SlideShare a Scribd company logo
1 of 14
Download to read offline
What's Next ?


Alexandru BĂLAN
<abalan@bitdefender.com>
Short Summary

• Last year...
   – Types of malware
   – Should AV producers take care of Linux boxes as well
     ?
• Now...
   – More threats
   – More defenses
• What's next ?
Last year we talked about...


• Examples of malware (viruses, rootkits,
  exploits, social engineering)‫‏‬
• Windows people having all the “fun”
• Apparently there's no need right now for AV
  producers to extend their focus to *NIX
  firewalls, rootkits and so on.
However

• The industry is shifting from protecting the data to
  protecting the information
• If companies have any number of employees at all,
  studies show and human nature shows that there's always
  going to be be somebody that is going to try and take
  advantage of the system
• New threats are emerging
Now..


• More threats (not necessarily new)‫‏‬
  – Botnets
  – Code running on your computer (client side
    javascript)‫‏‬
  – Tons of php/sql_injection/other exploits.
  – The human factor is (as expected) an
    increasing risk
What do you see as tomorrow's threats and defenses ?



Examples:
• Cisco/IOS rootkit
   – Presented at EUSecWest London UK – May 2008
   – Just “an interesting concept ?”
   Sebastian Muniz: I've been told by the cousin of a friend
    of my girlfriend that this kind of rootkit has previously
    been used :)‫‏‬



                   Source: http://eusecwest.com/sebastian-muniz-da-ios-rootkit.html
What do you see as tomorrow's threats and defenses ?



• Web OS – It's going to happen!
• Threats from and through social networks (read: facebook,
  myspace, ect, ect) are just an example:
   – It's not exactly spam and it's not exactly phishing. You
     can't even call it “tricking the user”. The users are
     ignorant enough to click everything and get in contact
     with everyone
   – 5 out of 10 “add me” requests are approved on IM
   – 7 out of 10 “add me” requests are approved in SNS
   – Usually comments are on a “accept all” basis
What do you see as tomorrow's threats and defenses ?



• Phlashing – Remote DOS in any device that supports
  firmware update
     – Attacking system firmware isn't a new tactic—the
       CIH/Chernobyl virus was capable of overwriting BIOS
       firmware back in 1998—but focusing such attacks on
       network hardware would be an unusual step, and could
       prove quite successful in at least the short term.



  Source: http://arstechnica.com/news.ars/post/20080520-phlashing-attacks-could-render-network-
  hardware-useless.html
What do you see as tomorrow's threats and defenses ?



• “14-Year-Old Turns Tram System Into Personal Train Set”
   – A Polish teenager allegedly turned the tram system in
     the city of Lodz into his own personal train set,
     triggering chaos and derailing four vehicles in the
     process. Twelve people were injured in one of the
     incidents.
   – The 14-year-old modified a TV remote control so that it
     could be used to change track points


                         Source : http://www.theregister.co.uk/2008/01/11/tram_hack/
What do you see as tomorrow's threats and defenses ?



• Firewire DMA bug (connect a laptop to a firewire port, trick
  the machine into allowing you read/write memory access)‫‏‬
   – A tool targeting mainly Windows XP systems has been
     released by Adam Boileau
   – To use the tool, hackers must connect a Linux-based
     computer to a Firewire port on the target machine. The
     machine is then tricked into allowing the attacking
     computer to have read and write access to its memory.

         Source: http://www.theage.com.au/news/security/hack-into-a-windows-pc-no-password-
         needed/2008/03/04/1204402423638.html
The conclusion

• Innovation and allocating resources to develop a solution
  for a future threat (i.e. cisco anti-rootkit) is risky.
• Awareness is still low and surprisingly, getting lower.
  10/10 random people asked, will not bother with security
  for “exotic” threats.
• Leaks from the underground have been plugged. We
  haven't heard about anything tasty in some years. This
  silence is a bad sign
The conclusion (cont)‫‏‬




Because of the above, it's difficult to predict and develop the
  security solution for tomorrow and it's increasingly easy for
  attackers to predict where and how to strike next.
What can YOU do

• Share information !
• Demand more from the industry. No matter how crazy it
  might sound today it might just be something we won't be
  able to live without tomorrow
• Don't be afraid to “waste resources” with innovation.
• Let us know. Send your requests and thoughts
  toabalan@bitdefender.com . My spam filters as well as
  our research teams will be happy to take note of them
Q&A

More Related Content

What's hot

Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System ThreatsDrishti Bhalla
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsLeelet1121
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESShyam Kumar Singh
 
Introduction to Ethical Hacking
Introduction to Ethical Hacking Introduction to Ethical Hacking
Introduction to Ethical Hacking Nasir Bhutta
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internetArthur Landry
 
Information-Security-Lecture-6.pptx
Information-Security-Lecture-6.pptxInformation-Security-Lecture-6.pptx
Information-Security-Lecture-6.pptxanbersattar
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxanbersattar
 
Information-Security-Lecture-4.pptx
Information-Security-Lecture-4.pptxInformation-Security-Lecture-4.pptx
Information-Security-Lecture-4.pptxanbersattar
 
Information-Security-Lecture-7.pptx
Information-Security-Lecture-7.pptxInformation-Security-Lecture-7.pptx
Information-Security-Lecture-7.pptxanbersattar
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeMurray Security Services
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Virusesmkgspsu
 
CSFI Stuxnet Report
CSFI Stuxnet ReportCSFI Stuxnet Report
CSFI Stuxnet ReportAmr Ali
 
Ite pc v40_chapter9_edited_h
Ite pc v40_chapter9_edited_hIte pc v40_chapter9_edited_h
Ite pc v40_chapter9_edited_hDave Arvin
 
xDEFENSE: An Extended DEFENSE for mitigating Next Generation Intrusions
xDEFENSE: An Extended DEFENSE for mitigating Next Generation IntrusionsxDEFENSE: An Extended DEFENSE for mitigating Next Generation Intrusions
xDEFENSE: An Extended DEFENSE for mitigating Next Generation IntrusionsVivek Venugopalan
 
Kaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst SummitKaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst SummitPR Americas
 
SOTWARE INFRINGEMENT
SOTWARE INFRINGEMENTSOTWARE INFRINGEMENT
SOTWARE INFRINGEMENTHunny Jummani
 

What's hot (20)

Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Hacking for Dummies 2
Hacking for Dummies 2Hacking for Dummies 2
Hacking for Dummies 2
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Introduction to Ethical Hacking
Introduction to Ethical Hacking Introduction to Ethical Hacking
Introduction to Ethical Hacking
 
News Bytes - May 2015
News Bytes - May 2015News Bytes - May 2015
News Bytes - May 2015
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internet
 
Information-Security-Lecture-6.pptx
Information-Security-Lecture-6.pptxInformation-Security-Lecture-6.pptx
Information-Security-Lecture-6.pptx
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptx
 
Information-Security-Lecture-4.pptx
Information-Security-Lecture-4.pptxInformation-Security-Lecture-4.pptx
Information-Security-Lecture-4.pptx
 
Information_Security_Class
Information_Security_ClassInformation_Security_Class
Information_Security_Class
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Information-Security-Lecture-7.pptx
Information-Security-Lecture-7.pptxInformation-Security-Lecture-7.pptx
Information-Security-Lecture-7.pptx
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber Crime
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
CSFI Stuxnet Report
CSFI Stuxnet ReportCSFI Stuxnet Report
CSFI Stuxnet Report
 
Ite pc v40_chapter9_edited_h
Ite pc v40_chapter9_edited_hIte pc v40_chapter9_edited_h
Ite pc v40_chapter9_edited_h
 
xDEFENSE: An Extended DEFENSE for mitigating Next Generation Intrusions
xDEFENSE: An Extended DEFENSE for mitigating Next Generation IntrusionsxDEFENSE: An Extended DEFENSE for mitigating Next Generation Intrusions
xDEFENSE: An Extended DEFENSE for mitigating Next Generation Intrusions
 
Kaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst SummitKaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst Summit
 
SOTWARE INFRINGEMENT
SOTWARE INFRINGEMENTSOTWARE INFRINGEMENT
SOTWARE INFRINGEMENT
 

Viewers also liked

7 good lives vs rp
7 good lives vs rp7 good lives vs rp
7 good lives vs rpAnna Salter
 
"Open Source ERP Projects and Opportunities for the Romanian Market" by Thoma...
"Open Source ERP Projects and Opportunities for the Romanian Market" by Thoma..."Open Source ERP Projects and Opportunities for the Romanian Market" by Thoma...
"Open Source ERP Projects and Opportunities for the Romanian Market" by Thoma...eLiberatica
 
"Write the Future Open Standards Open Source OpenOffice" by Louis Suarez-Pott...
"Write the Future Open Standards Open Source OpenOffice" by Louis Suarez-Pott..."Write the Future Open Standards Open Source OpenOffice" by Louis Suarez-Pott...
"Write the Future Open Standards Open Source OpenOffice" by Louis Suarez-Pott...eLiberatica
 
"Sun Open Source Universe" by Vassilis Boulogiorgos @ eLiberatica 2008
"Sun Open Source Universe" by Vassilis Boulogiorgos @ eLiberatica 2008"Sun Open Source Universe" by Vassilis Boulogiorgos @ eLiberatica 2008
"Sun Open Source Universe" by Vassilis Boulogiorgos @ eLiberatica 2008eLiberatica
 
"SocrateOpen after two years" by Remus Cazacu @ eLiberatica 2008
"SocrateOpen after two years" by Remus Cazacu @ eLiberatica 2008"SocrateOpen after two years" by Remus Cazacu @ eLiberatica 2008
"SocrateOpen after two years" by Remus Cazacu @ eLiberatica 2008eLiberatica
 
"Understanding Free Software and Open Source Licensing" by Zak Greant @ eLibe...
"Understanding Free Software and Open Source Licensing" by Zak Greant @ eLibe..."Understanding Free Software and Open Source Licensing" by Zak Greant @ eLibe...
"Understanding Free Software and Open Source Licensing" by Zak Greant @ eLibe...eLiberatica
 
Countus Ballon Spektakel 2010
Countus Ballon Spektakel 2010Countus Ballon Spektakel 2010
Countus Ballon Spektakel 2010jaccov
 
"Dell and Open Source" by Serban Zirnovan @ eLiberatica 2008
"Dell and Open Source" by Serban Zirnovan @ eLiberatica 2008"Dell and Open Source" by Serban Zirnovan @ eLiberatica 2008
"Dell and Open Source" by Serban Zirnovan @ eLiberatica 2008eLiberatica
 

Viewers also liked (8)

7 good lives vs rp
7 good lives vs rp7 good lives vs rp
7 good lives vs rp
 
"Open Source ERP Projects and Opportunities for the Romanian Market" by Thoma...
"Open Source ERP Projects and Opportunities for the Romanian Market" by Thoma..."Open Source ERP Projects and Opportunities for the Romanian Market" by Thoma...
"Open Source ERP Projects and Opportunities for the Romanian Market" by Thoma...
 
"Write the Future Open Standards Open Source OpenOffice" by Louis Suarez-Pott...
"Write the Future Open Standards Open Source OpenOffice" by Louis Suarez-Pott..."Write the Future Open Standards Open Source OpenOffice" by Louis Suarez-Pott...
"Write the Future Open Standards Open Source OpenOffice" by Louis Suarez-Pott...
 
"Sun Open Source Universe" by Vassilis Boulogiorgos @ eLiberatica 2008
"Sun Open Source Universe" by Vassilis Boulogiorgos @ eLiberatica 2008"Sun Open Source Universe" by Vassilis Boulogiorgos @ eLiberatica 2008
"Sun Open Source Universe" by Vassilis Boulogiorgos @ eLiberatica 2008
 
"SocrateOpen after two years" by Remus Cazacu @ eLiberatica 2008
"SocrateOpen after two years" by Remus Cazacu @ eLiberatica 2008"SocrateOpen after two years" by Remus Cazacu @ eLiberatica 2008
"SocrateOpen after two years" by Remus Cazacu @ eLiberatica 2008
 
"Understanding Free Software and Open Source Licensing" by Zak Greant @ eLibe...
"Understanding Free Software and Open Source Licensing" by Zak Greant @ eLibe..."Understanding Free Software and Open Source Licensing" by Zak Greant @ eLibe...
"Understanding Free Software and Open Source Licensing" by Zak Greant @ eLibe...
 
Countus Ballon Spektakel 2010
Countus Ballon Spektakel 2010Countus Ballon Spektakel 2010
Countus Ballon Spektakel 2010
 
"Dell and Open Source" by Serban Zirnovan @ eLiberatica 2008
"Dell and Open Source" by Serban Zirnovan @ eLiberatica 2008"Dell and Open Source" by Serban Zirnovan @ eLiberatica 2008
"Dell and Open Source" by Serban Zirnovan @ eLiberatica 2008
 

Similar to "BitDefender - What's Next" by Alexandru Balan @ eLiberatica 2008

Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII studentsAkiumi Hasegawa
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays worldSibghatullah Khattak
 
The difference between a duck
The difference between a duckThe difference between a duck
The difference between a duckSensePost
 
Network security
Network securityNetwork security
Network securitymena kaheel
 
A tale of mobile threats
A tale of mobile threatsA tale of mobile threats
A tale of mobile threatsVincenzo Iozzo
 
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana   iisf...Web security – application security roads to software security nirvana   iisf...
Web security – application security roads to software security nirvana iisf...Eoin Keary
 
Information Security - A Discussion
Information Security  - A DiscussionInformation Security  - A Discussion
Information Security - A DiscussionKaushik Patra
 
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdfUnit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdfSujanTimalsina5
 
Making the case for sandbox v1.1 (SD Conference 2007)
Making the case for sandbox v1.1 (SD Conference 2007)Making the case for sandbox v1.1 (SD Conference 2007)
Making the case for sandbox v1.1 (SD Conference 2007)Dinis Cruz
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITYafaque jaya
 
Formative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering AttacksFormative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering AttacksDamaineFranklinMScBE
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdfPavelVtek3
 

Similar to "BitDefender - What's Next" by Alexandru Balan @ eLiberatica 2008 (20)

Security
SecuritySecurity
Security
 
Hacking 10 2010
Hacking 10 2010Hacking 10 2010
Hacking 10 2010
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
The difference between a duck
The difference between a duckThe difference between a duck
The difference between a duck
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
C3
C3C3
C3
 
Information security
Information securityInformation security
Information security
 
A tale of mobile threats
A tale of mobile threatsA tale of mobile threats
A tale of mobile threats
 
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana   iisf...Web security – application security roads to software security nirvana   iisf...
Web security – application security roads to software security nirvana iisf...
 
Information Security - A Discussion
Information Security  - A DiscussionInformation Security  - A Discussion
Information Security - A Discussion
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdfUnit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
 
Making the case for sandbox v1.1 (SD Conference 2007)
Making the case for sandbox v1.1 (SD Conference 2007)Making the case for sandbox v1.1 (SD Conference 2007)
Making the case for sandbox v1.1 (SD Conference 2007)
 
Network monitoring white paper
Network monitoring white paperNetwork monitoring white paper
Network monitoring white paper
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Formative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering AttacksFormative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering Attacks
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
Network Security
Network SecurityNetwork Security
Network Security
 

More from eLiberatica

"Komodo - Why we chose to make our product open source" by Shane Caraveo @ eL...
"Komodo - Why we chose to make our product open source" by Shane Caraveo @ eL..."Komodo - Why we chose to make our product open source" by Shane Caraveo @ eL...
"Komodo - Why we chose to make our product open source" by Shane Caraveo @ eL...eLiberatica
 
"Introducing Red Hat Training Center" by Radu Radulescu @ eLiberatica 2008
"Introducing Red Hat Training Center" by Radu Radulescu @ eLiberatica 2008"Introducing Red Hat Training Center" by Radu Radulescu @ eLiberatica 2008
"Introducing Red Hat Training Center" by Radu Radulescu @ eLiberatica 2008eLiberatica
 
"HP vision Governing the use of open source" by Martin Michlmayr @ eLiberatic...
"HP vision Governing the use of open source" by Martin Michlmayr @ eLiberatic..."HP vision Governing the use of open source" by Martin Michlmayr @ eLiberatic...
"HP vision Governing the use of open source" by Martin Michlmayr @ eLiberatic...eLiberatica
 
"Open Source Software Middleware for The Internet of Things - Project ASPIRE"...
"Open Source Software Middleware for The Internet of Things - Project ASPIRE"..."Open Source Software Middleware for The Internet of Things - Project ASPIRE"...
"Open Source Software Middleware for The Internet of Things - Project ASPIRE"...eLiberatica
 
"Introducing eConference" by Eugen Rotariu @ eLiberatica 2008
"Introducing eConference" by Eugen Rotariu @ eLiberatica 2008"Introducing eConference" by Eugen Rotariu @ eLiberatica 2008
"Introducing eConference" by Eugen Rotariu @ eLiberatica 2008eLiberatica
 
"Mozilla Messaging and Thunderbird - why and how" by David Ascher @ eLiberati...
"Mozilla Messaging and Thunderbird - why and how" by David Ascher @ eLiberati..."Mozilla Messaging and Thunderbird - why and how" by David Ascher @ eLiberati...
"Mozilla Messaging and Thunderbird - why and how" by David Ascher @ eLiberati...eLiberatica
 
"For the first time in Europe Digital ID providers and OpenID service for Rom...
"For the first time in Europe Digital ID providers and OpenID service for Rom..."For the first time in Europe Digital ID providers and OpenID service for Rom...
"For the first time in Europe Digital ID providers and OpenID service for Rom...eLiberatica
 
"Standing on the Shoulders of Giants" by Brian King @ eLiberatica 2008
"Standing on the Shoulders of Giants" by Brian King @ eLiberatica 2008"Standing on the Shoulders of Giants" by Brian King @ eLiberatica 2008
"Standing on the Shoulders of Giants" by Brian King @ eLiberatica 2008eLiberatica
 
"Legal aspects related to a FLOSS based model business" by Bogdan Manolea @ e...
"Legal aspects related to a FLOSS based model business" by Bogdan Manolea @ e..."Legal aspects related to a FLOSS based model business" by Bogdan Manolea @ e...
"Legal aspects related to a FLOSS based model business" by Bogdan Manolea @ e...eLiberatica
 
"OSS in Public Administrations - A short Report from the European Level" by B...
"OSS in Public Administrations - A short Report from the European Level" by B..."OSS in Public Administrations - A short Report from the European Level" by B...
"OSS in Public Administrations - A short Report from the European Level" by B...eLiberatica
 
"The Future of Enterprise Content Management" by Aleksander Farstad @ eLibera...
"The Future of Enterprise Content Management" by Aleksander Farstad @ eLibera..."The Future of Enterprise Content Management" by Aleksander Farstad @ eLibera...
"The Future of Enterprise Content Management" by Aleksander Farstad @ eLibera...eLiberatica
 
"Integrating Open Source into Your Business" by Adam Jollans @ eLiberatica 2008
"Integrating Open Source into Your Business" by Adam Jollans @ eLiberatica 2008"Integrating Open Source into Your Business" by Adam Jollans @ eLiberatica 2008
"Integrating Open Source into Your Business" by Adam Jollans @ eLiberatica 2008eLiberatica
 
"Open Source at Microsoft" by Zoli Herczeg @ eLiberatica 2008
"Open Source at Microsoft" by Zoli Herczeg @ eLiberatica 2008"Open Source at Microsoft" by Zoli Herczeg @ eLiberatica 2008
"Open Source at Microsoft" by Zoli Herczeg @ eLiberatica 2008eLiberatica
 
"The Past Present and Future of the Mozilla Foundation" by Zak Greant @ eLibe...
"The Past Present and Future of the Mozilla Foundation" by Zak Greant @ eLibe..."The Past Present and Future of the Mozilla Foundation" by Zak Greant @ eLibe...
"The Past Present and Future of the Mozilla Foundation" by Zak Greant @ eLibe...eLiberatica
 
"Open Source and the Evolution of Communication" by Zak Greant @ eLiberatica ...
"Open Source and the Evolution of Communication" by Zak Greant @ eLiberatica ..."Open Source and the Evolution of Communication" by Zak Greant @ eLiberatica ...
"Open Source and the Evolution of Communication" by Zak Greant @ eLiberatica ...eLiberatica
 
"Building Careers with Free Software and Open Source" by Zak Greant @ eLibera...
"Building Careers with Free Software and Open Source" by Zak Greant @ eLibera..."Building Careers with Free Software and Open Source" by Zak Greant @ eLibera...
"Building Careers with Free Software and Open Source" by Zak Greant @ eLibera...eLiberatica
 
"Open Source and Sun" by Vassilis Boulogiorgos @ eLiberatica 2007
"Open Source and Sun" by Vassilis Boulogiorgos @ eLiberatica 2007"Open Source and Sun" by Vassilis Boulogiorgos @ eLiberatica 2007
"Open Source and Sun" by Vassilis Boulogiorgos @ eLiberatica 2007eLiberatica
 
"Real Time Ethernet Cryptor Based on Linux" by Tiberiu Socaciu @ eLiberatica ...
"Real Time Ethernet Cryptor Based on Linux" by Tiberiu Socaciu @ eLiberatica ..."Real Time Ethernet Cryptor Based on Linux" by Tiberiu Socaciu @ eLiberatica ...
"Real Time Ethernet Cryptor Based on Linux" by Tiberiu Socaciu @ eLiberatica ...eLiberatica
 
"Are You Afraid of the Semantic Web" by Sabin Corneliu Buraga @ eLiberatica 2007
"Are You Afraid of the Semantic Web" by Sabin Corneliu Buraga @ eLiberatica 2007"Are You Afraid of the Semantic Web" by Sabin Corneliu Buraga @ eLiberatica 2007
"Are You Afraid of the Semantic Web" by Sabin Corneliu Buraga @ eLiberatica 2007eLiberatica
 
"Open Source in the ERP CRM solutions arena Case study SocrateOpen powered by...
"Open Source in the ERP CRM solutions arena Case study SocrateOpen powered by..."Open Source in the ERP CRM solutions arena Case study SocrateOpen powered by...
"Open Source in the ERP CRM solutions arena Case study SocrateOpen powered by...eLiberatica
 

More from eLiberatica (20)

"Komodo - Why we chose to make our product open source" by Shane Caraveo @ eL...
"Komodo - Why we chose to make our product open source" by Shane Caraveo @ eL..."Komodo - Why we chose to make our product open source" by Shane Caraveo @ eL...
"Komodo - Why we chose to make our product open source" by Shane Caraveo @ eL...
 
"Introducing Red Hat Training Center" by Radu Radulescu @ eLiberatica 2008
"Introducing Red Hat Training Center" by Radu Radulescu @ eLiberatica 2008"Introducing Red Hat Training Center" by Radu Radulescu @ eLiberatica 2008
"Introducing Red Hat Training Center" by Radu Radulescu @ eLiberatica 2008
 
"HP vision Governing the use of open source" by Martin Michlmayr @ eLiberatic...
"HP vision Governing the use of open source" by Martin Michlmayr @ eLiberatic..."HP vision Governing the use of open source" by Martin Michlmayr @ eLiberatic...
"HP vision Governing the use of open source" by Martin Michlmayr @ eLiberatic...
 
"Open Source Software Middleware for The Internet of Things - Project ASPIRE"...
"Open Source Software Middleware for The Internet of Things - Project ASPIRE"..."Open Source Software Middleware for The Internet of Things - Project ASPIRE"...
"Open Source Software Middleware for The Internet of Things - Project ASPIRE"...
 
"Introducing eConference" by Eugen Rotariu @ eLiberatica 2008
"Introducing eConference" by Eugen Rotariu @ eLiberatica 2008"Introducing eConference" by Eugen Rotariu @ eLiberatica 2008
"Introducing eConference" by Eugen Rotariu @ eLiberatica 2008
 
"Mozilla Messaging and Thunderbird - why and how" by David Ascher @ eLiberati...
"Mozilla Messaging and Thunderbird - why and how" by David Ascher @ eLiberati..."Mozilla Messaging and Thunderbird - why and how" by David Ascher @ eLiberati...
"Mozilla Messaging and Thunderbird - why and how" by David Ascher @ eLiberati...
 
"For the first time in Europe Digital ID providers and OpenID service for Rom...
"For the first time in Europe Digital ID providers and OpenID service for Rom..."For the first time in Europe Digital ID providers and OpenID service for Rom...
"For the first time in Europe Digital ID providers and OpenID service for Rom...
 
"Standing on the Shoulders of Giants" by Brian King @ eLiberatica 2008
"Standing on the Shoulders of Giants" by Brian King @ eLiberatica 2008"Standing on the Shoulders of Giants" by Brian King @ eLiberatica 2008
"Standing on the Shoulders of Giants" by Brian King @ eLiberatica 2008
 
"Legal aspects related to a FLOSS based model business" by Bogdan Manolea @ e...
"Legal aspects related to a FLOSS based model business" by Bogdan Manolea @ e..."Legal aspects related to a FLOSS based model business" by Bogdan Manolea @ e...
"Legal aspects related to a FLOSS based model business" by Bogdan Manolea @ e...
 
"OSS in Public Administrations - A short Report from the European Level" by B...
"OSS in Public Administrations - A short Report from the European Level" by B..."OSS in Public Administrations - A short Report from the European Level" by B...
"OSS in Public Administrations - A short Report from the European Level" by B...
 
"The Future of Enterprise Content Management" by Aleksander Farstad @ eLibera...
"The Future of Enterprise Content Management" by Aleksander Farstad @ eLibera..."The Future of Enterprise Content Management" by Aleksander Farstad @ eLibera...
"The Future of Enterprise Content Management" by Aleksander Farstad @ eLibera...
 
"Integrating Open Source into Your Business" by Adam Jollans @ eLiberatica 2008
"Integrating Open Source into Your Business" by Adam Jollans @ eLiberatica 2008"Integrating Open Source into Your Business" by Adam Jollans @ eLiberatica 2008
"Integrating Open Source into Your Business" by Adam Jollans @ eLiberatica 2008
 
"Open Source at Microsoft" by Zoli Herczeg @ eLiberatica 2008
"Open Source at Microsoft" by Zoli Herczeg @ eLiberatica 2008"Open Source at Microsoft" by Zoli Herczeg @ eLiberatica 2008
"Open Source at Microsoft" by Zoli Herczeg @ eLiberatica 2008
 
"The Past Present and Future of the Mozilla Foundation" by Zak Greant @ eLibe...
"The Past Present and Future of the Mozilla Foundation" by Zak Greant @ eLibe..."The Past Present and Future of the Mozilla Foundation" by Zak Greant @ eLibe...
"The Past Present and Future of the Mozilla Foundation" by Zak Greant @ eLibe...
 
"Open Source and the Evolution of Communication" by Zak Greant @ eLiberatica ...
"Open Source and the Evolution of Communication" by Zak Greant @ eLiberatica ..."Open Source and the Evolution of Communication" by Zak Greant @ eLiberatica ...
"Open Source and the Evolution of Communication" by Zak Greant @ eLiberatica ...
 
"Building Careers with Free Software and Open Source" by Zak Greant @ eLibera...
"Building Careers with Free Software and Open Source" by Zak Greant @ eLibera..."Building Careers with Free Software and Open Source" by Zak Greant @ eLibera...
"Building Careers with Free Software and Open Source" by Zak Greant @ eLibera...
 
"Open Source and Sun" by Vassilis Boulogiorgos @ eLiberatica 2007
"Open Source and Sun" by Vassilis Boulogiorgos @ eLiberatica 2007"Open Source and Sun" by Vassilis Boulogiorgos @ eLiberatica 2007
"Open Source and Sun" by Vassilis Boulogiorgos @ eLiberatica 2007
 
"Real Time Ethernet Cryptor Based on Linux" by Tiberiu Socaciu @ eLiberatica ...
"Real Time Ethernet Cryptor Based on Linux" by Tiberiu Socaciu @ eLiberatica ..."Real Time Ethernet Cryptor Based on Linux" by Tiberiu Socaciu @ eLiberatica ...
"Real Time Ethernet Cryptor Based on Linux" by Tiberiu Socaciu @ eLiberatica ...
 
"Are You Afraid of the Semantic Web" by Sabin Corneliu Buraga @ eLiberatica 2007
"Are You Afraid of the Semantic Web" by Sabin Corneliu Buraga @ eLiberatica 2007"Are You Afraid of the Semantic Web" by Sabin Corneliu Buraga @ eLiberatica 2007
"Are You Afraid of the Semantic Web" by Sabin Corneliu Buraga @ eLiberatica 2007
 
"Open Source in the ERP CRM solutions arena Case study SocrateOpen powered by...
"Open Source in the ERP CRM solutions arena Case study SocrateOpen powered by..."Open Source in the ERP CRM solutions arena Case study SocrateOpen powered by...
"Open Source in the ERP CRM solutions arena Case study SocrateOpen powered by...
 

Recently uploaded

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

"BitDefender - What's Next" by Alexandru Balan @ eLiberatica 2008

  • 1. What's Next ? Alexandru BĂLAN <abalan@bitdefender.com>
  • 2. Short Summary • Last year... – Types of malware – Should AV producers take care of Linux boxes as well ? • Now... – More threats – More defenses • What's next ?
  • 3. Last year we talked about... • Examples of malware (viruses, rootkits, exploits, social engineering)‫‏‬ • Windows people having all the “fun” • Apparently there's no need right now for AV producers to extend their focus to *NIX firewalls, rootkits and so on.
  • 4. However • The industry is shifting from protecting the data to protecting the information • If companies have any number of employees at all, studies show and human nature shows that there's always going to be be somebody that is going to try and take advantage of the system • New threats are emerging
  • 5. Now.. • More threats (not necessarily new)‫‏‬ – Botnets – Code running on your computer (client side javascript)‫‏‬ – Tons of php/sql_injection/other exploits. – The human factor is (as expected) an increasing risk
  • 6. What do you see as tomorrow's threats and defenses ? Examples: • Cisco/IOS rootkit – Presented at EUSecWest London UK – May 2008 – Just “an interesting concept ?” Sebastian Muniz: I've been told by the cousin of a friend of my girlfriend that this kind of rootkit has previously been used :)‫‏‬ Source: http://eusecwest.com/sebastian-muniz-da-ios-rootkit.html
  • 7. What do you see as tomorrow's threats and defenses ? • Web OS – It's going to happen! • Threats from and through social networks (read: facebook, myspace, ect, ect) are just an example: – It's not exactly spam and it's not exactly phishing. You can't even call it “tricking the user”. The users are ignorant enough to click everything and get in contact with everyone – 5 out of 10 “add me” requests are approved on IM – 7 out of 10 “add me” requests are approved in SNS – Usually comments are on a “accept all” basis
  • 8. What do you see as tomorrow's threats and defenses ? • Phlashing – Remote DOS in any device that supports firmware update – Attacking system firmware isn't a new tactic—the CIH/Chernobyl virus was capable of overwriting BIOS firmware back in 1998—but focusing such attacks on network hardware would be an unusual step, and could prove quite successful in at least the short term. Source: http://arstechnica.com/news.ars/post/20080520-phlashing-attacks-could-render-network- hardware-useless.html
  • 9. What do you see as tomorrow's threats and defenses ? • “14-Year-Old Turns Tram System Into Personal Train Set” – A Polish teenager allegedly turned the tram system in the city of Lodz into his own personal train set, triggering chaos and derailing four vehicles in the process. Twelve people were injured in one of the incidents. – The 14-year-old modified a TV remote control so that it could be used to change track points Source : http://www.theregister.co.uk/2008/01/11/tram_hack/
  • 10. What do you see as tomorrow's threats and defenses ? • Firewire DMA bug (connect a laptop to a firewire port, trick the machine into allowing you read/write memory access)‫‏‬ – A tool targeting mainly Windows XP systems has been released by Adam Boileau – To use the tool, hackers must connect a Linux-based computer to a Firewire port on the target machine. The machine is then tricked into allowing the attacking computer to have read and write access to its memory. Source: http://www.theage.com.au/news/security/hack-into-a-windows-pc-no-password- needed/2008/03/04/1204402423638.html
  • 11. The conclusion • Innovation and allocating resources to develop a solution for a future threat (i.e. cisco anti-rootkit) is risky. • Awareness is still low and surprisingly, getting lower. 10/10 random people asked, will not bother with security for “exotic” threats. • Leaks from the underground have been plugged. We haven't heard about anything tasty in some years. This silence is a bad sign
  • 12. The conclusion (cont)‫‏‬ Because of the above, it's difficult to predict and develop the security solution for tomorrow and it's increasingly easy for attackers to predict where and how to strike next.
  • 13. What can YOU do • Share information ! • Demand more from the industry. No matter how crazy it might sound today it might just be something we won't be able to live without tomorrow • Don't be afraid to “waste resources” with innovation. • Let us know. Send your requests and thoughts toabalan@bitdefender.com . My spam filters as well as our research teams will be happy to take note of them
  • 14. Q&A