Your SlideShare is downloading. ×
0
Digital Lifestyle Trends and Threats                    Copyright 2011 Trend Micro Inc.
Sources:ADMA Digital Marketing Yearbook 2011Pando Networks Global Internet Speed Study (Aug 2011)                         ...
The fact that we are wired is the very reasonwe have threats                                                              ...
The technological landscape of Asia caninfluence the types of threats                     Classification 03/28/13   Copyri...
What about Hong Kong?• 4th country in Asia that has the most number blocked  attempts to access bad URLs hosted in that co...
Human interests and emotions are still  ripe for picking when it comes to              cybercrime              Classificat...
Steve Jobs is dead!Now who wants a free iPad?                Classification 03/28/13   Copyright 2011 Trend Micro Inc.   7
Data breaches are simpler than one              thinks            Classification 03/28/13   Copyright 2011 Trend Micro Inc...
Classification 03/28/13   Copyright 2011 Trend Micro Inc.   9
Data Breaches on the Rise: Epsilon                                          • Data breaches are not                       ...
Anatomy of a Malicious Data Breach Diagram                                                                               S...
Everyone is going mobile.  So are the bad guys.        Classification 03/28/13   Copyright 2011 Trend Micro Inc. 12
Android Landscape• 1st android phone (October  2008)• 51.9 million Android-based  smartphones• 250,000 apps and still  gro...
Android Malware Growth                Classification 03/28/13   Copyright 2011 Trend Micro Inc. 14
DroidDreamLight• Discovered in May 2011• Steals and sends info from  user’s phone to  cybercriminals• Displays fake notifi...
DroidDreamLight in Action            Device model            Device language setting            Country            IMEI nu...
USERS CANNOT BE PASSIVE ABOUTTECHNOLOGYEMBRACING THE DIGITAL LIFESTYLE MEANSCHANGING THE WAY TECHNOLOGY ANDSECURITY IS VIE...
THANK YOU!             Classification 03/28/13   Copyright 2011 Trend Micro Inc. 18
Classification 03/28/13   Copyright 2011 Trend Micro Inc. 19
Upcoming SlideShare
Loading in...5
×

Digital Lifestyle Trends and Threats

284

Published on

Digital Lifestyle Trends and Threats

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
284
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Digital Lifestyle Trends and Threats"

  1. 1. Digital Lifestyle Trends and Threats Copyright 2011 Trend Micro Inc.
  2. 2. Sources:ADMA Digital Marketing Yearbook 2011Pando Networks Global Internet Speed Study (Aug 2011) Classification 03/28/13 Copyright 2011 Trend Micro Inc. 2
  3. 3. The fact that we are wired is the very reasonwe have threats Source: Trend Micro Classification 03/28/13 Copyright 2011 Trend Micro Inc. 3
  4. 4. The technological landscape of Asia caninfluence the types of threats Classification 03/28/13 Copyright 2011 Trend Micro Inc. 4
  5. 5. What about Hong Kong?• 4th country in Asia that has the most number blocked attempts to access bad URLs hosted in that country – Bad sites in Hong Kong are usually classified as disease vectors (malware-related)• 14th country that has the most bad URL victims in Asia• Top 5 malware threats: – WORM_DOWNAD.AD • aka Conficker, this 3-year old worm exploits unpatched Windows systems to spread – CRCK_KEYGEN and HKTL_KEYGEN • KEYGEN or serial key generators are typically used to crack licensed software – ADW_TENCENT • This is usually related to ads related to a popular IM application – WORM_AUTORUN.SMW • Autorun worms spread via removable drives Classification 03/28/13 Copyright 2011 Trend Micro Inc. 5
  6. 6. Human interests and emotions are still ripe for picking when it comes to cybercrime Classification 03/28/13 Copyright 2011 Trend Micro Inc. 6
  7. 7. Steve Jobs is dead!Now who wants a free iPad? Classification 03/28/13 Copyright 2011 Trend Micro Inc. 7
  8. 8. Data breaches are simpler than one thinks Classification 03/28/13 Copyright 2011 Trend Micro Inc. 8
  9. 9. Classification 03/28/13 Copyright 2011 Trend Micro Inc. 9
  10. 10. Data Breaches on the Rise: Epsilon • Data breaches are not new • Data breaches can affect any industry • Hacking is the most common cause of data breaches Copyright 2011 Trend Micro Inc. 10
  11. 11. Anatomy of a Malicious Data Breach Diagram Source: Trend Micro Classification 03/28/13 Copyright 2011 Trend Micro Inc. 11
  12. 12. Everyone is going mobile. So are the bad guys. Classification 03/28/13 Copyright 2011 Trend Micro Inc. 12
  13. 13. Android Landscape• 1st android phone (October 2008)• 51.9 million Android-based smartphones• 250,000 apps and still growing• 6 billion downloaded apps• 43% market share Classification 03/28/13 Copyright 2011 Trend Micro Inc. 13
  14. 14. Android Malware Growth Classification 03/28/13 Copyright 2011 Trend Micro Inc. 14
  15. 15. DroidDreamLight• Discovered in May 2011• Steals and sends info from user’s phone to cybercriminals• Displays fake notifications Classification 03/28/13 Copyright 2011 Trend Micro Inc. 15
  16. 16. DroidDreamLight in Action Device model Device language setting Country IMEI number IMSI number List of installed apps Classification 03/28/13 Copyright 2011 Trend Micro Inc. 16
  17. 17. USERS CANNOT BE PASSIVE ABOUTTECHNOLOGYEMBRACING THE DIGITAL LIFESTYLE MEANSCHANGING THE WAY TECHNOLOGY ANDSECURITY IS VIEWEDLOOK FOR SECURITY SOLUTIONS THATADDRESS THE CONSTANT EVOLUTIONS INTHE THREAT LANDSCAPE Classification 03/28/13 Copyright 2011 Trend Micro Inc. 17
  18. 18. THANK YOU! Classification 03/28/13 Copyright 2011 Trend Micro Inc. 18
  19. 19. Classification 03/28/13 Copyright 2011 Trend Micro Inc. 19
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×