Invata cum sa-ti protejezei organizatia neguvernamentala in mediul online. Urmareste prezentarea sustinuta de Loredana Botezatu, Specialist Securitate IT in cadrul Bitdefender, in timpul webinarului ”Securitate in mediul online pentru ONG-uri”, organizat de TechSoup Romania.
This document summarizes a security solution called Security for Virtualized Environments (SVE) by Bitdefender that provides comprehensive security for virtualized server and desktop environments. SVE protects organizations' virtualized Windows, Linux, and Solaris servers and desktops from malware across VMware, Citrix, Microsoft and other virtualization platforms. It delivers centralized antivirus scanning within a hardened security virtual appliance to maintain high consolidation ratios while protecting virtualized environments from security threats.
The document is a report on e-threats in the first half of 2012. It discusses the top malware threats which were largely unchanged from 2011. Trojan.AutorunInf and Win32.Worm.Downadup remained among the top three threats. Exploits surpassed other infection methods to become the most common way for malware to spread. The report also covers social networking threats on Facebook, the growing issue of Android malware, and trends in spam and phishing attacks. Looking ahead, state-sponsored cyberattacks are expected to continue as governments use malware to spy on other countries.
The first six months of 2011 have been placed under the sign of vulnerabilities and data breaches. While the malware landscape has witnessed little to no significant changes or epidemics, the numbers of data breaches and outages have increased considerably during the monitored period. IT security companies have been the primary targets of cybercriminals in an attempt to take them offline and, at the same time, to diminish their expertise in the eyes of their customers. Two of the most important IT security vendors that have been slammed with such attacks are HBGary and RSA, the security division of EMC.
Another major data leak followed by almost one month of outage was the Sony PlayStation Network incident, which exposed credit card details of about two million PSN users. The data leak was disclosed with a significant delay. The damage inflicted to users is yet to be estimated.
Significant outages have also happened in Egypt, following the massive wave of protests that took place on January 28. In order to prevent demonstrations and protests, the Egyptian government had all the local ISPs pull the plug on the Internet, thus rendering the bulk of electronic communications useless. The Internet blackout in Egypt has brought up endless debates on the importance of digital communications and the catastrophic results of outages.
Social networks have played a key role in maintaining a climate of insecurity. Although the number of e-threats especially designed to infect social network users (such as the infamous Koobface and Boonana worms) has dramatically decreased, cyber-criminals have focused their efforts on pushing an unprecedented number of rogue applications. The purpose of these virally/spreading applications is two-fold: on the one side, they redirect the users to websites where they are forced to fill in surveys; on the other side, these applications collect exhaustive information about their victims and their friends, which are later used in targeted spam and phishing campaigns.
Invata cum sa-ti protejezei organizatia neguvernamentala in mediul online. Urmareste prezentarea sustinuta de Loredana Botezatu, Specialist Securitate IT in cadrul Bitdefender, in timpul webinarului ”Securitate in mediul online pentru ONG-uri”, organizat de TechSoup Romania.
This document summarizes a security solution called Security for Virtualized Environments (SVE) by Bitdefender that provides comprehensive security for virtualized server and desktop environments. SVE protects organizations' virtualized Windows, Linux, and Solaris servers and desktops from malware across VMware, Citrix, Microsoft and other virtualization platforms. It delivers centralized antivirus scanning within a hardened security virtual appliance to maintain high consolidation ratios while protecting virtualized environments from security threats.
The document is a report on e-threats in the first half of 2012. It discusses the top malware threats which were largely unchanged from 2011. Trojan.AutorunInf and Win32.Worm.Downadup remained among the top three threats. Exploits surpassed other infection methods to become the most common way for malware to spread. The report also covers social networking threats on Facebook, the growing issue of Android malware, and trends in spam and phishing attacks. Looking ahead, state-sponsored cyberattacks are expected to continue as governments use malware to spy on other countries.
The first six months of 2011 have been placed under the sign of vulnerabilities and data breaches. While the malware landscape has witnessed little to no significant changes or epidemics, the numbers of data breaches and outages have increased considerably during the monitored period. IT security companies have been the primary targets of cybercriminals in an attempt to take them offline and, at the same time, to diminish their expertise in the eyes of their customers. Two of the most important IT security vendors that have been slammed with such attacks are HBGary and RSA, the security division of EMC.
Another major data leak followed by almost one month of outage was the Sony PlayStation Network incident, which exposed credit card details of about two million PSN users. The data leak was disclosed with a significant delay. The damage inflicted to users is yet to be estimated.
Significant outages have also happened in Egypt, following the massive wave of protests that took place on January 28. In order to prevent demonstrations and protests, the Egyptian government had all the local ISPs pull the plug on the Internet, thus rendering the bulk of electronic communications useless. The Internet blackout in Egypt has brought up endless debates on the importance of digital communications and the catastrophic results of outages.
Social networks have played a key role in maintaining a climate of insecurity. Although the number of e-threats especially designed to infect social network users (such as the infamous Koobface and Boonana worms) has dramatically decreased, cyber-criminals have focused their efforts on pushing an unprecedented number of rogue applications. The purpose of these virally/spreading applications is two-fold: on the one side, they redirect the users to websites where they are forced to fill in surveys; on the other side, these applications collect exhaustive information about their victims and their friends, which are later used in targeted spam and phishing campaigns.
Trojan.Autorun.Inf was the most prevalent malware in the first half of 2009, accounting for 31% of infections globally. The Downadup/Conficker worm infected around 11 million computers worldwide before being brought under control. The top 10 malware list also included Trojans that used autorun, adware, and threats targeting digital media files and browsers.
This document discusses the rise in phishing attacks in Romania from 2007 to 2009, with most attacks targeting the same institution in 2009. It also humorously suggests some "easy" ways to start phishing, such as using social media profiles and botnets to target individuals and their friends, though clearly intends this as a joke to illustrate the harms of phishing. The document ends by asking if the reader has any questions.
The document discusses using wave oriented K-means (WOKM) clustering to classify spam emails. WOKM improves upon traditional K-means clustering by taking snapshots of the incoming email stream over time, storing the resulting clusters, and using past clusters to help classify new messages. This allows WOKM to dynamically determine the optimal number of clusters, classify streams of emails rather than static datasets, and leverage historical clustering to aid in novelty detection and future classification. The authors found WOKM was effective, including its ability to cluster similar spam emails written in different languages.
Do Humans Beat Computers At Pattern RecognitionBitdefender
The document discusses the development of automated pattern recognition systems for detecting spam over time. It describes four main systems developed:
1. Pattern extraction - An early system that extracted groups of similar emails but was difficult to use.
2. Line detection - Focused on extracting relevant lines which increased response time by 6.4% and helped sign spam waves.
3. Cluster-based rule generation - Clustered emails and had analysts create signatures based on clusters, allowing universal application but limited detection.
4. Automated signature creation - Extracted patterns from spam to automatically generate and test signatures, decreasing reaction time by 5-10% while avoiding false positives.
The document discusses upcoming trends in phishing attacks and methods for detecting and preventing phishing. It notes that phishing attacks rose sharply in late 2008 and are expected to continue increasing. Specific statistics on phishing attacks in Romania from 2007-2009 are presented. Methods that cybercriminals use to conduct sophisticated phishing scams are described, along with the current techniques used by BitDefender to combat phishing.
Trojan.Autorun.Inf was the most prevalent malware in the first half of 2009, accounting for 31% of infections globally. The Downadup/Conficker worm infected around 11 million computers worldwide before being brought under control. The top 10 malware list also included Trojans that used autorun, adware, and threats targeting digital media files and browsers.
This document discusses the rise in phishing attacks in Romania from 2007 to 2009, with most attacks targeting the same institution in 2009. It also humorously suggests some "easy" ways to start phishing, such as using social media profiles and botnets to target individuals and their friends, though clearly intends this as a joke to illustrate the harms of phishing. The document ends by asking if the reader has any questions.
The document discusses using wave oriented K-means (WOKM) clustering to classify spam emails. WOKM improves upon traditional K-means clustering by taking snapshots of the incoming email stream over time, storing the resulting clusters, and using past clusters to help classify new messages. This allows WOKM to dynamically determine the optimal number of clusters, classify streams of emails rather than static datasets, and leverage historical clustering to aid in novelty detection and future classification. The authors found WOKM was effective, including its ability to cluster similar spam emails written in different languages.
Do Humans Beat Computers At Pattern RecognitionBitdefender
The document discusses the development of automated pattern recognition systems for detecting spam over time. It describes four main systems developed:
1. Pattern extraction - An early system that extracted groups of similar emails but was difficult to use.
2. Line detection - Focused on extracting relevant lines which increased response time by 6.4% and helped sign spam waves.
3. Cluster-based rule generation - Clustered emails and had analysts create signatures based on clusters, allowing universal application but limited detection.
4. Automated signature creation - Extracted patterns from spam to automatically generate and test signatures, decreasing reaction time by 5-10% while avoiding false positives.
The document discusses upcoming trends in phishing attacks and methods for detecting and preventing phishing. It notes that phishing attacks rose sharply in late 2008 and are expected to continue increasing. Specific statistics on phishing attacks in Romania from 2007-2009 are presented. Methods that cybercriminals use to conduct sophisticated phishing scams are described, along with the current techniques used by BitDefender to combat phishing.