Anatomy of a Malware Attack: The New Malware Ecosystem

  • 1,868 views
Uploaded on

Today the threat has changed. Hackers are no longer kids trying to create a name for themselves; they're professionals with a vast network and are capable of increasingly sophisticated and highly …

Today the threat has changed. Hackers are no longer kids trying to create a name for themselves; they're professionals with a vast network and are capable of increasingly sophisticated and highly targeted attacks. In fact, many of today's attacks are so stealth that the victims may not even realize their systems have been compromised for days, weeks or even months. So how do organizations address malware attacks as part of their overall risk management program? What steps can you take to ensure that your organization is not the next TJX or Ameritrade? This presentation provides an overview of the attacks targeting the enterprise today and an insider's look into how a malware attack is executed and what tools are needed to respond effectively. Get statistics on malware from the Kaspersky Anti-Virus Research Lab in Moscow and the specific business risks they represent. Learn about risk analysis, virus dissection and recommended mitigation frameworks.

More in: Business
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
1,868
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
70
Comments
0
Likes
1

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Anatomy of a Malware Attack The New Malware Ecosystem Tom Bowers Senior Security Evangelist April 29, 2008 April 29, 2008 Copyright 2008. All Rights Reserved. 1
  • 2. Introduction • Malware growth rates • Evolution from nuisance to monetized threat • Malware as a business • Malware Ecosystem April 29, 2008 Copyright 2008. All Rights Reserved. 2
  • 3. Malware Samples per Year Source: The Kapsersky Internet Security Lab April 29, 2008 Copyright 2008. All Rights Reserved. 3