Advanced Online Threat Protection: Defending. Malware and Fraud. Andrew Bagnato Senior Systems Engineer
|
|
|
- Geoffrey Freeman
- 10 years ago
- Views:
Transcription
1 Advanced Online Threat Protection: Defending Your Online Banking Customers Against Modern Malware and Fraud Andrew Bagnato Senior Systems Engineer
2 Agenda Modern malware a targets Account credentials Financial transactions Modern malware techniques Social engineering Browser injection System monitoring Mobile Threat Landscape Q&A 2 Thursday, June 20, 2013 Webroot, Inc. Proprietary and Confidential #WebrootSIFMAtech
3 Modern malware targets >50% of organized cybercrime attacks focus on financial i and e-commerce businesses and their users Account credentials are the primary target accounts are of especially high value as they provide access to all other online accounts Financial transactions are highly targeted Recording an online purchase provides key necessary data to recreate someone's credit card Name, card number, exp. date, CVV code 3 Thursday, June 20, 2013 Webroot, Inc. Proprietary and Confidential #WebrootSIFMAtech
4 Modern malware techniques Social engineering is extremely effective Well crafted phishing s Telephone based attacks Browser injection is especially devious Extracts additional information Bypasses SSL/TLS Can bypass two factor authentication System monitoring Access to all other online accounts Leads to identity theft 4 Thursday, June 20, 2013 Webroot, Inc. Proprietary and Confidential #WebrootSIFMAtech
5 Mobile apps expand the issue Apple released the first iphone and ios in mid 2007 followed by Google s release of Android in the fall of 2008 By the end of 2010, there were roughly 300k iphone and 100k Android apps with more than 10 billion app downloads Today, both Google and Apple s app stores boast more than 800k apps and total downloads over 100 billion! The average smartphone users downloads 90 additional apps Webroot started collecting mobile apps in 2011 and has collected over 3.7 million unique mobile apps This number is much larger than the combined 1.6 million available on Apple and Google s markets The reason is there are numerous 3 rd party markets, mainly for Android apps Research shows nearly 30% of users acquire apps from 3 rd party markets Most malicious apps are found in 3 rd party markets as well as P2P networks 5 Thursday, June 20, 2013 Webroot, Inc. Proprietary and Confidential #WebrootSIFMAtech
6 Analyzing the risks of BYOD 88% of SMB s support mobile devices and 66% allow BYOD ios Version Distribution BYOD increases risk because it combines personal and 53% corporate data onto a single 29% device Compared to company provided devices, BYOD devices contain dozens of additional apps for personal use BYOD causes OS diversity concerns as users will have a 36% wide array of devices and OS versions, some which have known security vulnerabilities 26% 12% 5% 1% ios ios ios 6.0 ios 5 Earlier ios Android idversion Distribution ib ti <1% 3% 2% 33% Jelly Bean Ice Cream Sandwich Honeycomb Gingerbread Froyo Éclair 6 Thursday, June 20, 2013 Webroot, Inc. Proprietary and Confidential #WebrootSIFMAtech
7 Analyzing the risks of malicious apps Risks associate with malicious mobile apps: Information theft (adware/pua, spyware, trojans, apps from untrusted developers) Premium SMS charges (SMS trojans, repackaged/cracked apps) User tracking (spyware, legit tracking apps, trojans) Rootkits (repackaged/cracked apps, trojans) Consequences of malicious mobile apps: Spear-phishing Identity theft Financial loss Compromised network 7 Thursday, June 20, 2013 Webroot, Inc. Proprietary and Confidential #WebrootSIFMAtech
8 Malicious app trends With more than 3.7 million apps analyzed, 12% of Android apps are either malicious or unwanted (PUA) and nearly 3% of ios apps contain privacy violations Free apps are the biggest offender as developers look for ways to monetize their efforts Mobile app ad-engines typically pay based on the quantity of collected data 3 rd party markets and P2P networks are hotspots for malicious apps Some 3 rd party markets only distribute malicious apps often associated with cracking paid apps or translating apps into another language Malicious apps often perform the advertised task as a method to evade detection and as a way to make it onto legitimate app markets Android Samples Total Apps Malicious Apps 8 Thursday, June 20, 2013 Webroot, Inc. Proprietary and Confidential #WebrootSIFMAtech
9 Malicious app trends cont. Over 12% of Android apps have malicious or unwanted behavior let s look at the breakdown PUA s PUAs account for 86% Largely due to pervasiveness of aggressive ad-engines (Airpush) Trojans, Spyware and Rootkits account for the remaining 14% This includes SMS trojans, botnets, t rooting apps and all other truly malicious apps 9 Thursday, June 20, 2013 Webroot, Inc. Proprietary and Confidential #WebrootSIFMAtech
10 Malicious app example Trojan/Rootkit Here we have a classic example of an infected app which requests more permissions than necessary In both cases the app plays the game but the example on the right also sends premium SMS texts as well as roots the device Rooted devices pose a much bigger risk as I they circumvent device security features 10 Thursday, June 20, 2013 Webroot, Inc. Proprietary and Confidential #WebrootSIFMAtech
11 Malicious app example Adware/PUA PUA s PUAs account for the biggest chunk of malicious apps In this example, the ad-engine is advertising Flash Player which is not needed and is also charging $34.95 for the bogus app 11 Thursday, June 20, 2013 Webroot, Inc. Proprietary and Confidential #WebrootSIFMAtech
12 Malicious app example Spyware Often masqueraded as a tracking app, spyware apps are available on both legit and 3 rd party markets and can be used for malicious purposes 12 Thursday, June 20, 2013 Webroot, Inc. Proprietary and Confidential #WebrootSIFMAtech
13 Surprising survey results Year over year, more mobile devices are connecting to corporate networks and BYOD is on the rise 13 Thursday, June 20, 2013 Webroot, Inc. Proprietary and Confidential #WebrootSIFMAtech
14 Surprising survey results cont. ios and Android are the most common OS s to connect to the corporate network 14 Thursday, June 20, 2013 Webroot, Inc. Proprietary and Confidential #WebrootSIFMAtech
15 Surprising survey results cont. IT Pros are right mobile malware is on the rise and Android poses the biggest risk 15 Thursday, June 20, 2013 Webroot, Inc. Proprietary and Confidential #WebrootSIFMAtech
16 Surprising survey results cont. IT Pros are also aware of the risks posed by malicious mobile apps 16 Thursday, June 20, 2013 Webroot, Inc. Proprietary and Confidential #WebrootSIFMAtech
17 Surprising survey results cont. Yet when IT Pros were asked how familiar they were with malicious mobile apps or if they were aware of rooted devices connecting to the network 17 Thursday, June 20, 2013 Webroot, Inc. Proprietary and Confidential #WebrootSIFMAtech
18 Surprising survey results cont. And what about mobile device policies, solutions and employee education? 18 Thursday, June 20, 2013 Webroot, Inc. Proprietary and Confidential #WebrootSIFMAtech
19 What s next for MDM mobile app reputation Mobile app reputation is a service which helps inform users of which apps are safe vs. untrustworthy With many choices available, app rep helps inform users of apps which are safe to use and pose no security risk to private or corporate data 19 Thursday, June 20, 2013 Webroot, Inc. Proprietary and Confidential #WebrootSIFMAtech
20 Q&A Andrew Bagnato #WebrootSIFMAtech
Protecting against Mobile Attacks
2014-APR-17 Protecting against Mobile Attacks Frankie Wong Security Analyst, HKCERT 1 Image source: http://www.techweekeurope.co.uk/news/mobile-malware-record-mcafee-125537 2 Agenda Attacks moving to mobile
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware
How to Execute Your Next Generation of Mobile Initiatives Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware Company Facts 12000 1,800 employees 150 countries 17 languages 11 global
Managing Web Security in an Increasingly Challenging Threat Landscape
Managing Web Security in an Increasingly Challenging Threat Landscape Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Small wonder.
IT TRENDS AND FUTURE CONSIDERATIONS. Paul Rainbow CPA, CISA, CIA, CISSP, CTGA
IT TRENDS AND FUTURE CONSIDERATIONS Paul Rainbow CPA, CISA, CIA, CISSP, CTGA AGENDA BYOD Cloud Computing PCI Fraud Internet Banking Questions The Mobile Explosion Mobile traffic data in 2011 was nearly
Enterprise Mobile Threat Report
Enterprise Mobile Threat Report The State of ios and Android Security Threats to Enterprise Mobility I. Introduction This report examines enterprise security threats for ios and Android. While Android
How to Successfully Roll Out an Android BYOD Program
How to Successfully Roll Out an Android BYOD Program Nathan Steuer, Director of Mobility Solutions Ann Marie Cullen, Advisory Services Manager Global Computing Platform Market Share! 1Billion! Android
Mobile App Reputation
Mobile App Reputation A Webroot Security Intelligence Service Timur Kovalev and Darren Niller April 2013 2012 Webroot Inc. All rights reserved. Contents Rise of the Malicious App Machine... 3 Webroot App
Guideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
MOBILE APPS. QA Testing for mobile applications
MOBILE APPS QA Testing for mobile applications How familiar are you with Apple devices? This question can be asked for apple devices as well as Android devices - depending on the company your interviewing
WHITE PAPER > THE RISKS & REWARDS OF MOBILE BANKING APPS. The Risks & Rewards of Mobile Banking Apps
> The Risks & Rewards of Mobile Banking Apps FEBRUARY 2015 The market demand for mobile banking technology and its rapidly increasing adoption rate means that many banks have been managing the security
Henry Ford Health System Citrix Access Gateway Support Details
Access Disclaimer: Henry Ford Health System Citrix Access Gateway Support Details Last Updated: April 9 th, 2014 This document assumes that you already have an ID to access the Henry Ford Health System
How Attackers are Targeting Your Mobile Devices. Wade Williamson
How Attackers are Targeting Your Mobile Devices Wade Williamson Today s Agenda Brief overview of mobile computing today Understanding the risks Analysis of recently discovered malware Protections and best
Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University
Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1 Awareness of BYOD Security Concerns Benjamin Tillett-Wakeley East Carolina University AWARENESS OF BYOD SECURITY CONCERNS 2 Abstract This paper will
BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager
BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager 1 AGENDA Mobile Explosion Mobile Trends BYOD Benefits, Challenges and Threats BYOD Security BYOD Strategy
Practical Attacks against Mobile Device Management Solutions
Practical Attacks against Mobile Device Management Solutions Michael Shaulov, CEO [email protected] Daniel Brodie, Sr Security Researcher [email protected] About: Daniel Security researcher for nearly
... Mobile App Reputation Services THE RADICATI GROUP, INC.
. The Radicati Group, Inc. 1900 Embarcadero Road, Suite 206 Palo Alto, CA 94303 Phone 650-322-8059 Fax 650-322-8061 http://www.radicati.com THE RADICATI GROUP, INC. Mobile App Reputation Services Understanding
Mobile Device Management
1. Introduction Mobile Device Management This document introduces security risks with mobile devices, guidelines for managing the security of mobile devices in the Enterprise, strategies for mitigating
Defending Behind The Device Mobile Application Risks
Defending Behind The Device Mobile Application Risks Tyler Shields Product Manager and Strategist Veracode, Inc Session ID: MBS-301 Session Classification: Advanced Agenda The What The Problem Mobile Ecosystem
TrustDefender Mobile Technical Brief
TrustDefender Mobile Technical Brief Fraud Protection for Native Mobile Applications TrustDefender Mobile from ThreatMetrix is a lightweight SDK library for Google Android and Apple ios mobile devices.
DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest
DDoS Attacks: The Latest Threat to Availability Dr. Bill Highleyman Managing Editor Availability Digest The Anatomy of a DDoS Attack Sombers Associates, Inc. 2013 2 What is a Distributed Denial of Service
Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA
Emerging Network Security Threats and what they mean for internal auditors December 11, 2013 John Gagne, CISSP, CISA 0 Objectives Emerging Risks Distributed Denial of Service (DDoS) Attacks Social Engineering
Malware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
BYPASSING THE ios GATEKEEPER
BYPASSING THE ios GATEKEEPER AVI BASHAN Technology Leader Check Point Software Technologies, Ltd. OHAD BOBROV Director, Mobile Threat Prevention Check Point Software Technologies, Ltd. EXECUTIVE SUMMARY
Five Trends to Track in E-Commerce Fraud
Five Trends to Track in E-Commerce Fraud Fraud is nothing new if you re in the e-commerce business you probably have a baseline level of fraud losses due to stolen credit cards, return fraud and other
Spyware. Michael Glenn Technology Management [email protected]. 2004 Qwest Communications International Inc.
Spyware Michael Glenn Technology Management [email protected] Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References
Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May 2014. TrustInAds.org. Keeping people safe from bad online ads
Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams May 2014 TrustInAds.org Keeping people safe from bad online ads OVERVIEW Today, even the most tech savvy individuals can find themselves
Securing mobile devices in the business environment
IBM Global Technology Services Thought Leadership White Paper October 2011 Securing mobile devices in the business environment By I-Lung Kao, Global Strategist, IBM Security Services 2 Securing mobile
Webroot Security Intelligence for Mobile Suite. Cloud-based security solutions for mobile management providers
Webroot Security Intelligence for Mobile Suite Cloud-based security solutions for mobile management providers TABLE OF CONTENTS INTRODUCTION 3 WEBROOT INTELLIGENCE NETWORK 4 MOBILE SECURITY INTELLIGENCE
Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.
White Paper Securing Today s Mobile Workforce Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2012, Juniper Networks, Inc. 1 Table
The dramatic growth in mobile device malware. continues to escalate at an ever-accelerating. pace. These threats continue to become more
The dramatic growth in mobile device malware continues to escalate at an ever-accelerating pace. These threats continue to become more sophisticated while the barrier to entry remains low. As specific
Report on Consumer Behaviors and Perceptions of Mobile Security. Presented by NQ Mobile & NCSA January 25, 2012
Report on Consumer Behaviors and Perceptions of Mobile Security Presented by NQ Mobile & NCSA January 25, 2012 Methodology Online survey of 1,158 consumers. Participants had to own a smartphone. Respondents
Tutorial on Smartphone Security
Tutorial on Smartphone Security Wenliang (Kevin) Du Professor [email protected] Smartphone Usage Smartphone Applications Overview» Built-in Protections (ios and Android)» Jailbreaking and Rooting» Security
01. Introduction of Android
01. Introduction of Android Goal Understand the concepts and features of the Android Install the complete Android development environment Find out the one-click install Android development environment
Android Architecture. Alexandra Harrison & Jake Saxton
Android Architecture Alexandra Harrison & Jake Saxton Overview History of Android Architecture Five Layers Linux Kernel Android Runtime Libraries Application Framework Applications Summary History 2003
CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP
CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP August 2014 RSA agents recently traced a threat actor advertising a mobile credit card store application. The cybercriminal shared the information
Streamlining Web and Email Security
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor
Practical Attacks against Mobile Device Management (MDM) Michael Shaulov, CEO Daniel Brodie, Security Researcher Lacoon Mobile Security
Practical Attacks against Mobile Device Management (MDM) Michael Shaulov, CEO Daniel Brodie, Security Researcher Lacoon Mobile Security March 14, 2013 About: Daniel Security researcher for almost a decade
Lecture Embedded System Security A. R. Sadeghi, @TU Darmstadt, 2011 2012 Introduction Mobile Security
Smartphones and their applications have become an integral part of information society Security and privacy protection technology is an enabler for innovative business models Recent research on mobile
Marble & MobileIron Mobile App Risk Mitigation
Marble & MobileIron Mobile App Risk Mitigation SOLUTION GUIDE Enterprise users routinely expose their employers data and threaten network security by unknowingly installing malicious mobile apps onto their
MOBILE MALWARE REPORT
TRUST IN MOBILE MALWARE REPORT THREAT REPORT: H2/2014 CONTENTS At a Glance 03-03 Forecasts and trends 04-04 Current situation: 4.500 new Android malware instances every day 05-05 Third-party App-Stores
Henry Ford Health System Remote Access Support Details
Henry Ford Health System Remote Access Support Details Last Updated: March 5 th, 2014 Access Disclaimer: This document assumes that you already have an ID to access the Henry Ford Health System (HFHS)
Fraud Threat Intelligence
About ERM About The Speaker Safe Browsing, Monitoring Services Product Manager, Easy Solutions Inc. 8+ years anti-fraud, fraud risk, and security intelligence programs Previously licensed Securities Principle
Mobile Exploit Intelligence Project
Mobile Exploit Intelligence Project Dan Guido, Trail of Bits Mike Arpaia, isec Partners Blackberry, 06/2013 Mobile Device Security Thesis Mobile devices are loading up with data E- mail, line of business
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One End User Security, IS Control Evaluation & Self- Assessment Information Security Trends and Countermeasures
Malware Trend Report, Q2 2014 April May June
Malware Trend Report, Q2 2014 April May June 5 August 2014 Copyright RedSocks B.V. 2014. All Rights Reserved. Table of Contents 1. Introduction... 3 2. Overview... 4 2.1. Collecting Malware... 5 2.2. Processing...
CEH Version8 Course Outline
CEH Version8 Course Outline Module 01: Introduction to Ethical Hacking Information Security Overview Information Security Threats and Attack Vectors Hacking Concepts Hacking Phases Types of Attacks Information
Chris Boykin VP of Professional Services
5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing
Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth
Modern Cyber Threats how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure Axel Wirth Healthcare Solutions Architect Distinguished Systems Engineer AAMI 2013 Conference
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey
Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments
Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments Efficiently and Cost- Effectively Managing Mobility Risks in the Age of IT Consumerization Table of Contents EXECUTIVE
10 Quick Tips to Mobile Security
10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22
If you can't beat them - secure them
If you can't beat them - secure them v1.0 October 2012 Accenture, its logo, and High Performance delivered are trademarks of Accenture. Preface: Mobile adoption New apps deployed in the cloud Allow access
G Data Mobile MalwareReport. Half-Year Report July December 2013. G Data SecurityLabs
G Data Mobile MalwareReport Half-Year Report July December 2013 G Data SecurityLabs Contents At a glance... 2 Android malware: share of PUPs increasing significantly... 3 Android.Application consists of
Mobile Security Framework; Advances in Mobile Governance in Korea. TaeKyung Kim [email protected]
Mobile Security Framework; Advances in Mobile Governance in Korea TaeKyung Kim [email protected] I. e-banking in Korea 1. e-banking? BIS (Bank for International Settlements) - e-finance(electronic banking)
CHECK POINT Mobile Security Revolutionized. [Restricted] ONLY for designated groups and individuals
CHECK POINT Mobile Security Revolutionized [Restricted] ONLY for designated groups and individuals 2014 Check Point Software Technologies Ltd. 1 Rapidly Expanding Mobile Threats MOBILE THREATS are ESCALATING
BYOD: End-to-End Security
BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited [email protected]
Kaspersky Fraud Prevention platform: a comprehensive solution for secure payment processing
Kaspersky Fraud Prevention platform: a comprehensive solution for secure Today s bank customers can perform most of their financial operations online. According to a global survey of Internet users conducted
Security Bank of California Internet Banking Security Awareness
Security Bank of California Internet Banking Security Awareness INTRODUCTION Fraudsters are using increasingly sophisticated and malicious techniques to thwart existing authentication controls and gain
It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions
It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions Your home is your business and your farm is your network. But who has access to it? Can you protect
Mobile Security & BYOD Policy
Mobile Security & BYOD Policy Sarkis Daglian Assistant Manager, Desktop Support Office of Information Technology Isaac Straley UCI Information Security Officer Office of Information Technology Speakers
Studying Security Weaknesses of Android System
, pp. 7-12 http://dx.doi.org/10.14257/ijsia.2015.9.3.02 Studying Security Weaknesses of Android System Jae-Kyung Park* and Sang-Yong Choi** *Chief researcher at Cyber Security Research Center, Korea Advanced
Future of Mobile App Security. Vincent Sritapan Program Manager Cyber Security Division Science and Technology Directorate
Future of Mobile App Security Vincent Sritapan Program Manager Cyber Security Division Science and Technology Directorate Do You Know What Your Apps Are Doing? Spying Microphone & camera surveillance $
ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014
ONE DEVICE TO RULE THEM ALL! 1993 2013 1 AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014 2 1 AGENDA Mobile Devices / Smart Devices Implementation Models Risks & Threats Audit Program
WEB APPLICATION SECURITY
WEB APPLICATION SECURITY Governance and Risk Management YOUR LAST LINE OF DEFENSE Aug 06 2009 ANSES RAH RAH Anthony Lim MBA CISSP CSSLP FCITIL Director, Security, Asia Pacific Rational Software Prolog
MALWARE THREATS AND TRENDS. Chris Blow, Director Dustin Hutchison, Director
MALWARE THREATS AND TRENDS Chris Blow, Director Dustin Hutchison, Director WHAT IS MALWARE? Malicious Software Viruses Worms Trojans Rootkits Spyware Ransomware 2 MALWARE ORIGINS Users bring it from home
How we keep harmful apps out of Google Play and keep your Android device safe
How we keep harmful apps out of Google Play and keep your Android device safe February 2016 Bad apps create bad experiences, so we work hard to keep them off your device and out of Google Play. In 2015,
Student Tech Security Training. ITS Security Office
Student Tech Security Training ITS Security Office ITS Security Office Total Security is an illusion security will always be slightly broken. Find strategies for living with it. Monitor our Network with
