
PGP for Mac OSXor
Windows.
Add a password to open and
change your documents.
  Always use email services
that offer end-to-end
encryption.
  Lear how to avoid phishing
attacks here and here.
What if your device is infected?
  Keep a copy of the infecting
message and send a copy to
the Citizen Lab of the
University of Toronto.
  Check information logs and
analyze all traffic to the
attacker’s IP.
  Update your antivirus
program and run a full scan.
  Back up your information,
encrypt it and store it in a
safe place.
  Reformat your computer to
erase any trace of malware.
  Alert your network of this
attack and change
vulnerable practices.
  Use Windows appropriately,
change to a Mac computer
or try Linux.
Jorge Luis Sierra
jsierra@icfj.org
@latinointx
2016

More Related Content

What's hot

What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
Quick Heal Technologies Ltd.
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
Anurag Srivastava
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
AfiqEfendy Zaen
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
Raghav Chhabra
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applications
Niyas Nazar
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
SysCloud
 
Phishing
PhishingPhishing
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
Jorge Sebastiao
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Jay Nagar
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
Progressive Integrations
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
Aryan Ragu
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru
 
Phishing
PhishingPhishing
Phishing
Sagar Rai
 
Man in The Middle Attack
Man in The Middle AttackMan in The Middle Attack
Man in The Middle Attack
Deepak Upadhyay
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
Netsparker
 
Man in the middle attack (mitm)
Man in the middle attack (mitm)Man in the middle attack (mitm)
Man in the middle attack (mitm)
Hemal Joshi
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Priyanshu Ratnakar
 
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
Intellipaat
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Security
anjuselina
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
Dawood Faheem Abbasi
 

What's hot (20)

What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applications
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
Phishing
PhishingPhishing
Phishing
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Phishing
PhishingPhishing
Phishing
 
Man in The Middle Attack
Man in The Middle AttackMan in The Middle Attack
Man in The Middle Attack
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
 
Man in the middle attack (mitm)
Man in the middle attack (mitm)Man in the middle attack (mitm)
Man in the middle attack (mitm)
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Security
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 

Similar to Spear phishing attacks

Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
Symptai Consulting Limited
 
SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdf
ssusera0b94b
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awareness
Kanishk Raj
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
MILANOP1
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ncell
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
tunzida045
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas Informática
Dani Díaz
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Ruhil Arora
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
security issues
security issuessecurity issues
security issues
Pratham Gupta
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
Tapan Khilar
 
Cyber Crime Awareness : Staying Safe in the Digital Age
Cyber Crime Awareness : Staying Safe in the Digital AgeCyber Crime Awareness : Staying Safe in the Digital Age
Cyber Crime Awareness : Staying Safe in the Digital Age
Ayushi Yadav
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch
iYogi
 
security measures from computer threats.
security measures from computer threats.security measures from computer threats.
security measures from computer threats.
dubeysushil07
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Adeel Younas
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
Tapan Khilar
 
Security Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesSecurity Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 Viruses
Catherine MacAllister
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
UmaraZahidLecturer
 
Unmasking Scam Websites: Ways to Safe Surfing
Unmasking Scam Websites: Ways to Safe SurfingUnmasking Scam Websites: Ways to Safe Surfing
Unmasking Scam Websites: Ways to Safe Surfing
SoftwareDeals
 

Similar to Spear phishing attacks (20)

Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdf
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awareness
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas Informática
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
security issues
security issuessecurity issues
security issues
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
 
Cyber Crime Awareness : Staying Safe in the Digital Age
Cyber Crime Awareness : Staying Safe in the Digital AgeCyber Crime Awareness : Staying Safe in the Digital Age
Cyber Crime Awareness : Staying Safe in the Digital Age
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch
 
security measures from computer threats.
security measures from computer threats.security measures from computer threats.
security measures from computer threats.
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
Security Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesSecurity Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 Viruses
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
Unmasking Scam Websites: Ways to Safe Surfing
Unmasking Scam Websites: Ways to Safe SurfingUnmasking Scam Websites: Ways to Safe Surfing
Unmasking Scam Websites: Ways to Safe Surfing
 

More from Jorge Luis Sierra

Manual para pgp con gpg suite para computadoras mac y mailvelope para chrome
Manual para pgp con gpg suite para computadoras mac y mailvelope para chromeManual para pgp con gpg suite para computadoras mac y mailvelope para chrome
Manual para pgp con gpg suite para computadoras mac y mailvelope para chrome
Jorge Luis Sierra
 
Manual con pantallas para pgp con kleopatra y mailvelope version 1.0
Manual con pantallas para pgp con kleopatra y mailvelope version 1.0Manual con pantallas para pgp con kleopatra y mailvelope version 1.0
Manual con pantallas para pgp con kleopatra y mailvelope version 1.0
Jorge Luis Sierra
 
Manual de seguridad digital y móvil
Manual de seguridad digital y móvilManual de seguridad digital y móvil
Manual de seguridad digital y móvil
Jorge Luis Sierra
 
Cómo encriptar tu celular Android
Cómo encriptar tu celular AndroidCómo encriptar tu celular Android
Cómo encriptar tu celular Android
Jorge Luis Sierra
 
Caja de herramientas de seguridad digital
Caja de herramientas de seguridad digitalCaja de herramientas de seguridad digital
Caja de herramientas de seguridad digital
Jorge Luis Sierra
 
Protege tu comunicación digital
Protege tu comunicación digitalProtege tu comunicación digital
Protege tu comunicación digital
Jorge Luis Sierra
 
How to use anonymox
How to use anonymoxHow to use anonymox
How to use anonymox
Jorge Luis Sierra
 
Bulletproofing digital newsrooms
Bulletproofing digital newsroomsBulletproofing digital newsrooms
Bulletproofing digital newsrooms
Jorge Luis Sierra
 
Evaluación de Riesgos para Periodistas en Guerrero
Evaluación de Riesgos para Periodistas en GuerreroEvaluación de Riesgos para Periodistas en Guerrero
Evaluación de Riesgos para Periodistas en Guerrero
Jorge Luis Sierra
 
Evaluación de Riesgos para Periodistas en Veracruz
Evaluación de Riesgos para Periodistas en VeracruzEvaluación de Riesgos para Periodistas en Veracruz
Evaluación de Riesgos para Periodistas en Veracruz
Jorge Luis Sierra
 
Policías y agresores de civil agreden a periodistas de Veracruz
Policías y agresores de civil agreden a periodistas de VeracruzPolicías y agresores de civil agreden a periodistas de Veracruz
Policías y agresores de civil agreden a periodistas de Veracruz
Jorge Luis Sierra
 
Protege tus comunicaciones con Jitsi meet
Protege tus comunicaciones con Jitsi meet Protege tus comunicaciones con Jitsi meet
Protege tus comunicaciones con Jitsi meet
Jorge Luis Sierra
 
Cómo usar peerio
Cómo usar peerioCómo usar peerio
Cómo usar peerio
Jorge Luis Sierra
 
Cómo encriptar tu computadora con FileVault
Cómo encriptar tu computadora con FileVaultCómo encriptar tu computadora con FileVault
Cómo encriptar tu computadora con FileVault
Jorge Luis Sierra
 
Jitsi meet
Jitsi meetJitsi meet
Jitsi meet
Jorge Luis Sierra
 
Cómo abrir una cuenta de hushmail
Cómo abrir una cuenta de hushmailCómo abrir una cuenta de hushmail
Cómo abrir una cuenta de hushmail
Jorge Luis Sierra
 
Cómo encriptar emails
Cómo encriptar emailsCómo encriptar emails
Cómo encriptar emails
Jorge Luis Sierra
 
Protección de la privacidad y navegación anónima en internet
Protección de la privacidad y navegación anónima en internetProtección de la privacidad y navegación anónima en internet
Protección de la privacidad y navegación anónima en internet
Jorge Luis Sierra
 
Protege tu móvil
Protege tu móvilProtege tu móvil
Protege tu móvil
Jorge Luis Sierra
 
Protección de equipos, documentos y contraseñas
Protección de equipos, documentos y contraseñasProtección de equipos, documentos y contraseñas
Protección de equipos, documentos y contraseñas
Jorge Luis Sierra
 

More from Jorge Luis Sierra (20)

Manual para pgp con gpg suite para computadoras mac y mailvelope para chrome
Manual para pgp con gpg suite para computadoras mac y mailvelope para chromeManual para pgp con gpg suite para computadoras mac y mailvelope para chrome
Manual para pgp con gpg suite para computadoras mac y mailvelope para chrome
 
Manual con pantallas para pgp con kleopatra y mailvelope version 1.0
Manual con pantallas para pgp con kleopatra y mailvelope version 1.0Manual con pantallas para pgp con kleopatra y mailvelope version 1.0
Manual con pantallas para pgp con kleopatra y mailvelope version 1.0
 
Manual de seguridad digital y móvil
Manual de seguridad digital y móvilManual de seguridad digital y móvil
Manual de seguridad digital y móvil
 
Cómo encriptar tu celular Android
Cómo encriptar tu celular AndroidCómo encriptar tu celular Android
Cómo encriptar tu celular Android
 
Caja de herramientas de seguridad digital
Caja de herramientas de seguridad digitalCaja de herramientas de seguridad digital
Caja de herramientas de seguridad digital
 
Protege tu comunicación digital
Protege tu comunicación digitalProtege tu comunicación digital
Protege tu comunicación digital
 
How to use anonymox
How to use anonymoxHow to use anonymox
How to use anonymox
 
Bulletproofing digital newsrooms
Bulletproofing digital newsroomsBulletproofing digital newsrooms
Bulletproofing digital newsrooms
 
Evaluación de Riesgos para Periodistas en Guerrero
Evaluación de Riesgos para Periodistas en GuerreroEvaluación de Riesgos para Periodistas en Guerrero
Evaluación de Riesgos para Periodistas en Guerrero
 
Evaluación de Riesgos para Periodistas en Veracruz
Evaluación de Riesgos para Periodistas en VeracruzEvaluación de Riesgos para Periodistas en Veracruz
Evaluación de Riesgos para Periodistas en Veracruz
 
Policías y agresores de civil agreden a periodistas de Veracruz
Policías y agresores de civil agreden a periodistas de VeracruzPolicías y agresores de civil agreden a periodistas de Veracruz
Policías y agresores de civil agreden a periodistas de Veracruz
 
Protege tus comunicaciones con Jitsi meet
Protege tus comunicaciones con Jitsi meet Protege tus comunicaciones con Jitsi meet
Protege tus comunicaciones con Jitsi meet
 
Cómo usar peerio
Cómo usar peerioCómo usar peerio
Cómo usar peerio
 
Cómo encriptar tu computadora con FileVault
Cómo encriptar tu computadora con FileVaultCómo encriptar tu computadora con FileVault
Cómo encriptar tu computadora con FileVault
 
Jitsi meet
Jitsi meetJitsi meet
Jitsi meet
 
Cómo abrir una cuenta de hushmail
Cómo abrir una cuenta de hushmailCómo abrir una cuenta de hushmail
Cómo abrir una cuenta de hushmail
 
Cómo encriptar emails
Cómo encriptar emailsCómo encriptar emails
Cómo encriptar emails
 
Protección de la privacidad y navegación anónima en internet
Protección de la privacidad y navegación anónima en internetProtección de la privacidad y navegación anónima en internet
Protección de la privacidad y navegación anónima en internet
 
Protege tu móvil
Protege tu móvilProtege tu móvil
Protege tu móvil
 
Protección de equipos, documentos y contraseñas
Protección de equipos, documentos y contraseñasProtección de equipos, documentos y contraseñas
Protección de equipos, documentos y contraseñas
 

Recently uploaded

Call Girl Low Price Noida 9873777170 Cash Payment Free Home Delivery
Call Girl Low Price Noida 9873777170 Cash Payment Free Home DeliveryCall Girl Low Price Noida 9873777170 Cash Payment Free Home Delivery
Call Girl Low Price Noida 9873777170 Cash Payment Free Home Delivery
hanshkumar9870
 
📛 Independent Call Girls In Pune 👉 7014168258 😂👈 Render Sexy Fulfillment Esco...
📛 Independent Call Girls In Pune 👉 7014168258 😂👈 Render Sexy Fulfillment Esco...📛 Independent Call Girls In Pune 👉 7014168258 😂👈 Render Sexy Fulfillment Esco...
📛 Independent Call Girls In Pune 👉 7014168258 😂👈 Render Sexy Fulfillment Esco...
kumarikajal989877
 
exammeessccglpyq2023exammeessccglpyq2023
exammeessccglpyq2023exammeessccglpyq2023exammeessccglpyq2023exammeessccglpyq2023
exammeessccglpyq2023exammeessccglpyq2023
SubhamMandal40
 
Call Girls Prayagraj 8824825030 Escort In Prayagraj service 24X7
Call Girls Prayagraj 8824825030 Escort In Prayagraj service 24X7Call Girls Prayagraj 8824825030 Escort In Prayagraj service 24X7
Call Girls Prayagraj 8824825030 Escort In Prayagraj service 24X7
vrvipin164
 
Coimbatore Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Ser...
Coimbatore Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Ser...Coimbatore Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Ser...
Coimbatore Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Ser...
bhavnakaurni
 
Delhi Call Girls RK Puram 👉 9711199171 👈 unlimited short high profile full tr...
Delhi Call Girls RK Puram 👉 9711199171 👈 unlimited short high profile full tr...Delhi Call Girls RK Puram 👉 9711199171 👈 unlimited short high profile full tr...
Delhi Call Girls RK Puram 👉 9711199171 👈 unlimited short high profile full tr...
gujratescort#p11
 
Call Girls Goa ☎️ +91-7426014248 😍 Goa Call Girl Beauty Girls Goa Escorts
Call Girls Goa ☎️ +91-7426014248 😍 Goa Call Girl Beauty Girls Goa EscortsCall Girls Goa ☎️ +91-7426014248 😍 Goa Call Girl Beauty Girls Goa Escorts
Call Girls Goa ☎️ +91-7426014248 😍 Goa Call Girl Beauty Girls Goa Escorts
anilsa9823
 
Delhi Call Girls South Ex 👉 9899900591 👈 unlimited short high profile full tr...
Delhi Call Girls South Ex 👉 9899900591 👈 unlimited short high profile full tr...Delhi Call Girls South Ex 👉 9899900591 👈 unlimited short high profile full tr...
Delhi Call Girls South Ex 👉 9899900591 👈 unlimited short high profile full tr...
gujratescort#p11
 
Company Profile of Tempcon - Chiller Manufacturer In India
Company Profile of Tempcon - Chiller Manufacturer In IndiaCompany Profile of Tempcon - Chiller Manufacturer In India
Company Profile of Tempcon - Chiller Manufacturer In India
soumotempcon
 
Call Girls In Bhubaneswar👯‍♀️ 7339748667 🔥 Safe Housewife Call Girl Service H...
Call Girls In Bhubaneswar👯‍♀️ 7339748667 🔥 Safe Housewife Call Girl Service H...Call Girls In Bhubaneswar👯‍♀️ 7339748667 🔥 Safe Housewife Call Girl Service H...
Call Girls In Bhubaneswar👯‍♀️ 7339748667 🔥 Safe Housewife Call Girl Service H...
dhyaansingh0898#S07
 
Night Call Girls Service In Chennai ☎️ Dail-👉 7014168258 😂👈 At Your Doorstep
Night Call Girls Service In Chennai ☎️ Dail-👉 7014168258 😂👈 At Your DoorstepNight Call Girls Service In Chennai ☎️ Dail-👉 7014168258 😂👈 At Your Doorstep
Night Call Girls Service In Chennai ☎️ Dail-👉 7014168258 😂👈 At Your Doorstep
Ak47
 
Call Girls Guwahati Book Me ☎️ 9024918724 Quickest Hot Delivery Service
Call Girls Guwahati Book Me ☎️ 9024918724 Quickest Hot Delivery ServiceCall Girls Guwahati Book Me ☎️ 9024918724 Quickest Hot Delivery Service
Call Girls Guwahati Book Me ☎️ 9024918724 Quickest Hot Delivery Service
kuldeepsharmaks8120
 
Call Girls Hyderabad (india) ☎️ +91-7426014248 Hyderabad Call Girl
Call Girls Hyderabad  (india) ☎️ +91-7426014248 Hyderabad  Call GirlCall Girls Hyderabad  (india) ☎️ +91-7426014248 Hyderabad  Call Girl
Call Girls Hyderabad (india) ☎️ +91-7426014248 Hyderabad Call Girl
sapna sharmap11
 
Vip Kolkata Call Girls 🍑 7374876321 🍑 ENJOY College Girls With Full Night
Vip Kolkata Call Girls 🍑 7374876321 🍑 ENJOY College Girls With Full NightVip Kolkata Call Girls 🍑 7374876321 🍑 ENJOY College Girls With Full Night
Vip Kolkata Call Girls 🍑 7374876321 🍑 ENJOY College Girls With Full Night
JoyaBansal
 
ℂall Girls Kolkata 😍 Call 0000000 Vip Escorts Service Kolkata
ℂall Girls Kolkata 😍 Call 0000000 Vip Escorts Service Kolkataℂall Girls Kolkata 😍 Call 0000000 Vip Escorts Service Kolkata
ℂall Girls Kolkata 😍 Call 0000000 Vip Escorts Service Kolkata
nhero3888
 
Call Girls Malegaon 💯Call Us 🔝 7426014248 🔝 Independent Malegaon Escorts Serv...
Call Girls Malegaon 💯Call Us 🔝 7426014248 🔝 Independent Malegaon Escorts Serv...Call Girls Malegaon 💯Call Us 🔝 7426014248 🔝 Independent Malegaon Escorts Serv...
Call Girls Malegaon 💯Call Us 🔝 7426014248 🔝 Independent Malegaon Escorts Serv...
ss728938
 
Vasant Kunj Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with ...
Vasant Kunj Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with ...Vasant Kunj Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with ...
Vasant Kunj Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with ...
simrangupta87541
 
🔥Airhostess Call Girl Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chandiga...
🔥Airhostess Call Girl Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chandiga...🔥Airhostess Call Girl Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chandiga...
🔥Airhostess Call Girl Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chandiga...
sonamrawat5631
 
Marathi Call Girls Bangalore 9024918724 Just CALL ME Book Beautiful Girls any...
Marathi Call Girls Bangalore 9024918724 Just CALL ME Book Beautiful Girls any...Marathi Call Girls Bangalore 9024918724 Just CALL ME Book Beautiful Girls any...
Marathi Call Girls Bangalore 9024918724 Just CALL ME Book Beautiful Girls any...
vaibhavkumar8900
 
一比一原版(ku学位证书)美国堪萨斯大学毕业证如何办理
一比一原版(ku学位证书)美国堪萨斯大学毕业证如何办理一比一原版(ku学位证书)美国堪萨斯大学毕业证如何办理
一比一原版(ku学位证书)美国堪萨斯大学毕业证如何办理
yswno
 

Recently uploaded (20)

Call Girl Low Price Noida 9873777170 Cash Payment Free Home Delivery
Call Girl Low Price Noida 9873777170 Cash Payment Free Home DeliveryCall Girl Low Price Noida 9873777170 Cash Payment Free Home Delivery
Call Girl Low Price Noida 9873777170 Cash Payment Free Home Delivery
 
📛 Independent Call Girls In Pune 👉 7014168258 😂👈 Render Sexy Fulfillment Esco...
📛 Independent Call Girls In Pune 👉 7014168258 😂👈 Render Sexy Fulfillment Esco...📛 Independent Call Girls In Pune 👉 7014168258 😂👈 Render Sexy Fulfillment Esco...
📛 Independent Call Girls In Pune 👉 7014168258 😂👈 Render Sexy Fulfillment Esco...
 
exammeessccglpyq2023exammeessccglpyq2023
exammeessccglpyq2023exammeessccglpyq2023exammeessccglpyq2023exammeessccglpyq2023
exammeessccglpyq2023exammeessccglpyq2023
 
Call Girls Prayagraj 8824825030 Escort In Prayagraj service 24X7
Call Girls Prayagraj 8824825030 Escort In Prayagraj service 24X7Call Girls Prayagraj 8824825030 Escort In Prayagraj service 24X7
Call Girls Prayagraj 8824825030 Escort In Prayagraj service 24X7
 
Coimbatore Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Ser...
Coimbatore Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Ser...Coimbatore Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Ser...
Coimbatore Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Ser...
 
Delhi Call Girls RK Puram 👉 9711199171 👈 unlimited short high profile full tr...
Delhi Call Girls RK Puram 👉 9711199171 👈 unlimited short high profile full tr...Delhi Call Girls RK Puram 👉 9711199171 👈 unlimited short high profile full tr...
Delhi Call Girls RK Puram 👉 9711199171 👈 unlimited short high profile full tr...
 
Call Girls Goa ☎️ +91-7426014248 😍 Goa Call Girl Beauty Girls Goa Escorts
Call Girls Goa ☎️ +91-7426014248 😍 Goa Call Girl Beauty Girls Goa EscortsCall Girls Goa ☎️ +91-7426014248 😍 Goa Call Girl Beauty Girls Goa Escorts
Call Girls Goa ☎️ +91-7426014248 😍 Goa Call Girl Beauty Girls Goa Escorts
 
Delhi Call Girls South Ex 👉 9899900591 👈 unlimited short high profile full tr...
Delhi Call Girls South Ex 👉 9899900591 👈 unlimited short high profile full tr...Delhi Call Girls South Ex 👉 9899900591 👈 unlimited short high profile full tr...
Delhi Call Girls South Ex 👉 9899900591 👈 unlimited short high profile full tr...
 
Company Profile of Tempcon - Chiller Manufacturer In India
Company Profile of Tempcon - Chiller Manufacturer In IndiaCompany Profile of Tempcon - Chiller Manufacturer In India
Company Profile of Tempcon - Chiller Manufacturer In India
 
Call Girls In Bhubaneswar👯‍♀️ 7339748667 🔥 Safe Housewife Call Girl Service H...
Call Girls In Bhubaneswar👯‍♀️ 7339748667 🔥 Safe Housewife Call Girl Service H...Call Girls In Bhubaneswar👯‍♀️ 7339748667 🔥 Safe Housewife Call Girl Service H...
Call Girls In Bhubaneswar👯‍♀️ 7339748667 🔥 Safe Housewife Call Girl Service H...
 
Night Call Girls Service In Chennai ☎️ Dail-👉 7014168258 😂👈 At Your Doorstep
Night Call Girls Service In Chennai ☎️ Dail-👉 7014168258 😂👈 At Your DoorstepNight Call Girls Service In Chennai ☎️ Dail-👉 7014168258 😂👈 At Your Doorstep
Night Call Girls Service In Chennai ☎️ Dail-👉 7014168258 😂👈 At Your Doorstep
 
Call Girls Guwahati Book Me ☎️ 9024918724 Quickest Hot Delivery Service
Call Girls Guwahati Book Me ☎️ 9024918724 Quickest Hot Delivery ServiceCall Girls Guwahati Book Me ☎️ 9024918724 Quickest Hot Delivery Service
Call Girls Guwahati Book Me ☎️ 9024918724 Quickest Hot Delivery Service
 
Call Girls Hyderabad (india) ☎️ +91-7426014248 Hyderabad Call Girl
Call Girls Hyderabad  (india) ☎️ +91-7426014248 Hyderabad  Call GirlCall Girls Hyderabad  (india) ☎️ +91-7426014248 Hyderabad  Call Girl
Call Girls Hyderabad (india) ☎️ +91-7426014248 Hyderabad Call Girl
 
Vip Kolkata Call Girls 🍑 7374876321 🍑 ENJOY College Girls With Full Night
Vip Kolkata Call Girls 🍑 7374876321 🍑 ENJOY College Girls With Full NightVip Kolkata Call Girls 🍑 7374876321 🍑 ENJOY College Girls With Full Night
Vip Kolkata Call Girls 🍑 7374876321 🍑 ENJOY College Girls With Full Night
 
ℂall Girls Kolkata 😍 Call 0000000 Vip Escorts Service Kolkata
ℂall Girls Kolkata 😍 Call 0000000 Vip Escorts Service Kolkataℂall Girls Kolkata 😍 Call 0000000 Vip Escorts Service Kolkata
ℂall Girls Kolkata 😍 Call 0000000 Vip Escorts Service Kolkata
 
Call Girls Malegaon 💯Call Us 🔝 7426014248 🔝 Independent Malegaon Escorts Serv...
Call Girls Malegaon 💯Call Us 🔝 7426014248 🔝 Independent Malegaon Escorts Serv...Call Girls Malegaon 💯Call Us 🔝 7426014248 🔝 Independent Malegaon Escorts Serv...
Call Girls Malegaon 💯Call Us 🔝 7426014248 🔝 Independent Malegaon Escorts Serv...
 
Vasant Kunj Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with ...
Vasant Kunj Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with ...Vasant Kunj Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with ...
Vasant Kunj Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with ...
 
🔥Airhostess Call Girl Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chandiga...
🔥Airhostess Call Girl Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chandiga...🔥Airhostess Call Girl Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chandiga...
🔥Airhostess Call Girl Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent Chandiga...
 
Marathi Call Girls Bangalore 9024918724 Just CALL ME Book Beautiful Girls any...
Marathi Call Girls Bangalore 9024918724 Just CALL ME Book Beautiful Girls any...Marathi Call Girls Bangalore 9024918724 Just CALL ME Book Beautiful Girls any...
Marathi Call Girls Bangalore 9024918724 Just CALL ME Book Beautiful Girls any...
 
一比一原版(ku学位证书)美国堪萨斯大学毕业证如何办理
一比一原版(ku学位证书)美国堪萨斯大学毕业证如何办理一比一原版(ku学位证书)美国堪萨斯大学毕业证如何办理
一比一原版(ku学位证书)美国堪萨斯大学毕业证如何办理
 

Spear phishing attacks

  • 1. How to prevent spear phishing attacks Jorge Luis Sierra Knight International Journalism Fellow
  • 2. What is a spear phishing attack?   Spear phishing is a type of cyberattack carefully crafted to deceive a person and steal online personal information.   Spear phishing attacks tend to be personalized with features that tempt journalists to click on a link or open a document that, in fact, are malicious programs.   Journalists can lose not only private information, but also contact lists, research plans, confidential documents, names and contact information of sensitive sources.
  • 3. Preventative steps   Always keep your computer and mobile devices updated.   Install robust antivirus software. You can use Avira, Clam AV, Immunet, Avast, Symantec, AVG or Kaspersky. Other tools are: Spybot and Prozen software.   Do a diligence process before before clicking any link or opening any file.   Use your common sense to identify a smear phishing attack: look for misspellings, fake email addresses, any signal of something weird in the message.   Avoid plugging in your devices to charge batteries in unreliable offices.
  • 4. Preventive steps   Avoid using WiFi networks controlled by non reliable people.   Use your own mobile hotspots or mobile modems to connect to the internet or to send data.   Always use several layers of encryption to share sensitive information.   You can use PGP for Mac OSXor Windows. Add a password to open and change your documents.   Always use email services that offer end-to-end encryption.   Lear how to avoid phishing attacks here and here.
  • 5. What if your device is infected?   Keep a copy of the infecting message and send a copy to the Citizen Lab of the University of Toronto.   Check information logs and analyze all traffic to the attacker’s IP.   Update your antivirus program and run a full scan.   Back up your information, encrypt it and store it in a safe place.   Reformat your computer to erase any trace of malware.   Alert your network of this attack and change vulnerable practices.   Use Windows appropriately, change to a Mac computer or try Linux.
  翻译: