Kaspersky Labs 6 ht Annual Partner Conference · Turkey, June 2-6 2004 Kaspersky Labs 6 th Annual Partner Conference · Turkey, 2-6 June 2004 November 16.

Slides:



Advertisements
Similar presentations
KASPERSKY ANTI VIRUS Independent tests show Kaspersky to be the #1 in terms of Virus detection, false positives and response time for new viruses. Antivirus.
Advertisements

Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Breaking Trust On The Internet
AmadeusCybersecurity: the essentials12 th November 2014 Alex van Someren Family Office Forum 12 th November 2014, Zurich Cybersecurity: the essentials.
Intermediate 1 Internet Safety Section 1: Viruses Section 2: Malware Section 3: Other Internet Threats Section 4: Internet Defences Section5: Legal Aspects.
Zombie or not to be: Trough the meshes of Botnets - Guillaume Lovet AVAR 2005 Tianjin, China.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Встреча в верхах: нам покоряются любые высоты! Kaspersky Open Space Security Kaspersky ® Open Space Security a holistic approach to protecting corporate.
Kaspersky Labs 6 ht Annual Partner Conference · Turkey, June Kaspersky Labs 6 th Annual Partner Conference · Turkey, 2-6 June 2004 VII Kaspersky.
Protecting our Cyber Space Staying Ahead of the Game Basel Alomair National Center for Cybersecurity Technology (C4C) King Abdulaziz City for Science and.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
9 99 CHAPTER Privacy and Security - FAQ’s. 9 © The McGraw-Hill Companies, Inc Privacy How secure is data –On system –On Internet Private network.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
E-Commerce Security and Fraud Issues and Protections
Kaspersky Lab: The Best of Both Worlds Alexey Denisyuk, pre-sales engineer Kaspersky Lab Eastern Europe 5 th April 2012 / 2 nd InfoCom Security Conference.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
CYBER CRIME AND SECURITY TRENDS
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Barracuda Spam & Virus Firewall. Introduction to the Barracuda Spam & Virus Firewall Complete server protection –Spam Blocking (95+ percent) Extremely.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Norman SecureSurf Protect your users when surfing the Internet.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Viruses.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Cyber crime & Security Prepared by : Rughani Zarana.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Mobile Technology and Cyber Threats Deon Woods Bell Office of International Affairs The Fifth Annual African Consumer Protection Dialogue Conference Livingstone,
 The purpose of this report is to inform people that the spyware and virus threat is growing and what people can do to stop the spread of spyware and.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
CYBER CRIME.
Hacking and International Investigations Presented By: Nenette Day Harvard University Extension School.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Cyber Security Nevada Businesses Overview June, 2014.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 Fighting cybercrime in 2009 Magnus Kalkuhl, Senior Virus Analyst Kaspersky Lab ITU-T.
Desktop Security: Making Sure Your Office Environment is Secure.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
Pacific Northwest Digital Government Summit Security – How Much is Enough? June 20, 2006 SA Kenneth A. Schmutz.
AVAR 2004, Japan, Tokyo Today’s Threats and the Evolution of the Computer Underground Today’s Threats and the Evolution of the Computer Underground Eugene.
A threat to global security and economy Koushik Mannepalli CMPE 294.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Network Security.  With an increasing amount of people getting connected to networks, the security threats that cause massive harm are increasing also.
Cyber Security : Indian perspective. 22 Internet Infrastructure in INDIA.
Safe’n’Sec IT security solutions for enterprises of any size.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Cybersecurity Test Review Introduction to Digital Technology.
MIS323 – Business Telecommunications Chapter 10 Security.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Global Mobile Anti-malware Market WEBSITE Single User License: US$ 2500 No of Pages: 55 Corporate User License: US$
KASPERSKY INTERNET SECURITY multi-device  Average number of devices in households: 4.5  Consumer device diversity will continue to expand.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Easy3s Smart Cop antivirus Total Security for Internet ERA.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Securing Information Systems
Ransomware & Security for Virtualization
Securing Information Systems
“CYBER SPACE” - THE UNDERGROUND ECONOMY
Prepared By : Binay Tiwari
Presentation transcript:

Kaspersky Labs 6 ht Annual Partner Conference · Turkey, June Kaspersky Labs 6 th Annual Partner Conference · Turkey, 2-6 June 2004 November 16 th, 2005 AVAR-2005, China, November 2005 Challenges we face in today’s cyber world Eugene Kaspersky Head of Anti-Virus Research

AVAR-2005, China, November 2005 Financial fraudFinancial fraud  BankSpy Trojans  Phishing AdvertisingAdvertising  Spam  AdWare BlackmailBlackmail  Cyber racket Other (dialers etc.)Other (dialers etc.) Cybercrime

AVAR-2005, China, November 2005 Source: Computer Economics, 2004 ? ? ? Melissa Love Letter MyDoomBagleNetskySasser Malicious programs damage the economy

AVAR-2005, China, November 2005 Source: Kaspersky Lab Criminalization of the Internet (1980 – 2005) Criminalization of the Internet (1980 – 2005)

AVAR-2005, China, November 2005 Serious virus epidemics Source: Kaspersky Lab ?

AVAR-2005, China, November 2005 Antivirus companies speed in reaction Law enforcement agencies becoming more active infected computers What’s the situation today?

AVAR-2005, China, November 2005 Localized virus epidemics: 1000 х 1000 х 1000… Using a combination of infection vectors: + Internet Virus writers working together: organized crime spreading on the Internet Virus writers competing with each other Virus writers actively working against antivirus companies Virus writers’ current tactics

AVAR-2005, China, November 2005 It’s a race against time: Collecting information Speed of reaction Speed of delivery Antivirus companies’ current tactics

AVAR-2005, China, November 2005 Virus detection

AVAR-2005, China, November Smartphones, PDAs: The threats remain the same: - Data theft - Spam - DoS attacks Critical mass (devices): 1% 50% (?) 2.Smart homes Tomorrow: under threat

AVAR-2005, China, November Increasing criminalization: -conflict between groups of virus writers and hackers -organized criminal structures -new technologies applied for increased effect 2. Malware going mobile: viruses for smartphones, PDAs and maybe even for smart appliances…? What does the future hold?

AVAR-2005, China, November 2005 Why is this happening? 1.Operating systems are by nature insecure 2.The architecture of the Internet is insecure Protect all network elements: - workstations- PDAs - file servers- laptops - mail servers- smartphones What can be done?

AVAR-2005, China, November 2005 KAV Personal/Personal Pro Kaspersky Personal Security Suite Kaspersky Anti-Hacker Kaspersky Anti-Spam Personal Kaspersky Security for PDA KAV for Symbian OS Kaspersky AV Business Optimal Kaspersky Corporate Suite Kaspersky AS Enterprise Edition Kaspersky AS ISP Edition Our products Personal SMB Corporate and ISP

AVAR-2005, China, November 2005 Thank you for your attention!