SlideShare a Scribd company logo
The Dangers Of Laptops, Smartphones & Social Media To Enterprise Security Dr. Paul Judge Chief Research Officer
Half of The Spam Disappeared 3 52 Billion 26 Billion 2010
Five Innovations That Created Security Risks
1. Rapid Growth ,[object Object]
 196 million domain names
 47 million new sites last yearSource:Verisign
2.  Dynamic Web Apps: AJAX Rich site-to-browser interaction Browser is the new operating system Browser is active in the application, not simply a passive display tool
[object Object]
1 in 11 organizations had remote workers infected
46%  of remote infections come from infected Web sites3. Remote Employees
Smartphone and tablet computing blur the line between personal and business computing Companies must reconsider policies for devices that are not owned by the company 4. New Devices
Mobile Users Branch Offices ,[object Object]
Need the right delivery model for each location and user
Centralized management, forensics, and reporting is difficult
Remote users and branch offices often not covered because of difficulty or cost
Compromises in security because of the complexity or costInternet Headquarters Teleworkers Problem: Many Locations and Remote Users Roaming Users
Cloud-based Web Security Cloud-based content filtering and malware protection Centralized multi-site management and reporting Simple policy-based Web security Protects remote and mobile employees Massively scalable infrastructure eliminates latency Rapid response to new and emerging threats Internet Policy Management Security Protection Consolidated Reporting Workplace Users Mobile Users Roaming Users
5. User-Generated Content ,[object Object]
500 million users on Facebook
100 million accounts on Twitter
2.5 billion photos uploaded each month to Facebook
30 million new ads per day on Craigslist,[object Object]
Then Came Along… User Generated Content
With 100s of millions of users behind a single domain, we need to understand user level reputation Is this account good or bad? Is this account even real? Need for User Reputation
Facebook Social Attacks
Photo ‘Tags’ Up To 50 People
Website Selling Fake Illegal Shoes
Likejacking
Malicious Facebook Apps
“Hidden Truth” Photos
Automated Social Engineering
Barracuda Labs Technology:Maltrace: Malware Analysis w. Virtualization ,[object Object]
Load samples into Maltrace
Maltrace allows the malware to run on a virtual PC
Maltrace collects the network traffic generated
Maltrace creates signatures based on malicious traffic
Adds the signatures to URL, IP and fingerprint databases,[object Object]
‘Funniest Video Ever’ Banking Trojan
Rogue A/V + Trending Topics (step 1 of 3)
Rogue A/V + Trending Topics (Step 2 of 3) hxxp://securityland.cn/?uid=144&pid=3&ttl=31c48520c54 which acts as a traffic distribution system for a Rogue AV operation; the chain of redirections ends at one of the following Rogue AV distribution points: hxxp://my-systemscan.com/?p=WKmimHVlbG2HjsbIo22EhHV8ipnVbWiMnNah2qeNm 6nZwombm5h2lpd9fXCHodjSbmRelWZxmV6SZGbLU9bYxKWspXOL1dZ2Y2ZuZ2tnaWyVYYrJlG0%3D  hxxp://my-newprotection.net/?p=WKmimHVlbG2HjsbIo22EhHV8ipnVbWiMnNah2qeNm 6nZwombm5h2lpd9fXCHodjSbmRelWZxmV6SZGbLU9bYxKWspXOL1dZ2Y2ZuZ2tnaWyVYYrJlG0%3D  hxxp://trustsystem-protection.com/?p=WKmimHVlbG2HjsbIo22EhHV8ipnVbWiMnNah2 qeNm6nZwombm5h2lpd9fXCHodjSbmRelWZxmV6SZGbLU9bYxKWspXOL1dZ2Y2ZuZ2tnaWyVYYrJlG0%3D
Rogue A/V + Trending Topics (step 3 of 3)
Barracuda Labs Technology:Twitter Reputation System ,[object Object]
Query Twitter User Database for Other Users
Analyze Users’ Activities
Analyze Web Links
Add Malicious Sites to Barracuda SPYDEF list,[object Object]
True Twitter Users ≥10 Followers, Friends, & Tweets Compared to 21% in Jan 2010
Friends(Following):     For every 100 Twitter users…  16 have 27 have 40 have 17 have 0 1-9 10-99 100+ friends friends friends friends
Friend-Follower Delta:  For every 100 Twitter users… 43  have same  (+/- 5) amount 23 have more friends 34 have  more followers
Crime Rate twitter crime rate is the percentage of accounts created per month that are eventually suspended by Twitter
Twitter Growth – Red Carpet Era Twitter Account Creation 2006-2009 ,[object Object]
 Twitter growth rate went from 2.02% in Nov 08 to 21.17% in April 09.Twitter Account Creation  Red Carpet Era (11/08-04/09) Barracuda Networks Confidential
Twitter Crime Rate 2006-2009 ,[object Object]
 2007 = 1.7%
 2008 = 2.2% During Red Carpet Era: ,[object Object]
 This more than tripled over the following four months, escalating to 12% in October 2009.Twitter Crime Rate 2006-2009 Barracuda Networks Confidential
Twitter Crime Rate 2010
Suspended Accounts: Friend Follower Delta ,[object Object],[object Object]
In the 2500 range, we start to see some scammers.

More Related Content

What's hot

Cybercrimes against the korean online banking systems 1227 eng_slideshare
Cybercrimes against the korean online banking systems 1227 eng_slideshareCybercrimes against the korean online banking systems 1227 eng_slideshare
Cybercrimes against the korean online banking systems 1227 eng_slideshare
Youngjun Chang
 
Avar2011 changing security_awareness_training
Avar2011 changing security_awareness_trainingAvar2011 changing security_awareness_training
Avar2011 changing security_awareness_training
Youngjun Chang
 
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone UnderwearThe Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
Bob Wall
 
14 cyber threats
14 cyber threats14 cyber threats
14 cyber threats
mahesh43211
 
Infographic: The High Cost of BYOD
Infographic: The High Cost of BYODInfographic: The High Cost of BYOD
Infographic: The High Cost of BYOD
Trustwave
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec
 
Cyber Vulnerabilities & How companies can test them
Cyber Vulnerabilities & How companies can test themCyber Vulnerabilities & How companies can test them
Cyber Vulnerabilities & How companies can test them
24by7Security Inc
 
Android mobile platform security and malware survey
Android mobile platform security and malware surveyAndroid mobile platform security and malware survey
Android mobile platform security and malware survey
eSAT Journals
 
The State of Internet Security: Web Attaks Take Over
The State of Internet Security: Web Attaks Take OverThe State of Internet Security: Web Attaks Take Over
The State of Internet Security: Web Attaks Take Over
JAX Chamber IT Council
 
CSS Trivia
CSS TriviaCSS Trivia
CSS Trivia
Alert Logic
 
Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check
Symantec
 
Report on Rogue Security Software: a summary
Report on Rogue Security Software: a summaryReport on Rogue Security Software: a summary
Report on Rogue Security Software: a summary
Symantec Italia
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec Technology and Consulting
 
Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015
Symantec
 
Top Cyber Threats of 2009
Top Cyber Threats of 2009Top Cyber Threats of 2009
Top Cyber Threats of 2009
Symantec
 
Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015
Waqas Amir
 
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Symantec
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android application
IAEME Publication
 
Ransomeware : A High Profile Attack
Ransomeware : A High Profile AttackRansomeware : A High Profile Attack
Ransomeware : A High Profile Attack
IRJET Journal
 
Quick heal threat_report_q3_2016
Quick heal threat_report_q3_2016Quick heal threat_report_q3_2016
Quick heal threat_report_q3_2016
Andrey Apuhtin
 

What's hot (20)

Cybercrimes against the korean online banking systems 1227 eng_slideshare
Cybercrimes against the korean online banking systems 1227 eng_slideshareCybercrimes against the korean online banking systems 1227 eng_slideshare
Cybercrimes against the korean online banking systems 1227 eng_slideshare
 
Avar2011 changing security_awareness_training
Avar2011 changing security_awareness_trainingAvar2011 changing security_awareness_training
Avar2011 changing security_awareness_training
 
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone UnderwearThe Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
 
14 cyber threats
14 cyber threats14 cyber threats
14 cyber threats
 
Infographic: The High Cost of BYOD
Infographic: The High Cost of BYODInfographic: The High Cost of BYOD
Infographic: The High Cost of BYOD
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19
 
Cyber Vulnerabilities & How companies can test them
Cyber Vulnerabilities & How companies can test themCyber Vulnerabilities & How companies can test them
Cyber Vulnerabilities & How companies can test them
 
Android mobile platform security and malware survey
Android mobile platform security and malware surveyAndroid mobile platform security and malware survey
Android mobile platform security and malware survey
 
The State of Internet Security: Web Attaks Take Over
The State of Internet Security: Web Attaks Take OverThe State of Internet Security: Web Attaks Take Over
The State of Internet Security: Web Attaks Take Over
 
CSS Trivia
CSS TriviaCSS Trivia
CSS Trivia
 
Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check
 
Report on Rogue Security Software: a summary
Report on Rogue Security Software: a summaryReport on Rogue Security Software: a summary
Report on Rogue Security Software: a summary
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015
 
Top Cyber Threats of 2009
Top Cyber Threats of 2009Top Cyber Threats of 2009
Top Cyber Threats of 2009
 
Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015Symantec Internet Security Threat Report Volume 2015
Symantec Internet Security Threat Report Volume 2015
 
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android application
 
Ransomeware : A High Profile Attack
Ransomeware : A High Profile AttackRansomeware : A High Profile Attack
Ransomeware : A High Profile Attack
 
Quick heal threat_report_q3_2016
Quick heal threat_report_q3_2016Quick heal threat_report_q3_2016
Quick heal threat_report_q3_2016
 

Viewers also liked

Smh travelhealth pwrpont
Smh travelhealth pwrpontSmh travelhealth pwrpont
Smh travelhealth pwrpont
hutch7272
 
Product supervisor kpi
Product supervisor kpiProduct supervisor kpi
Product supervisor kpi
furesjom
 
Hf in uas auto
Hf in uas autoHf in uas auto
Hf in uas auto
Jo Elliott
 
My face
My faceMy face
My face
Flavia Ruz
 
Product director kpi
Product director kpiProduct director kpi
Product director kpi
jomfures
 
Smartphones for Real Estate
Smartphones for Real EstateSmartphones for Real Estate
Smartphones for Real Estate
The Tallon Consulting Firm
 
Presenting the film making research
Presenting the film making researchPresenting the film making research
Presenting the film making research
Gurgina
 
A cor azul!
A cor azul!A cor azul!
A cor azul!
Irina Pimenta
 
International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI)International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI)
inventionjournals
 
Sametime 7.5.1
Sametime 7.5.1Sametime 7.5.1
SCIENCE LAB
SCIENCE LABSCIENCE LAB
SCIENCE LAB
SUNIL47
 
Mobile Marketing Gambling Summit Slideshare
Mobile Marketing Gambling Summit SlideshareMobile Marketing Gambling Summit Slideshare
Mobile Marketing Gambling Summit Slideshare
Donky Carrots
 
SP2013 Hybrid SPSPhoenix2013_owenallen
SP2013 Hybrid SPSPhoenix2013_owenallenSP2013 Hybrid SPSPhoenix2013_owenallen
SP2013 Hybrid SPSPhoenix2013_owenallen
Owen Allen
 
White Paper - Antivirus é eficiente para a proteção de redes industriais?
White Paper - Antivirus é eficiente para a proteção de redes industriais?White Paper - Antivirus é eficiente para a proteção de redes industriais?
White Paper - Antivirus é eficiente para a proteção de redes industriais?
TI Safe
 
Taller SOLID Refactor
Taller SOLID RefactorTaller SOLID Refactor
Taller SOLID Refactor
Agile Spain
 
Suguk activity feed
Suguk activity feedSuguk activity feed
Suguk activity feed
Wes Hackett
 
Ciudadanía Romana - Presentación Carla Corbo - Marta Santamaría - 1ºB mayo de...
Ciudadanía Romana - Presentación Carla Corbo - Marta Santamaría - 1ºB mayo de...Ciudadanía Romana - Presentación Carla Corbo - Marta Santamaría - 1ºB mayo de...
Ciudadanía Romana - Presentación Carla Corbo - Marta Santamaría - 1ºB mayo de...
filolacabrera
 
2b
2b2b
SQL Server 2005 Licensing Unplugged
SQL Server 2005 Licensing UnpluggedSQL Server 2005 Licensing Unplugged
SQL Server 2005 Licensing Unplugged
webhostingguy
 
Anatomia general de la medula espinal
Anatomia general de la medula espinalAnatomia general de la medula espinal
Anatomia general de la medula espinal
Mi rincón de Medicina
 

Viewers also liked (20)

Smh travelhealth pwrpont
Smh travelhealth pwrpontSmh travelhealth pwrpont
Smh travelhealth pwrpont
 
Product supervisor kpi
Product supervisor kpiProduct supervisor kpi
Product supervisor kpi
 
Hf in uas auto
Hf in uas autoHf in uas auto
Hf in uas auto
 
My face
My faceMy face
My face
 
Product director kpi
Product director kpiProduct director kpi
Product director kpi
 
Smartphones for Real Estate
Smartphones for Real EstateSmartphones for Real Estate
Smartphones for Real Estate
 
Presenting the film making research
Presenting the film making researchPresenting the film making research
Presenting the film making research
 
A cor azul!
A cor azul!A cor azul!
A cor azul!
 
International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI)International Journal of Business and Management Invention (IJBMI)
International Journal of Business and Management Invention (IJBMI)
 
Sametime 7.5.1
Sametime 7.5.1Sametime 7.5.1
Sametime 7.5.1
 
SCIENCE LAB
SCIENCE LABSCIENCE LAB
SCIENCE LAB
 
Mobile Marketing Gambling Summit Slideshare
Mobile Marketing Gambling Summit SlideshareMobile Marketing Gambling Summit Slideshare
Mobile Marketing Gambling Summit Slideshare
 
SP2013 Hybrid SPSPhoenix2013_owenallen
SP2013 Hybrid SPSPhoenix2013_owenallenSP2013 Hybrid SPSPhoenix2013_owenallen
SP2013 Hybrid SPSPhoenix2013_owenallen
 
White Paper - Antivirus é eficiente para a proteção de redes industriais?
White Paper - Antivirus é eficiente para a proteção de redes industriais?White Paper - Antivirus é eficiente para a proteção de redes industriais?
White Paper - Antivirus é eficiente para a proteção de redes industriais?
 
Taller SOLID Refactor
Taller SOLID RefactorTaller SOLID Refactor
Taller SOLID Refactor
 
Suguk activity feed
Suguk activity feedSuguk activity feed
Suguk activity feed
 
Ciudadanía Romana - Presentación Carla Corbo - Marta Santamaría - 1ºB mayo de...
Ciudadanía Romana - Presentación Carla Corbo - Marta Santamaría - 1ºB mayo de...Ciudadanía Romana - Presentación Carla Corbo - Marta Santamaría - 1ºB mayo de...
Ciudadanía Romana - Presentación Carla Corbo - Marta Santamaría - 1ºB mayo de...
 
2b
2b2b
2b
 
SQL Server 2005 Licensing Unplugged
SQL Server 2005 Licensing UnpluggedSQL Server 2005 Licensing Unplugged
SQL Server 2005 Licensing Unplugged
 
Anatomia general de la medula espinal
Anatomia general de la medula espinalAnatomia general de la medula espinal
Anatomia general de la medula espinal
 

Similar to The Dangers of Lapto

LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014
Ashlie Steele
 
TECHNICAL WHITE PAPER▶ Symantec Website Security Threat Report
TECHNICAL WHITE PAPER▶ Symantec Website Security Threat ReportTECHNICAL WHITE PAPER▶ Symantec Website Security Threat Report
TECHNICAL WHITE PAPER▶ Symantec Website Security Threat Report
Symantec
 
Scaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware InfectionScaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware Infection
Wayne Huang
 
TRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , TexasTRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , Texas
Aditya K Sood
 
Symantec Website Threat Report Part-1 2015
Symantec Website Threat Report Part-1 2015Symantec Website Threat Report Part-1 2015
Symantec Website Threat Report Part-1 2015
RapidSSLOnline.com
 
CYREN_Q1_2015_Trend_Report
CYREN_Q1_2015_Trend_ReportCYREN_Q1_2015_Trend_Report
CYREN_Q1_2015_Trend_Report
Chris Taylor
 
18-mobile-malware.pptx
18-mobile-malware.pptx18-mobile-malware.pptx
18-mobile-malware.pptx
sundar110567
 
C3
C3C3
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET -  	  Chrome Extension for Detecting Phishing WebsitesIRJET -  	  Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET Journal
 
Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Security
crussell79
 
How websites are attacked
How websites are attackedHow websites are attacked
How websites are attacked
Mykonos Software
 
Internet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshareInternet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshare
Youngjun Chang
 
Meet the potnet - AboutAndroid | Malware Analysis Report
Meet the potnet - AboutAndroid | Malware Analysis ReportMeet the potnet - AboutAndroid | Malware Analysis Report
Meet the potnet - AboutAndroid | Malware Analysis Report
Eran Goldstein
 
DEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptDEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.ppt
schwarz10
 
Sql Injection Attacks And A Web Application Environment
Sql Injection Attacks And A Web Application EnvironmentSql Injection Attacks And A Web Application Environment
Sql Injection Attacks And A Web Application Environment
Sheri Elliott
 
Malicious malware breaches - eScan
Malicious malware breaches - eScanMalicious malware breaches - eScan
Malicious malware breaches - eScan
MicroWorld Software Services Pvt Ltd
 
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine LearningIRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET Journal
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
Sibghatullah Khattak
 
Guarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social NetworkGuarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social Network
Editor IJCATR
 
Network Insights of Dyre and Dridex Trojan Bankers
Network Insights of Dyre and Dridex Trojan BankersNetwork Insights of Dyre and Dridex Trojan Bankers
Network Insights of Dyre and Dridex Trojan Bankers
Blueliv
 

Similar to The Dangers of Lapto (20)

LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014
 
TECHNICAL WHITE PAPER▶ Symantec Website Security Threat Report
TECHNICAL WHITE PAPER▶ Symantec Website Security Threat ReportTECHNICAL WHITE PAPER▶ Symantec Website Security Threat Report
TECHNICAL WHITE PAPER▶ Symantec Website Security Threat Report
 
Scaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware InfectionScaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware Infection
 
TRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , TexasTRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , Texas
 
Symantec Website Threat Report Part-1 2015
Symantec Website Threat Report Part-1 2015Symantec Website Threat Report Part-1 2015
Symantec Website Threat Report Part-1 2015
 
CYREN_Q1_2015_Trend_Report
CYREN_Q1_2015_Trend_ReportCYREN_Q1_2015_Trend_Report
CYREN_Q1_2015_Trend_Report
 
18-mobile-malware.pptx
18-mobile-malware.pptx18-mobile-malware.pptx
18-mobile-malware.pptx
 
C3
C3C3
C3
 
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET -  	  Chrome Extension for Detecting Phishing WebsitesIRJET -  	  Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing Websites
 
Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Security
 
How websites are attacked
How websites are attackedHow websites are attacked
How websites are attacked
 
Internet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshareInternet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshare
 
Meet the potnet - AboutAndroid | Malware Analysis Report
Meet the potnet - AboutAndroid | Malware Analysis ReportMeet the potnet - AboutAndroid | Malware Analysis Report
Meet the potnet - AboutAndroid | Malware Analysis Report
 
DEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptDEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.ppt
 
Sql Injection Attacks And A Web Application Environment
Sql Injection Attacks And A Web Application EnvironmentSql Injection Attacks And A Web Application Environment
Sql Injection Attacks And A Web Application Environment
 
Malicious malware breaches - eScan
Malicious malware breaches - eScanMalicious malware breaches - eScan
Malicious malware breaches - eScan
 
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine LearningIRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
Guarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social NetworkGuarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social Network
 
Network Insights of Dyre and Dridex Trojan Bankers
Network Insights of Dyre and Dridex Trojan BankersNetwork Insights of Dyre and Dridex Trojan Bankers
Network Insights of Dyre and Dridex Trojan Bankers
 

The Dangers of Lapto

Editor's Notes

  1. Half the spam disappeared. Why? Because they found something better to do. Same people.Dos, spam, phishing, rogue av, Hard to make it thru spam fws, easier to catch people out surfing. Why is it easier to catch people on web?
  2. a) rapid growthb) dynamic ajax: xls, outlookc) user generated content: facebook, conn, d) remote employeespick up laptop e) new devices: androids, ipads,...
  3. 1 millionipadsper month
  4. 2. Problem: mobile users/road warriors gateway solution does not solve problem for mobile users. (picture)smaller remote offices is a further problem, have lesser security becausedo not want to deploy all the boxes....(picture) 
  5. Attackers use the social/viral features to spread their attacks quicklyTag a picture and it shows up for the friend of everyone that you tagged. On average 1000 friends, 50 tags, 50K people saw that link
  6. 6- BotNets(stuxnet, kraken)7- Cybercriminals: /Criminals
  7. Malicious jar file and trojantbanking1600 clicked linkhow many accounts used?used fake accounts, popular hash tags and search terms
  8. PAUL: 21% in Jan 2010, 29% in july 2010, 43% in 1/2011
  9. 16% following no one 15% decrease from 18.9% in July 201057% are following 10+26% increase from 45% in July 2010>100 17%>1000 1%> 10000 0.01%
  10. PAUL:55% of twitter have same number fo followers as following (+/- 5)So must using it as a social network13% have more followers: celbrities32% have more following: consumers vs creators
  11. PAUL:Over half of the NW tweets less then a once dayBut >100 is .2%  but that is couple hundred thousand accounts can represent 38% percent of the traffic
  12. The amount of malware found daily across the search engines increased 55 percent from 145.7 in June 2010 to 226.3 in December 2010.
  13. Inputs:Malicious Javascript Detector (MJD)Exploit Kit Detector (EKD)Maltrace DetectorSocial Network DetectorSEO DetectorSpamUser SubmissionsWAF feedback*phion firewall logs*Results:Content filter databaseMalware databaseIntent-based spam filter databaseVirus fingerprintsUsed by: Web filter cloudWeb filter appliancesEmail appliancesEmail cloudPeople:Researchers (analysis and building software)Analyst team (review user submissions and review borderline analysis results)