0
Symantec Security Awareness October 2012
Symantec Security Awareness October 2012
Symantec Security Awareness October 2012
Symantec Security Awareness October 2012
Symantec Security Awareness October 2012
Symantec Security Awareness October 2012
Symantec Security Awareness October 2012
Symantec Security Awareness October 2012
Symantec Security Awareness October 2012
Symantec Security Awareness October 2012
Symantec Security Awareness October 2012
Symantec Security Awareness October 2012
Symantec Security Awareness October 2012
Symantec Security Awareness October 2012
Symantec Security Awareness October 2012
Symantec Security Awareness October 2012
Symantec Security Awareness October 2012
Symantec Security Awareness October 2012
Symantec Security Awareness October 2012
Symantec Security Awareness October 2012
Symantec Security Awareness October 2012
Symantec Security Awareness October 2012
Symantec Security Awareness October 2012
Symantec Security Awareness October 2012
Symantec Security Awareness October 2012
Symantec Security Awareness October 2012
Symantec Security Awareness October 2012
Symantec Security Awareness October 2012
Symantec Security Awareness October 2012
Symantec Security Awareness October 2012
Symantec Security Awareness October 2012
Symantec Security Awareness October 2012
Symantec Security Awareness October 2012
Symantec Security Awareness October 2012
Symantec Security Awareness October 2012
Symantec Security Awareness October 2012
Symantec Security Awareness October 2012
Symantec Security Awareness October 2012
Symantec Security Awareness October 2012
Symantec Security Awareness October 2012
Symantec Security Awareness October 2012
Upcoming SlideShare
Loading in...5
×

Symantec Security Awareness October 2012

2,431

Published on

Believe it or not, a higher percentage of religious sites have been compromised with malware than adult websites. Organizations of all kinds are at risk as are everyday internet users, but there are simple steps to take to avoid being duped and stay safe online.

Published in: Technology
0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
2,431
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
126
Comments
0
Likes
3
Embeds 0
No embeds

No notes for slide
  • Quiz question – which is more dangerous?It’s not what we used to think.We’ve been telling people that “bad” sites are dangerous … but one of the most interesting pieces of data is that religious sites are more likely to infect you than an adult site
  • This chart is from the ISTR 17 (April 2012)Looked at sites that were infected – how many pieces of malware were on each of these sitesAlmost 5x more malware on religious sites than on adult sitesTakeaway? Sites with poor security become an easy target – sites are beginning to realize that if their sites are infected, people won’t visit. Adult websites are businesses – they have learned that if they infect their customers, they wont’ get repeat visits, so they are working hard to keep their sites cleanMessage for SMBs – you need to protect your site or you will become a host for malware and customers will go elsewhere
  • This is one of the key assumptions … Anybody that has gone into an SMB has heard this – that they don’t believe they are a target.
  • This is one of the key assumptions … Anybody that has gone into an SMB has heard this – that they don’t believe they are a target.
  • Assumption 2 – only executives are targeted
  • This shows targeted attacks by the target’s occupation …Executives seem to be a big chunk … but …
  • So, spam is down and vulnerabilities are down, but malware is up. Why?Attack toolkits continue to flourish – they use existing vulnerabilities – the malware authors use those vulnerabilities that work – they focus on the vulns that are not patchedThis chart at the bottom looks at toolkits that were in use in 2011 – Blackhole was a big one and another was NumDir (not named)Toolkit authors trying to go a bit more undercover than in the past – trying to lower their profile – they are also moving to service model like legit SW – think of it like cloud computing for malware authors – they are not handing out SW as in the past
    1. Gostou de algum slide específico?

      Recortar slides é uma maneira fácil de colecionar informações para acessar mais tarde.

    ×