SlideShare a Scribd company logo
Cybercrime & Business
How do we fight this war?




Pirkka Palomäki
Chief Technology Officer
F-Secure Corporation
Operating system
Floppy                             Browsers
Lan                                Java
Email                              Adobe Flash
Web                                Adobe PDF reader
                                   Quicktime




     facebook, myspace, twitter, linkedin?
Acrobat
Flash
Case Darkmarket
Featuring
                                Mr. Adewale Taiwo



Featuring Mr. Cagatay Evyapan
          aka "Cha0"
Case Mebroot
Case Mebroot – short introduction
   The first complex MBR rootkit with malicious payload
      Kernel-mode downloader and backdoor
      Downloads PWS and banking Trojan components


   Strengths of Mebroot:
      No executable files on file system
      No registry keys or standard launch points
      No driver module in module list
      Minimal memory footprint
      Early execution during system startup
      Stealth read/write disk operations
      Stealth Anti-Removal protection
      Totally generic, open malware platform (MAOS)
How do we work?
F-Secure Dashboard
Myth To Forget
Obsolete for
Hundreds of Thousands
 of samples every day
Security Research Flow; The Critical Chain




    Malware                   Detection Malware
                 Automatic                          Real-time
   Samples /                   Engine Researchers &
                  Analysis                           delivery
   Acquisition               Technology Analysts
SMA Decisions – daily
thank you

More Related Content

Viewers also liked

Managerial economics summary
Managerial economics summaryManagerial economics summary
Managerial economics summary
John Cousins
 
Economic survey
Economic surveyEconomic survey
Economic surveybudgetana
 
detyrë kursi Inspektimi byirenakotobelli
detyrë kursi Inspektimi byirenakotobellidetyrë kursi Inspektimi byirenakotobelli
detyrë kursi Inspektimi byirenakotobelli
irena kotobelli
 
Analysing Business Markets
Analysing Business MarketsAnalysing Business Markets
Analysing Business Markets
Krishna M N
 
Raiff Bancassurance
Raiff BancassuranceRaiff Bancassurance
Raiff Bancassurance
Aleksei79
 
Problemet e menaxhimit dhe te rritjes se bizneseve - Nehar islami dhe Dafina ...
Problemet e menaxhimit dhe te rritjes se bizneseve - Nehar islami dhe Dafina ...Problemet e menaxhimit dhe te rritjes se bizneseve - Nehar islami dhe Dafina ...
Problemet e menaxhimit dhe te rritjes se bizneseve - Nehar islami dhe Dafina ...
Target
 
Rast studimore "ProCreditBank"
Rast studimore "ProCreditBank"Rast studimore "ProCreditBank"
Rast studimore "ProCreditBank"
Fitore ZEQIRI
 
Kompania DEKA
Kompania DEKAKompania DEKA
Kompania DEKA
denisa hysenlikaj
 
Ekonomi "Probleme te konkurrences ne tregun tone."
Ekonomi "Probleme te konkurrences ne tregun tone."Ekonomi "Probleme te konkurrences ne tregun tone."
Ekonomi "Probleme te konkurrences ne tregun tone."
Maja
 
Letters Requesting Payment
Letters Requesting PaymentLetters Requesting Payment
Letters Requesting PaymentLeite Bayukaka
 
Plani i biznesit.docxfilename= utf-8''plani i biznesit
Plani i biznesit.docxfilename= utf-8''plani i biznesitPlani i biznesit.docxfilename= utf-8''plani i biznesit
Plani i biznesit.docxfilename= utf-8''plani i biznesit
Landmark Communications Tirana
 
Presentation1
Presentation1Presentation1
Presentation1
endrit caushi
 
Nehar islami dhe Arben Dedaj-Krahasimi i bankes Teb dhe i bankes Raiffeisen
Nehar islami dhe Arben Dedaj-Krahasimi i bankes Teb dhe i bankes RaiffeisenNehar islami dhe Arben Dedaj-Krahasimi i bankes Teb dhe i bankes Raiffeisen
Nehar islami dhe Arben Dedaj-Krahasimi i bankes Teb dhe i bankes Raiffeisen
Target
 

Viewers also liked (16)

Managerial economics summary
Managerial economics summaryManagerial economics summary
Managerial economics summary
 
Economic survey
Economic surveyEconomic survey
Economic survey
 
Deka company
Deka companyDeka company
Deka company
 
detyrë kursi Inspektimi byirenakotobelli
detyrë kursi Inspektimi byirenakotobellidetyrë kursi Inspektimi byirenakotobelli
detyrë kursi Inspektimi byirenakotobelli
 
Analysing Business Markets
Analysing Business MarketsAnalysing Business Markets
Analysing Business Markets
 
Raiff Bancassurance
Raiff BancassuranceRaiff Bancassurance
Raiff Bancassurance
 
Economics
EconomicsEconomics
Economics
 
Problemet e menaxhimit dhe te rritjes se bizneseve - Nehar islami dhe Dafina ...
Problemet e menaxhimit dhe te rritjes se bizneseve - Nehar islami dhe Dafina ...Problemet e menaxhimit dhe te rritjes se bizneseve - Nehar islami dhe Dafina ...
Problemet e menaxhimit dhe te rritjes se bizneseve - Nehar islami dhe Dafina ...
 
Rast studimore "ProCreditBank"
Rast studimore "ProCreditBank"Rast studimore "ProCreditBank"
Rast studimore "ProCreditBank"
 
Kompania DEKA
Kompania DEKAKompania DEKA
Kompania DEKA
 
Ekonomi "Probleme te konkurrences ne tregun tone."
Ekonomi "Probleme te konkurrences ne tregun tone."Ekonomi "Probleme te konkurrences ne tregun tone."
Ekonomi "Probleme te konkurrences ne tregun tone."
 
Letters Requesting Payment
Letters Requesting PaymentLetters Requesting Payment
Letters Requesting Payment
 
Plani i biznesit.docxfilename= utf-8''plani i biznesit
Plani i biznesit.docxfilename= utf-8''plani i biznesitPlani i biznesit.docxfilename= utf-8''plani i biznesit
Plani i biznesit.docxfilename= utf-8''plani i biznesit
 
Presentation1
Presentation1Presentation1
Presentation1
 
Nehar islami dhe Arben Dedaj-Krahasimi i bankes Teb dhe i bankes Raiffeisen
Nehar islami dhe Arben Dedaj-Krahasimi i bankes Teb dhe i bankes RaiffeisenNehar islami dhe Arben Dedaj-Krahasimi i bankes Teb dhe i bankes Raiffeisen
Nehar islami dhe Arben Dedaj-Krahasimi i bankes Teb dhe i bankes Raiffeisen
 
SAP FI-BANK
SAP  FI-BANKSAP  FI-BANK
SAP FI-BANK
 

Similar to Cybercrime & Business. Jak wygrać tę wojnę?

Keynote fx try harder 2 be yourself
Keynote fx   try harder 2 be yourselfKeynote fx   try harder 2 be yourself
Keynote fx try harder 2 be yourselfDefconRussia
 
Modern malware and threats
Modern malware and threatsModern malware and threats
Modern malware and threats
Martin Holovský
 
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
AgileNetwork
 
The A and the P of the T
The A and the P of the TThe A and the P of the T
The A and the P of the T
Cyphort
 
The A and the P of the T
The A and the P of the TThe A and the P of the T
The A and the P of the T
pinkflawd
 
Thinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and PreventionThinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and Prevention
David Perkins
 
Hacking ATM machines for fun and profit!
Hacking ATM machines for fun and profit!Hacking ATM machines for fun and profit!
Hacking ATM machines for fun and profit!
Zigoo0
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
Satria Ady Pradana
 
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
Felipe Prado
 
How websites are attacked
How websites are attackedHow websites are attacked
How websites are attacked
Mykonos Software
 
Malware's most wanted-zberp-the_financial_trojan
Malware's most wanted-zberp-the_financial_trojanMalware's most wanted-zberp-the_financial_trojan
Malware's most wanted-zberp-the_financial_trojan
Cyphort
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec
 
Cansec West 2009
Cansec West 2009Cansec West 2009
Cansec West 2009abhicc285
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
Akiumi Hasegawa
 
Cyber Defense Automation
Cyber Defense AutomationCyber Defense Automation
Cyber Defense Automation
♟Sergej Epp
 
Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015
SLBdiensten
 
Securing Underprotected APIs - Deja vu Security
Securing Underprotected APIs - Deja vu SecuritySecuring Underprotected APIs - Deja vu Security
Securing Underprotected APIs - Deja vu Security
Deja vu Security
 
Malware Analysis
Malware AnalysisMalware Analysis
Malware Analysis
Ramin Farajpour Cami
 
GDP Product Presentation
GDP Product PresentationGDP Product Presentation
GDP Product Presentationtswong
 
Automated Penetration Testing With Core Impact
Automated Penetration Testing With Core ImpactAutomated Penetration Testing With Core Impact
Automated Penetration Testing With Core Impact
Tom Eston
 

Similar to Cybercrime & Business. Jak wygrać tę wojnę? (20)

Keynote fx try harder 2 be yourself
Keynote fx   try harder 2 be yourselfKeynote fx   try harder 2 be yourself
Keynote fx try harder 2 be yourself
 
Modern malware and threats
Modern malware and threatsModern malware and threats
Modern malware and threats
 
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
 
The A and the P of the T
The A and the P of the TThe A and the P of the T
The A and the P of the T
 
The A and the P of the T
The A and the P of the TThe A and the P of the T
The A and the P of the T
 
Thinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and PreventionThinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and Prevention
 
Hacking ATM machines for fun and profit!
Hacking ATM machines for fun and profit!Hacking ATM machines for fun and profit!
Hacking ATM machines for fun and profit!
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
 
How websites are attacked
How websites are attackedHow websites are attacked
How websites are attacked
 
Malware's most wanted-zberp-the_financial_trojan
Malware's most wanted-zberp-the_financial_trojanMalware's most wanted-zberp-the_financial_trojan
Malware's most wanted-zberp-the_financial_trojan
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Cansec West 2009
Cansec West 2009Cansec West 2009
Cansec West 2009
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
 
Cyber Defense Automation
Cyber Defense AutomationCyber Defense Automation
Cyber Defense Automation
 
Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015
 
Securing Underprotected APIs - Deja vu Security
Securing Underprotected APIs - Deja vu SecuritySecuring Underprotected APIs - Deja vu Security
Securing Underprotected APIs - Deja vu Security
 
Malware Analysis
Malware AnalysisMalware Analysis
Malware Analysis
 
GDP Product Presentation
GDP Product PresentationGDP Product Presentation
GDP Product Presentation
 
Automated Penetration Testing With Core Impact
Automated Penetration Testing With Core ImpactAutomated Penetration Testing With Core Impact
Automated Penetration Testing With Core Impact
 

More from Biznes to Rozmowy

Bezpłatne WIFI rozkręca biznes - Łukasz Antoniewicz
Bezpłatne WIFI rozkręca biznes - Łukasz AntoniewiczBezpłatne WIFI rozkręca biznes - Łukasz Antoniewicz
Bezpłatne WIFI rozkręca biznes - Łukasz Antoniewicz
Biznes to Rozmowy
 
Jak wypromować swoją firmę w internecie. Przykłady kampanii, m.in Google Adwo...
Jak wypromować swoją firmę w internecie. Przykłady kampanii, m.in Google Adwo...Jak wypromować swoją firmę w internecie. Przykłady kampanii, m.in Google Adwo...
Jak wypromować swoją firmę w internecie. Przykłady kampanii, m.in Google Adwo...
Biznes to Rozmowy
 
Warto być widocznym w Social Mediach. Facebook, Linkedin. - Bartek Brzoskowski
Warto być widocznym w Social Mediach. Facebook, Linkedin. - Bartek BrzoskowskiWarto być widocznym w Social Mediach. Facebook, Linkedin. - Bartek Brzoskowski
Warto być widocznym w Social Mediach. Facebook, Linkedin. - Bartek Brzoskowski
Biznes to Rozmowy
 
Kurs malowania Mona Lisy... Czyli jak stworzyć markę, którą Klienci będą koch...
Kurs malowania Mona Lisy... Czyli jak stworzyć markę, którą Klienci będą koch...Kurs malowania Mona Lisy... Czyli jak stworzyć markę, którą Klienci będą koch...
Kurs malowania Mona Lisy... Czyli jak stworzyć markę, którą Klienci będą koch...
Biznes to Rozmowy
 
Driving at 200 km/ into a wall of security issues in personal cloud?
Driving at 200 km/ into a wall of security issues in personal cloud?Driving at 200 km/ into a wall of security issues in personal cloud?
Driving at 200 km/ into a wall of security issues in personal cloud?
Biznes to Rozmowy
 
Nas nie zaatakują!
Nas nie zaatakują!Nas nie zaatakują!
Nas nie zaatakują!
Biznes to Rozmowy
 
The future of human: brand interface
The future of human: brand interfaceThe future of human: brand interface
The future of human: brand interface
Biznes to Rozmowy
 
Brand video
Brand videoBrand video
Brand video
Biznes to Rozmowy
 
Od internetu rzeczy do biohackingu: o trendach i mikrotrendach, które były, s...
Od internetu rzeczy do biohackingu: o trendach i mikrotrendach, które były, s...Od internetu rzeczy do biohackingu: o trendach i mikrotrendach, które były, s...
Od internetu rzeczy do biohackingu: o trendach i mikrotrendach, które były, s...
Biznes to Rozmowy
 
Przedsiębiorstwo 2.0 Jak korzystać z elastycznych, bezpiecznych rozwiązań a n...
Przedsiębiorstwo 2.0 Jak korzystać z elastycznych, bezpiecznych rozwiązań a n...Przedsiębiorstwo 2.0 Jak korzystać z elastycznych, bezpiecznych rozwiązań a n...
Przedsiębiorstwo 2.0 Jak korzystać z elastycznych, bezpiecznych rozwiązań a n...
Biznes to Rozmowy
 
Komunikacja po prostu.
Komunikacja po prostu.Komunikacja po prostu.
Komunikacja po prostu.
Biznes to Rozmowy
 
Kreator czy technokrata? Kogo bardziej potrzebuje innowacyjność
Kreator czy technokrata? Kogo bardziej potrzebuje innowacyjnośćKreator czy technokrata? Kogo bardziej potrzebuje innowacyjność
Kreator czy technokrata? Kogo bardziej potrzebuje innowacyjność
Biznes to Rozmowy
 
Kim są Early Adopters i dlaczego była nią Twoja Babcia?
Kim są Early Adopters i dlaczego była nią Twoja Babcia?Kim są Early Adopters i dlaczego była nią Twoja Babcia?
Kim są Early Adopters i dlaczego była nią Twoja Babcia?
Biznes to Rozmowy
 
1 + 1 > 2. Jak zamieniać rozmowy w biznes.
1 + 1 > 2. Jak zamieniać rozmowy w biznes.1 + 1 > 2. Jak zamieniać rozmowy w biznes.
1 + 1 > 2. Jak zamieniać rozmowy w biznes.
Biznes to Rozmowy
 
Highly-Effective Relationships in a Technology-Driven World: An Impossible Po...
Highly-Effective Relationships in a Technology-Driven World: An Impossible Po...Highly-Effective Relationships in a Technology-Driven World: An Impossible Po...
Highly-Effective Relationships in a Technology-Driven World: An Impossible Po...
Biznes to Rozmowy
 
Video will touch us all.
Video will touch us all.Video will touch us all.
Video will touch us all.
Biznes to Rozmowy
 
WiFi - jakiego nie znacie.
WiFi - jakiego nie znacie.WiFi - jakiego nie znacie.
WiFi - jakiego nie znacie.
Biznes to Rozmowy
 
Golden Eye. I wiesz więcej.
Golden Eye. I wiesz więcej.Golden Eye. I wiesz więcej.
Golden Eye. I wiesz więcej.
Biznes to Rozmowy
 
What's Next
What's NextWhat's Next
What's Next
Biznes to Rozmowy
 
Jak żeglować na oceanie informacji. Nowoczesny pracownik w erze komunikacji g...
Jak żeglować na oceanie informacji. Nowoczesny pracownik w erze komunikacji g...Jak żeglować na oceanie informacji. Nowoczesny pracownik w erze komunikacji g...
Jak żeglować na oceanie informacji. Nowoczesny pracownik w erze komunikacji g...
Biznes to Rozmowy
 

More from Biznes to Rozmowy (20)

Bezpłatne WIFI rozkręca biznes - Łukasz Antoniewicz
Bezpłatne WIFI rozkręca biznes - Łukasz AntoniewiczBezpłatne WIFI rozkręca biznes - Łukasz Antoniewicz
Bezpłatne WIFI rozkręca biznes - Łukasz Antoniewicz
 
Jak wypromować swoją firmę w internecie. Przykłady kampanii, m.in Google Adwo...
Jak wypromować swoją firmę w internecie. Przykłady kampanii, m.in Google Adwo...Jak wypromować swoją firmę w internecie. Przykłady kampanii, m.in Google Adwo...
Jak wypromować swoją firmę w internecie. Przykłady kampanii, m.in Google Adwo...
 
Warto być widocznym w Social Mediach. Facebook, Linkedin. - Bartek Brzoskowski
Warto być widocznym w Social Mediach. Facebook, Linkedin. - Bartek BrzoskowskiWarto być widocznym w Social Mediach. Facebook, Linkedin. - Bartek Brzoskowski
Warto być widocznym w Social Mediach. Facebook, Linkedin. - Bartek Brzoskowski
 
Kurs malowania Mona Lisy... Czyli jak stworzyć markę, którą Klienci będą koch...
Kurs malowania Mona Lisy... Czyli jak stworzyć markę, którą Klienci będą koch...Kurs malowania Mona Lisy... Czyli jak stworzyć markę, którą Klienci będą koch...
Kurs malowania Mona Lisy... Czyli jak stworzyć markę, którą Klienci będą koch...
 
Driving at 200 km/ into a wall of security issues in personal cloud?
Driving at 200 km/ into a wall of security issues in personal cloud?Driving at 200 km/ into a wall of security issues in personal cloud?
Driving at 200 km/ into a wall of security issues in personal cloud?
 
Nas nie zaatakują!
Nas nie zaatakują!Nas nie zaatakują!
Nas nie zaatakują!
 
The future of human: brand interface
The future of human: brand interfaceThe future of human: brand interface
The future of human: brand interface
 
Brand video
Brand videoBrand video
Brand video
 
Od internetu rzeczy do biohackingu: o trendach i mikrotrendach, które były, s...
Od internetu rzeczy do biohackingu: o trendach i mikrotrendach, które były, s...Od internetu rzeczy do biohackingu: o trendach i mikrotrendach, które były, s...
Od internetu rzeczy do biohackingu: o trendach i mikrotrendach, które były, s...
 
Przedsiębiorstwo 2.0 Jak korzystać z elastycznych, bezpiecznych rozwiązań a n...
Przedsiębiorstwo 2.0 Jak korzystać z elastycznych, bezpiecznych rozwiązań a n...Przedsiębiorstwo 2.0 Jak korzystać z elastycznych, bezpiecznych rozwiązań a n...
Przedsiębiorstwo 2.0 Jak korzystać z elastycznych, bezpiecznych rozwiązań a n...
 
Komunikacja po prostu.
Komunikacja po prostu.Komunikacja po prostu.
Komunikacja po prostu.
 
Kreator czy technokrata? Kogo bardziej potrzebuje innowacyjność
Kreator czy technokrata? Kogo bardziej potrzebuje innowacyjnośćKreator czy technokrata? Kogo bardziej potrzebuje innowacyjność
Kreator czy technokrata? Kogo bardziej potrzebuje innowacyjność
 
Kim są Early Adopters i dlaczego była nią Twoja Babcia?
Kim są Early Adopters i dlaczego była nią Twoja Babcia?Kim są Early Adopters i dlaczego była nią Twoja Babcia?
Kim są Early Adopters i dlaczego była nią Twoja Babcia?
 
1 + 1 > 2. Jak zamieniać rozmowy w biznes.
1 + 1 > 2. Jak zamieniać rozmowy w biznes.1 + 1 > 2. Jak zamieniać rozmowy w biznes.
1 + 1 > 2. Jak zamieniać rozmowy w biznes.
 
Highly-Effective Relationships in a Technology-Driven World: An Impossible Po...
Highly-Effective Relationships in a Technology-Driven World: An Impossible Po...Highly-Effective Relationships in a Technology-Driven World: An Impossible Po...
Highly-Effective Relationships in a Technology-Driven World: An Impossible Po...
 
Video will touch us all.
Video will touch us all.Video will touch us all.
Video will touch us all.
 
WiFi - jakiego nie znacie.
WiFi - jakiego nie znacie.WiFi - jakiego nie znacie.
WiFi - jakiego nie znacie.
 
Golden Eye. I wiesz więcej.
Golden Eye. I wiesz więcej.Golden Eye. I wiesz więcej.
Golden Eye. I wiesz więcej.
 
What's Next
What's NextWhat's Next
What's Next
 
Jak żeglować na oceanie informacji. Nowoczesny pracownik w erze komunikacji g...
Jak żeglować na oceanie informacji. Nowoczesny pracownik w erze komunikacji g...Jak żeglować na oceanie informacji. Nowoczesny pracownik w erze komunikacji g...
Jak żeglować na oceanie informacji. Nowoczesny pracownik w erze komunikacji g...
 

Recently uploaded

What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
HumanResourceDimensi1
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
seoforlegalpillers
 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
fakeloginn69
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
anasabutalha2013
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
Bojamma2
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
NathanBaughman3
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
DerekIwanaka1
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
HARSHITHV26
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Navpack & Print
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
Ben Wann
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
tanyjahb
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
Sam H
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
Workforce Group
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
KaiNexus
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
Erika906060
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
sarahvanessa51503
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
awaisafdar
 
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
PaulBryant58
 

Recently uploaded (20)

What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
 
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
 

Cybercrime & Business. Jak wygrać tę wojnę?

  • 1.
  • 2. Cybercrime & Business How do we fight this war? Pirkka Palomäki Chief Technology Officer F-Secure Corporation
  • 3.
  • 4.
  • 5. Operating system Floppy Browsers Lan Java Email Adobe Flash Web Adobe PDF reader Quicktime facebook, myspace, twitter, linkedin?
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. Featuring Mr. Adewale Taiwo Featuring Mr. Cagatay Evyapan aka "Cha0"
  • 14.
  • 16. Case Mebroot – short introduction The first complex MBR rootkit with malicious payload Kernel-mode downloader and backdoor Downloads PWS and banking Trojan components Strengths of Mebroot: No executable files on file system No registry keys or standard launch points No driver module in module list Minimal memory footprint Early execution during system startup Stealth read/write disk operations Stealth Anti-Removal protection Totally generic, open malware platform (MAOS)
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. How do we work?
  • 24. Obsolete for Hundreds of Thousands of samples every day
  • 25. Security Research Flow; The Critical Chain Malware Detection Malware Automatic Real-time Samples / Engine Researchers & Analysis delivery Acquisition Technology Analysts
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.