SlideShare uma empresa Scribd logo
1 de 11
Baixar para ler offline
Click to edit Master title style


• Click to edit Master text styles
    – Second level
       • Third level
                Securing Africa
           – Fourth level

                - get prepared for the future to come -
               » Fifth level




                Costin G. Raiu
                Chief Security Expert, Kaspersky Lab EEMEA
                craiu@kaspersky.ro
Today’s agenda
Click to edit Master title style


• Click to edit Master text styles
•   The Threat Landscape: 2009
     – Second level
•   The sidelevel
        • Third
                effects of increased bandwidth
           – Fourth level
               » Fifth level
•   2010 – prevention is better than the cure
•   simple mitigation steps for safer
    computing
Kaspersky Lab: number of signatures
   Click to edit Master title style

1600000
    • Click to edit Master text styles
1400000
                    New threats per day: 30,000
           – Second level
1200000
              • Third level
                    More than 3,500 new signatures/day
1000000                 – Fourth level
                          November 2009: +3 mil
                           » Fifth level
800000

600000

400000

200000

     0

          Year   1998      1999   2000   2001   2002   2003   2004   2005   2006   2007   2008
Internet threats – infected legitimate websites
Click to edit Master title style

   2,000

• Click to edit Master text styles
  1,800
                                                                               15,000%
   1,600
   – Second level                                                             growth vs 2006

   1,400
           • Third level
   1,200
              – Fourth level
   1,000          » Fifth level
    800

    600

    400

    200

      0
                2006                2007                   2008                 2009
                Infected legitimate websites out of a pool of 300K
                           Source: Kaspersky Lab Analytical article
                       http://www.viruslist.com/en/analysis?pubid=204792089
“En masse” infections
Click to edit Master title style

Gumblar, 9-Ball:
• Click to edit Master text styles
    – Second level
       • Third level
           – Fourth level
               » Fifth level
Click tofiber optic connections
Faster edit Master title style


• Click to edit Master text styles
  Seacom
   – Second level
ConnectsThird level
        •
          a large
part of AfricaFourth level
            – with:
    – India     »   Fifth level
    – UK, France
    – UAE, Egypt




                                     Image source: mybroadband.co.za
Seacom -
 Click to edit Master title style
                 effects

 • Click to edit Master text styles
       +
     – Second level
                                                                               -
Cheaper internet
        • Third level                                                    P2P networks
access for allFourth level
           –                                                             file sharing
Faster internet Fifth level
                »
                                                                         Pirate software
connections                                                              Internet attacks
Online commerce

                              Image source: Seacom HQ c/o Linda Carter
Click to social engineering attacks
2010 – edit Master title style


• Click to edit Master text styles
   – Second level
       • Third level
          – Fourth level
              » Fifth level
Click to social engineering attacks
2010 – edit Master title style


• Click to edit Master text styles
   – Second level
       • Third level
          – Fourth level
              » Fifth level
Mitigation steps
Click to edit Master title style


• Click to edit Master is better
      Prevention text styles          than cure!
• Install and levelan Internet Security Suite
   – Second
               run
      • Third level
• Don’t assumelevel
          – Fourth
                     a website is safe because it is high
  profile     » Fifth level

• Use an up-to-date, modern browser: IE8, FF 3.x,
  Chrome, Opera 10
• Keep Windows up-to-date
• Always run the latest versions of Adobe Reader,
  Flash Player, MS Word, etc…
• Be wary of messages from social networks
Click to edit Master title style


• Click to edit Master text styles
    – Second level
           The future is coming – be prepared!
       • Third level
           – Fourth level
               » Fifth level

                      Thank you!

Mais conteúdo relacionado

Destaque

Sakai – what is changing
Sakai – what is changingSakai – what is changing
Sakai – what is changingBrian Moynihan
 
02 3-aprendizaje colaborativo-cooperativo
02 3-aprendizaje colaborativo-cooperativo02 3-aprendizaje colaborativo-cooperativo
02 3-aprendizaje colaborativo-cooperativoLINA SILVA
 
Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009Ohio LETC
 
Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009Ohio LETC
 
Inovatie locala, impact global
Inovatie locala, impact globalInovatie locala, impact global
Inovatie locala, impact globalCostin Raiu
 
Shakespeare’s Theatre
Shakespeare’s TheatreShakespeare’s Theatre
Shakespeare’s Theatrejohnyap11
 

Destaque (9)

Sakai – what is changing
Sakai – what is changingSakai – what is changing
Sakai – what is changing
 
02 3-aprendizaje colaborativo-cooperativo
02 3-aprendizaje colaborativo-cooperativo02 3-aprendizaje colaborativo-cooperativo
02 3-aprendizaje colaborativo-cooperativo
 
Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009
 
PC osciloskop
PC osciloskopPC osciloskop
PC osciloskop
 
Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009
 
Finge.Unit1cross
Finge.Unit1crossFinge.Unit1cross
Finge.Unit1cross
 
Inovatie locala, impact global
Inovatie locala, impact globalInovatie locala, impact global
Inovatie locala, impact global
 
Shakespeare’s Theatre
Shakespeare’s TheatreShakespeare’s Theatre
Shakespeare’s Theatre
 
Solidarnost
SolidarnostSolidarnost
Solidarnost
 

Semelhante a Securing Africa - 2009-2010

Automated Targeted Attacks: The New Age of Cybercrime
Automated Targeted Attacks: The New Age of CybercrimeAutomated Targeted Attacks: The New Age of Cybercrime
Automated Targeted Attacks: The New Age of CybercrimeStefan Tanase
 
Malware * punct ro
Malware * punct roMalware * punct ro
Malware * punct roCostin Raiu
 
Surviving Today's Targeted Attacks
Surviving Today's Targeted AttacksSurviving Today's Targeted Attacks
Surviving Today's Targeted AttacksStefan Tanase
 
Bypassing malware detection mechanisms in online banking
Bypassing malware detection mechanisms in online bankingBypassing malware detection mechanisms in online banking
Bypassing malware detection mechanisms in online bankingJakub Kałużny
 
Today’s hidden dangers: Social networks under attack
Today’s hidden dangers: Social networks under attackToday’s hidden dangers: Social networks under attack
Today’s hidden dangers: Social networks under attackStefan Tanase
 
DevSecOps Done Right - Strategies and Tools.pptx
DevSecOps Done Right - Strategies and Tools.pptxDevSecOps Done Right - Strategies and Tools.pptx
DevSecOps Done Right - Strategies and Tools.pptxDavide Benvegnù
 
New Developments in the BREACH attack
New Developments in the BREACH attackNew Developments in the BREACH attack
New Developments in the BREACH attackE Hacking
 
Anderson montria mobile_presentationtemplate
Anderson montria mobile_presentationtemplateAnderson montria mobile_presentationtemplate
Anderson montria mobile_presentationtemplatemontria
 
Anderson montria mobile_presentation
Anderson montria mobile_presentationAnderson montria mobile_presentation
Anderson montria mobile_presentationmontria
 
Anderson montria mobile_presentation
Anderson montria mobile_presentationAnderson montria mobile_presentation
Anderson montria mobile_presentationmontria
 
The Savage Curtain: Mobile SSL Failures
The Savage Curtain: Mobile SSL FailuresThe Savage Curtain: Mobile SSL Failures
The Savage Curtain: Mobile SSL Failures☠Tony Trummer☠
 
MongoDB and MongoMK Source Event
MongoDB and MongoMK Source EventMongoDB and MongoMK Source Event
MongoDB and MongoMK Source EventYuval Ararat
 
7 ways of reducing tpm cost
7 ways of reducing tpm cost 7 ways of reducing tpm cost
7 ways of reducing tpm cost TradeInsight
 
Cat valorezi kaspersky
Cat valorezi kasperskyCat valorezi kaspersky
Cat valorezi kasperskyAgora Group
 
Presentation solid waste treatment plant for Africa Jan 14
Presentation solid waste treatment plant for Africa  Jan 14Presentation solid waste treatment plant for Africa  Jan 14
Presentation solid waste treatment plant for Africa Jan 14Kevin Austeen
 
Brighton SEO Talk Deck
Brighton SEO Talk DeckBrighton SEO Talk Deck
Brighton SEO Talk DeckKim Slade
 
Touch Video Academy Brighton SEO 2018 Talk
Touch Video Academy Brighton SEO 2018 TalkTouch Video Academy Brighton SEO 2018 Talk
Touch Video Academy Brighton SEO 2018 TalkKim Slade
 

Semelhante a Securing Africa - 2009-2010 (20)

Automated Targeted Attacks: The New Age of Cybercrime
Automated Targeted Attacks: The New Age of CybercrimeAutomated Targeted Attacks: The New Age of Cybercrime
Automated Targeted Attacks: The New Age of Cybercrime
 
Malware * punct ro
Malware * punct roMalware * punct ro
Malware * punct ro
 
Surviving Today's Targeted Attacks
Surviving Today's Targeted AttacksSurviving Today's Targeted Attacks
Surviving Today's Targeted Attacks
 
Bypassing malware detection mechanisms in online banking
Bypassing malware detection mechanisms in online bankingBypassing malware detection mechanisms in online banking
Bypassing malware detection mechanisms in online banking
 
Today’s hidden dangers: Social networks under attack
Today’s hidden dangers: Social networks under attackToday’s hidden dangers: Social networks under attack
Today’s hidden dangers: Social networks under attack
 
DevSecOps Done Right - Strategies and Tools.pptx
DevSecOps Done Right - Strategies and Tools.pptxDevSecOps Done Right - Strategies and Tools.pptx
DevSecOps Done Right - Strategies and Tools.pptx
 
New Developments in the BREACH attack
New Developments in the BREACH attackNew Developments in the BREACH attack
New Developments in the BREACH attack
 
Anderson montria mobile_presentationtemplate
Anderson montria mobile_presentationtemplateAnderson montria mobile_presentationtemplate
Anderson montria mobile_presentationtemplate
 
Microsoft Cloud Computing
Microsoft Cloud ComputingMicrosoft Cloud Computing
Microsoft Cloud Computing
 
Anderson montria mobile_presentation
Anderson montria mobile_presentationAnderson montria mobile_presentation
Anderson montria mobile_presentation
 
Anderson montria mobile_presentation
Anderson montria mobile_presentationAnderson montria mobile_presentation
Anderson montria mobile_presentation
 
The Savage Curtain: Mobile SSL Failures
The Savage Curtain: Mobile SSL FailuresThe Savage Curtain: Mobile SSL Failures
The Savage Curtain: Mobile SSL Failures
 
MongoDB and MongoMK Source Event
MongoDB and MongoMK Source EventMongoDB and MongoMK Source Event
MongoDB and MongoMK Source Event
 
7 ways of reducing tpm cost
7 ways of reducing tpm cost 7 ways of reducing tpm cost
7 ways of reducing tpm cost
 
Cat valorezi kaspersky
Cat valorezi kasperskyCat valorezi kaspersky
Cat valorezi kaspersky
 
Presentation solid waste treatment plant for Africa Jan 14
Presentation solid waste treatment plant for Africa  Jan 14Presentation solid waste treatment plant for Africa  Jan 14
Presentation solid waste treatment plant for Africa Jan 14
 
Seminário de Segurança em Informática - Microsoft
Seminário de Segurança em Informática - MicrosoftSeminário de Segurança em Informática - Microsoft
Seminário de Segurança em Informática - Microsoft
 
Seminário de Segurança em Informática - Apresentação Andrew Cushman
Seminário de Segurança em Informática - Apresentação Andrew Cushman Seminário de Segurança em Informática - Apresentação Andrew Cushman
Seminário de Segurança em Informática - Apresentação Andrew Cushman
 
Brighton SEO Talk Deck
Brighton SEO Talk DeckBrighton SEO Talk Deck
Brighton SEO Talk Deck
 
Touch Video Academy Brighton SEO 2018 Talk
Touch Video Academy Brighton SEO 2018 TalkTouch Video Academy Brighton SEO 2018 Talk
Touch Video Academy Brighton SEO 2018 Talk
 

Último

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Último (20)

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

Securing Africa - 2009-2010

  • 1. Click to edit Master title style • Click to edit Master text styles – Second level • Third level Securing Africa – Fourth level - get prepared for the future to come - » Fifth level Costin G. Raiu Chief Security Expert, Kaspersky Lab EEMEA craiu@kaspersky.ro
  • 2. Today’s agenda Click to edit Master title style • Click to edit Master text styles • The Threat Landscape: 2009 – Second level • The sidelevel • Third effects of increased bandwidth – Fourth level » Fifth level • 2010 – prevention is better than the cure • simple mitigation steps for safer computing
  • 3. Kaspersky Lab: number of signatures Click to edit Master title style 1600000 • Click to edit Master text styles 1400000 New threats per day: 30,000 – Second level 1200000 • Third level More than 3,500 new signatures/day 1000000 – Fourth level November 2009: +3 mil » Fifth level 800000 600000 400000 200000 0 Year 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008
  • 4. Internet threats – infected legitimate websites Click to edit Master title style 2,000 • Click to edit Master text styles 1,800 15,000% 1,600 – Second level growth vs 2006 1,400 • Third level 1,200 – Fourth level 1,000 » Fifth level 800 600 400 200 0 2006 2007 2008 2009 Infected legitimate websites out of a pool of 300K Source: Kaspersky Lab Analytical article http://www.viruslist.com/en/analysis?pubid=204792089
  • 5. “En masse” infections Click to edit Master title style Gumblar, 9-Ball: • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level
  • 6. Click tofiber optic connections Faster edit Master title style • Click to edit Master text styles Seacom – Second level ConnectsThird level • a large part of AfricaFourth level – with: – India » Fifth level – UK, France – UAE, Egypt Image source: mybroadband.co.za
  • 7. Seacom - Click to edit Master title style effects • Click to edit Master text styles + – Second level - Cheaper internet • Third level P2P networks access for allFourth level – file sharing Faster internet Fifth level » Pirate software connections Internet attacks Online commerce Image source: Seacom HQ c/o Linda Carter
  • 8. Click to social engineering attacks 2010 – edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level
  • 9. Click to social engineering attacks 2010 – edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level
  • 10. Mitigation steps Click to edit Master title style • Click to edit Master is better Prevention text styles than cure! • Install and levelan Internet Security Suite – Second run • Third level • Don’t assumelevel – Fourth a website is safe because it is high profile » Fifth level • Use an up-to-date, modern browser: IE8, FF 3.x, Chrome, Opera 10 • Keep Windows up-to-date • Always run the latest versions of Adobe Reader, Flash Player, MS Word, etc… • Be wary of messages from social networks
  • 11. Click to edit Master title style • Click to edit Master text styles – Second level The future is coming – be prepared! • Third level – Fourth level » Fifth level Thank you!