SlideShare uma empresa Scribd logo
1 de 41
Security Awareness Training


Would You Get Duped by Attackers?

Kevin Haley
Director, Symantec Security Technology And Response
   @kphaley
Symantec’s Security Awareness Quiz




   How well will you do?


                                     2
Which Website is More Dangerous?




         A                         B
                                       3
Most Harmful Websites by Categories




• Websites with poor security become easy targets for malware authors
• Any website you visit could potentially be infected with malware
                                                                        4
Can Macs Get Infected by Malware?




                                    5
Yes. Even Macs Get Infected.

  In 2012, 500,000 Macs were infected by 1 threat. Flashback




• Malware can figure out what type of computer you use
• Then it infects you with the appropriate malware
                                                               6
Which is More Likely to Get Attacked?


               A                  B



          Small or Medium   Large Organization
            Organization
                                                 7
Which is More Likely to Get Attacked?

  All sizes of organizations get attacked




           Small or Medium   Large Organization
             Organization
                                                  8
Who is Most Likely to be Targeted in an Attack?



           A                            B



    Typical Employee                   CEO

                                                  9
Who is Most Likely to be Targeted in an Attack?

                          Both




Only 25% of targeted attacks directed at C-Level executives
                                                         10
Are You at Risk From This Website?




                                     11
Do You See it Now?




                     12
Would You be Fooled by This?




How About by This?

        twitter.dsdsdds.com/main/sessions-login/


     If something seems wrong take a closer look

     Attackers can’t fool all the people all the time
                                                        13
Double Click to Edit Following Text Areas;
Are You   Expecting a Package? Subject, Date, Body
              Window Title, From, To,




                From:        UPS                                                             Sent: Mon 6/4/2012 4:08 PM
                To:          Kevin Haley
                Cc:
                Subject:     Unable to Deliver Package


                    Dan,

                    I have been a Weyerhaeuser shareholder since late 2008 and recently had the
                    opportunity to attend your Annual Shareholders’ Meeting at your headquarters. I spoke
                    to you briefly after your address and it was pleasure to hear from you about all of
                    Weyerhaeuser’s innovations.
                    I also never realized that Clint Eastwood was once an employee of the company – now it
                    makes sense why I like him so much!

                    I posted this picture from your address, I hope you like it.




                                                                                                                          14
Double Click to Edit Following Text Areas;
Did You   Have Trouble LoggingSubject, Date, Body
             Window Title, From, To,
                                        Into Facebook?



                From:        Facebook                                                        Sent: Mon 6/4/2012 4:08 PM
                To:          Kevin Haley
                Cc:
                Subject:     Login Problem


                    Dan,

                    I have been a Weyerhaeuser shareholder since late 2008 and recently had the
                    opportunity to attend your Annual Shareholders’ Meeting at your headquarters. I spoke
                    to you briefly after your address and it was pleasure to hear from you about all of
                    Weyerhaeuser’s innovations.
                    I also never realized that Clint Eastwood was once an employee of the company – now it
                    makes sense why I like him so much!

                    I posted this picture from your address, I hope you like it.




                                                                                                                          15
Double Click to Edit Following Text Areas;
Would Your   Bank Really WantSubject, Date, Body
             Window Title, From, To,
                                       You to Click Here?



              From:        YourBank                                                        Sent: Mon 6/4/2012 4:08 PM
              To:          Kevin Haley
              Cc:
              Subject:     Account Issue


                  Dan,

                                                              You can ensure your
                  I have been a Weyerhaeuser shareholder since late 2008 and recently had the
                         Your Bank
                  opportunity to attend your Annual Shareholders’ Meeting at your headquarters. I spoke
                                                              bank account is okay
                  to you briefly after your address and it was pleasure to hear from you about all of
                  Weyerhaeuser’s innovations.
                  I also never realized that Clint Eastwood was once an employee of the company – now it
                  makes sense why I like him so much!

                  I posted this picture from your address, I hope you like it.




                                                                                                                        16
Then Don’t Click!




                    17
How Likely is it That Someone Posted Your Pic Online?




                                                        18
How Likely is it That Someone Posted Your Pic Online?

                    Not Very




      But it’s very likely that malware is
             at the end of that link
                                                        19
This is All Social Engineering




   That’s a fancy way of saying you’re being fooled

                                                      20
Which of These is a Real Person?




     A                    B        C
                                       21
Which of These is a Real Person?



                 James Stavridis is the commander of NATO

                 He created his own Facebook page after he
                 found someone on Facebook pretending to
                 be him


     A           People may not be who they say they are
                 on the Internet



                                                             22
Which of These is Most Likely to be a Facebook Scam?




     OMG!              Profile          Dislike
     Videos           Viewers           Buttons


      A                 B                  C
                                                       23
Which of These is Most Likely to be a Facebook Scam?




     OMG!              Profile          Dislike
     Videos           Viewers           Buttons



                  All of Them

                                                       24
Which of These is Most Likely to be a Facebook Scam?

                  Bad Guys Want to Get Us to Click to:
                   • Infect us with malware
                   • Make us take bogus surveys to:
                     • Gain information or
                     • Sign us up for premium SMS services
     OMG!
                   • Send spam to us and our friends
     Videos



    OMG! Videos Get People to Click

                                                         25
Which of These is Most Likely to be a Facebook Scam?




     Profile
    Viewers


 Bad guys know that people want to know
     who viewed their Facebook page
                                                       26
Which of These is Most Likely to be a Facebook Scam?




    Dislike
    Buttons


     Bad guys know that people want a
               dislike button
                                                       27
Which of These is Most Likely to be a Facebook Scam?




     OMG!              Profile          Dislike
     Videos           Viewers           Buttons


 They can’t give us these things, but they
    can fool us into thinking they can
                                                       28
What Are Your Chances of Getting Your Lost Phone Back?




                                                   29
What Are Your Chances of Getting Your Lost Phone Back?




Source: Symantec’s “Project HoneyStick” research
http://www.symantec.com/about/news/resources/press_kits/detail.jsp?pkid=symantec-smartphone-honey-stick-project

                                                                                                                  30
What are the Chances of Your Work and Personal
Information Being Looked at?




                                                 31
What are the Chances of Your Work and Personal
Information Being Looked at?




Source: Symantec’s “Project HoneyStick” research
http://www.symantec.com/about/news/resources/press_kits/detail.jsp?pkid=symantec-smartphone-honey-stick-project

                                                                                                                  32
How Many New Pieces of Malware are Created Each Day?



   A 1,000
    B 100,000
    C 1,000,000
                                                 33
How Many New Pieces of Malware are Created Each Day?


• 1 million+ new pieces of malware are created every day
• In 2011 we saw 403 million new pieces of malware




    C 1,000,000
                                                       34
Why?




• Bad guys have tools to easily create and distribute new threats
• Some of these tool kits can create malware-on-demand




                                                                    35
Does it Seem Pretty Bad Out There?




• Symantec and Norton have good tips on protecting yourself and
  your business
• But … if you need it simplified, remember these 3 things …


                                                              36
You don’t have to give up
using the Internet…



There are ways to protect
yourself.




                            37
What your mother told you
is still true…



If something doesn’t seem
right, it probably isn’t.




                            38
Get help from experts…



We hope it’s from Symantec
and Norton.




                             39
Additional Resources



  If You Are More Technical        If You Are Less Technical
Internet Security Threat Report   Norton Security Center
Symantec Security Response        Norton Family Resources
  Website
Advanced Persistent Threat
  Website
Malicious Insider White Paper
Twitter.com/threatintel


                                                               40
Thank you!
Kevin Haley
   @kphaley




Copyright © 2012 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec
Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.


                                                                                                                                                                                        41

Mais conteúdo relacionado

Semelhante a Symantec Security Awareness October 2012

Don't Change Infront of an Open Window and Other Real World Advice To Use Online
Don't Change Infront of an Open Window and Other Real World Advice To Use OnlineDon't Change Infront of an Open Window and Other Real World Advice To Use Online
Don't Change Infront of an Open Window and Other Real World Advice To Use OnlineKrista Neher
 
Chapter 1 Essay Instructions
Chapter 1 Essay InstructionsChapter 1 Essay Instructions
Chapter 1 Essay InstructionsApril Smith
 
Incorporating Video Into Non-Profit Messaging
Incorporating Video Into Non-Profit MessagingIncorporating Video Into Non-Profit Messaging
Incorporating Video Into Non-Profit MessagingSee3 Communications
 
Get your facebook out of my twitter
Get your facebook out of my twitterGet your facebook out of my twitter
Get your facebook out of my twitterprofessormedic
 
Bridge Conference - Fundraising 2.0 Session
Bridge Conference - Fundraising 2.0 SessionBridge Conference - Fundraising 2.0 Session
Bridge Conference - Fundraising 2.0 SessionBeth Kanter
 
Essay On Energy Conservation And Management
Essay On Energy Conservation And ManagementEssay On Energy Conservation And Management
Essay On Energy Conservation And ManagementMissy Hanten
 
Corp Web Risks and Concerns
Corp Web Risks and ConcernsCorp Web Risks and Concerns
Corp Web Risks and ConcernsPINT Inc
 
On Being HUMAN: The Importance of Writing More Engaging Emails (and more! )
On Being HUMAN: The Importance of Writing More Engaging Emails (and more!	)On Being HUMAN: The Importance of Writing More Engaging Emails (and more!	)
On Being HUMAN: The Importance of Writing More Engaging Emails (and more! )DJ Waldow
 
Viral marketing
Viral marketingViral marketing
Viral marketingtdcjackson
 
Example Of A Persuasive Essay For High School
Example Of A Persuasive Essay For High SchoolExample Of A Persuasive Essay For High School
Example Of A Persuasive Essay For High SchoolKrystal Bultman
 
I Suck At Writing Essays RMemes. Online assignment writing service.
I Suck At Writing Essays  RMemes. Online assignment writing service.I Suck At Writing Essays  RMemes. Online assignment writing service.
I Suck At Writing Essays RMemes. Online assignment writing service.Nora Hernandez
 
Med122 viral media long
Med122 viral media longMed122 viral media long
Med122 viral media longRob Jewitt
 
8 Things Your CEO Needs to Know Right Now About Social Media Tourism Trends i...
8 Things Your CEO Needs to Know Right Now About Social Media Tourism Trends i...8 Things Your CEO Needs to Know Right Now About Social Media Tourism Trends i...
8 Things Your CEO Needs to Know Right Now About Social Media Tourism Trends i...Chad Wiebesick
 
Finding the job through social media
Finding the job through social mediaFinding the job through social media
Finding the job through social mediaLeif Kajrup
 
Leveraging Social Media, PR and Internal Comms 2010 - Lars Voedisch
Leveraging Social Media, PR and Internal Comms 2010 - Lars VoedischLeveraging Social Media, PR and Internal Comms 2010 - Lars Voedisch
Leveraging Social Media, PR and Internal Comms 2010 - Lars VoedischLars Voedisch
 

Semelhante a Symantec Security Awareness October 2012 (20)

Don't Change Infront of an Open Window and Other Real World Advice To Use Online
Don't Change Infront of an Open Window and Other Real World Advice To Use OnlineDon't Change Infront of an Open Window and Other Real World Advice To Use Online
Don't Change Infront of an Open Window and Other Real World Advice To Use Online
 
Chapter 1 Essay Instructions
Chapter 1 Essay InstructionsChapter 1 Essay Instructions
Chapter 1 Essay Instructions
 
Incorporating Video Into Non-Profit Messaging
Incorporating Video Into Non-Profit MessagingIncorporating Video Into Non-Profit Messaging
Incorporating Video Into Non-Profit Messaging
 
Get your facebook out of my twitter
Get your facebook out of my twitterGet your facebook out of my twitter
Get your facebook out of my twitter
 
Bridge Conference - Fundraising 2.0 Session
Bridge Conference - Fundraising 2.0 SessionBridge Conference - Fundraising 2.0 Session
Bridge Conference - Fundraising 2.0 Session
 
Essay On Energy Conservation And Management
Essay On Energy Conservation And ManagementEssay On Energy Conservation And Management
Essay On Energy Conservation And Management
 
Corp Web Risks and Concerns
Corp Web Risks and ConcernsCorp Web Risks and Concerns
Corp Web Risks and Concerns
 
Intro to social media
Intro to social mediaIntro to social media
Intro to social media
 
Web 2.0 What's Now
Web 2.0 What's NowWeb 2.0 What's Now
Web 2.0 What's Now
 
Birddog @ oi15
Birddog @ oi15Birddog @ oi15
Birddog @ oi15
 
On Being HUMAN: The Importance of Writing More Engaging Emails (and more! )
On Being HUMAN: The Importance of Writing More Engaging Emails (and more!	)On Being HUMAN: The Importance of Writing More Engaging Emails (and more!	)
On Being HUMAN: The Importance of Writing More Engaging Emails (and more! )
 
Viral marketing
Viral marketingViral marketing
Viral marketing
 
Example Of A Persuasive Essay For High School
Example Of A Persuasive Essay For High SchoolExample Of A Persuasive Essay For High School
Example Of A Persuasive Essay For High School
 
I Suck At Writing Essays RMemes. Online assignment writing service.
I Suck At Writing Essays  RMemes. Online assignment writing service.I Suck At Writing Essays  RMemes. Online assignment writing service.
I Suck At Writing Essays RMemes. Online assignment writing service.
 
Crisis Management: Writing for Crisis
Crisis Management: Writing for CrisisCrisis Management: Writing for Crisis
Crisis Management: Writing for Crisis
 
Med122 viral media long
Med122 viral media longMed122 viral media long
Med122 viral media long
 
8 Things Your CEO Needs to Know Right Now About Social Media Tourism Trends i...
8 Things Your CEO Needs to Know Right Now About Social Media Tourism Trends i...8 Things Your CEO Needs to Know Right Now About Social Media Tourism Trends i...
8 Things Your CEO Needs to Know Right Now About Social Media Tourism Trends i...
 
Finding the job through social media
Finding the job through social mediaFinding the job through social media
Finding the job through social media
 
Content Marketing Master Class - New York
Content Marketing Master Class - New York Content Marketing Master Class - New York
Content Marketing Master Class - New York
 
Leveraging Social Media, PR and Internal Comms 2010 - Lars Voedisch
Leveraging Social Media, PR and Internal Comms 2010 - Lars VoedischLeveraging Social Media, PR and Internal Comms 2010 - Lars Voedisch
Leveraging Social Media, PR and Internal Comms 2010 - Lars Voedisch
 

Mais de Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

Mais de Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Último

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Último (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Symantec Security Awareness October 2012

  • 1. Security Awareness Training Would You Get Duped by Attackers? Kevin Haley Director, Symantec Security Technology And Response @kphaley
  • 2. Symantec’s Security Awareness Quiz How well will you do? 2
  • 3. Which Website is More Dangerous? A B 3
  • 4. Most Harmful Websites by Categories • Websites with poor security become easy targets for malware authors • Any website you visit could potentially be infected with malware 4
  • 5. Can Macs Get Infected by Malware? 5
  • 6. Yes. Even Macs Get Infected. In 2012, 500,000 Macs were infected by 1 threat. Flashback • Malware can figure out what type of computer you use • Then it infects you with the appropriate malware 6
  • 7. Which is More Likely to Get Attacked? A B Small or Medium Large Organization Organization 7
  • 8. Which is More Likely to Get Attacked? All sizes of organizations get attacked Small or Medium Large Organization Organization 8
  • 9. Who is Most Likely to be Targeted in an Attack? A B Typical Employee CEO 9
  • 10. Who is Most Likely to be Targeted in an Attack? Both Only 25% of targeted attacks directed at C-Level executives 10
  • 11. Are You at Risk From This Website? 11
  • 12. Do You See it Now? 12
  • 13. Would You be Fooled by This? How About by This? twitter.dsdsdds.com/main/sessions-login/ If something seems wrong take a closer look Attackers can’t fool all the people all the time 13
  • 14. Double Click to Edit Following Text Areas; Are You Expecting a Package? Subject, Date, Body Window Title, From, To, From: UPS Sent: Mon 6/4/2012 4:08 PM To: Kevin Haley Cc: Subject: Unable to Deliver Package Dan, I have been a Weyerhaeuser shareholder since late 2008 and recently had the opportunity to attend your Annual Shareholders’ Meeting at your headquarters. I spoke to you briefly after your address and it was pleasure to hear from you about all of Weyerhaeuser’s innovations. I also never realized that Clint Eastwood was once an employee of the company – now it makes sense why I like him so much! I posted this picture from your address, I hope you like it. 14
  • 15. Double Click to Edit Following Text Areas; Did You Have Trouble LoggingSubject, Date, Body Window Title, From, To, Into Facebook? From: Facebook Sent: Mon 6/4/2012 4:08 PM To: Kevin Haley Cc: Subject: Login Problem Dan, I have been a Weyerhaeuser shareholder since late 2008 and recently had the opportunity to attend your Annual Shareholders’ Meeting at your headquarters. I spoke to you briefly after your address and it was pleasure to hear from you about all of Weyerhaeuser’s innovations. I also never realized that Clint Eastwood was once an employee of the company – now it makes sense why I like him so much! I posted this picture from your address, I hope you like it. 15
  • 16. Double Click to Edit Following Text Areas; Would Your Bank Really WantSubject, Date, Body Window Title, From, To, You to Click Here? From: YourBank Sent: Mon 6/4/2012 4:08 PM To: Kevin Haley Cc: Subject: Account Issue Dan, You can ensure your I have been a Weyerhaeuser shareholder since late 2008 and recently had the Your Bank opportunity to attend your Annual Shareholders’ Meeting at your headquarters. I spoke bank account is okay to you briefly after your address and it was pleasure to hear from you about all of Weyerhaeuser’s innovations. I also never realized that Clint Eastwood was once an employee of the company – now it makes sense why I like him so much! I posted this picture from your address, I hope you like it. 16
  • 18. How Likely is it That Someone Posted Your Pic Online? 18
  • 19. How Likely is it That Someone Posted Your Pic Online? Not Very But it’s very likely that malware is at the end of that link 19
  • 20. This is All Social Engineering That’s a fancy way of saying you’re being fooled 20
  • 21. Which of These is a Real Person? A B C 21
  • 22. Which of These is a Real Person? James Stavridis is the commander of NATO He created his own Facebook page after he found someone on Facebook pretending to be him A People may not be who they say they are on the Internet 22
  • 23. Which of These is Most Likely to be a Facebook Scam? OMG! Profile Dislike Videos Viewers Buttons A B C 23
  • 24. Which of These is Most Likely to be a Facebook Scam? OMG! Profile Dislike Videos Viewers Buttons All of Them 24
  • 25. Which of These is Most Likely to be a Facebook Scam? Bad Guys Want to Get Us to Click to: • Infect us with malware • Make us take bogus surveys to: • Gain information or • Sign us up for premium SMS services OMG! • Send spam to us and our friends Videos OMG! Videos Get People to Click 25
  • 26. Which of These is Most Likely to be a Facebook Scam? Profile Viewers Bad guys know that people want to know who viewed their Facebook page 26
  • 27. Which of These is Most Likely to be a Facebook Scam? Dislike Buttons Bad guys know that people want a dislike button 27
  • 28. Which of These is Most Likely to be a Facebook Scam? OMG! Profile Dislike Videos Viewers Buttons They can’t give us these things, but they can fool us into thinking they can 28
  • 29. What Are Your Chances of Getting Your Lost Phone Back? 29
  • 30. What Are Your Chances of Getting Your Lost Phone Back? Source: Symantec’s “Project HoneyStick” research http://www.symantec.com/about/news/resources/press_kits/detail.jsp?pkid=symantec-smartphone-honey-stick-project 30
  • 31. What are the Chances of Your Work and Personal Information Being Looked at? 31
  • 32. What are the Chances of Your Work and Personal Information Being Looked at? Source: Symantec’s “Project HoneyStick” research http://www.symantec.com/about/news/resources/press_kits/detail.jsp?pkid=symantec-smartphone-honey-stick-project 32
  • 33. How Many New Pieces of Malware are Created Each Day? A 1,000 B 100,000 C 1,000,000 33
  • 34. How Many New Pieces of Malware are Created Each Day? • 1 million+ new pieces of malware are created every day • In 2011 we saw 403 million new pieces of malware C 1,000,000 34
  • 35. Why? • Bad guys have tools to easily create and distribute new threats • Some of these tool kits can create malware-on-demand 35
  • 36. Does it Seem Pretty Bad Out There? • Symantec and Norton have good tips on protecting yourself and your business • But … if you need it simplified, remember these 3 things … 36
  • 37. You don’t have to give up using the Internet… There are ways to protect yourself. 37
  • 38. What your mother told you is still true… If something doesn’t seem right, it probably isn’t. 38
  • 39. Get help from experts… We hope it’s from Symantec and Norton. 39
  • 40. Additional Resources If You Are More Technical If You Are Less Technical Internet Security Threat Report Norton Security Center Symantec Security Response Norton Family Resources Website Advanced Persistent Threat Website Malicious Insider White Paper Twitter.com/threatintel 40
  • 41. Thank you! Kevin Haley @kphaley Copyright © 2012 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 41

Notas do Editor

  1. Quiz question – which is more dangerous?It’s not what we used to think.We’ve been telling people that “bad” sites are dangerous … but one of the most interesting pieces of data is that religious sites are more likely to infect you than an adult site
  2. This chart is from the ISTR 17 (April 2012)Looked at sites that were infected – how many pieces of malware were on each of these sitesAlmost 5x more malware on religious sites than on adult sitesTakeaway? Sites with poor security become an easy target – sites are beginning to realize that if their sites are infected, people won’t visit. Adult websites are businesses – they have learned that if they infect their customers, they wont’ get repeat visits, so they are working hard to keep their sites cleanMessage for SMBs – you need to protect your site or you will become a host for malware and customers will go elsewhere
  3. This is one of the key assumptions … Anybody that has gone into an SMB has heard this – that they don’t believe they are a target.
  4. This is one of the key assumptions … Anybody that has gone into an SMB has heard this – that they don’t believe they are a target.
  5. Assumption 2 – only executives are targeted
  6. This shows targeted attacks by the target’s occupation …Executives seem to be a big chunk … but …
  7. So, spam is down and vulnerabilities are down, but malware is up. Why?Attack toolkits continue to flourish – they use existing vulnerabilities – the malware authors use those vulnerabilities that work – they focus on the vulns that are not patchedThis chart at the bottom looks at toolkits that were in use in 2011 – Blackhole was a big one and another was NumDir (not named)Toolkit authors trying to go a bit more undercover than in the past – trying to lower their profile – they are also moving to service model like legit SW – think of it like cloud computing for malware authors – they are not handing out SW as in the past