Paul Wood Senior Analyst, MessageLabs. Email summary.

Slides:



Advertisements
Similar presentations
Symantec 2004 Pulse of IT Security in Canada Volume II Survey shows Increases in Concern and Spending for IT Security Andrew Bisson Director, Planning.
Advertisements

© Ravi Sandhu Introduction to Information Security Ravi Sandhu.
Network Operations Research Nick Feamster
Preparation for NSS and Communication with Parents Preparation for NSS and Communication with Parents
COUNTRY UPDATE THE GAMBIA. 1. Status of national planning process VISION 2020 exists as the long term development framework for the country to be operationalised.
Increasing Survey Cooperation: Motivating Chronic Late Responders to an Annual Survey National Science Foundation Division of Science Resources Statistics.
OPTN Regional Meetings Data Update Spring OPTN 2007 Donor, Transplant, and Waiting List Numbers.
Preventing Web Application Injections with Complementary Character Coding Raymond Mui Phyllis Frankl Polytechnic Institute of NYU Presented at ESORICS.
1 Proofpoint, Inc. Proprietary and Confidential ©2010 Proofpoint Protection/Privacy Offering Proofpoint Privacy Accurately detect ePHI in s Integrated.
Intrusion Prevention anno 2012: Widening the IPS concept.
What is Lurking in the shadows...
How are we CREATING Your Web and Global Presence.
TrustPort Net Gateway Web traffic protection. Keep It Secure Contents Latest security threats spam and malware Advantages of entry point.
Selling your products online in the Irish Market By Philip Hayes Coinigear Web Design (Deewhy Consultants)
Primary research figuresPrimary research figures These are some of the results from my primary research. percentages of people who like/dislike the show.
SUNDAY MONDAY TUESDAY WEDNESDAY THURSDAY FRIDAY SATURDAY
Oracle Application Express Rapid Application Development Tool
Challenges In The Morphing Threat Landscape Apr 2011, Arnhem Tamas Rudnai, Websense Security Labs.
Established in 1987 Business Review Weekly Magazine Fast 100 Company 2007 & 2008 Sold in 75 Countries Largest Customer in Australia Approx 10,000 Devices.
National CS Week December 7 – 11, Did You Know? Shift Happens.
Hands-on SQL Injection Attack and Defense HI-TEC July 21, 2013.
K-State IT Security Training Ken Stafford CIO and Vice Provost for IT Services Harvard Townsend Chief Information Security Officer
Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions October 12, 2014 DRAFT1.
Name ____________________ Date ___________ Period ____.
Layered Security Solutions - Simplified © 2008 Monte Robertson - CEO Layered Security Solutions – Simplified!
Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing s are designed.
Security on Web 2.0 Krasznay Csaba. Google Search Trends.
Cyber Security: Hacker Web and Shodan MIS 510 Ali Hassan Alenizi, Farah J Jafar, Nikhar Shah, Yirong Zhu.
Welcome to EECS 354 Network Penetration and Security.
CERN - IT Department CH-1211 Genève 23 Switzerland t Update on the underground economy and making profit on the black market Wojciech Lapka.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.
May l Washington, DC l Omni Shoreham The ROI of Messaging Security JF Sullivan VP Marketing, Cloudmark, Inc.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Michael McDonnell GIAC Certified Intrusion Analyst Creative Commons License: You are free to share and remix but you must provide.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
10/14/2015 Introducing Worry-Free SecureSite. Copyright Trend Micro Inc. Agenda Problem –SQL injection –XSS Solution Market opportunity Target.
Is Your Company Security Aware? Presented By: Brian Picard GSEC.
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
DNS as a Gatekeeper: Creating Lightweight Capabilities for Server Defense Curtis Taylor Craig Shue
Security Analysts Marie Bueler Emmett Koen Paul McMillan Director Chris Green.
CCT355H5 F Presentation: Phishing November Jennifer Li.
Web system security issues: A developer's perspective Morrison, P. Jason 9 December 2004 BAD Information Security Web system security issues:
Awicaksi E-Commerce Security & Payment System E-Commerce.
© 2009 WatchGuard Technologies WatchGuard ReputationAuthority Rejecting Unwanted & Web Traffic at the Perimeter.
Homework for Wed’s topic: Threats to E-Commerce 1. Review Chapter 5 in Laudon textbook 2. “Facebook's Top Cop”— Joe Sullivan and a staff of 50 people Fortune.
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
A threat to global security and economy Koushik Mannepalli CMPE 294.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
From viruses to theft Joakim von Braun Security Consultant von Braun Security Consultants Uppsala universitet
CJS 250 Week 9 Final Project The Security Plan Check this A+ tutorial guideline at 250-Week-9-Final-Project-The-Security-Plan.
WEB 434 Week 2 Summary Check this A+ tutorial guideline at Week-2-Summary For more classes visit
WEB 434 Week 4 Summary Check this A+ tutorial guideline at Week-4-Summary For more classes visit
IT 244 Week 6 DQ 2 To purchase this material link 244-Week-6-DQ-2 For more courses visit our website
Threat Monitoring Center
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Jon Peppler, Menlo Security Channels
Auburn Information Technology
Strong Security for Your Weak Link:
Internet Worm propagation
Erez Etzion / Chris Onions ACCU Meeting December 3, 2008
Security Use Case Description Public charter schools serving grades K-12. Operates 40 schools and serves over 16,000 students and over 2,000 teachers.
Networking for Home and Small Businesses – Chapter 8
Google POV Google 0.1 Understand the structure of links on the web.
Tom Murphy Chief Information Security Officer
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Presentation transcript:

Paul Wood Senior Analyst, MessageLabs

summary

Factors: CAPTCHA finally broken

Example of a Google Docs link in a spam leading to Google Docs spam content 4

Targeted Attacks: Who Is At Risk? per week per day January per day 514 in2hours December per day May per day Large Multinational Corporations Includes Small/Medium Businesses

Factors: Shadow Economy 6

Factors: Botnet Evolution – P2P e.g. Storm

Storm Botnet

Web Security Threats 9 SQL Injection Attacks Social Networks

Social Networks: Phishing and Spam 10

SecondLife: A New World or a New Risk?