SlideShare uma empresa Scribd logo
1 de 41
Baixar para ler offline
Cybercrime & solutions for
    Home users and Small
               Businesses
                                                        Eddy Willems
                                                   Security Evangelist
                                   EICAR Director Information & Press

                                         Eddy.Willems@kaspersky.be




      Copyright by Kaspersky Lab
Agenda



About Kaspersky Lab

History

Cyber Crime ...

Future




                      Copyright by Kaspersky Lab
About Kaspersky Lab

 International leader in internet security, visionary part
 Gartner quadrant
 Advanced antivirus, antispyware, antispam and firewall
 More than 250 million protected users worldwide
 10 R&D and virus labs worldwide
 Over 1400 employees, 450 developers & engineers
 Local sales, marketing and technical support
 Local virus detection by Benelux virus lab
 Fast reaction time and automatic hourly updates
                   Copyright by Kaspersky Lab
Leading IT security players worldwide




Have Chosen Kaspersky Lab Technology


                 Copyright by Kaspersky Lab
The Kaspersky Virus Lab - sharing knowledge through malware research

  Antivirus experts and virus analysts
Industry-leading knowledge resource – http://www.viruslist.com
Our team of virus analysts is active in
                                                         AVIEN (Anti-Virus Information
                                                         Exchange Network)
                                                         CARO (Computer Antivirus
                                                         Research Organization)
                                                         ICSA (International Computer
                                                         Security Association)
                                                         AVAR (Association of Antivirus
                                                         Asia Researchers)
                                                         IMPACT (international partnership
                                                         dedicated to combating terrorist
                                                         activities in the area of information
                                                         technology)
                                                         EICAR (European Institute for
                                                         Computer AntiVirus Research)


                      Copyright by Kaspersky Lab
TIME
Copyright by Kaspersky Lab
Some History: The old days !




        Copyright by Kaspersky Lab
Some years ago ...




            Virus
                                           SPAM


            Worm


                                 Trojan


              Copyright by Kaspersky Lab
Today’s Threats …



                                                            SPAM
               Virus                                   Phishing
                Root-kits         Spyware
                                                              Adware



                                       Control Agent
                                       Control Agent
                            Bot




                                         Remote-
                                         Remote
      Trojan            Zombie
                       Keystroke Premium-
                         logger  Rate Dialer
                        Screen
      Worm                         Pharming
                        grabber
                              Password
                               grabber


               Copyright by Kaspersky Lab
What are the real threats ?




                                                              Data Theft
                                       Viruses
    Worms        Spyware
                                                              PeerToPeer
                                                              attacks
 Adware                                                                    External
                                  Bad Stuff
               Internal                                                    Hacker
                                                                  Spam
               Hacker
    Exploits
                                                                    DoS
                     User                          Phishing
   Identity Theft
                                          DDoS                Mailers
                 Vulnerabilities
                      Copyright by Kaspersky Lab
The end of global epidemics



                  25

                  20
      Epidemics



                  15

                  10

                  5

                  0
                       2002    2003       2004         2005   2006   2007
                                            Quarters


                              Source: Kaspersky Lab


                          Copyright by Kaspersky Lab
Increasing Numbers




1.600.000
                                                    KL records
1.400.000
1.200.000
1.000.000
 800.000
 600.000
 400.000
 200.000
       0
            98 99 00 01 02 03 04 05 06 07 08
                            Source: Kaspersky Lab

                  Copyright by Kaspersky Lab
Cyber crime


   Types of malware in daily updates
  500                                                       Cyber vandalism
                                                            Petty fraud
  400                                                       Cyber crime

  300

  200

  100

    0
        1998 1999 2000 2001 2002 2003 2004 2005 2006 2007

                         Source: Kaspersky Lab


                      Copyright by Kaspersky Lab
The Ecosystem

      E-Criminals                                   Victims




       Police                                    ITTP Industry




                    Copyright by Kaspersky Lab
The Rogues’ Gallery – The Script Kiddies




Chen Ing-Hau – 24
      Ing-                   Jeffrey Lee Parson –       Sven Jaschan – 18 –
(Taiwan)                     18 – (USA)                 (Germany)
Arrested September 21,
                     21,     Arrested August 29, 2003
                                              29,       Arrested May 7, 2004 for
2000 for the CIH virus       for the Lovesan.b virus
                                     Lovesan.           NetSky and Sasser viruses




                           Copyright by Kaspersky Lab
The Rogues’ Gallery – Binary Thieves




Jeanson James                 Farid Essebar -18 (Morocco), Atilla Ekici – 21
Ancheta – 20 (USA)            (Turkey)
Arrested November 3, 2005     Arrested on August 26, 2005 for creating zombie
                                                 26,
for creating zombie           networks using Mytob and Zotob (Bozori) worms
                                                                Bozori)
networks and leasing them
for spam mailing and DDoS
attacks on websites

                            Copyright by Kaspersky Lab
Today we are fighting these!




 Jeremy Jaynes           Jay Echouafni         Andrew Schwarmkoff
 Millionaire,            CEO,                  Member of Russian
 and a spammer           and a DDoS attacker   mob, and a phisher

                 Copyright by Kaspersky Lab
One of the big problems: Botnets




         Copyright by Kaspersky Lab
What is a botnet ? part 1




                  Copyright by Kaspersky Lab
What is a botnet ? part 2




                  Copyright by Kaspersky Lab
What is a botnet ? part 3




                  Copyright by Kaspersky Lab
What can you see ?




                Copyright by Kaspersky Lab
Using botnet


   DDoS for fun and glory
   Sending spam, making spamlists
   Phishing
   Stealing private data
   Ransoming
   Botnet renting


                Copyright by Kaspersky Lab
New territories: Social Networking


 Blogs, forums
 Wiki
 MySpace, YouTube
 Other online communities:
Who’s on Facebook?




                      Copyright by Kaspersky Lab
CyberCrime is Big Business


  Profitability

  Easy to do
  (technically and morally)
                   morally)

  Low risk business

  New services that are
  profitable to attack


                       Copyright by Kaspersky Lab
Today’s Networks Lack Clear, Crisp Boundaries


   Internal/External network
   Individual Users connect from                        Telecomm
                                                          uters
   multiple locations
   Managed/Unmanaged devices                                 Contrac

   Individual devices operate both                Network
   inside the network, and on public
   networks                                                  Mobile
                                                              Users
   New Devices on the Network                               Wireless
                          Internet
    eg. SmartPhones, etc ….                                  Users


                     Copyright by Kaspersky Lab
Top 10: Safe Internet Security Tips

 1. Make backups
 2. Update software regularly and check this
 3. Use upgraded anti-virus/spyware software and update regularly and
 check this
 4. Use a personal desktop firewall
 5. Use difficult passwords
 6. Be very carefull with unknown files or programs
 7. Surf sure and browse logically
 8. Thnik twice when leaving personal data somewhere
 9. do not react on SPAM
 10. Use common sense
                     Copyright by Kaspersky Lab
What do we really need ?




                                                              Data Theft
                                       Viruses
    Worms        Spyware
                                                              PeerToPeer
                                                                attacks
 Adware                                                                    External
                                  Bad Stuff
               Internal                                                    Hacker
                                                                  Spam
               Hacker
    Exploits
                                                                    DoS
                     User                          Phishing
   Identity Theft
                                          DDoS                Mailers
                 Vulnerabilities
                      Copyright by Kaspersky Lab
Thank you




            Copyright by Kaspersky Lab
KOSS

Copyright by Kaspersky Lab
Kaspersky Open Space Security




                 Copyright by Kaspersky Lab
So what do we have?

A perfect combination of ….
  Legendary good detection with very
quick reaction time
  New improved scanning engine with
rootkit cleaning
  Improved Heuristic scanner
(emulation+sandbox)
  Behaviour blocker + HIPS
(proactive detection)
  An easy firewall
  Anti-Spam
  Vulnerability Scanner
  Web control and Device control
  Within one easy package !!!
                  Copyright by Kaspersky Lab
Don’t forget
        KMS
  Copyright by Kaspersky Lab
Kaspersky Anti-Virus Mobile




                  On-access monitor intercepts all data channels
                  On-demand monitor for manual scan
                  SMS spam filtering and other value-add features
                  Firewall
                  Anti-theft: SMS Block, SMS Clean, SIM Watch : Unique feature
                  Digitally signed updates via WAP, HTTP or from PC folder
                  Minimal amount of system resources used
                  Flexible customization options for OEMs, mobile operators, device
                  vendors and content providers
                  Supports all popular devices, including SonyEricsson, NOKIA, Siemens,
                  Samsung, Panasonic, Sendo and other vendors
                  Available for Symbian, Windows Mobile



                     Copyright by Kaspersky Lab
A different view ...
          KHSS
    Copyright by Kaspersky Lab
What do we offer?

 Kaspersky                       Kaspersky             Kaspersky
 Hosted Mail                     Hosted Web            Hosted IM
  Security                        Security              Security
   Cascaded Virus                   Virus protection    Virus protection
     protection                     Content Control     SPIM protection
 Comprehensive Spam                     URL-
                                        URL-Filter      Content Control
     protection
                                         Scalable          Scalable
   Content Control
                                        Reporting          Reporting
Inbound and Outbound
      Scalable
      Reporting




                       Copyright by Kaspersky Lab
Consumer v2009
            KAV & KIS




 Copyright by Kaspersky Lab
New Technologies in v2009
KAV / KIS v2009 (8.0) : AV signatures + PDM + Emulator +
       Improved Heuristics

-       Behaviour control {Security Rating, WhiteListing, Rules
        engine} => Improved HIPS
-       Vulnerability Checker
-       Virtual Keyboard
-       In-the Cloud protection: Kaspersky Security Network
-       Online Check + Rescue Disk Image
-       Improved Anti-Rootkit
-       Improved Firewall
-       Improved Parental Control
-       Easier Wizards
    First Hybrid Technology Product in the world

                     Copyright by Kaspersky Lab
Automatic Classification of Applications




                                                      Avantages : Each
                                                         application is
                                                         automatically
                                                   categorized based on
                                                  criteria managed by KIS
                                                             2009

                                                       Much less user
                                                  interaction needed while
                                                     less false postives
                     Copyright by Kaspersky Lab
Copyright by Kaspersky Lab
Thank you !

         Questions ?



                                          Eddy Willems
                             Eddy.Willems@kaspersky.be




Copyright by Kaspersky Lab

Mais conteúdo relacionado

Destaque

Malware Spam Juridisch Timelex
Malware Spam Juridisch TimelexMalware Spam Juridisch Timelex
Malware Spam Juridisch TimelexICTloket.be
 
Will Striker 180609 Rfid
Will Striker 180609 RfidWill Striker 180609 Rfid
Will Striker 180609 RfidICTloket.be
 
Presentatie Inventis 2805
Presentatie Inventis 2805Presentatie Inventis 2805
Presentatie Inventis 2805ICTloket.be
 
Presentatie Timelex 2805
Presentatie Timelex 2805Presentatie Timelex 2805
Presentatie Timelex 2805ICTloket.be
 
Edwin Jacobs 180609 Elektronisch Documentenbeheer In De Onderneming
Edwin Jacobs 180609 Elektronisch Documentenbeheer In De OndernemingEdwin Jacobs 180609 Elektronisch Documentenbeheer In De Onderneming
Edwin Jacobs 180609 Elektronisch Documentenbeheer In De OndernemingICTloket.be
 
Presentatie Ict Loket 15 04 2009 Seerz.Com
Presentatie Ict Loket 15 04 2009   Seerz.ComPresentatie Ict Loket 15 04 2009   Seerz.Com
Presentatie Ict Loket 15 04 2009 Seerz.ComICTloket.be
 
Outrider Seo 19022009
Outrider   Seo   19022009Outrider   Seo   19022009
Outrider Seo 19022009ICTloket.be
 
Will Striker 180609 Ft
Will Striker 180609 FtWill Striker 180609 Ft
Will Striker 180609 FtICTloket.be
 

Destaque (9)

Malware Spam Juridisch Timelex
Malware Spam Juridisch TimelexMalware Spam Juridisch Timelex
Malware Spam Juridisch Timelex
 
Will Striker 180609 Rfid
Will Striker 180609 RfidWill Striker 180609 Rfid
Will Striker 180609 Rfid
 
Presentatie Inventis 2805
Presentatie Inventis 2805Presentatie Inventis 2805
Presentatie Inventis 2805
 
Presentatie Timelex 2805
Presentatie Timelex 2805Presentatie Timelex 2805
Presentatie Timelex 2805
 
Edwin Jacobs 180609 Elektronisch Documentenbeheer In De Onderneming
Edwin Jacobs 180609 Elektronisch Documentenbeheer In De OndernemingEdwin Jacobs 180609 Elektronisch Documentenbeheer In De Onderneming
Edwin Jacobs 180609 Elektronisch Documentenbeheer In De Onderneming
 
Presentatie Ict Loket 15 04 2009 Seerz.Com
Presentatie Ict Loket 15 04 2009   Seerz.ComPresentatie Ict Loket 15 04 2009   Seerz.Com
Presentatie Ict Loket 15 04 2009 Seerz.Com
 
Outrider Seo 19022009
Outrider   Seo   19022009Outrider   Seo   19022009
Outrider Seo 19022009
 
Will Striker 180609 Ft
Will Striker 180609 FtWill Striker 180609 Ft
Will Striker 180609 Ft
 
Ensayo de torsion
Ensayo de torsionEnsayo de torsion
Ensayo de torsion
 

Semelhante a 2009 Kl Cybercrime Kaspersky

Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Andrew Ryan
 
Kaspersky - 07apr2011
Kaspersky - 07apr2011Kaspersky - 07apr2011
Kaspersky - 07apr2011Agora Group
 
Oracle tech db-02-hacking-neum-15.04.2010
Oracle tech db-02-hacking-neum-15.04.2010Oracle tech db-02-hacking-neum-15.04.2010
Oracle tech db-02-hacking-neum-15.04.2010Oracle BH
 
Cyber crime trends in 2013
Cyber crime trends in 2013 Cyber crime trends in 2013
Cyber crime trends in 2013 The eCore Group
 
DSS ITSEC CONFERENCE - Lumension Security - Real Time Risk & Compliance Man...
DSS   ITSEC CONFERENCE - Lumension Security - Real Time Risk & Compliance Man...DSS   ITSEC CONFERENCE - Lumension Security - Real Time Risk & Compliance Man...
DSS ITSEC CONFERENCE - Lumension Security - Real Time Risk & Compliance Man...Andris Soroka
 
8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't StopSophos
 
The Evolution Theory of Malware and Our Thought
The Evolution Theory of Malware and Our ThoughtThe Evolution Theory of Malware and Our Thought
The Evolution Theory of Malware and Our Thought Antiy Labs
 
Evolución de la Ciber Seguridad
Evolución de la Ciber SeguridadEvolución de la Ciber Seguridad
Evolución de la Ciber SeguridadCristian Garcia G.
 
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virusTrojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virusABHAY PATHAK
 
Setup Your Personal Malware Lab
Setup Your Personal Malware LabSetup Your Personal Malware Lab
Setup Your Personal Malware LabDigit Oktavianto
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesIşınsu Akçetin
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoorsGaurav Dalvi
 
Malware Analysis and Prediction System
Malware Analysis and Prediction SystemMalware Analysis and Prediction System
Malware Analysis and Prediction SystemAzri Hafiz
 
NCompass Live: IT Security for Libraries
NCompass Live: IT Security for LibrariesNCompass Live: IT Security for Libraries
NCompass Live: IT Security for LibrariesChrista Porter
 
Mc afee conectando las piezas
Mc afee conectando las piezasMc afee conectando las piezas
Mc afee conectando las piezasSoftware Guru
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan100701982
 

Semelhante a 2009 Kl Cybercrime Kaspersky (20)

Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
 
Kaspersky - 07apr2011
Kaspersky - 07apr2011Kaspersky - 07apr2011
Kaspersky - 07apr2011
 
Oracle tech db-02-hacking-neum-15.04.2010
Oracle tech db-02-hacking-neum-15.04.2010Oracle tech db-02-hacking-neum-15.04.2010
Oracle tech db-02-hacking-neum-15.04.2010
 
Cyber crime trends in 2013
Cyber crime trends in 2013 Cyber crime trends in 2013
Cyber crime trends in 2013
 
DSS ITSEC CONFERENCE - Lumension Security - Real Time Risk & Compliance Man...
DSS   ITSEC CONFERENCE - Lumension Security - Real Time Risk & Compliance Man...DSS   ITSEC CONFERENCE - Lumension Security - Real Time Risk & Compliance Man...
DSS ITSEC CONFERENCE - Lumension Security - Real Time Risk & Compliance Man...
 
8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop
 
The Evolution Theory of Malware and Our Thought
The Evolution Theory of Malware and Our ThoughtThe Evolution Theory of Malware and Our Thought
The Evolution Theory of Malware and Our Thought
 
Evolución de la Ciber Seguridad
Evolución de la Ciber SeguridadEvolución de la Ciber Seguridad
Evolución de la Ciber Seguridad
 
Anti virus
Anti virusAnti virus
Anti virus
 
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virusTrojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
 
Setup Your Personal Malware Lab
Setup Your Personal Malware LabSetup Your Personal Malware Lab
Setup Your Personal Malware Lab
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
 
Malware Analysis and Prediction System
Malware Analysis and Prediction SystemMalware Analysis and Prediction System
Malware Analysis and Prediction System
 
NCompass Live: IT Security for Libraries
NCompass Live: IT Security for LibrariesNCompass Live: IT Security for Libraries
NCompass Live: IT Security for Libraries
 
NCompass Live: IT Security for Libraries
NCompass Live: IT Security for LibrariesNCompass Live: IT Security for Libraries
NCompass Live: IT Security for Libraries
 
DamballaOverview
DamballaOverviewDamballaOverview
DamballaOverview
 
Mc afee conectando las piezas
Mc afee conectando las piezasMc afee conectando las piezas
Mc afee conectando las piezas
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 

Mais de ICTloket.be

Exuvis Presentatie
Exuvis PresentatieExuvis Presentatie
Exuvis PresentatieICTloket.be
 
Truvo Seo Presentatie
Truvo   Seo PresentatieTruvo   Seo Presentatie
Truvo Seo PresentatieICTloket.be
 
Time.Lex Presentatie
Time.Lex PresentatieTime.Lex Presentatie
Time.Lex PresentatieICTloket.be
 
Exuvis Presentatie
Exuvis PresentatieExuvis Presentatie
Exuvis PresentatieICTloket.be
 
Truvo Seo Presentatie
Truvo   Seo PresentatieTruvo   Seo Presentatie
Truvo Seo PresentatieICTloket.be
 
1. Social Spaces Workshop Ictloket
1. Social Spaces Workshop Ictloket1. Social Spaces Workshop Ictloket
1. Social Spaces Workshop IctloketICTloket.be
 
2. Nascom Sociale Media Ict Loket
2. Nascom   Sociale Media Ict Loket2. Nascom   Sociale Media Ict Loket
2. Nascom Sociale Media Ict LoketICTloket.be
 
3. Lithium Visie Op Social Media & Marketing
3. Lithium Visie Op Social Media & Marketing3. Lithium Visie Op Social Media & Marketing
3. Lithium Visie Op Social Media & MarketingICTloket.be
 
4. Truvo. Orm And Social Media Nl Ic Tloket
4. Truvo. Orm And Social Media Nl Ic Tloket4. Truvo. Orm And Social Media Nl Ic Tloket
4. Truvo. Orm And Social Media Nl Ic TloketICTloket.be
 
6. Veba Consulting
6. Veba Consulting6. Veba Consulting
6. Veba ConsultingICTloket.be
 
Ic Tloket Open Source Fks
Ic Tloket Open Source FksIc Tloket Open Source Fks
Ic Tloket Open Source FksICTloket.be
 
Outrider S E O 19022009
Outrider    S E O   19022009Outrider    S E O   19022009
Outrider S E O 19022009ICTloket.be
 
Outrider S E O 19022009
Outrider    S E O   19022009Outrider    S E O   19022009
Outrider S E O 19022009ICTloket.be
 

Mais de ICTloket.be (15)

Seo Evolution
Seo EvolutionSeo Evolution
Seo Evolution
 
Exuvis Presentatie
Exuvis PresentatieExuvis Presentatie
Exuvis Presentatie
 
Truvo Seo Presentatie
Truvo   Seo PresentatieTruvo   Seo Presentatie
Truvo Seo Presentatie
 
Time.Lex Presentatie
Time.Lex PresentatieTime.Lex Presentatie
Time.Lex Presentatie
 
Exuvis Presentatie
Exuvis PresentatieExuvis Presentatie
Exuvis Presentatie
 
Truvo Seo Presentatie
Truvo   Seo PresentatieTruvo   Seo Presentatie
Truvo Seo Presentatie
 
1. Social Spaces Workshop Ictloket
1. Social Spaces Workshop Ictloket1. Social Spaces Workshop Ictloket
1. Social Spaces Workshop Ictloket
 
2. Nascom Sociale Media Ict Loket
2. Nascom   Sociale Media Ict Loket2. Nascom   Sociale Media Ict Loket
2. Nascom Sociale Media Ict Loket
 
3. Lithium Visie Op Social Media & Marketing
3. Lithium Visie Op Social Media & Marketing3. Lithium Visie Op Social Media & Marketing
3. Lithium Visie Op Social Media & Marketing
 
4. Truvo. Orm And Social Media Nl Ic Tloket
4. Truvo. Orm And Social Media Nl Ic Tloket4. Truvo. Orm And Social Media Nl Ic Tloket
4. Truvo. Orm And Social Media Nl Ic Tloket
 
5. Dear Media
5. Dear Media5. Dear Media
5. Dear Media
 
6. Veba Consulting
6. Veba Consulting6. Veba Consulting
6. Veba Consulting
 
Ic Tloket Open Source Fks
Ic Tloket Open Source FksIc Tloket Open Source Fks
Ic Tloket Open Source Fks
 
Outrider S E O 19022009
Outrider    S E O   19022009Outrider    S E O   19022009
Outrider S E O 19022009
 
Outrider S E O 19022009
Outrider    S E O   19022009Outrider    S E O   19022009
Outrider S E O 19022009
 

Último

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Último (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

2009 Kl Cybercrime Kaspersky

  • 1. Cybercrime & solutions for Home users and Small Businesses Eddy Willems Security Evangelist EICAR Director Information & Press Eddy.Willems@kaspersky.be Copyright by Kaspersky Lab
  • 2. Agenda About Kaspersky Lab History Cyber Crime ... Future Copyright by Kaspersky Lab
  • 3. About Kaspersky Lab International leader in internet security, visionary part Gartner quadrant Advanced antivirus, antispyware, antispam and firewall More than 250 million protected users worldwide 10 R&D and virus labs worldwide Over 1400 employees, 450 developers & engineers Local sales, marketing and technical support Local virus detection by Benelux virus lab Fast reaction time and automatic hourly updates Copyright by Kaspersky Lab
  • 4. Leading IT security players worldwide Have Chosen Kaspersky Lab Technology Copyright by Kaspersky Lab
  • 5. The Kaspersky Virus Lab - sharing knowledge through malware research Antivirus experts and virus analysts Industry-leading knowledge resource – http://www.viruslist.com Our team of virus analysts is active in AVIEN (Anti-Virus Information Exchange Network) CARO (Computer Antivirus Research Organization) ICSA (International Computer Security Association) AVAR (Association of Antivirus Asia Researchers) IMPACT (international partnership dedicated to combating terrorist activities in the area of information technology) EICAR (European Institute for Computer AntiVirus Research) Copyright by Kaspersky Lab
  • 7. Some History: The old days ! Copyright by Kaspersky Lab
  • 8. Some years ago ... Virus SPAM Worm Trojan Copyright by Kaspersky Lab
  • 9. Today’s Threats … SPAM Virus Phishing Root-kits Spyware Adware Control Agent Control Agent Bot Remote- Remote Trojan Zombie Keystroke Premium- logger Rate Dialer Screen Worm Pharming grabber Password grabber Copyright by Kaspersky Lab
  • 10. What are the real threats ? Data Theft Viruses Worms Spyware PeerToPeer attacks Adware External Bad Stuff Internal Hacker Spam Hacker Exploits DoS User Phishing Identity Theft DDoS Mailers Vulnerabilities Copyright by Kaspersky Lab
  • 11. The end of global epidemics 25 20 Epidemics 15 10 5 0 2002 2003 2004 2005 2006 2007 Quarters Source: Kaspersky Lab Copyright by Kaspersky Lab
  • 12. Increasing Numbers 1.600.000 KL records 1.400.000 1.200.000 1.000.000 800.000 600.000 400.000 200.000 0 98 99 00 01 02 03 04 05 06 07 08 Source: Kaspersky Lab Copyright by Kaspersky Lab
  • 13. Cyber crime Types of malware in daily updates 500 Cyber vandalism Petty fraud 400 Cyber crime 300 200 100 0 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 Source: Kaspersky Lab Copyright by Kaspersky Lab
  • 14. The Ecosystem E-Criminals Victims Police ITTP Industry Copyright by Kaspersky Lab
  • 15. The Rogues’ Gallery – The Script Kiddies Chen Ing-Hau – 24 Ing- Jeffrey Lee Parson – Sven Jaschan – 18 – (Taiwan) 18 – (USA) (Germany) Arrested September 21, 21, Arrested August 29, 2003 29, Arrested May 7, 2004 for 2000 for the CIH virus for the Lovesan.b virus Lovesan. NetSky and Sasser viruses Copyright by Kaspersky Lab
  • 16. The Rogues’ Gallery – Binary Thieves Jeanson James Farid Essebar -18 (Morocco), Atilla Ekici – 21 Ancheta – 20 (USA) (Turkey) Arrested November 3, 2005 Arrested on August 26, 2005 for creating zombie 26, for creating zombie networks using Mytob and Zotob (Bozori) worms Bozori) networks and leasing them for spam mailing and DDoS attacks on websites Copyright by Kaspersky Lab
  • 17. Today we are fighting these! Jeremy Jaynes Jay Echouafni Andrew Schwarmkoff Millionaire, CEO, Member of Russian and a spammer and a DDoS attacker mob, and a phisher Copyright by Kaspersky Lab
  • 18. One of the big problems: Botnets Copyright by Kaspersky Lab
  • 19. What is a botnet ? part 1 Copyright by Kaspersky Lab
  • 20. What is a botnet ? part 2 Copyright by Kaspersky Lab
  • 21. What is a botnet ? part 3 Copyright by Kaspersky Lab
  • 22. What can you see ? Copyright by Kaspersky Lab
  • 23. Using botnet DDoS for fun and glory Sending spam, making spamlists Phishing Stealing private data Ransoming Botnet renting Copyright by Kaspersky Lab
  • 24. New territories: Social Networking Blogs, forums Wiki MySpace, YouTube Other online communities: Who’s on Facebook? Copyright by Kaspersky Lab
  • 25. CyberCrime is Big Business Profitability Easy to do (technically and morally) morally) Low risk business New services that are profitable to attack Copyright by Kaspersky Lab
  • 26. Today’s Networks Lack Clear, Crisp Boundaries Internal/External network Individual Users connect from Telecomm uters multiple locations Managed/Unmanaged devices Contrac Individual devices operate both Network inside the network, and on public networks Mobile Users New Devices on the Network Wireless Internet eg. SmartPhones, etc …. Users Copyright by Kaspersky Lab
  • 27. Top 10: Safe Internet Security Tips 1. Make backups 2. Update software regularly and check this 3. Use upgraded anti-virus/spyware software and update regularly and check this 4. Use a personal desktop firewall 5. Use difficult passwords 6. Be very carefull with unknown files or programs 7. Surf sure and browse logically 8. Thnik twice when leaving personal data somewhere 9. do not react on SPAM 10. Use common sense Copyright by Kaspersky Lab
  • 28. What do we really need ? Data Theft Viruses Worms Spyware PeerToPeer attacks Adware External Bad Stuff Internal Hacker Spam Hacker Exploits DoS User Phishing Identity Theft DDoS Mailers Vulnerabilities Copyright by Kaspersky Lab
  • 29. Thank you Copyright by Kaspersky Lab
  • 31. Kaspersky Open Space Security Copyright by Kaspersky Lab
  • 32. So what do we have? A perfect combination of …. Legendary good detection with very quick reaction time New improved scanning engine with rootkit cleaning Improved Heuristic scanner (emulation+sandbox) Behaviour blocker + HIPS (proactive detection) An easy firewall Anti-Spam Vulnerability Scanner Web control and Device control Within one easy package !!! Copyright by Kaspersky Lab
  • 33. Don’t forget KMS Copyright by Kaspersky Lab
  • 34. Kaspersky Anti-Virus Mobile On-access monitor intercepts all data channels On-demand monitor for manual scan SMS spam filtering and other value-add features Firewall Anti-theft: SMS Block, SMS Clean, SIM Watch : Unique feature Digitally signed updates via WAP, HTTP or from PC folder Minimal amount of system resources used Flexible customization options for OEMs, mobile operators, device vendors and content providers Supports all popular devices, including SonyEricsson, NOKIA, Siemens, Samsung, Panasonic, Sendo and other vendors Available for Symbian, Windows Mobile Copyright by Kaspersky Lab
  • 35. A different view ... KHSS Copyright by Kaspersky Lab
  • 36. What do we offer? Kaspersky Kaspersky Kaspersky Hosted Mail Hosted Web Hosted IM Security Security Security Cascaded Virus Virus protection Virus protection protection Content Control SPIM protection Comprehensive Spam URL- URL-Filter Content Control protection Scalable Scalable Content Control Reporting Reporting Inbound and Outbound Scalable Reporting Copyright by Kaspersky Lab
  • 37. Consumer v2009 KAV & KIS Copyright by Kaspersky Lab
  • 38. New Technologies in v2009 KAV / KIS v2009 (8.0) : AV signatures + PDM + Emulator + Improved Heuristics - Behaviour control {Security Rating, WhiteListing, Rules engine} => Improved HIPS - Vulnerability Checker - Virtual Keyboard - In-the Cloud protection: Kaspersky Security Network - Online Check + Rescue Disk Image - Improved Anti-Rootkit - Improved Firewall - Improved Parental Control - Easier Wizards First Hybrid Technology Product in the world Copyright by Kaspersky Lab
  • 39. Automatic Classification of Applications Avantages : Each application is automatically categorized based on criteria managed by KIS 2009 Much less user interaction needed while less false postives Copyright by Kaspersky Lab
  • 41. Thank you ! Questions ? Eddy Willems Eddy.Willems@kaspersky.be Copyright by Kaspersky Lab