Believe it or not, a higher percentage of religious sites have been compromised with malware than adult websites. Organizations of all kinds are at risk as are everyday internet users, but there are simple steps to take to avoid being duped and stay safe online.
Hatch! open #8: Facebook for FUN and PROFITAnh Ngoc Vu
[HATCH! OPEN]
Last year Facebook’s user base in Vietnam more than tripled from 2.6 million to 8.5 million. It is now the social network of choice for Vietnam’s young, urban internet users. Yet relatively few Vietnamese brands are using Facebook effectively to market themselves. In this coffee talk #8, Mr. Jason, our special guest from ClickSpace come and together share with us an interesting topic: Facebook for FUN and PROFIT.
To update with our event, please come and visit us at: http://www.hatch.vn/events.html
Presentation by Charl van der Walt, Jaco van Graan and Roelof Temmingh at ICM in 2000.
The presentation begins by giving an overview of what hackers are, what they do and what drives them. Security fundamentals such as encryption and the four pillars of information security are discussed. The presentation ends with discussions on the security process and security certification.
Hatch! open #8: Facebook for FUN and PROFITAnh Ngoc Vu
[HATCH! OPEN]
Last year Facebook’s user base in Vietnam more than tripled from 2.6 million to 8.5 million. It is now the social network of choice for Vietnam’s young, urban internet users. Yet relatively few Vietnamese brands are using Facebook effectively to market themselves. In this coffee talk #8, Mr. Jason, our special guest from ClickSpace come and together share with us an interesting topic: Facebook for FUN and PROFIT.
To update with our event, please come and visit us at: http://www.hatch.vn/events.html
Presentation by Charl van der Walt, Jaco van Graan and Roelof Temmingh at ICM in 2000.
The presentation begins by giving an overview of what hackers are, what they do and what drives them. Security fundamentals such as encryption and the four pillars of information security are discussed. The presentation ends with discussions on the security process and security certification.
Don't Change Infront of an Open Window and Other Real World Advice To Use OnlineKrista Neher
This presentation about Social Media for College Students was delivered by Krista Neher (www.KristaNeher.com) a College Social Media Speaker. Neher speaks on how college students and business professionals can use social media as an asset to build their brand, versus having social media cost them a job.
This presentation shows how college students can:
- Watch out for common mistakes on social media that could cost them a job
- Make a social media presence that impresses potential employers
- Stay safe and make smart choices online
Humorous discussion presenting some of the kids of risks that face public facing Web sites for corporations ranging from hacking to legal to social media scares. Slides are illustrative in nature and the aim of the talk is more awareness than anything else.
Scot McKee is a B2B Brand Consultant with over 25 years, and founder and Managing Director of Birddog, the multi-award winning B2B brand and digital marketing agency.
Read Scot's presentation from Oi15!
On Being HUMAN: The Importance of Writing More Engaging Emails (and more! )DJ Waldow
Want to get more return on your email marketing - and overall marketing - campaigns? Try this: BE MORE HUMAN.
This presentation share a TON of examples of how to be more engaging and human in your emails and marketing overall.
Writing for crisis management comes with its own set of rules. Learn core ideals, key tenets, and even strategy for social media crisis communications.
8 Things Your CEO Needs to Know Right Now About Social Media Tourism Trends i...Chad Wiebesick
Now, more than ever, social media and digital technology is increasingly influencing the way travelers plan, book and share their trip. Your social media efforts, however, will be an uphill battle if you cannot justify it to your CEO. Learn the top trends to help you build the business case for investing time, resources and budget in social media marketing
We’re living in a new media marketing era. It’s noisy and it’s crowded. People’s email inboxes are overflowing. Web ads and pop-ups and prestitials are in your face. Not to mention the social media overload.
Buyers are tuning out. Their eyes have glazed over. Bombarding your prospects with an unending stream of sales messages is no longer the answer.
So how do you stand out from the crowd? How do you have your buyers and prospects look forward to hearing from you? How do you build awareness … loyalty … and your customer base?
The answer is content marketing.
More and more marketers and content creators from around the world are discovering that an effective content strategy is essential to staying ahead of the curve.
At the Content Marketing Master Class, you’ll have a chance to learn from and interact with many of today’s top content strategists who have had a hand in shaping the industry into what it is today.
Leveraging Social Media, PR and Internal Comms 2010 - Lars VoedischLars Voedisch
Session at the "PR & Media 2010 Congress" in Singapore: A new paradigm for communicators - Leveraging social media, PR and internal communications in the digital age
What do corporate communicators need to
know about social media and what does it
mean for your organisation
Linking PR efforts to business objectives
Managing strategic media relations in
times of continuous change and crisis
What do our internal stakeholders expect
Identifying and understanding the new
influencers
Leveraging on upcoming trends and
opportunities
Symantec Enterprise Security Products are now part of BroadcomSymantec
Symantec Enterprise Security Products are now part of Broadcom. The consumer division of Symantec Corp. is now NortonLifeLock Inc. -- a standalone company dedicated to consumer cyber safety.
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
Youth in foster care face unique risks to their identity.In this webinar we discuss the risks, as well as tips for better protection. Watch on demand here: https://symc.ly/2N8cELV.
More Related Content
Similar to Symantec Security Awareness October 2012
Don't Change Infront of an Open Window and Other Real World Advice To Use OnlineKrista Neher
This presentation about Social Media for College Students was delivered by Krista Neher (www.KristaNeher.com) a College Social Media Speaker. Neher speaks on how college students and business professionals can use social media as an asset to build their brand, versus having social media cost them a job.
This presentation shows how college students can:
- Watch out for common mistakes on social media that could cost them a job
- Make a social media presence that impresses potential employers
- Stay safe and make smart choices online
Humorous discussion presenting some of the kids of risks that face public facing Web sites for corporations ranging from hacking to legal to social media scares. Slides are illustrative in nature and the aim of the talk is more awareness than anything else.
Scot McKee is a B2B Brand Consultant with over 25 years, and founder and Managing Director of Birddog, the multi-award winning B2B brand and digital marketing agency.
Read Scot's presentation from Oi15!
On Being HUMAN: The Importance of Writing More Engaging Emails (and more! )DJ Waldow
Want to get more return on your email marketing - and overall marketing - campaigns? Try this: BE MORE HUMAN.
This presentation share a TON of examples of how to be more engaging and human in your emails and marketing overall.
Writing for crisis management comes with its own set of rules. Learn core ideals, key tenets, and even strategy for social media crisis communications.
8 Things Your CEO Needs to Know Right Now About Social Media Tourism Trends i...Chad Wiebesick
Now, more than ever, social media and digital technology is increasingly influencing the way travelers plan, book and share their trip. Your social media efforts, however, will be an uphill battle if you cannot justify it to your CEO. Learn the top trends to help you build the business case for investing time, resources and budget in social media marketing
We’re living in a new media marketing era. It’s noisy and it’s crowded. People’s email inboxes are overflowing. Web ads and pop-ups and prestitials are in your face. Not to mention the social media overload.
Buyers are tuning out. Their eyes have glazed over. Bombarding your prospects with an unending stream of sales messages is no longer the answer.
So how do you stand out from the crowd? How do you have your buyers and prospects look forward to hearing from you? How do you build awareness … loyalty … and your customer base?
The answer is content marketing.
More and more marketers and content creators from around the world are discovering that an effective content strategy is essential to staying ahead of the curve.
At the Content Marketing Master Class, you’ll have a chance to learn from and interact with many of today’s top content strategists who have had a hand in shaping the industry into what it is today.
Leveraging Social Media, PR and Internal Comms 2010 - Lars VoedischLars Voedisch
Session at the "PR & Media 2010 Congress" in Singapore: A new paradigm for communicators - Leveraging social media, PR and internal communications in the digital age
What do corporate communicators need to
know about social media and what does it
mean for your organisation
Linking PR efforts to business objectives
Managing strategic media relations in
times of continuous change and crisis
What do our internal stakeholders expect
Identifying and understanding the new
influencers
Leveraging on upcoming trends and
opportunities
Similar to Symantec Security Awareness October 2012 (20)
Symantec Enterprise Security Products are now part of BroadcomSymantec
Symantec Enterprise Security Products are now part of Broadcom. The consumer division of Symantec Corp. is now NortonLifeLock Inc. -- a standalone company dedicated to consumer cyber safety.
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
Youth in foster care face unique risks to their identity.In this webinar we discuss the risks, as well as tips for better protection. Watch on demand here: https://symc.ly/2N8cELV.
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
Learn how to protect your data during Symantec's National Cyber Security Awareness Month webinar with the Identity Theft Resource Center and Infolock.To watch on demand https://symc.ly/2VMMWQX.
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
Symantec, TechSoup and the Michigan Small Business Development Center share how to apply added layers of security to your devices and online accounts. Watch on-demand recording here: https://symc.ly/33ifcxo.
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
View this webinar from Symantec and NCSAM partners, the National PTA, Connect Safety and the National Cyber Security Alliance, to learn how to protect the devices you use day to day.
Watch on demand here: https://symc.ly/2nLyXyB
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
On January 1, 2020, one of the strictest privacy laws in the US, the California Consumer Privacy Act (CCPA), will come into effect. What should governance, risk and compliance executives know in order to prepare for CCPA? Watch the on demand recording here: https://symc.ly/2Pn7tvW.
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
Experts from Symantec and MITRE explore the latest research and best practices for detecting targeted ransomware in your environment.
Watch on-demand webinar here: https://symc.ly/2L7ESFI.
This webinar will explore the less-discussed topics of a mobile security strategy that everyone should understand – before it’s too late. Watch on-demand here: https://symc.ly/2z6hUsM.
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
There is an art to securely using cloud apps and services, including SaaS, PaaS, and IaaS. In this Symantec webcast, hear from Steve Riley, a Gartner senior director analyst who focuses on public cloud security, and Eric Andrews, Symantec’s vice president of cloud security, as they share best practices with practical tips for deploying CASB. Watch here: https://symc.ly/2QTyUec.
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
This webinar to shares insight into how an Advanced Threat Assessment does root analysis to uncover unknown, unique threats happening in your environment. Watch here: https://symc.ly/2W52MoA
Learn if you’ve got the right security strategy, and investment plan, to protect your organization and ensure regulatory compliance with the General Data Protection Regulation (GDPR). Watch now here: https://symc.ly/2VMNHIm
2019 Symantec Internet Security Threat Report (ISTR): The New Threat Landscape presented by Kevin Haley, Director Product Management, Security Technology & Response, Symantec. Watch webinar recording here: https://symc.ly/2FJ9T18.
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
Gain valuable insight whether you’re well on your way to Zero Trust implementation or are just considering it. Watch the original webinar here https://www.symantec.com/about/webcasts?commid=347274.
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
First-hand insights on the newest cloud-delivered endpoint security solutions. Hear from Joakim Liallias, Symantec and special guest speakers Sundeep Vijeswarapu from PayPal and top industry analyst Fernando Montenegro, 451 Research. Listen here: https://symc.ly/2UY2TlS.
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
Learn how Symantec Endpoint Protection & Response (EDR) and the MITRE ATT&CK framework can expose and thwart persistent adversaries like APT28 otherwise known as Fancy Bear. Watch Webinar here: https://symc.ly/2WyPD8I
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
4. Most Harmful Websites by Categories
• Websites with poor security become easy targets for malware authors
• Any website you visit could potentially be infected with malware
4
6. Yes. Even Macs Get Infected.
In 2012, 500,000 Macs were infected by 1 threat. Flashback
• Malware can figure out what type of computer you use
• Then it infects you with the appropriate malware
6
7. Which is More Likely to Get Attacked?
A B
Small or Medium Large Organization
Organization
7
8. Which is More Likely to Get Attacked?
All sizes of organizations get attacked
Small or Medium Large Organization
Organization
8
9. Who is Most Likely to be Targeted in an Attack?
A B
Typical Employee CEO
9
10. Who is Most Likely to be Targeted in an Attack?
Both
Only 25% of targeted attacks directed at C-Level executives
10
13. Would You be Fooled by This?
How About by This?
twitter.dsdsdds.com/main/sessions-login/
If something seems wrong take a closer look
Attackers can’t fool all the people all the time
13
14. Double Click to Edit Following Text Areas;
Are You Expecting a Package? Subject, Date, Body
Window Title, From, To,
From: UPS Sent: Mon 6/4/2012 4:08 PM
To: Kevin Haley
Cc:
Subject: Unable to Deliver Package
Dan,
I have been a Weyerhaeuser shareholder since late 2008 and recently had the
opportunity to attend your Annual Shareholders’ Meeting at your headquarters. I spoke
to you briefly after your address and it was pleasure to hear from you about all of
Weyerhaeuser’s innovations.
I also never realized that Clint Eastwood was once an employee of the company – now it
makes sense why I like him so much!
I posted this picture from your address, I hope you like it.
14
15. Double Click to Edit Following Text Areas;
Did You Have Trouble LoggingSubject, Date, Body
Window Title, From, To,
Into Facebook?
From: Facebook Sent: Mon 6/4/2012 4:08 PM
To: Kevin Haley
Cc:
Subject: Login Problem
Dan,
I have been a Weyerhaeuser shareholder since late 2008 and recently had the
opportunity to attend your Annual Shareholders’ Meeting at your headquarters. I spoke
to you briefly after your address and it was pleasure to hear from you about all of
Weyerhaeuser’s innovations.
I also never realized that Clint Eastwood was once an employee of the company – now it
makes sense why I like him so much!
I posted this picture from your address, I hope you like it.
15
16. Double Click to Edit Following Text Areas;
Would Your Bank Really WantSubject, Date, Body
Window Title, From, To,
You to Click Here?
From: YourBank Sent: Mon 6/4/2012 4:08 PM
To: Kevin Haley
Cc:
Subject: Account Issue
Dan,
You can ensure your
I have been a Weyerhaeuser shareholder since late 2008 and recently had the
Your Bank
opportunity to attend your Annual Shareholders’ Meeting at your headquarters. I spoke
bank account is okay
to you briefly after your address and it was pleasure to hear from you about all of
Weyerhaeuser’s innovations.
I also never realized that Clint Eastwood was once an employee of the company – now it
makes sense why I like him so much!
I posted this picture from your address, I hope you like it.
16
22. Which of These is a Real Person?
James Stavridis is the commander of NATO
He created his own Facebook page after he
found someone on Facebook pretending to
be him
A People may not be who they say they are
on the Internet
22
23. Which of These is Most Likely to be a Facebook Scam?
OMG! Profile Dislike
Videos Viewers Buttons
A B C
23
24. Which of These is Most Likely to be a Facebook Scam?
OMG! Profile Dislike
Videos Viewers Buttons
All of Them
24
25. Which of These is Most Likely to be a Facebook Scam?
Bad Guys Want to Get Us to Click to:
• Infect us with malware
• Make us take bogus surveys to:
• Gain information or
• Sign us up for premium SMS services
OMG!
• Send spam to us and our friends
Videos
OMG! Videos Get People to Click
25
26. Which of These is Most Likely to be a Facebook Scam?
Profile
Viewers
Bad guys know that people want to know
who viewed their Facebook page
26
27. Which of These is Most Likely to be a Facebook Scam?
Dislike
Buttons
Bad guys know that people want a
dislike button
27
28. Which of These is Most Likely to be a Facebook Scam?
OMG! Profile Dislike
Videos Viewers Buttons
They can’t give us these things, but they
can fool us into thinking they can
28
29. What Are Your Chances of Getting Your Lost Phone Back?
29
30. What Are Your Chances of Getting Your Lost Phone Back?
Source: Symantec’s “Project HoneyStick” research
http://www.symantec.com/about/news/resources/press_kits/detail.jsp?pkid=symantec-smartphone-honey-stick-project
30
31. What are the Chances of Your Work and Personal
Information Being Looked at?
31
32. What are the Chances of Your Work and Personal
Information Being Looked at?
Source: Symantec’s “Project HoneyStick” research
http://www.symantec.com/about/news/resources/press_kits/detail.jsp?pkid=symantec-smartphone-honey-stick-project
32
33. How Many New Pieces of Malware are Created Each Day?
A 1,000
B 100,000
C 1,000,000
33
34. How Many New Pieces of Malware are Created Each Day?
• 1 million+ new pieces of malware are created every day
• In 2011 we saw 403 million new pieces of malware
C 1,000,000
34
35. Why?
• Bad guys have tools to easily create and distribute new threats
• Some of these tool kits can create malware-on-demand
35
36. Does it Seem Pretty Bad Out There?
• Symantec and Norton have good tips on protecting yourself and
your business
• But … if you need it simplified, remember these 3 things …
36
37. You don’t have to give up
using the Internet…
There are ways to protect
yourself.
37
38. What your mother told you
is still true…
If something doesn’t seem
right, it probably isn’t.
38
39. Get help from experts…
We hope it’s from Symantec
and Norton.
39
40. Additional Resources
If You Are More Technical If You Are Less Technical
Internet Security Threat Report Norton Security Center
Symantec Security Response Norton Family Resources
Website
Advanced Persistent Threat
Website
Malicious Insider White Paper
Twitter.com/threatintel
40
Quiz question – which is more dangerous?It’s not what we used to think.We’ve been telling people that “bad” sites are dangerous … but one of the most interesting pieces of data is that religious sites are more likely to infect you than an adult site
This chart is from the ISTR 17 (April 2012)Looked at sites that were infected – how many pieces of malware were on each of these sitesAlmost 5x more malware on religious sites than on adult sitesTakeaway? Sites with poor security become an easy target – sites are beginning to realize that if their sites are infected, people won’t visit. Adult websites are businesses – they have learned that if they infect their customers, they wont’ get repeat visits, so they are working hard to keep their sites cleanMessage for SMBs – you need to protect your site or you will become a host for malware and customers will go elsewhere
This is one of the key assumptions … Anybody that has gone into an SMB has heard this – that they don’t believe they are a target.
This is one of the key assumptions … Anybody that has gone into an SMB has heard this – that they don’t believe they are a target.
Assumption 2 – only executives are targeted
This shows targeted attacks by the target’s occupation …Executives seem to be a big chunk … but …
So, spam is down and vulnerabilities are down, but malware is up. Why?Attack toolkits continue to flourish – they use existing vulnerabilities – the malware authors use those vulnerabilities that work – they focus on the vulns that are not patchedThis chart at the bottom looks at toolkits that were in use in 2011 – Blackhole was a big one and another was NumDir (not named)Toolkit authors trying to go a bit more undercover than in the past – trying to lower their profile – they are also moving to service model like legit SW – think of it like cloud computing for malware authors – they are not handing out SW as in the past