• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • About
    • Secure360
    • UMSA
    • Get Involved
  • Events
    • Secure360 2021
    • Student360
    • Past Events
      • 2020 Secure360 Twin Cities
      • 2020 Student360
      • 2019 Secure360 Twin Cities
      • 2019 Student360
      • 2018 Secure360 Twin Cities
      • 2018 Secure360 Wisconsin
      • 2018 Student360
      • 2017 Secure360 Twin Cities
      • 2017 Student360
      • 2016 TC Secure360 Conference
      • 2015 Secure360 Conference
      • 2014 Secure360 Conference
      • 2013 Secure360 Conference
        • 2013 Secure360 Conference Speaker Presentations
      • 2012 Secure360 Conference
  • For Sponsors
    • Secure360 Twin Cities
    • Student360 Sponsors
  • For Speakers
    • Secure360 Speaker Details
    • Student360 Speaker Details
  • Blog
  • Nav Social Menu

    • Facebook
    • LinkedIn
    • Twitter
    • Vimeo

Secure360

How cybercriminals use geo-targeting

September 12, 2017 by Secure360 and UMSA

View of a large city and tall buildings with illustrated arches connecting the buildings

Copyright: Galina Peshkova

Cybercriminals have existed for a long time and they aren’t going anywhere anytime soon. Anyone who has ever been victim of cybercrime may be puzzled as to how it happened. How do cybercriminals decide who they are going to target? Is there actually a method to their attacks or is it random?

The truth is, cyber crooks are using different techniques to target future victims based on location (aka geo-targeting). Geo-targeting can be broken down pretty simply. Essentially, cybercriminals will seek out countries or locations that are wealthy as opposed to those that are not. Since an attack is not “one size fits all,” they will customize their invasion to be believable to the intended audience. For example, if the attack occurs via email, criminals will use common language of the area and imitate well-known businesses or brands.

These online criminals are working hard to advance their strategies, creating more sophisticated approaches, and are targeting different audiences based on where they live. This is how they do it.

IP address

Every device has an IP address which allows anyone to locate the geographical location. Hackers have access to many online services that track IP addresses. Once obtained, a hacker might know as much as your location, the company you work for and which internet service provider is used.

Domain extension

Using email to infect or hack devices is an easy option for cybercriminals. Scammers are able to identify a user’s location based on the email extension. It is not at all difficult for these cybercriminals to determine extensions and their locations. Once they have domain extension locations they are able to attack the desired location with a quick email scam.

API

The technical definition of an Application Programming Interface is a set of routines, protocols and tools for building software application. Essentially, these instructions allow apps and services to communicate with one another without the user. Once a hacker has gained some knowledge about your device, they can use different types of API’s to extract information. By looking at the language you have downloaded for your keyboard, applications used and previous searches, your location can quickly be narrowed down.

If you’re now wondering how you can hide and protect yourself from hackers, there are plenty of strategies and steps anyone can take to protect themselves from cybercriminals. Our blog is a great resource that tackles many different angles of cybersecurity. Also, register for our security and risk management conference happening in October!

Filed Under: Business Continuity Management, Cybersecurity

About Secure360 and UMSA

The Secure360 and UMSA team is made up of professionals in the security and risk management industries. Topics of expertise range from physical security, IT, risk management, cybersecurity, cloud, information security and records management.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Categories

  • Uncategorized
  • Guest Posts
  • Business Continuity Management
  • News and Events
  • Physical Security
  • Cybersecurity
  • Professional Development
  • Risk and Compliance

latest tweets

  1. Secure360 Conference
    Secure360 Conference: Exciting news for a #Monday! We've officially welcomed @pingidentity as a 2021 #Platinum #sponsor for #Sec360 🤩 Lea… https://t.co/ddZ4MvCkk1
    about 1 day ago

  2. Secure360 Conference
    Secure360 Conference: Spots are filling fast & you don't want to miss these benefits! Register as a #Secure360 sponsor to show off the la… https://t.co/aqNcbZ25Ek
    about 3 days ago

  3. Secure360 Conference
    Secure360 Conference: Really interesting read from our Diamond #sponsor, @Cisco! Learn how to build #resiliency through a year of change https://t.co/GTWe6a0W3A
    about 4 days ago

Footer

Contact

For more information about UMSA events, contact: Marie Strawser

Email List Signup

Join our email list for monthly Secure360 news and updates!




Join our tradeshow email list for updates on sponsorship opportunities and upcoming exhibitor deadlines.

Sponsored by:
© 2021 Secure360. All rights reserved.