Digital Lifestyle Trends and Threats

845 views

Published on

Digital Lifestyle Trends and Threats

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
845
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
18
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Digital Lifestyle Trends and Threats

  1. 1. Digital Lifestyle Trends and Threats Copyright 2011 Trend Micro Inc.
  2. 2. Sources:ADMA Digital Marketing Yearbook 2011Pando Networks Global Internet Speed Study (Aug 2011) Classification 03/28/13 Copyright 2011 Trend Micro Inc. 2
  3. 3. The fact that we are wired is the very reasonwe have threats Source: Trend Micro Classification 03/28/13 Copyright 2011 Trend Micro Inc. 3
  4. 4. The technological landscape of Asia caninfluence the types of threats Classification 03/28/13 Copyright 2011 Trend Micro Inc. 4
  5. 5. What about Hong Kong?• 4th country in Asia that has the most number blocked attempts to access bad URLs hosted in that country – Bad sites in Hong Kong are usually classified as disease vectors (malware-related)• 14th country that has the most bad URL victims in Asia• Top 5 malware threats: – WORM_DOWNAD.AD • aka Conficker, this 3-year old worm exploits unpatched Windows systems to spread – CRCK_KEYGEN and HKTL_KEYGEN • KEYGEN or serial key generators are typically used to crack licensed software – ADW_TENCENT • This is usually related to ads related to a popular IM application – WORM_AUTORUN.SMW • Autorun worms spread via removable drives Classification 03/28/13 Copyright 2011 Trend Micro Inc. 5
  6. 6. Human interests and emotions are still ripe for picking when it comes to cybercrime Classification 03/28/13 Copyright 2011 Trend Micro Inc. 6
  7. 7. Steve Jobs is dead!Now who wants a free iPad? Classification 03/28/13 Copyright 2011 Trend Micro Inc. 7
  8. 8. Data breaches are simpler than one thinks Classification 03/28/13 Copyright 2011 Trend Micro Inc. 8
  9. 9. Classification 03/28/13 Copyright 2011 Trend Micro Inc. 9
  10. 10. Data Breaches on the Rise: Epsilon • Data breaches are not new • Data breaches can affect any industry • Hacking is the most common cause of data breaches Copyright 2011 Trend Micro Inc. 10
  11. 11. Anatomy of a Malicious Data Breach Diagram Source: Trend Micro Classification 03/28/13 Copyright 2011 Trend Micro Inc. 11
  12. 12. Everyone is going mobile. So are the bad guys. Classification 03/28/13 Copyright 2011 Trend Micro Inc. 12
  13. 13. Android Landscape• 1st android phone (October 2008)• 51.9 million Android-based smartphones• 250,000 apps and still growing• 6 billion downloaded apps• 43% market share Classification 03/28/13 Copyright 2011 Trend Micro Inc. 13
  14. 14. Android Malware Growth Classification 03/28/13 Copyright 2011 Trend Micro Inc. 14
  15. 15. DroidDreamLight• Discovered in May 2011• Steals and sends info from user’s phone to cybercriminals• Displays fake notifications Classification 03/28/13 Copyright 2011 Trend Micro Inc. 15
  16. 16. DroidDreamLight in Action Device model Device language setting Country IMEI number IMSI number List of installed apps Classification 03/28/13 Copyright 2011 Trend Micro Inc. 16
  17. 17. USERS CANNOT BE PASSIVE ABOUTTECHNOLOGYEMBRACING THE DIGITAL LIFESTYLE MEANSCHANGING THE WAY TECHNOLOGY ANDSECURITY IS VIEWEDLOOK FOR SECURITY SOLUTIONS THATADDRESS THE CONSTANT EVOLUTIONS INTHE THREAT LANDSCAPE Classification 03/28/13 Copyright 2011 Trend Micro Inc. 17
  18. 18. THANK YOU! Classification 03/28/13 Copyright 2011 Trend Micro Inc. 18
  19. 19. Classification 03/28/13 Copyright 2011 Trend Micro Inc. 19

×