SlideShare uma empresa Scribd logo
1 de 65
The Dangers Of Laptops, Smartphones & Social Media To Enterprise Security Dr. Paul Judge Chief Research Officer
Half of The Spam Disappeared 3 52 Billion 26 Billion 2010
Five Innovations That Created Security Risks
1. Rapid Growth ,[object Object]
 196 million domain names
 47 million new sites last yearSource:Verisign
2.  Dynamic Web Apps: AJAX Rich site-to-browser interaction Browser is the new operating system Browser is active in the application, not simply a passive display tool
[object Object]
1 in 11 organizations had remote workers infected
46%  of remote infections come from infected Web sites3. Remote Employees
Smartphone and tablet computing blur the line between personal and business computing Companies must reconsider policies for devices that are not owned by the company 4. New Devices
Mobile Users Branch Offices ,[object Object]
Need the right delivery model for each location and user
Centralized management, forensics, and reporting is difficult
Remote users and branch offices often not covered because of difficulty or cost
Compromises in security because of the complexity or costInternet Headquarters Teleworkers Problem: Many Locations and Remote Users Roaming Users
Cloud-based Web Security Cloud-based content filtering and malware protection Centralized multi-site management and reporting Simple policy-based Web security Protects remote and mobile employees Massively scalable infrastructure eliminates latency Rapid response to new and emerging threats Internet Policy Management Security Protection Consolidated Reporting Workplace Users Mobile Users Roaming Users
5. User-Generated Content ,[object Object]
500 million users on Facebook
100 million accounts on Twitter
2.5 billion photos uploaded each month to Facebook
30 million new ads per day on Craigslist,[object Object]
Then Came Along… User Generated Content
With 100s of millions of users behind a single domain, we need to understand user level reputation Is this account good or bad? Is this account even real? Need for User Reputation
Facebook Social Attacks
Photo ‘Tags’ Up To 50 People
Website Selling Fake Illegal Shoes
Likejacking
Malicious Facebook Apps
“Hidden Truth” Photos
Automated Social Engineering
Barracuda Labs Technology:Maltrace: Malware Analysis w. Virtualization ,[object Object]
Load samples into Maltrace
Maltrace allows the malware to run on a virtual PC
Maltrace collects the network traffic generated
Maltrace creates signatures based on malicious traffic
Adds the signatures to URL, IP and fingerprint databases,[object Object]
‘Funniest Video Ever’ Banking Trojan
Rogue A/V + Trending Topics (step 1 of 3)
Rogue A/V + Trending Topics (Step 2 of 3) hxxp://securityland.cn/?uid=144&pid=3&ttl=31c48520c54 which acts as a traffic distribution system for a Rogue AV operation; the chain of redirections ends at one of the following Rogue AV distribution points: hxxp://my-systemscan.com/?p=WKmimHVlbG2HjsbIo22EhHV8ipnVbWiMnNah2qeNm 6nZwombm5h2lpd9fXCHodjSbmRelWZxmV6SZGbLU9bYxKWspXOL1dZ2Y2ZuZ2tnaWyVYYrJlG0%3D  hxxp://my-newprotection.net/?p=WKmimHVlbG2HjsbIo22EhHV8ipnVbWiMnNah2qeNm 6nZwombm5h2lpd9fXCHodjSbmRelWZxmV6SZGbLU9bYxKWspXOL1dZ2Y2ZuZ2tnaWyVYYrJlG0%3D  hxxp://trustsystem-protection.com/?p=WKmimHVlbG2HjsbIo22EhHV8ipnVbWiMnNah2 qeNm6nZwombm5h2lpd9fXCHodjSbmRelWZxmV6SZGbLU9bYxKWspXOL1dZ2Y2ZuZ2tnaWyVYYrJlG0%3D
Rogue A/V + Trending Topics (step 3 of 3)
Barracuda Labs Technology:Twitter Reputation System ,[object Object]
Query Twitter User Database for Other Users
Analyze Users’ Activities
Analyze Web Links
Add Malicious Sites to Barracuda SPYDEF list,[object Object]
True Twitter Users ≥10 Followers, Friends, & Tweets Compared to 21% in Jan 2010
Friends(Following):     For every 100 Twitter users…  16 have 27 have 40 have 17 have 0 1-9 10-99 100+ friends friends friends friends
Friend-Follower Delta:  For every 100 Twitter users… 43  have same  (+/- 5) amount 23 have more friends 34 have  more followers
Crime Rate twitter crime rate is the percentage of accounts created per month that are eventually suspended by Twitter
Twitter Growth – Red Carpet Era Twitter Account Creation 2006-2009 ,[object Object]
 Twitter growth rate went from 2.02% in Nov 08 to 21.17% in April 09.Twitter Account Creation  Red Carpet Era (11/08-04/09) Barracuda Networks Confidential
Twitter Crime Rate 2006-2009 ,[object Object]
 2007 = 1.7%
 2008 = 2.2% During Red Carpet Era: ,[object Object]
 This more than tripled over the following four months, escalating to 12% in October 2009.Twitter Crime Rate 2006-2009 Barracuda Networks Confidential
Twitter Crime Rate 2010
Suspended Accounts: Friend Follower Delta ,[object Object],[object Object]
In the 2500 range, we start to see some scammers.

Mais conteúdo relacionado

Mais procurados

Cybercrimes against the korean online banking systems 1227 eng_slideshare
Cybercrimes against the korean online banking systems 1227 eng_slideshareCybercrimes against the korean online banking systems 1227 eng_slideshare
Cybercrimes against the korean online banking systems 1227 eng_slideshareYoungjun Chang
 
Avar2011 changing security_awareness_training
Avar2011 changing security_awareness_trainingAvar2011 changing security_awareness_training
Avar2011 changing security_awareness_trainingYoungjun Chang
 
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone UnderwearThe Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone UnderwearBob Wall
 
14 cyber threats
14 cyber threats14 cyber threats
14 cyber threatsmahesh43211
 
Infographic: The High Cost of BYOD
Infographic: The High Cost of BYODInfographic: The High Cost of BYOD
Infographic: The High Cost of BYODTrustwave
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec
 
Cyber Vulnerabilities & How companies can test them
Cyber Vulnerabilities & How companies can test themCyber Vulnerabilities & How companies can test them
Cyber Vulnerabilities & How companies can test them24by7Security Inc
 
Android mobile platform security and malware survey
Android mobile platform security and malware surveyAndroid mobile platform security and malware survey
Android mobile platform security and malware surveyeSAT Journals
 
The State of Internet Security: Web Attaks Take Over
The State of Internet Security: Web Attaks Take OverThe State of Internet Security: Web Attaks Take Over
The State of Internet Security: Web Attaks Take OverJAX Chamber IT Council
 
Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check Symantec
 
Report on Rogue Security Software: a summary
Report on Rogue Security Software: a summaryReport on Rogue Security Software: a summary
Report on Rogue Security Software: a summarySymantec Italia
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec Technology and Consulting
 
Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015Symantec
 
Top Cyber Threats of 2009
Top Cyber Threats of 2009Top Cyber Threats of 2009
Top Cyber Threats of 2009Symantec
 
Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015Waqas Amir
 
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Symantec
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android applicationIAEME Publication
 
Ransomeware : A High Profile Attack
Ransomeware : A High Profile AttackRansomeware : A High Profile Attack
Ransomeware : A High Profile AttackIRJET Journal
 
Quick heal threat_report_q3_2016
Quick heal threat_report_q3_2016Quick heal threat_report_q3_2016
Quick heal threat_report_q3_2016Andrey Apuhtin
 

Mais procurados (20)

Cybercrimes against the korean online banking systems 1227 eng_slideshare
Cybercrimes against the korean online banking systems 1227 eng_slideshareCybercrimes against the korean online banking systems 1227 eng_slideshare
Cybercrimes against the korean online banking systems 1227 eng_slideshare
 
Avar2011 changing security_awareness_training
Avar2011 changing security_awareness_trainingAvar2011 changing security_awareness_training
Avar2011 changing security_awareness_training
 
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone UnderwearThe Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
 
14 cyber threats
14 cyber threats14 cyber threats
14 cyber threats
 
Infographic: The High Cost of BYOD
Infographic: The High Cost of BYODInfographic: The High Cost of BYOD
Infographic: The High Cost of BYOD
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19
 
Cyber Vulnerabilities & How companies can test them
Cyber Vulnerabilities & How companies can test themCyber Vulnerabilities & How companies can test them
Cyber Vulnerabilities & How companies can test them
 
Android mobile platform security and malware survey
Android mobile platform security and malware surveyAndroid mobile platform security and malware survey
Android mobile platform security and malware survey
 
The State of Internet Security: Web Attaks Take Over
The State of Internet Security: Web Attaks Take OverThe State of Internet Security: Web Attaks Take Over
The State of Internet Security: Web Attaks Take Over
 
CSS Trivia
CSS TriviaCSS Trivia
CSS Trivia
 
Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check
 
Report on Rogue Security Software: a summary
Report on Rogue Security Software: a summaryReport on Rogue Security Software: a summary
Report on Rogue Security Software: a summary
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015
 
Top Cyber Threats of 2009
Top Cyber Threats of 2009Top Cyber Threats of 2009
Top Cyber Threats of 2009
 
Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015
 
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android application
 
Ransomeware : A High Profile Attack
Ransomeware : A High Profile AttackRansomeware : A High Profile Attack
Ransomeware : A High Profile Attack
 
Quick heal threat_report_q3_2016
Quick heal threat_report_q3_2016Quick heal threat_report_q3_2016
Quick heal threat_report_q3_2016
 

Destaque

Smh travelhealth pwrpont
Smh travelhealth pwrpontSmh travelhealth pwrpont
Smh travelhealth pwrponthutch7272
 
Product supervisor kpi
Product supervisor kpiProduct supervisor kpi
Product supervisor kpifuresjom
 
Hf in uas auto
Hf in uas autoHf in uas auto
Hf in uas autoJo Elliott
 
Product director kpi
Product director kpiProduct director kpi
Product director kpijomfures
 
Presenting the film making research
Presenting the film making researchPresenting the film making research
Presenting the film making researchGurgina
 
International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI)International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI)inventionjournals
 
SCIENCE LAB
SCIENCE LABSCIENCE LAB
SCIENCE LABSUNIL47
 
Mobile Marketing Gambling Summit Slideshare
Mobile Marketing Gambling Summit SlideshareMobile Marketing Gambling Summit Slideshare
Mobile Marketing Gambling Summit SlideshareDonky Carrots
 
SP2013 Hybrid SPSPhoenix2013_owenallen
SP2013 Hybrid SPSPhoenix2013_owenallenSP2013 Hybrid SPSPhoenix2013_owenallen
SP2013 Hybrid SPSPhoenix2013_owenallenOwen Allen
 
White Paper - Antivirus é eficiente para a proteção de redes industriais?
White Paper - Antivirus é eficiente para a proteção de redes industriais?White Paper - Antivirus é eficiente para a proteção de redes industriais?
White Paper - Antivirus é eficiente para a proteção de redes industriais?TI Safe
 
Taller SOLID Refactor
Taller SOLID RefactorTaller SOLID Refactor
Taller SOLID RefactorAgile Spain
 
Suguk activity feed
Suguk activity feedSuguk activity feed
Suguk activity feedWes Hackett
 
Ciudadanía Romana - Presentación Carla Corbo - Marta Santamaría - 1ºB mayo de...
Ciudadanía Romana - Presentación Carla Corbo - Marta Santamaría - 1ºB mayo de...Ciudadanía Romana - Presentación Carla Corbo - Marta Santamaría - 1ºB mayo de...
Ciudadanía Romana - Presentación Carla Corbo - Marta Santamaría - 1ºB mayo de...filolacabrera
 
SQL Server 2005 Licensing Unplugged
SQL Server 2005 Licensing UnpluggedSQL Server 2005 Licensing Unplugged
SQL Server 2005 Licensing Unpluggedwebhostingguy
 

Destaque (20)

Smh travelhealth pwrpont
Smh travelhealth pwrpontSmh travelhealth pwrpont
Smh travelhealth pwrpont
 
Product supervisor kpi
Product supervisor kpiProduct supervisor kpi
Product supervisor kpi
 
Hf in uas auto
Hf in uas autoHf in uas auto
Hf in uas auto
 
My face
My faceMy face
My face
 
Product director kpi
Product director kpiProduct director kpi
Product director kpi
 
Smartphones for Real Estate
Smartphones for Real EstateSmartphones for Real Estate
Smartphones for Real Estate
 
Presenting the film making research
Presenting the film making researchPresenting the film making research
Presenting the film making research
 
A cor azul!
A cor azul!A cor azul!
A cor azul!
 
International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI)International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI)
 
Sametime 7.5.1
Sametime 7.5.1Sametime 7.5.1
Sametime 7.5.1
 
SCIENCE LAB
SCIENCE LABSCIENCE LAB
SCIENCE LAB
 
Mobile Marketing Gambling Summit Slideshare
Mobile Marketing Gambling Summit SlideshareMobile Marketing Gambling Summit Slideshare
Mobile Marketing Gambling Summit Slideshare
 
SP2013 Hybrid SPSPhoenix2013_owenallen
SP2013 Hybrid SPSPhoenix2013_owenallenSP2013 Hybrid SPSPhoenix2013_owenallen
SP2013 Hybrid SPSPhoenix2013_owenallen
 
White Paper - Antivirus é eficiente para a proteção de redes industriais?
White Paper - Antivirus é eficiente para a proteção de redes industriais?White Paper - Antivirus é eficiente para a proteção de redes industriais?
White Paper - Antivirus é eficiente para a proteção de redes industriais?
 
Taller SOLID Refactor
Taller SOLID RefactorTaller SOLID Refactor
Taller SOLID Refactor
 
Suguk activity feed
Suguk activity feedSuguk activity feed
Suguk activity feed
 
Ciudadanía Romana - Presentación Carla Corbo - Marta Santamaría - 1ºB mayo de...
Ciudadanía Romana - Presentación Carla Corbo - Marta Santamaría - 1ºB mayo de...Ciudadanía Romana - Presentación Carla Corbo - Marta Santamaría - 1ºB mayo de...
Ciudadanía Romana - Presentación Carla Corbo - Marta Santamaría - 1ºB mayo de...
 
2b
2b2b
2b
 
SQL Server 2005 Licensing Unplugged
SQL Server 2005 Licensing UnpluggedSQL Server 2005 Licensing Unplugged
SQL Server 2005 Licensing Unplugged
 
Anatomia general de la medula espinal
Anatomia general de la medula espinalAnatomia general de la medula espinal
Anatomia general de la medula espinal
 

Semelhante a The Dangers of Lapto

LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014Ashlie Steele
 
TECHNICAL WHITE PAPER▶ Symantec Website Security Threat Report
TECHNICAL WHITE PAPER▶ Symantec Website Security Threat ReportTECHNICAL WHITE PAPER▶ Symantec Website Security Threat Report
TECHNICAL WHITE PAPER▶ Symantec Website Security Threat ReportSymantec
 
Scaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware InfectionScaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware InfectionWayne Huang
 
TRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , TexasTRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , TexasAditya K Sood
 
Symantec Website Threat Report Part-1 2015
Symantec Website Threat Report Part-1 2015Symantec Website Threat Report Part-1 2015
Symantec Website Threat Report Part-1 2015RapidSSLOnline.com
 
CYREN_Q1_2015_Trend_Report
CYREN_Q1_2015_Trend_ReportCYREN_Q1_2015_Trend_Report
CYREN_Q1_2015_Trend_ReportChris Taylor
 
18-mobile-malware.pptx
18-mobile-malware.pptx18-mobile-malware.pptx
18-mobile-malware.pptxsundar110567
 
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET -  	  Chrome Extension for Detecting Phishing WebsitesIRJET -  	  Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing WebsitesIRJET Journal
 
Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Securitycrussell79
 
Internet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshareInternet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshareYoungjun Chang
 
Meet the potnet - AboutAndroid | Malware Analysis Report
Meet the potnet - AboutAndroid | Malware Analysis ReportMeet the potnet - AboutAndroid | Malware Analysis Report
Meet the potnet - AboutAndroid | Malware Analysis ReportEran Goldstein
 
DEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptDEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptschwarz10
 
Sql Injection Attacks And A Web Application Environment
Sql Injection Attacks And A Web Application EnvironmentSql Injection Attacks And A Web Application Environment
Sql Injection Attacks And A Web Application EnvironmentSheri Elliott
 
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine LearningIRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine LearningIRJET Journal
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays worldSibghatullah Khattak
 
Guarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social NetworkGuarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social NetworkEditor IJCATR
 
Network Insights of Dyre and Dridex Trojan Bankers
Network Insights of Dyre and Dridex Trojan BankersNetwork Insights of Dyre and Dridex Trojan Bankers
Network Insights of Dyre and Dridex Trojan BankersBlueliv
 

Semelhante a The Dangers of Lapto (20)

LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014
 
TECHNICAL WHITE PAPER▶ Symantec Website Security Threat Report
TECHNICAL WHITE PAPER▶ Symantec Website Security Threat ReportTECHNICAL WHITE PAPER▶ Symantec Website Security Threat Report
TECHNICAL WHITE PAPER▶ Symantec Website Security Threat Report
 
Scaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware InfectionScaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware Infection
 
TRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , TexasTRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , Texas
 
Symantec Website Threat Report Part-1 2015
Symantec Website Threat Report Part-1 2015Symantec Website Threat Report Part-1 2015
Symantec Website Threat Report Part-1 2015
 
CYREN_Q1_2015_Trend_Report
CYREN_Q1_2015_Trend_ReportCYREN_Q1_2015_Trend_Report
CYREN_Q1_2015_Trend_Report
 
18-mobile-malware.pptx
18-mobile-malware.pptx18-mobile-malware.pptx
18-mobile-malware.pptx
 
C3
C3C3
C3
 
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET -  	  Chrome Extension for Detecting Phishing WebsitesIRJET -  	  Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing Websites
 
Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Security
 
How websites are attacked
How websites are attackedHow websites are attacked
How websites are attacked
 
Internet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshareInternet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshare
 
Meet the potnet - AboutAndroid | Malware Analysis Report
Meet the potnet - AboutAndroid | Malware Analysis ReportMeet the potnet - AboutAndroid | Malware Analysis Report
Meet the potnet - AboutAndroid | Malware Analysis Report
 
DEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptDEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.ppt
 
Sql Injection Attacks And A Web Application Environment
Sql Injection Attacks And A Web Application EnvironmentSql Injection Attacks And A Web Application Environment
Sql Injection Attacks And A Web Application Environment
 
Malicious malware breaches - eScan
Malicious malware breaches - eScanMalicious malware breaches - eScan
Malicious malware breaches - eScan
 
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine LearningIRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
Guarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social NetworkGuarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social Network
 
Network Insights of Dyre and Dridex Trojan Bankers
Network Insights of Dyre and Dridex Trojan BankersNetwork Insights of Dyre and Dridex Trojan Bankers
Network Insights of Dyre and Dridex Trojan Bankers
 

The Dangers of Lapto

Notas do Editor

  1. Half the spam disappeared. Why? Because they found something better to do. Same people.Dos, spam, phishing, rogue av, Hard to make it thru spam fws, easier to catch people out surfing. Why is it easier to catch people on web?
  2. a) rapid growthb) dynamic ajax: xls, outlookc) user generated content: facebook, conn, d) remote employeespick up laptop e) new devices: androids, ipads,...
  3. 1 millionipadsper month
  4. 2. Problem: mobile users/road warriors gateway solution does not solve problem for mobile users. (picture)smaller remote offices is a further problem, have lesser security becausedo not want to deploy all the boxes....(picture) 
  5. Attackers use the social/viral features to spread their attacks quicklyTag a picture and it shows up for the friend of everyone that you tagged. On average 1000 friends, 50 tags, 50K people saw that link
  6. 6- BotNets(stuxnet, kraken)7- Cybercriminals: /Criminals
  7. Malicious jar file and trojantbanking1600 clicked linkhow many accounts used?used fake accounts, popular hash tags and search terms
  8. PAUL: 21% in Jan 2010, 29% in july 2010, 43% in 1/2011
  9. 16% following no one 15% decrease from 18.9% in July 201057% are following 10+26% increase from 45% in July 2010>100 17%>1000 1%> 10000 0.01%
  10. PAUL:55% of twitter have same number fo followers as following (+/- 5)So must using it as a social network13% have more followers: celbrities32% have more following: consumers vs creators
  11. PAUL:Over half of the NW tweets less then a once dayBut >100 is .2%  but that is couple hundred thousand accounts can represent 38% percent of the traffic
  12. The amount of malware found daily across the search engines increased 55 percent from 145.7 in June 2010 to 226.3 in December 2010.
  13. Inputs:Malicious Javascript Detector (MJD)Exploit Kit Detector (EKD)Maltrace DetectorSocial Network DetectorSEO DetectorSpamUser SubmissionsWAF feedback*phion firewall logs*Results:Content filter databaseMalware databaseIntent-based spam filter databaseVirus fingerprintsUsed by: Web filter cloudWeb filter appliancesEmail appliancesEmail cloudPeople:Researchers (analysis and building software)Analyst team (review user submissions and review borderline analysis results)