Anatomy of a Malware Attack: The New Malware Ecosystem

2,238 views
2,125 views

Published on

Today the threat has changed. Hackers are no longer kids trying to create a name for themselves; they're professionals with a vast network and are capable of increasingly sophisticated and highly targeted attacks. In fact, many of today's attacks are so stealth that the victims may not even realize their systems have been compromised for days, weeks or even months. So how do organizations address malware attacks as part of their overall risk management program? What steps can you take to ensure that your organization is not the next TJX or Ameritrade? This presentation provides an overview of the attacks targeting the enterprise today and an insider's look into how a malware attack is executed and what tools are needed to respond effectively. Get statistics on malware from the Kaspersky Anti-Virus Research Lab in Moscow and the specific business risks they represent. Learn about risk analysis, virus dissection and recommended mitigation frameworks.

Published in: Business
0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
2,238
On SlideShare
0
From Embeds
0
Number of Embeds
14
Actions
Shares
0
Downloads
89
Comments
0
Likes
3
Embeds 0
No embeds

No notes for slide

Anatomy of a Malware Attack: The New Malware Ecosystem

  1. 1. Anatomy of a Malware Attack The New Malware Ecosystem Tom Bowers Senior Security Evangelist April 29, 2008 April 29, 2008 Copyright 2008. All Rights Reserved. 1
  2. 2. Introduction • Malware growth rates • Evolution from nuisance to monetized threat • Malware as a business • Malware Ecosystem April 29, 2008 Copyright 2008. All Rights Reserved. 2
  3. 3. Malware Samples per Year Source: The Kapsersky Internet Security Lab April 29, 2008 Copyright 2008. All Rights Reserved. 3

×