SlideShare une entreprise Scribd logo
1  sur  14
Cyber Threats in South
Africa
Adv Jacqueline Fick
PwC
22 July 2011
www.pwc.com
PwC
Contents
1.Understanding the origins and characteristics of South Africa’s most
prevalent cyber crime categories.
2.Phishing.
3.Cyber crime and tax refunds.
4.What to do?
5.Conclusion
2
PwC
Understanding the origins and characteristics of South
Africa’s most prevalent cyber crime categories
Cyber crime defined
• “…computer crime encompasses the use of a computer as a tool in the
perpetration of a crime, as well as situations in which there has been
unauthorised access to the victim’s computer, or data. Computer
crime also extends to physical attacks on the computer and/or related
equipment as well as illegal use of credit cards and violations of
automated teller machines, including electronic fund transfer thefts
and the counterfeit of hardware and software.” (Credo and Michels)
• Watney uses the term cyber crime and defined it as all illegal
activities pertaining to a computer system, irrespective of whether the
computer is the object of the crime or the instrument with which the
crime is committed.
• Move in South African law to the use of the term cyber crime which is
wide enough to encompass all illegal activities in respect of
computers, information networks and cyberspace.
3
PwC
Understanding the origins and characteristics of South
Africa’s most prevalent cyber crime categories
Types of cyber crime in South Africa
• Unauthorised access (s86(1))
• Unauthorised modification of data and various forms of malicious
code (s86(2))
• Denial of service attacks (S86(5))
• Devices used to gain unauthorised access to data (s86(4))
• Computer-related extortion, fraud and forgery (s87)
• Child pornography, cyber obscenity and cyber stalking
• Copyright infringement
• Industrial espionage
• Piracy
• Online gambling
4
PwC
Understanding the origins and characteristics of South
Africa’s most prevalent cyber crime categories
The world of cyber crime
• An underground cybercrime economy and cyber black market exists
where the cybercriminal can buy, sell, barter or trade criminal skills,
tools and your private information, you can buy IDs, credit cards
botnet kits.
• Cybercriminals are now less hackers and more like offline crime
syndicates, such as the Mafia or urban gangs.
• One can buy a keystroke logger for about $23 or pay $10 to have
someone host a phishing scam, pick up a botnet for just $225, or get a
tool that exploits a vulnerability on a banking site for $740 to $3 000.
(Cybercrime Exposed Marian Merritt)
• What happened in South Africa…
• “It’s grown to become a flourishing industry with international
syndicates, just like the Mafia” (Pres Jacob Zuma)
5
PwC
Phishing
• In the field of computer security, phishing is the criminally
fraudulent process of attempting to acquire sensitive information
such as usernames, passwords and credit card details by
masquerading as a trustworthy entity in an electronic
communication.
• An online scam that uses e-mail to “fish” for users’ information by
imitating legitimate companies. People are lured into sharing user
names, passwords, account information or credit-card numbers.
The phishing e-mail usually contains a link to a illegitimate site.
6
PwC
Phishing (cont.)
What statistics show
RSA Online Fraud Reports show that South Africa does not fall within
the top ten countries hosting phishing attacks, but features high on the
list of top ten countries by attack volume.
The U.S., UK, and South Africa continue to be the countries that have
endured the highest volume of phishing attacks – for 15 consecutive
months. Over the past year, the U.S. and UK have absorbed a combined
average portion of 65 percent of the attacks. (May 2010 - April 2011).
7
PwC
Cyber Crime and Tax Refunds
8
PwC
Cyber Crime and Tax Refunds
• Warnings from SARS – diligence in tax season
• Promise of tax refund, click on link!
• Close resemblance to e-filing page
• SARS will never ask for your personal details
• Do not click on any links – malware, trojans, viruses
• Threat of keyloggers and spy software
• Criminals steal information to become “you”
9
PwC
Cyber Crime and Tax Refunds
10
PwC
Cyber Crime and Tax refunds
• CIRPRO :
• Changing names of directors – electronic lodgement of CM29
• Registering false companies (the PwC example)
• Mostly aimed at diverting VAT refunds
• Company details should be checked routinely.
• Warning signs such as delay in payment of tax refund, odd queries
from clients or credit bureaus.
11
PwC
What to do?
• Regularly check your company details.
• www.cipro.gov.za – panel on the left. Search for company name or
similar name.
• Never respond to unsolicited emails or click on links in the mails. If
you haven’t bought a lotto ticket, chances are you did not win
anything!!!
• If you think that your company has been hijacked keep record of
everything you do – disputes with SARS, banks.
• Notify your own bank and other banks of information to assist in
tracing fraudulent accounts.
• Notify CIPRO, SARS and SAPS and your own employees.
• Contact your clients to say your details have not changed.
12
PwC
Closing remarks
• Effectively and efficiently addressing cyber crime requires a shift in
paradigm.
• Protect information as a valuable asset.
• Pro-active vs re-active approach: prevention is better than
prosecution.
• Always keep abreast of scams and ensure your systems are up to date.
• Understand your organisation, your data and the value of IT.
• Have appropriate policies and enforcement monitoring in place.
• Share experiences
13
It is widely accepted that in today’s technology-driven
environment, information is worth a king’s ransom;
successful businesses know how to protect and capitalise
on it. Information is fast becoming the biggest contributor
to the bottom-line and an asset that should be jealously
guarded with the same vigour as financial assets. The best
of the best employ information technology (IT) and
information resources to create competitive advantage and
ensure the good governance thereof.
Thank you
This publication has been prepared for general guidance on matters of interest only, and does not constitute professional advice. You should not act upon
the information contained in this publication without obtaining specific professional advice. No representation or warranty (express or implied) is given as to
the accuracy or completeness of the information contained in this publication, and, to the extent permitted by law, PricewaterhouseCoopers Inc, its
members, employees and agents do not accept or assume any liability, responsibility or duty of care for any consequences of you or anyone else acting, or
refraining to act, in reliance on the information contained in this publication or for any decision based on it.
© 2010 PricewaterhouseCoopers (“PwC”), a South African firm, PwC is part of the PricewaterhouseCoopers International Limited (“PwCIL”) network that
consists of separate and independent legal entities that do not act as agents of PwCIL or any other member firm, nor is PwCIL or the separate firms
responsible or liable for the acts or omissions of each other in any way. No portion of this document may be reproduced by any process without the written
permission of PwC.

Contenu connexe

En vedette

En vedette (7)

App sharing-今日头条
App sharing-今日头条App sharing-今日头条
App sharing-今日头条
 
Rumah ibadat di bandar
Rumah ibadat di bandarRumah ibadat di bandar
Rumah ibadat di bandar
 
Kompetencijų perkėlimas į e - erdvę
Kompetencijų perkėlimas į e - erdvęKompetencijų perkėlimas į e - erdvę
Kompetencijų perkėlimas į e - erdvę
 
Praktinė e-prekybos patirtis Skandinavijoje
Praktinė e-prekybos patirtis SkandinavijojePraktinė e-prekybos patirtis Skandinavijoje
Praktinė e-prekybos patirtis Skandinavijoje
 
LMCP1532:PEMBANGUNAN BANDAR MAPAN
LMCP1532:PEMBANGUNAN BANDAR MAPANLMCP1532:PEMBANGUNAN BANDAR MAPAN
LMCP1532:PEMBANGUNAN BANDAR MAPAN
 
Pembangunan dan alam sekitar
Pembangunan dan alam sekitarPembangunan dan alam sekitar
Pembangunan dan alam sekitar
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Plus de Jacqueline Fick

Expanding your horizons how traditional crime can turn hi tech adv j fick
Expanding your horizons  how traditional crime can turn hi tech adv j fickExpanding your horizons  how traditional crime can turn hi tech adv j fick
Expanding your horizons how traditional crime can turn hi tech adv j fickJacqueline Fick
 
A day in the life of a cyber syndicate
A day in the life of a cyber syndicateA day in the life of a cyber syndicate
A day in the life of a cyber syndicateJacqueline Fick
 
Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Jacqueline Fick
 
Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...Jacqueline Fick
 
Understanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationUnderstanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationJacqueline Fick
 
International trends in mobile law
International trends in mobile lawInternational trends in mobile law
International trends in mobile lawJacqueline Fick
 
A kings' ransom iod directorship jan2010
A kings' ransom iod directorship jan2010A kings' ransom iod directorship jan2010
A kings' ransom iod directorship jan2010Jacqueline Fick
 
Cyber training 23 5 2012
Cyber training 23 5 2012Cyber training 23 5 2012
Cyber training 23 5 2012Jacqueline Fick
 
Cybercrime in government
Cybercrime in governmentCybercrime in government
Cybercrime in governmentJacqueline Fick
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickJacqueline Fick
 
Creating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationJacqueline Fick
 
Women in law enforcement 2014
Women in law enforcement 2014Women in law enforcement 2014
Women in law enforcement 2014Jacqueline Fick
 
Mr SIM Swap Gone Phishing
Mr SIM Swap Gone PhishingMr SIM Swap Gone Phishing
Mr SIM Swap Gone PhishingJacqueline Fick
 

Plus de Jacqueline Fick (14)

Expanding your horizons how traditional crime can turn hi tech adv j fick
Expanding your horizons  how traditional crime can turn hi tech adv j fickExpanding your horizons  how traditional crime can turn hi tech adv j fick
Expanding your horizons how traditional crime can turn hi tech adv j fick
 
A day in the life of a cyber syndicate
A day in the life of a cyber syndicateA day in the life of a cyber syndicate
A day in the life of a cyber syndicate
 
Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23
 
Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...
 
Understanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationUnderstanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisation
 
International trends in mobile law
International trends in mobile lawInternational trends in mobile law
International trends in mobile law
 
A kings' ransom iod directorship jan2010
A kings' ransom iod directorship jan2010A kings' ransom iod directorship jan2010
A kings' ransom iod directorship jan2010
 
Cyber training 23 5 2012
Cyber training 23 5 2012Cyber training 23 5 2012
Cyber training 23 5 2012
 
Cyber crime 101
Cyber crime 101Cyber crime 101
Cyber crime 101
 
Cybercrime in government
Cybercrime in governmentCybercrime in government
Cybercrime in government
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fick
 
Creating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisation
 
Women in law enforcement 2014
Women in law enforcement 2014Women in law enforcement 2014
Women in law enforcement 2014
 
Mr SIM Swap Gone Phishing
Mr SIM Swap Gone PhishingMr SIM Swap Gone Phishing
Mr SIM Swap Gone Phishing
 

Dernier

Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxfilippoluciani9
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书E LSS
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labourBhavikaGholap1
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书SS A
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书E LSS
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfKelechi48
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx2020000445musaib
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubham Wadhonkar
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptxPamelaAbegailMonsant2
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm2020000445musaib
 
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881mayurchatre90
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书SS A
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionAnuragMishra811030
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxRRR Chambers
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxRRR Chambers
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxMollyBrown86
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxRRR Chambers
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptzainabbkhaleeq123
 

Dernier (20)

Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labour
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdf
 
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm
 
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusion
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptx
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .ppt
 

Presentation j fick cyber threats pw c tax 22 7 2011

  • 1. Cyber Threats in South Africa Adv Jacqueline Fick PwC 22 July 2011 www.pwc.com
  • 2. PwC Contents 1.Understanding the origins and characteristics of South Africa’s most prevalent cyber crime categories. 2.Phishing. 3.Cyber crime and tax refunds. 4.What to do? 5.Conclusion 2
  • 3. PwC Understanding the origins and characteristics of South Africa’s most prevalent cyber crime categories Cyber crime defined • “…computer crime encompasses the use of a computer as a tool in the perpetration of a crime, as well as situations in which there has been unauthorised access to the victim’s computer, or data. Computer crime also extends to physical attacks on the computer and/or related equipment as well as illegal use of credit cards and violations of automated teller machines, including electronic fund transfer thefts and the counterfeit of hardware and software.” (Credo and Michels) • Watney uses the term cyber crime and defined it as all illegal activities pertaining to a computer system, irrespective of whether the computer is the object of the crime or the instrument with which the crime is committed. • Move in South African law to the use of the term cyber crime which is wide enough to encompass all illegal activities in respect of computers, information networks and cyberspace. 3
  • 4. PwC Understanding the origins and characteristics of South Africa’s most prevalent cyber crime categories Types of cyber crime in South Africa • Unauthorised access (s86(1)) • Unauthorised modification of data and various forms of malicious code (s86(2)) • Denial of service attacks (S86(5)) • Devices used to gain unauthorised access to data (s86(4)) • Computer-related extortion, fraud and forgery (s87) • Child pornography, cyber obscenity and cyber stalking • Copyright infringement • Industrial espionage • Piracy • Online gambling 4
  • 5. PwC Understanding the origins and characteristics of South Africa’s most prevalent cyber crime categories The world of cyber crime • An underground cybercrime economy and cyber black market exists where the cybercriminal can buy, sell, barter or trade criminal skills, tools and your private information, you can buy IDs, credit cards botnet kits. • Cybercriminals are now less hackers and more like offline crime syndicates, such as the Mafia or urban gangs. • One can buy a keystroke logger for about $23 or pay $10 to have someone host a phishing scam, pick up a botnet for just $225, or get a tool that exploits a vulnerability on a banking site for $740 to $3 000. (Cybercrime Exposed Marian Merritt) • What happened in South Africa… • “It’s grown to become a flourishing industry with international syndicates, just like the Mafia” (Pres Jacob Zuma) 5
  • 6. PwC Phishing • In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. • An online scam that uses e-mail to “fish” for users’ information by imitating legitimate companies. People are lured into sharing user names, passwords, account information or credit-card numbers. The phishing e-mail usually contains a link to a illegitimate site. 6
  • 7. PwC Phishing (cont.) What statistics show RSA Online Fraud Reports show that South Africa does not fall within the top ten countries hosting phishing attacks, but features high on the list of top ten countries by attack volume. The U.S., UK, and South Africa continue to be the countries that have endured the highest volume of phishing attacks – for 15 consecutive months. Over the past year, the U.S. and UK have absorbed a combined average portion of 65 percent of the attacks. (May 2010 - April 2011). 7
  • 8. PwC Cyber Crime and Tax Refunds 8
  • 9. PwC Cyber Crime and Tax Refunds • Warnings from SARS – diligence in tax season • Promise of tax refund, click on link! • Close resemblance to e-filing page • SARS will never ask for your personal details • Do not click on any links – malware, trojans, viruses • Threat of keyloggers and spy software • Criminals steal information to become “you” 9
  • 10. PwC Cyber Crime and Tax Refunds 10
  • 11. PwC Cyber Crime and Tax refunds • CIRPRO : • Changing names of directors – electronic lodgement of CM29 • Registering false companies (the PwC example) • Mostly aimed at diverting VAT refunds • Company details should be checked routinely. • Warning signs such as delay in payment of tax refund, odd queries from clients or credit bureaus. 11
  • 12. PwC What to do? • Regularly check your company details. • www.cipro.gov.za – panel on the left. Search for company name or similar name. • Never respond to unsolicited emails or click on links in the mails. If you haven’t bought a lotto ticket, chances are you did not win anything!!! • If you think that your company has been hijacked keep record of everything you do – disputes with SARS, banks. • Notify your own bank and other banks of information to assist in tracing fraudulent accounts. • Notify CIPRO, SARS and SAPS and your own employees. • Contact your clients to say your details have not changed. 12
  • 13. PwC Closing remarks • Effectively and efficiently addressing cyber crime requires a shift in paradigm. • Protect information as a valuable asset. • Pro-active vs re-active approach: prevention is better than prosecution. • Always keep abreast of scams and ensure your systems are up to date. • Understand your organisation, your data and the value of IT. • Have appropriate policies and enforcement monitoring in place. • Share experiences 13
  • 14. It is widely accepted that in today’s technology-driven environment, information is worth a king’s ransom; successful businesses know how to protect and capitalise on it. Information is fast becoming the biggest contributor to the bottom-line and an asset that should be jealously guarded with the same vigour as financial assets. The best of the best employ information technology (IT) and information resources to create competitive advantage and ensure the good governance thereof. Thank you This publication has been prepared for general guidance on matters of interest only, and does not constitute professional advice. You should not act upon the information contained in this publication without obtaining specific professional advice. No representation or warranty (express or implied) is given as to the accuracy or completeness of the information contained in this publication, and, to the extent permitted by law, PricewaterhouseCoopers Inc, its members, employees and agents do not accept or assume any liability, responsibility or duty of care for any consequences of you or anyone else acting, or refraining to act, in reliance on the information contained in this publication or for any decision based on it. © 2010 PricewaterhouseCoopers (“PwC”), a South African firm, PwC is part of the PricewaterhouseCoopers International Limited (“PwCIL”) network that consists of separate and independent legal entities that do not act as agents of PwCIL or any other member firm, nor is PwCIL or the separate firms responsible or liable for the acts or omissions of each other in any way. No portion of this document may be reproduced by any process without the written permission of PwC.