Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,

Slides:



Advertisements
Similar presentations
Click to edit Master title style. Click to edit Master subtitle style.
Advertisements

KASPERSKY ANTI VIRUS Independent tests show Kaspersky to be the #1 in terms of Virus detection, false positives and response time for new viruses. Antivirus.
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
Mary Burger Owner ComputerDiva, LLC Vancouver, WA
PAGE 1 | Gradient colors RGBRGB Diagrams RGBRGB RGBRGB 166.
7 Effective Habits when using the Internet Philip O’Kane 1.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Kaspersky Labs 6 ht Annual Partner Conference · Turkey, June Kaspersky Labs 6 th Annual Partner Conference · Turkey, 2-6 June 2004 VII Kaspersky.
Threats To A Computer Network
From AV to Internetized Security Solution 马杰 Jeffrey Beijing Rising Tech. Co., Ltd. --- The Analysis Report of Malware Technology in China in 2005.
Access · convergence · management security · performance Margins in Mobility – Ian Kilpatrick, Wick Hill.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Chapter Nine Maintaining a Computer Part III: Malware.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
資安新聞簡報 報告者:劉旭哲、曾家雄. Spam down, but malware up 報告者:劉旭哲.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.
Combating cyber-crime: the context Justice Canada March 2005.
Telling the right story Confidential © Bloor Research 2010 …optimise your IT investments Click to edit Master subtitle style Malware—taking protection.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Mobile and Cyber Threat Issues The Fifth Annual African Dialogue Consumer Protection Conference Livingstone, Zambia September 2013.
Mobile Technology and Cyber Threats Deon Woods Bell Office of International Affairs The Fifth Annual African Consumer Protection Dialogue Conference Livingstone,
IT security By Tilly Gerlack.
 The purpose of this report is to inform people that the spyware and virus threat is growing and what people can do to stop the spread of spyware and.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
WEBSENSE ® SECURITY LABS™ 2006 Semi-Annual Web Security Trends Report OWASP Presentation November 9, 2006 Jim Young (301)
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
 a crime committed on a computer network, esp. the Internet.
Click to edit Master title style Click to edit Master text styles Second level Third level Fourth level Fifth level June 10 th, 2009Event details (title,
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
Managing Information in a Global World
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
THE THREAT LANDSCAPE FROM CYBERCRIME TO CYBER-WAR David Emm Global Research and Analysis Team.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Kaspersky Labs 6 ht Annual Partner Conference · Turkey, June Kaspersky Labs 6 th Annual Partner Conference · Turkey, 2-6 June 2004 November 16.
What is Spam? d min.
Changes in Computer Security Will You Be Better Off?
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Safe’n’Sec complex solutions for home PCs protection.
The hidden part of TDSS Sergey (k1k) Golovanov, Malware Expert Global Research and Analysis Team Kaspersky Lab.
Cybersecurity Test Review Introduction to Digital Technology.
Global Mobile Anti-malware Market WEBSITE Single User License: US$ 2500 No of Pages: 55 Corporate User License: US$
KASPERSKY INTERNET SECURITY multi-device  Average number of devices in households: 4.5  Consumer device diversity will continue to expand.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Headline sample style Intro sample style Click to edit Master text styles –Second level Third level –Fourth level o Fifth level.
Botnets A collection of compromised machines
IT Security  .
Click to Add Title Click to Add Subtitle.
Botnets A collection of compromised machines
Click to edit Master text styles
Click to edit Master text styles
Malware CJ
Computer Security.
Click to edit Master text styles
Slide Title Edit Master text styles Second level Third level
ОПШТЕСТВО ТЕМА: МЕСТОТО ВО КОЕ ЖИВЕАМ Скопје
Click to edit Master text styles
Introduction to Internet Worm
Click to edit Master text styles
Presentation transcript:

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts Alexander Gostev Director, Global Research and Analysis Team Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) Cyberthreat Landscape in 2009

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) 2009 – Main Trend The number of new malware samples, detected year over year Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010 Source: Kaspersky Lab Relative stability replaces massive increases in the amount of new malware

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) 2009 – Malware Numbers in Review 1992 – 2007 > detected about 2 mln unique malware programs But in 2008 alone – 15 mln In about 33,9 mln unique malicious files in the Kaspersky Lab collection 2009: 15 mln new files again (same as 2008 – flat growth rate) Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) Reasons for the Stable Growth The pace of malware development slowed significantly Increased competition in the malware market a big decline in gaming Trojans The successful work of: law enforcement regulatory structures and the antivirus industry Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) Outcomes in 2009

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) Sophisticated Malware An increase in sophisticated malicious programs  Sinowal  TDSS  Clampi Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) Global Outbreaks The following malicious programs affected more than 1 million computers in 2009: Kido (worm) Sality (virus) Brontok (worm) Mabezat (worm) Parite.b (virus) Virut.ce (virus-bot) Sohanad (worm) TDSS.z (rootkit) Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) Kido - Conficker Kido epidemic – all of 2009 November 2009 – over 7 mln infected systems Conficker Working Group - the first example of broad international cooperation Source: Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010

Gumblar – a Self-Spreading Website Botnet Significant outbreak - hit tens of thousands of web resources Came in waves Gumblar tiers Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) Evolution: 1.Visitors to legal websites re-directed to infected illegal malicious servers. 2.Users re-directed from legal websites to infected, but legal websites. Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010 Gumblar – a fully automated system

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) Internet based fraud - SMS Websites offering services: Locate people via GSM Read private messages in social networks Collect data, and more SMS can cost up to $10 Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) Internet Based Fraud – Fake AV Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010 Fake AV boom – spread via: Internet ads Malware such as Kido Fake AV revenues in mln. USD* *Source: Internet Crime Complaint Center

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) Alternative Platforms – Mac OS The first Trojan - OSX.RSPlug.A (Trojan-Downloader.OSX. Jahlav) The first rogue AV solution - Imunizator Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010

Alternative Platforms - Mobile First malicious programs for iPhone (Ike worms) First piece of spyware for Android (Mobile spy) First crypto-signed malware for Symbian new families39 new families 143 new variants257 new variants Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) Alternative Platforms – ATMs The first Backdoor for ATM – Backdoor.Win32.Skimer Stole money Stole credit card data Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) Forecasts for 2010

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) Change in Attack Vector Attacks via ; Internet/network attacks; Attacks via websites (including social networks) a significant increase of attacks via file-sharing networks - P2P and torrents Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) Growing complexity Malware will become much more sophisticated IT security companies develop even more complex protection tools Immune malware Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) Attacks on Google Wave Usual pattern Sending spam Phishing attacks Exploiting vulnerabilities and Spreading malware Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) Alternative Platforms - Mobile Rise in mobile threats for iPhone and Android Android - no effective checks in place to ensure third-party software applications are secure Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) AV industry trends

In-the-Cloud Security Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010 Technological advance Protects users BUT Potential IP abuse Will be attacked

International Collaboration AV + educators, law enforcement, ISP & so on AV vendors educate about security AV vendors help solve cybercrime Results: IT security awareness Conficker Working Group Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010

Summary: Forecasts for 2010 Kido remaining an active global epidemic Significant increase of attacks through P2P networks Emergence of more "grey" schemes in the botnet services market Attacks via Google Wave Rise in mobile threats for iPhone and Android Kido remaining an active global epidemic Significant increase of attacks through P2P networks Emergence of more "grey" schemes in the botnet services market Attacks via Google Wave Rise in mobile threats for iPhone and Android Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) Director, Global Research and Analysis Team Alexander Gostev Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010 Thank you! Questions?