Your SlideShare is downloading. ×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Kaseya Connect 2011 - Malwarebytes - Marcin Kleczynski

791

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
791
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • * Malwarebytes’ Malware count from 2008 - 2011
  • * Perhaps add in a slide “Malwarebytes definition of malware” – Malware as full programs or applications designed to steal data, corrupt files or disrupt business. Viruses are simply malicious code that depends on infecting, changing, corrupting or patching applications and/or program files.
  • * Perhaps add in a slide “Malwarebytes definition of malware” – Malware as full programs or applications designed to steal data, corrupt files or disrupt business. Viruses are simply malicious code that depends on infecting, changing, corrupting or patching applications and/or program files.
  • Don’t take just our word for it. Other researchers and industry experts confirm what we are seeing. Scanning and Sampling Methodology: Panda Labs gathers data from millions of computers worldwide through its scanning service to give a statistically valid view of the security situation at the desktop. The scanned computers belong to both corporate and consumer users in more than 100 countries. Though the scanning system checks for many different kinds of potentially unwanted software, for this report, Panda Labs has segmented out ‘ Downloaders’ and ‘Banking Trojans/Password Stealers’ as they are most often associated with financial crimes such as automated phishing schemes. According to Luis Corrons, PandaLabs Technical Director and an APWG Trends Report contributing analyst, the proportion of infected computers has decreased (from 53 percent of desktops scanned in Q1 to just over 50 percent in Q2), but the infection rate is still is over 50 percent. That means, Corrons said, that Panda’s scanners have detected malware (active or latent) in half of all computers scanned. The percentage of computers infected with banking Trojans and Password Stealers rose to 17 more than percent from 15 percent in Q1. The percentage of Downloaders rose from under 8.3 percent to almost 8.4 percent in Q2.
  • Don’t take just our word for it. Other researchers and industry experts confirm what we are seeing. Scanning and Sampling Methodology: Panda Labs gathers data from millions of computers worldwide through its scanning service to give a statistically valid view of the security situation at the desktop. The scanned computers belong to both corporate and consumer users in more than 100 countries. Though the scanning system checks for many different kinds of potentially unwanted software, for this report, Panda Labs has segmented out ‘ Downloaders’ and ‘Banking Trojans/Password Stealers’ as they are most often associated with financial crimes such as automated phishing schemes. According to Luis Corrons, PandaLabs Technical Director and an APWG Trends Report contributing analyst, the proportion of infected computers has decreased (from 53 percent of desktops scanned in Q1 to just over 50 percent in Q2), but the infection rate is still is over 50 percent. That means, Corrons said, that Panda’s scanners have detected malware (active or latent) in half of all computers scanned. The percentage of computers infected with banking Trojans and Password Stealers rose to 17 more than percent from 15 percent in Q1. The percentage of Downloaders rose from under 8.3 percent to almost 8.4 percent in Q2.
  • Talking point: Discuss the approach of our industry leading malware removal capabilities. Two principals coming from a computer & technical support background working to simplify and automate how malware could be removed from systems by the average person. Second talking point: Majority of AV testing services will scan an archived pile of samples that are decades old. This is something we call “Right Click scanning”. Marcin can Describe the two protection modules and how they function in “Real World” situations.
  • Transcript

    • 1. Kaseya User Conference Over 5.0 Billion Pieces of Malware Detected, Removed and Counting!
    • 2.
      • Introduction – Hello!
      • Call me Marcin
      • Team members here who fight the good fight: Nick, Samuel, and Ron
      • The Malwarebytes Story
    • 3. What is Malware Anyway? “ Software is considered to be malware based on the perceived intent of the creator rather than any particular features. Malware includes computer viruses, worms, trojan horses, spyware, dishonest adware, scareware, crimeware, most rootkits, and other malicious or unwanted software or programs” – Wikipedia
    • 4. What is Malware Anyway? “ Malware as full programs or applications designed to steal data, corrupt files or disrupt business. Viruses are simply malicious code that depends on infecting, changing, corrupting or patching applications and/or program files.” – Malwarebytes Corp
    • 5.
      • Why Malware Hurts You
      • Data of all types is at Serious Risk!
        • Corporate Trade Secrets & Business Intelligence
        • Financial Information
        • Personal Information of Employees
      • Disrupts Day to Day Business!
        • Employee Productivity Slowed, in many cases Stopped
        • Recovery and Reimaging solutions take valuable time
      • In short: Expensive and Dangerous!!
    • 6.
      • Differences between Malware and a Virus
      • A virus is a subset of Malware
      • A virus corrupts or patches files on systems
      • Many people still believe a virus is the most common online threat
      • The Reality: Majority of today’s threats are MALWARE!
    • 7. Malware Industry Trends: Source: APWG Trends Report Q2 2010
    • 8.
      • Malware Industry Trends:
      • Trojans are currently the most common threat used to infect all types of customers.
      • IBM X-Force reports that trojans represent +55 % of the current threats during the first half of 2009. 
      • In the same report, viruses are less than 5% of samples.
      Source: IBM X-Force Threat Insight Report 1H09
    • 9.
      • Our Core Technologies
      • Malwarebytes Anti-Malware is our Flagship product!
      • Released in early 2008
      • Over 100 Million Downloads and growing!
      • Hundreds of Thousands of Satisfied Customers
      • 62,000 Likes on our Facebook Fan Page
    • 10.
      • Why You Need Anti-Malware Today
      • Traditional Antivirus (AV) is Not Enough!
      • Malwarebytes is designed to be an AV complement, not a full AV replacement
        • Targeting zero-day and “Pulled-From-Web” threats
        • Precise focus on threats where traditional Antivirus technologies fail
      • Layered Security Approach is always best
      • Dual Protection modules cover multiple attack vectors
    • 11. Our Research Team The MBAM Global Research Team is placed strategically around the world and made up of extremely dedicated professionals including Microsoft MVPs and former community volunteers. Our team is obsessed with protecting our community and stopping the bad guys, and in turn are very caffeinated! Photo Source: Artscoffee.com
    • 12.
      • Research Metholodogy – How Exactly?
      • Besides traditional research, we investigate Multiple Attack Vectors
      • Get infected just like a real user would:
        • P2P
        • Internet Browsing and Downloads
        • Clicking on online ads (malvertisements)
        • Plugging in an infected USB
    • 13.
      • What to Look for in an Anti-Malware Tool
      • Proven track record and reputation
        • Small & regular daily updates
        • Malware detection and removal capabilities
        • Fast & effective scans
        • Minimal impact to system resources
      • Must Provide Protection
        • Don’t blindly trust Anti-Virus Comparatives
        • Malware Research Group is conducting testing similar to our approach towards malware
        • Have seen threats that morph from once per hour to once per download (we got that covered)
    • 14.
      • Kaseya & Malwarebytes
      • Product integration with Kaseya Management Console
      • Kaseya team handles all 1 st level support (More of them)
      • For more technical details, be sure to catch Jeff Keyes and Jeff Keller’s talk later today on Kaseya Antivirus and Antimalware.
    • 15.
      • What’s Next For Us
      • Cloud Technologies
      • Additional Protection Engines
      • Enhancing Current Protection
        • Domain level versus IP level filtering
        • Heuristics Intelligence
      • Other services and tools that will help our community!
    • 16. Closing & Goodbyes Contact your Kaseya Rep for Pricing Still have questions? Email us at [email_address]

    ×