Protecting the irreplaceable | f-secure.com
Threat Eye-OpenerBryan Ford – Head of Operator SalesAugust 15th, 2012Protecting the irreplaceable | f-secure.com
Agenda• Definition of Terms• History of Malware• Recent Attacks – Stuxnet & Ghost Click• Online Safety Tips• Mobile Threat...
Industry Terms• Malware - Software that is intended to damage or disable computers and  computer systems• Botnets - A botn...
We used to be fighting these...• Chen-Ing Hau                              Joseph McElroy         Benny  Author of        ...
Case Tariq al-Daour| © August 15, 2012, F-Secure Corporation
Malware Trends| © August 15, 2012, F-Secure Corporation
Malware Trends Number of malware                                            •   Numbers continue to rise                  ...
Malware Trends| © August 15, 2012, F-Secure Corporation
Malware Trends• Malware writing is becoming more professional| © August 15, 2012, F-Secure Corporation
Malware Trends• Malware writing is becoming more professional• Previously undiscovered vulnerabilities are worth a lot on ...
Malware Trends• Previously undiscovered vulnerabilities are worth a lot on the black market| © August 15, 2012, F-Secure C...
Malware TrendsQ: How expensive would such vulnerabilities be?| © August 15, 2012, F-Secure Corporation
Malware TrendsA: A single form of malware in a popular version ofWindows could go for anything between $50,000 to$500,000....
Malware Trends• The aims are simple and depend on the group involved:• Money from spam, scams and fakes• Hacktivism to inc...
Malware Trends• The aims are simple and depend on the group involved:• Money from spam, scams and fakes• Hacktivism to inc...
Malware Trends• Money from spam, scams and fakes• Hacktivism to increase public exposure of an issue| © August 15, 2012, F...
Malware Trends• Hacktivism to increase public exposure of an issue| © August 15, 2012, F-Secure Corporation
Malware Trends| © August 15, 2012, F-Secure Corporation
| © August 15, 2012, F-Secure Corporation
| © August 15, 2012, F-Secure Corporation
Malware trends| © August 15, 2012, F-Secure Corporation
Malware trendsCase:| © August 15, 2012, F-Secure Corporation
Malware trendsCase:Stuxnet| © August 15, 2012, F-Secure Corporation
Malware trendsCase:StuxnetMore information:| © August 15, 2012, F-Secure Corporation
Malware trendsCase:StuxnetMore information:http://www.f-secure.com/weblog/archives/00002066.html| © August 15, 2012, F-Sec...
Malware trendsCase:StuxnetMore information:http://www.f-secure.com/weblog/archives/00002066.html| © August 15, 2012, F-Sec...
Malware trendsCase:”Ghost Click”More information:http://www.f-secure.com/weblog/archives/00002268.html| © August 15, 2012,...
Malware trendsCase:”Ghost Click”More information:http://www.f-secure.com/weblog/archives/00002268.html| © August 15, 2012,...
Safer online banking| © August 15, 2012, F-Secure Corporation
Safer online banking| © August 15, 2012, F-Secure Corporation
Safer online banking       • Banks provide safety instuctions       • No pop-ups       • PIN only asked once       • https...
Safer online banking       • Banks provide safety instuctions       • No pop-ups       • PIN only asked once       • https...
Safer online banking       • Banks provide safety instuctions       • No pop-ups       • PIN only asked once       • https...
Safer social networking| © August 15, 2012, F-Secure Corporation
Safer social networking| © August 15, 2012, F-Secure Corporation
Safer social networking • Danger of revealing too much • Caution with personal details • Pictures stay on the Internet for...
Safer social networking • Danger of revealing too much • Caution with personal details • Pictures stay on the Internet for...
Safer social networking • Danger of revealing too much • Caution with personal details • Pictures stay on the Internet for...
Safer social networking • Danger of revealing too much • Caution with personal details • Pictures stay on the Internet for...
Well-being in a mobile world| © August 15, 2012, F-Secure Corporation
Well-being in a mobile world• Lots of information on your mobile• Crime against Android multiplying• Malware via Bluetooth...
Well-being in a mobile world• Lots of information on your mobile• Crime against Android multiplying• Malware via Bluetooth...
Well-being in a mobile world• Lots of information on your mobile• Crime against Android multiplying• Malware via Bluetooth...
Well-being in a mobile world• Lots of information on your mobile• Crime against Android multiplying• Malware via Bluetooth...
Well-being in a mobile world• Lots of information on your mobile• Crime against Android multiplying• Malware via Bluetooth...
Frontier Secure – Max Security•       Single Integrated product :    •     Antivirus Protection    •     Anti Spyware    •...
Q&Awww.frontier.com/security| © August 15, 2012, F-Secure Corporation
Brought to you by:A MORE DEDICATED CONNECTION Thank You Call: 1-866-408-0233
Upcoming SlideShare
Loading in...5
×

Security for Small Business

322

Published on

A presentation on security for small businesses presented by F-Secure.

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
322
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Security for Small Business

  1. 1. Protecting the irreplaceable | f-secure.com
  2. 2. Threat Eye-OpenerBryan Ford – Head of Operator SalesAugust 15th, 2012Protecting the irreplaceable | f-secure.com
  3. 3. Agenda• Definition of Terms• History of Malware• Recent Attacks – Stuxnet & Ghost Click• Online Safety Tips• Mobile Threats• Frontier Secure• Q&A| © August 15, 2012, F-Secure Corporation
  4. 4. Industry Terms• Malware - Software that is intended to damage or disable computers and computer systems• Botnets - A botnet is a collection of internet-connected computers whose security defenses have been breached and control ceded to an unknown party• SSL - (Secure Sockets Layer) is the standard security technology for establishing an encrypted link between a web server and a browser| © August 15, 2012, F-Secure Corporation
  5. 5. We used to be fighting these...• Chen-Ing Hau Joseph McElroy Benny Author of Hacked the Fermi lab Ex-29A the CIH virus network| © August 15, 2012, F-Secure Corporation
  6. 6. Case Tariq al-Daour| © August 15, 2012, F-Secure Corporation
  7. 7. Malware Trends| © August 15, 2012, F-Secure Corporation
  8. 8. Malware Trends Number of malware • Numbers continue to rise exponentially| © August 15, 2012, F-Secure Corporation
  9. 9. Malware Trends| © August 15, 2012, F-Secure Corporation
  10. 10. Malware Trends• Malware writing is becoming more professional| © August 15, 2012, F-Secure Corporation
  11. 11. Malware Trends• Malware writing is becoming more professional• Previously undiscovered vulnerabilities are worth a lot on the black market| © August 15, 2012, F-Secure Corporation
  12. 12. Malware Trends• Previously undiscovered vulnerabilities are worth a lot on the black market| © August 15, 2012, F-Secure Corporation
  13. 13. Malware TrendsQ: How expensive would such vulnerabilities be?| © August 15, 2012, F-Secure Corporation
  14. 14. Malware TrendsA: A single form of malware in a popular version ofWindows could go for anything between $50,000 to$500,000.| © August 15, 2012, F-Secure Corporation
  15. 15. Malware Trends• The aims are simple and depend on the group involved:• Money from spam, scams and fakes• Hacktivism to increase public exposure of an issue| © August 15, 2012, F-Secure Corporation
  16. 16. Malware Trends• The aims are simple and depend on the group involved:• Money from spam, scams and fakes• Hacktivism to increase public exposure of an issue| © August 15, 2012, F-Secure Corporation
  17. 17. Malware Trends• Money from spam, scams and fakes• Hacktivism to increase public exposure of an issue| © August 15, 2012, F-Secure Corporation
  18. 18. Malware Trends• Hacktivism to increase public exposure of an issue| © August 15, 2012, F-Secure Corporation
  19. 19. Malware Trends| © August 15, 2012, F-Secure Corporation
  20. 20. | © August 15, 2012, F-Secure Corporation
  21. 21. | © August 15, 2012, F-Secure Corporation
  22. 22. Malware trends| © August 15, 2012, F-Secure Corporation
  23. 23. Malware trendsCase:| © August 15, 2012, F-Secure Corporation
  24. 24. Malware trendsCase:Stuxnet| © August 15, 2012, F-Secure Corporation
  25. 25. Malware trendsCase:StuxnetMore information:| © August 15, 2012, F-Secure Corporation
  26. 26. Malware trendsCase:StuxnetMore information:http://www.f-secure.com/weblog/archives/00002066.html| © August 15, 2012, F-Secure Corporation
  27. 27. Malware trendsCase:StuxnetMore information:http://www.f-secure.com/weblog/archives/00002066.html| © August 15, 2012, F-Secure Corporation
  28. 28. Malware trendsCase:”Ghost Click”More information:http://www.f-secure.com/weblog/archives/00002268.html| © August 15, 2012, F-Secure Corporation
  29. 29. Malware trendsCase:”Ghost Click”More information:http://www.f-secure.com/weblog/archives/00002268.html| © August 15, 2012, F-Secure Corporation
  30. 30. Safer online banking| © August 15, 2012, F-Secure Corporation
  31. 31. Safer online banking| © August 15, 2012, F-Secure Corporation
  32. 32. Safer online banking • Banks provide safety instuctions • No pop-ups • PIN only asked once • https:// address (Hypertext Transfer Protocol over Secure Socket Layer) • always when banking and dealing with credit card number in an online store • Paying with credit card or online payment service provider (PayPal) is safer| © August 15, 2012, F-Secure Corporation
  33. 33. Safer online banking • Banks provide safety instuctions • No pop-ups • PIN only asked once • https:// address (Hypertext Transfer Protocol over Secure Socket Layer) • always when banking and dealing with credit card number in an online store • Paying with credit card or online payment service provider (PayPal) is safer| © August 15, 2012, F-Secure Corporation
  34. 34. Safer online banking • Banks provide safety instuctions • No pop-ups • PIN only asked once • https:// address (Hypertext Transfer Protocol over Secure Socket Layer) • always when banking and dealing with credit card number in an online store • Paying with credit card or online payment service provider (PayPal) is safer| © August 15, 2012, F-Secure Corporation
  35. 35. Safer social networking| © August 15, 2012, F-Secure Corporation
  36. 36. Safer social networking| © August 15, 2012, F-Secure Corporation
  37. 37. Safer social networking • Danger of revealing too much • Caution with personal details • Pictures stay on the Internet forever • Privacy? • Privacy settings • Strong passwords • Identity theft, spam, targeted attacks • Maintaining a good reputation| © August 15, 2012, F-Secure Corporation
  38. 38. Safer social networking • Danger of revealing too much • Caution with personal details • Pictures stay on the Internet forever • Privacy? • Privacy settings • Strong passwords • Identity theft, spam, targeted attacks • Maintaining a good reputation| © August 15, 2012, F-Secure Corporation
  39. 39. Safer social networking • Danger of revealing too much • Caution with personal details • Pictures stay on the Internet forever • Privacy? • Privacy settings • Strong passwords • Identity theft, spam, targeted attacks • Maintaining a good reputation| © August 15, 2012, F-Secure Corporation
  40. 40. Safer social networking • Danger of revealing too much • Caution with personal details • Pictures stay on the Internet forever • Privacy? • Privacy settings • Strong passwords • Identity theft, spam, targeted attacks • Maintaining a good reputation| © August 15, 2012, F-Secure Corporation
  41. 41. Well-being in a mobile world| © August 15, 2012, F-Secure Corporation
  42. 42. Well-being in a mobile world• Lots of information on your mobile• Crime against Android multiplying• Malware via Bluetooth and web download• Spy-tools• Recording• Monitoring calls, SMS, multimedia, email• Locating phone via GPS| © August 15, 2012, F-Secure Corporation
  43. 43. Well-being in a mobile world• Lots of information on your mobile• Crime against Android multiplying• Malware via Bluetooth and web download• Spy-tools• Recording• Monitoring calls, SMS, multimedia, email• Locating phone via GPS| © August 15, 2012, F-Secure Corporation
  44. 44. Well-being in a mobile world• Lots of information on your mobile• Crime against Android multiplying• Malware via Bluetooth and web download• Spy-tools• Recording• Monitoring calls, SMS, multimedia, email• Locating phone via GPS| © August 15, 2012, F-Secure Corporation
  45. 45. Well-being in a mobile world• Lots of information on your mobile• Crime against Android multiplying• Malware via Bluetooth and web download• Spy-tools• Recording• Monitoring calls, SMS, multimedia, email• Locating phone via GPS| © August 15, 2012, F-Secure Corporation
  46. 46. Well-being in a mobile world• Lots of information on your mobile• Crime against Android multiplying• Malware via Bluetooth and web download• Spy-tools• Recording• Monitoring calls, SMS, multimedia, email• Locating phone via GPS| © August 15, 2012, F-Secure Corporation
  47. 47. Frontier Secure – Max Security• Single Integrated product : • Antivirus Protection • Anti Spyware • Personal Firewall • Browsing Protection • Spam Filtering • Automatic Updates• Live 24/7 Support• PC & Mac Support| © August 15, 2012, F-Secure Corporation
  48. 48. Q&Awww.frontier.com/security| © August 15, 2012, F-Secure Corporation
  49. 49. Brought to you by:A MORE DEDICATED CONNECTION Thank You Call: 1-866-408-0233
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×