SlideShare a Scribd company logo
1 of 19
Digital Lifestyle Trends and Threats


                    Copyright 2011 Trend Micro Inc.
Sources:
ADMA Digital Marketing Yearbook 2011
Pando Network's Global Internet Speed Study (Aug 2011)
                                             Classification 03/28/13   Copyright 2011 Trend Micro Inc.   2
The fact that we are wired is the very reason
we have threats




                                                                                  Source: Trend Micro




                  Classification 03/28/13   Copyright 2011 Trend Micro Inc.   3
The technological landscape of Asia can
influence the types of threats




                     Classification 03/28/13   Copyright 2011 Trend Micro Inc.   4
What about Hong Kong?
• 4th country in Asia that has the most number blocked
  attempts to access bad URLs hosted in that country
   – Bad sites in Hong Kong are usually classified as disease vectors
     (malware-related)

• 14th country that has the most bad URL victims in Asia
• Top 5 malware threats:
   – WORM_DOWNAD.AD
      • aka Conficker, this 3-year old worm exploits unpatched
        Windows systems to spread
   – CRCK_KEYGEN and HKTL_KEYGEN
      • KEYGEN or serial key generators are typically used to crack
        licensed software
   – ADW_TENCENT
      • This is usually related to ads related to a popular IM
        application
   – WORM_AUTORUN.SMW
      • Autorun worms spread via removable drives
                                 Classification 03/28/13   Copyright 2011 Trend Micro Inc.   5
Human interests and emotions are still
  ripe for picking when it comes to
              cybercrime




              Classification 03/28/13   Copyright 2011 Trend Micro Inc.   6
Steve Jobs is dead!
Now who wants a free iPad?




                Classification 03/28/13   Copyright 2011 Trend Micro Inc.   7
Data breaches are simpler than one
              thinks




            Classification 03/28/13   Copyright 2011 Trend Micro Inc.   8
Classification 03/28/13   Copyright 2011 Trend Micro Inc.   9
Data Breaches on the Rise: Epsilon

                                          • Data breaches are not
                                            new
                                          • Data breaches can
                                            affect any industry
                                          • Hacking is the most
                                            common cause of data
                                            breaches




                      Copyright 2011 Trend Micro Inc. 10
Anatomy of a Malicious Data Breach Diagram




                                                                               Source: Trend Micro




                Classification 03/28/13   Copyright 2011 Trend Micro Inc. 11
Everyone is going mobile.
  So are the bad guys.




        Classification 03/28/13   Copyright 2011 Trend Micro Inc. 12
Android Landscape
• 1st android phone (October
  2008)
• 51.9 million Android-based
  smartphones
• 250,000 apps and still
  growing
• 6 billion downloaded apps
• 43% market share




                       Classification 03/28/13   Copyright 2011 Trend Micro Inc. 13
Android Malware Growth




                Classification 03/28/13   Copyright 2011 Trend Micro Inc. 14
DroidDreamLight
• Discovered in May 2011
• Steals and sends info from
  user’s phone to
  cybercriminals
• Displays fake notifications




                       Classification 03/28/13   Copyright 2011 Trend Micro Inc. 15
DroidDreamLight in Action

            Device model
            Device language setting
            Country
            IMEI number
            IMSI number
            List of installed apps




                    Classification 03/28/13   Copyright 2011 Trend Micro Inc. 16
USERS CANNOT BE PASSIVE ABOUT
TECHNOLOGY



EMBRACING THE DIGITAL LIFESTYLE MEANS
CHANGING THE WAY TECHNOLOGY AND
SECURITY IS VIEWED



LOOK FOR SECURITY SOLUTIONS THAT
ADDRESS THE CONSTANT EVOLUTIONS IN
THE THREAT LANDSCAPE
               Classification 03/28/13   Copyright 2011 Trend Micro Inc. 17
THANK YOU!




             Classification 03/28/13   Copyright 2011 Trend Micro Inc. 18
Classification 03/28/13   Copyright 2011 Trend Micro Inc. 19

More Related Content

What's hot

Looking at information security from different perspectives
Looking at information security from different perspectivesLooking at information security from different perspectives
Looking at information security from different perspectives
Edgard Chammas
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
Raffa Learning Community
 

What's hot (20)

Presentation on Software Piracy
Presentation on Software PiracyPresentation on Software Piracy
Presentation on Software Piracy
 
Computer Vandalism
Computer VandalismComputer Vandalism
Computer Vandalism
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Is Your Dating App Breaking Your Heart?
Is Your Dating App Breaking Your Heart?Is Your Dating App Breaking Your Heart?
Is Your Dating App Breaking Your Heart?
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
 
Hacking presentation
Hacking presentation Hacking presentation
Hacking presentation
 
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” WorldTrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
TrendLabs 2012 Annual Security Roundup: Evolved Threats in a “Post-PC” World
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber Crime
 
Looking at information security from different perspectives
Looking at information security from different perspectivesLooking at information security from different perspectives
Looking at information security from different perspectives
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Top 5 Cyber Threats of 2014
Top 5 Cyber Threats of 2014Top 5 Cyber Threats of 2014
Top 5 Cyber Threats of 2014
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 

Similar to Digital Lifestyle Trends and Threats

festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...
festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...
festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...
festival ICT 2016
 
Absolutely no plagiarism  Topic Mobile users and d.docx
Absolutely no plagiarism  Topic  Mobile users and d.docxAbsolutely no plagiarism  Topic  Mobile users and d.docx
Absolutely no plagiarism  Topic Mobile users and d.docx
adkinspaige22
 

Similar to Digital Lifestyle Trends and Threats (20)

Threat predictions 2011
Threat predictions 2011 Threat predictions 2011
Threat predictions 2011
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
 
Staying Safe and Secure Online
Staying Safe and Secure OnlineStaying Safe and Secure Online
Staying Safe and Secure Online
 
Mobile security article
Mobile security articleMobile security article
Mobile security article
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
 
Netop Remote Control Embedded Devices
Netop Remote Control Embedded DevicesNetop Remote Control Embedded Devices
Netop Remote Control Embedded Devices
 
festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...
festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...
festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012
 
Third Annual Mobile Threats Report
Third Annual Mobile Threats ReportThird Annual Mobile Threats Report
Third Annual Mobile Threats Report
 
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONSCYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnline
 
Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬
 
Absolutely no plagiarism  Topic Mobile users and d.docx
Absolutely no plagiarism  Topic  Mobile users and d.docxAbsolutely no plagiarism  Topic  Mobile users and d.docx
Absolutely no plagiarism  Topic Mobile users and d.docx
 
Android-manifest extraction and labeling method for malware compilation and d...
Android-manifest extraction and labeling method for malware compilation and d...Android-manifest extraction and labeling method for malware compilation and d...
Android-manifest extraction and labeling method for malware compilation and d...
 
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
 
The Mobility Challenge - Fran Rosch, SVP Mobility
The Mobility Challenge - Fran Rosch, SVP MobilityThe Mobility Challenge - Fran Rosch, SVP Mobility
The Mobility Challenge - Fran Rosch, SVP Mobility
 
Top 5 Famous Cyberattacks Of The World | SOCVault
Top 5 Famous Cyberattacks Of The World | SOCVaultTop 5 Famous Cyberattacks Of The World | SOCVault
Top 5 Famous Cyberattacks Of The World | SOCVault
 
Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)
 

More from Andrew Wong

Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
Andrew Wong
 
Trend micro global consumer technology use & security study
Trend micro global consumer technology use & security studyTrend micro global consumer technology use & security study
Trend micro global consumer technology use & security study
Andrew Wong
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
Andrew Wong
 
Enterprise it consumerization survey
Enterprise it consumerization surveyEnterprise it consumerization survey
Enterprise it consumerization survey
Andrew Wong
 
2010 corporate end user study
2010 corporate end user study2010 corporate end user study
2010 corporate end user study
Andrew Wong
 
Trend micro smartphone consumer market research report
Trend micro smartphone consumer market research reportTrend micro smartphone consumer market research report
Trend micro smartphone consumer market research report
Andrew Wong
 

More from Andrew Wong (20)

2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
 
Red Hat Training Briefing Hong Kong
Red Hat Training Briefing Hong KongRed Hat Training Briefing Hong Kong
Red Hat Training Briefing Hong Kong
 
Red Hat Training Catalog 2012
Red Hat Training Catalog 2012Red Hat Training Catalog 2012
Red Hat Training Catalog 2012
 
Big Data in Retail Industry
Big Data in Retail IndustryBig Data in Retail Industry
Big Data in Retail Industry
 
Cloud Solution Handbook for HKSMB
Cloud Solution Handbook for HKSMBCloud Solution Handbook for HKSMB
Cloud Solution Handbook for HKSMB
 
Oracle Social CRM Applications Strategy Overview And Roadmap
Oracle Social CRM Applications Strategy Overview And RoadmapOracle Social CRM Applications Strategy Overview And Roadmap
Oracle Social CRM Applications Strategy Overview And Roadmap
 
Introduction Google Script in Marketing
Introduction Google Script in MarketingIntroduction Google Script in Marketing
Introduction Google Script in Marketing
 
B2B Content Marketing Trend 2012-13
B2B Content Marketing Trend 2012-13B2B Content Marketing Trend 2012-13
B2B Content Marketing Trend 2012-13
 
Introduction to Trend Micro Mobility Security 8
Introduction to Trend Micro Mobility Security 8Introduction to Trend Micro Mobility Security 8
Introduction to Trend Micro Mobility Security 8
 
SolarWinds Network Solution Guide
SolarWinds Network Solution GuideSolarWinds Network Solution Guide
SolarWinds Network Solution Guide
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
 
Trend micro global consumer technology use & security study
Trend micro global consumer technology use & security studyTrend micro global consumer technology use & security study
Trend micro global consumer technology use & security study
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
 
Enterprise it consumerization survey
Enterprise it consumerization surveyEnterprise it consumerization survey
Enterprise it consumerization survey
 
2010 corporate end user study
2010 corporate end user study2010 corporate end user study
2010 corporate end user study
 
Trend micro smartphone consumer market research report
Trend micro smartphone consumer market research reportTrend micro smartphone consumer market research report
Trend micro smartphone consumer market research report
 
Android Security Essentials Presentation
Android Security Essentials PresentationAndroid Security Essentials Presentation
Android Security Essentials Presentation
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for Businesss
 
Amazon Web Services
Amazon Web ServicesAmazon Web Services
Amazon Web Services
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection Network
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Digital Lifestyle Trends and Threats

  • 1. Digital Lifestyle Trends and Threats Copyright 2011 Trend Micro Inc.
  • 2. Sources: ADMA Digital Marketing Yearbook 2011 Pando Network's Global Internet Speed Study (Aug 2011) Classification 03/28/13 Copyright 2011 Trend Micro Inc. 2
  • 3. The fact that we are wired is the very reason we have threats Source: Trend Micro Classification 03/28/13 Copyright 2011 Trend Micro Inc. 3
  • 4. The technological landscape of Asia can influence the types of threats Classification 03/28/13 Copyright 2011 Trend Micro Inc. 4
  • 5. What about Hong Kong? • 4th country in Asia that has the most number blocked attempts to access bad URLs hosted in that country – Bad sites in Hong Kong are usually classified as disease vectors (malware-related) • 14th country that has the most bad URL victims in Asia • Top 5 malware threats: – WORM_DOWNAD.AD • aka Conficker, this 3-year old worm exploits unpatched Windows systems to spread – CRCK_KEYGEN and HKTL_KEYGEN • KEYGEN or serial key generators are typically used to crack licensed software – ADW_TENCENT • This is usually related to ads related to a popular IM application – WORM_AUTORUN.SMW • Autorun worms spread via removable drives Classification 03/28/13 Copyright 2011 Trend Micro Inc. 5
  • 6. Human interests and emotions are still ripe for picking when it comes to cybercrime Classification 03/28/13 Copyright 2011 Trend Micro Inc. 6
  • 7. Steve Jobs is dead! Now who wants a free iPad? Classification 03/28/13 Copyright 2011 Trend Micro Inc. 7
  • 8. Data breaches are simpler than one thinks Classification 03/28/13 Copyright 2011 Trend Micro Inc. 8
  • 9. Classification 03/28/13 Copyright 2011 Trend Micro Inc. 9
  • 10. Data Breaches on the Rise: Epsilon • Data breaches are not new • Data breaches can affect any industry • Hacking is the most common cause of data breaches Copyright 2011 Trend Micro Inc. 10
  • 11. Anatomy of a Malicious Data Breach Diagram Source: Trend Micro Classification 03/28/13 Copyright 2011 Trend Micro Inc. 11
  • 12. Everyone is going mobile. So are the bad guys. Classification 03/28/13 Copyright 2011 Trend Micro Inc. 12
  • 13. Android Landscape • 1st android phone (October 2008) • 51.9 million Android-based smartphones • 250,000 apps and still growing • 6 billion downloaded apps • 43% market share Classification 03/28/13 Copyright 2011 Trend Micro Inc. 13
  • 14. Android Malware Growth Classification 03/28/13 Copyright 2011 Trend Micro Inc. 14
  • 15. DroidDreamLight • Discovered in May 2011 • Steals and sends info from user’s phone to cybercriminals • Displays fake notifications Classification 03/28/13 Copyright 2011 Trend Micro Inc. 15
  • 16. DroidDreamLight in Action Device model Device language setting Country IMEI number IMSI number List of installed apps Classification 03/28/13 Copyright 2011 Trend Micro Inc. 16
  • 17. USERS CANNOT BE PASSIVE ABOUT TECHNOLOGY EMBRACING THE DIGITAL LIFESTYLE MEANS CHANGING THE WAY TECHNOLOGY AND SECURITY IS VIEWED LOOK FOR SECURITY SOLUTIONS THAT ADDRESS THE CONSTANT EVOLUTIONS IN THE THREAT LANDSCAPE Classification 03/28/13 Copyright 2011 Trend Micro Inc. 17
  • 18. THANK YOU! Classification 03/28/13 Copyright 2011 Trend Micro Inc. 18
  • 19. Classification 03/28/13 Copyright 2011 Trend Micro Inc. 19