Cybercrime & solutions for Home users and Small Businesses
|
|
|
- Barbara Douglas
- 10 years ago
- Views:
Transcription
1 Cybercrime & solutions for Home users and Small Businesses Eddy Willems Security Evangelist EICAR Director Information & Press
2 Agenda About Kaspersky Lab History Cyber Crime... Future
3 About Kaspersky Lab International leader in internet security, visionary part Gartner quadrant Advanced antivirus, antispyware, antispam and firewall More than 250 million protected users worldwide 10 R&D and virus labs worldwide Over 1400 employees, 450 developers & engineers Local sales, marketing and technical support Local virus detection by Benelux virus lab Fast reaction time and automatic hourly updates
4 Leading IT security players worldwide Have Chosen Kaspersky Lab Technology
5 The Kaspersky Virus Lab - sharing knowledge through malware research Antivirus experts and virus analysts Industry-leading knowledge resource Our team of virus analysts is active in AVIEN (Anti-Virus Information Exchange Network) CARO (Computer Antivirus Research Organization) ICSA (International Computer Security Association) AVAR (Association of Antivirus Asia Researchers) IMPACT (international partnership dedicated to combating terrorist activities in the area of information technology) EICAR (European Institute for Computer AntiVirus Research)
6 TIME
7 Some History: The old days!
8 Some years ago... Virus SPAM Worm Trojan
9 Today s Threats Trojan Worm Virus Root-kits Bot Zombie Keystroke logger Spyware Screen Pharming grabber Password grabber Phishing Remote- Control Agent Premium- Rate Dialer SPAM Adware
10 What are the real threats? Worms Adware Spyware Internal Hacker Viruses Bad Stuff Data Theft PeerToPeer attacks Spam External Hacker Exploits User Phishing Identity Theft Vulnerabilities DDoS Mailers DoS
11 The end of global epidemics Epidemics Quarters Source: Kaspersky Lab
12 Increasing Numbers KL records Source: Kaspersky Lab
13 Cyber crime Types of malware in daily updates 500 Cyber vandalism Petty fraud Cyber crime Source: Kaspersky Lab
14 The Ecosystem E-Criminals Victims Police ITTP Industry
15 The Rogues Gallery The Script Kiddies Chen Ing-Hau 24 (Taiwan) Arrested September 21, 2000 for the CIH virus Jeffrey Lee Parson 18 (USA) Arrested August 29, 2003 for the Lovesan.b virus Sven Jaschan 18 (Germany) Arrested May 7, 2004 for NetSky and Sasser viruses
16 The Rogues Gallery Binary Thieves Jeanson James Ancheta 20 (USA) Arrested November 3, 2005 for creating zombie networks and leasing them for spam mailing and DDoS attacks on websites Farid Essebar -18 (Morocco), Atilla Ekici 21 (Turkey) Arrested on August 26, 2005 for creating zombie networks using Mytob and Zotob (Bozori) worms
17 Today we are fighting these! Jeremy Jaynes Millionaire, and a spammer Jay Echouafni CEO, and a DDoS attacker Andrew Schwarmkoff Member of Russian mob, and a phisher
18 One of the big problems: Botnets
19 What is a botnet? part 1
20 What is a botnet? part 2
21 What is a botnet? part 3
22 What can you see?
23 Using botnet DDoS for fun and glory Sending spam, making spamlists Phishing Stealing private data Ransoming Botnet renting
24 New territories: Social Networking Blogs, forums Wiki MySpace, YouTube Other online communities: Who s on Facebook?
25 CyberCrime is Big Business Profitability Easy to do (technically and morally) Low risk business New services that are profitable to attack
26 Today s Networks Lack Clear, Crisp Boundaries Internal/External network Individual Users connect from multiple locations Managed/Unmanaged devices Individual devices operate both inside the network, and on public networks New Devices on the Network Internet eg. SmartPhones, etc. Network Telecomm uters Contrac Mobile Users Wireless Users
27 Top 10: Safe Internet Security Tips 1. Make backups 2. Update software regularly and check this 3. Use upgraded anti-virus/spyware software and update regularly and check this 4. Use a personal desktop firewall 5. Use difficult passwords 6. Be very carefull with unknown files or programs 7. Surf sure and browse logically 8. Thnik twice when leaving personal data somewhere 9. do not react on SPAM 10. Use common sense
28 What do we really need? Worms Adware Spyware Internal Hacker Viruses Bad Stuff Data Theft PeerToPeer attacks Spam External Hacker Exploits User Phishing Identity Theft Vulnerabilities DDoS Mailers DoS
29 Thank you
30 KOSS
31 Kaspersky Open Space Security
32 So what do we have? A perfect combination of. Legendary good detection with very quick reaction time New improved scanning engine with rootkit cleaning Improved Heuristic scanner (emulation+sandbox) Behaviour blocker + HIPS (proactive detection) An easy firewall Anti-Spam Vulnerability Scanner Web control and Device control Within one easy package!!!
33 Don t forget KMS
34 Kaspersky Anti-Virus Mobile On-access monitor intercepts all data channels On-demand monitor for manual scan SMS spam filtering and other value-add features Firewall Anti-theft: SMS Block, SMS Clean, SIM Watch : Unique feature Digitally signed updates via WAP, HTTP or from PC folder Minimal amount of system resources used Flexible customization options for OEMs, mobile operators, device vendors and content providers Supports all popular devices, including SonyEricsson, NOKIA, Siemens, Samsung, Panasonic, Sendo and other vendors Available for Symbian, Windows Mobile
35 A different view... KHSS
36 What do we offer? Kaspersky Hosted Mail Security Cascaded Virus protection Comprehensive Spam protection Content Control Inbound and Outbound Scalable Reporting Kaspersky Hosted Web Security Virus protection Content Control URL-Filter Scalable Reporting Kaspersky Hosted IM Security Virus protection SPIM protection Content Control Scalable Reporting
37 Consumer v2009 KAV & KIS
38 New Technologies in v2009 KAV / KIS v2009 (8.0) : AV signatures + PDM+ Emulator + Improved Heuristics - Behaviour control {Security Rating, WhiteListing, Rules engine} => Improved HIPS - Vulnerability Checker - Virtual Keyboard - In-the Cloud protection: Kaspersky Security Network - Online Check + Rescue Disk Image - Improved Anti-Rootkit - Improved Firewall - Improved Parental Control - Easier Wizards First Hybrid Technology Product in the world
39 Automatic Classification of Applications Avantages : Each application is automatically categorized based on criteria managed by KIS 2009 Much less user interaction needed while less false postives
40
41 Thank you! Questions? Eddy Willems
Attacks from the Inside
Attacks from the Inside Eddy Willems, G Data Righard J. Zwienenberg, Norman Attacks from the Inside. Agenda - Social Networking / Engineering - Where are the threats coming from - Infection vectors - The
The Mobile Malware Problem
The Mobile Malware Problem Eddy Willems Security Evangelist G Data Security Labs Director Security Industry Relationships - EICAR [email protected] Introduction Security Evangelist at G Data: Privately
Integrated Protection for Systems. João Batista [email protected] Territory Manager
Integrated Protection for Systems João Batista [email protected] Territory Manager 2 McAfee Overview Proven Expertise And what it means to you Proof of Expertise Impact of Expertise 1 17 100 300
KASPERSKY SMALL OFFICE SECURITY (Version 3) Features List
KASPERSKY SMALL OFFICE SECURITY (Version 3) Features List Contents Overview... 3 Features list for Personal Computer and File Server... 3 Computer Security... 3 Internet Security... 4 Backup & Restore...
McAfee Total Protection Reduce the Complexity of Managing Security
McAfee Total Protection Reduce the Complexity of Managing Security Computer security has changed dramatically since the first computer virus emerged 25 years ago. It s now far more complex and time-consuming.
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community
Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community A Sampling of Cyber Security Solutions Designed for the
Spyware. Michael Glenn Technology Management [email protected]. 2004 Qwest Communications International Inc.
Spyware Michael Glenn Technology Management [email protected] Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References
WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World
Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING Web Threats Are Serious Business Your
Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:
Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for
Customer Value Enhancement, Endpoint Security Products Global, 2011
Customer Value Enhancement, Endpoint Security Products Global, 2011 Frost & Sullivan s Global Research Platform Frost & Sullivan is in its 50th year in business with a global research organization of 1,800
Stopping zombies, botnets and other email- and web-borne threats
Stopping zombies, botnets and other email- and web-borne threats Hijacked computers, or zombies, hide inside networks where they send spam, steal company secrets, and enable other serious crimes. This
Introduction (Contd )
Introduction In 2008, mobile devices continue to rapidly replace desktop computers. Mobile devices create easier ways to communicate and work more efficiently while away from the corporate office. In addition,
A progressive and integrated approach to protecting corporate networks
A progressive and integrated approach to protecting corporate networks Kaspersky Open Space Security is a suite of products that offers security coverage for all types of network endpoints, from mobile
Cyber Security Solutions:
ThisIsCable for Business Report Series Cyber Security Solutions: A Sampling of Cyber Security Solutions Designed for the Small Business Community Comparison Report Produced by BizTechReports.com Editorial
Spyware: Securing gateway and endpoint against data theft
Spyware: Securing gateway and endpoint against data theft The explosion in spyware has presented businesses with increasing concerns about security issues, from data theft and network damage to reputation
OUR MISSION IS TO PROTECT EVERYONE FROM CYBERCRIME
OUR MISSION IS TO PROTECT EVERYONE FROM CYBERCRIME We believe that everyone from home computer users and small companies, to large corporations and governments has the right to be free from cybersecurity
KASPERSKY LAB TECHNOLOGY LEADERSHIP
KASPERSKY LAB TECHNOLOGY LEADERSHIP OUR MISSION IS TO PROTECT EVERYONE FROM CYBERCRIME We believe that everyone from home computer users and small companies, to large corporations and governments has the
Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799
Cyber Security An Executive Imperative for Business Owners SSE Network Services www.ssenetwork.com 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Pretecht SM by SSE predicts and remedies
System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security
Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems
BE SAFE ONLINE: Lesson Plan
BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take
ITSC Training Courses Student IT Competence Programme SIIS1 Information Security
ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know
Information Security Threat Trends
Talk @ Microsoft Security Day Sep 2005 Information Security Threat Trends Mr. S.C. Leung 梁 兆 昌 Senior Consultant 高 級 顧 問 CISSP CISA CBCP M@PISA Email: [email protected] 香 港 電 腦 保 安 事 故 協 調 中 心 Introducing
Technical Product Overview. Employing cloud-based technologies to address security risks to endpoint systems
Symantec Endpoint Protection.cloud Employing cloud-based technologies to address security risks to endpoint systems White Paper: Endpoint Protection.cloud - Symantec Endpoint Protection.cloud Contents
OutbreakShield Effective and Immediate Protection against Email Virus Outbreaks
OutbreakShield Effective and Immediate Protection against Email Virus Outbreaks Ralf Benzmüller G DATA Software AG Introduction The virus protection provided by all current antivirus software products
Importance of Web Application Firewall Technology for Protecting Web-based Resources
Importance of Web Application Firewall Technology for Protecting Web-based Resources By Andrew J. Hacker, CISSP, ISSAP Senior Security Analyst, ICSA Labs January 10, 2008 ICSA Labs 1000 Bent Creek Blvd.,
WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security
WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security A World of Constant Threat We live in a world on constant threat. Every hour of every day in every country around the globe hackers
Malware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
Identity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office
Identity Theft CHRISTOS TOPAKAS Head of Group IT Security and Control Office Agenda Identity Theft Threats and Techniques Identity Theft Definition and Facts Identity Theft & Financial Institutions Prevention
Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers 2012. Your Interactive Guide to the Digital World
Chapter 11 Manage Computing Securely, Safely and Ethically Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define the term, computer security risks, and briefly
CYBEROAM UTM s. Outbound Spam Protection Subscription for Service Providers. Securing You. Our Products. www.cyberoam.com
CYBEROAM UTM s Outbound Spam Protection Subscription for Service Providers Our Products Unified Threat Management Agenda of Presentation What is Outbound Spam? Consequences of Outbound Spam Why current
Emerging Security Technological Threats
Emerging Security Technological Threats Jamie Gillespie Training and Education Team Leader, AusCERT About AusCERT Australia s national CERT Collect, monitor, advise on threats and vulnerabilities Incident
Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning
Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Lee Zelyck Network Administrator Regina Public Library Malware, Spyware, Trojans
Top tips for improved network security
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
Kaspersky Endpoint Security 8 for Windows and Kaspersky Security Center
Kaspersky Endpoint Security 8 for Windows and Kaspersky Security Center Reviewer s Guide Contents Introduction / Solution Headlines... 3 Getting Started... 4 Deployment... 4 Installation on an Infected
BitDefender Client Security Workstation Security and Management
BitDefender Client Security Workstation Security and Management BitDefender Client Security is an easy to use business security and management solution, which delivers superior proactive protection from
OCT Training & Technology Solutions [email protected] (718) 997-4875
OCT Training & Technology Solutions [email protected] (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,
BCS IT User Syllabus IT Security for Users Level 2. Version 1.0
BCS IT User Syllabus IT for Users Level 2 Version 1.0 June 2009 ITS2.1 System Performance ITS2.1.1 Unwanted messages ITS2.1.2 Malicious ITS2.1.1.1 ITS2.1.1.2 ITS2.1.2.1 ITS2.1.2.2 ITS2.1.2.3 ITS2.1.2.4
ABOUT LAVASOFT. Contact. Lavasoft Product Sheet: Ad-Aware Pro Security
ABOUT LAVASOFT Company Overview Lavasoft is the original anti-malware company, creating award-winning, free security and privacy software since 1999. Born of the belief that online security should be available
Top 10 Tips to Keep Your Small Business Safe
Securing Your Web World Top 10 Tips to Keep Your Small Business Safe Protecting your business against the latest Web threats has become an incredibly complicated task. The consequences of external attacks,
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports Building a Security Operation Center Agenda: Auditing Your Network Environment Selecting Effective Security
AVG AntiVirus Free Edition
AVG AntiVirus Free Edition User Manual Document revision AVG.06 (16.10.2015 ) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners.
Endpoint Security and the Case For Automated Sandboxing
WHITE PAPER Endpoint Security and the Case For Automated Sandboxing https://enterprise.comodo.com A World of Constant Threat We live in a world of constant threat. Hackers around the globe work every hour
Why AVG? Reasons to choose AVG. The AVG Difference: People who know security recommend AVG
Why AVG? The world of small business has changed. Businesses like yours rely increasingly on the Internet to provide the tools to compete and succeed. As you and your employees communicate and store more
Don t Fall Victim to Cybercrime:
Don t Fall Victim to Cybercrime: Best Practices to Safeguard Your Business Agenda Cybercrime Overview Corporate Account Takeover Computer Hacking, Phishing, Malware Breach Statistics Internet Security
World-class security solutions for your business. Business Products. C a t a l o g u e
World-class security solutions for your business Business Products C a t a l o g u e About Kaspersky Lab Kaspersky Lab is the largest developer of secure content management systems in Europe and is among
Technology in Action. Alan Evans Kendall Martin Mary Anne Poatsy. Eleventh Edition. Copyright 2015 Pearson Education, Inc.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Eleventh Edition Technology in Action Chapter 7 Securing Your System: Protecting Your Digital Data and Devices Chapter Topics Cybercrime
STPIC/Admin/002/2009-2010/ Date: 18.06.09. Sub: Quotation for purchase/renewal of Anti Virus Software Reg.
STPIC/Admin/002/2009-2010/ Date: 18.06.09 Sub: Quotation for purchase/renewal of Anti Virus Software Reg. Software Technology Parks of India (STPI), an autonomous Society under Ministry of Communication
KASPERSKY ENDPOINT SECURITY FOR BUSINESS: TECHNOLOGY IN ACTION
KASPERSKY ENDPOINT SECURITY FOR BUSINESS: TECHNOLOGY IN ACTION For the threats you can see and those you can t kaspersky.com/business #Securebiz CONTENTS Protect your business from the threats you can
McAfee Internet Security Suite Quick-Start Guide
Enjoy a Worry Free Online Experience McAfee Internet Security Suite protects your PC, identity and online experience. It also includes PC and network tools, plus McAfee SiteAdvisor for safe surfing. Internet
SECURE SHARING AND COMMUNICATION. Protection for servers, email and collaboration
SECURE SHARING AND COMMUNICATION Protection for servers, email and collaboration THE VALUE OF SECURITY Most malware attacks use software vulnerabilities to reach their targets. Only 90% of malware attacks
For Businesses with more than 25 seats. www.eset.com
For Businesses with more than 25 seats www.eset.com ESET Secure Enterprise Whether your business is just starting or Simple and Straightforward established, there are a few things you expect With ESET
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
What Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013
Security workshop Belnet Aris Adamantiadis Brussels 18 th April 2013 Agenda What is a botnet? Symptoms How does it work? Life cycle How to fight against botnets? Proactive and reactive NIDS 2 What is a
How to Use Windows Firewall With User Account Control (UAC)
Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security
2009 Antispyware Coalition Public Workshop
2009 Antispyware Coalition Public Workshop Jeffrey Fox Technology Editor, Consumer Reports Media contact: Lauren Hackett, 914-378-2561 Background For several years, Consumer Reports has been testing and
Fighting Cyber Crime in the Telecommunications Industry. Sachi Chakrabarty
Fighting Cyber Crime in the Telecommunications Industry Sachi Chakrabarty Agenda Cyber Crime What s all the fuss about CyberCrime? DoS Attacks Telco Solutions Cybercrime? Cybercrime Definition All criminal
Kaspersky Security Network
Kaspersky Security Network Kaspersky Security Network is a progressive technology implemented in the latest versions of Kaspersky Lab s personal products. When it comes to new malware, it ensures a prompt
Alexander Nikov. 9. Information Assurance and Security, Protecting Information Resources. Learning Objectives. You re on Facebook? Watch Out!
INFO 1500 Information Technology Fundamentals Learning Objectives 9. Information Assurance and Security, Protecting Information Resources Alexander Nikov Explain why information systems are vulnerable
Countermeasures against Spyware
(2) Countermeasures against Spyware Are you sure your computer is not infected with Spyware? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Spyware?
Defending Behind The Device Mobile Application Risks
Defending Behind The Device Mobile Application Risks Tyler Shields Product Manager and Strategist Veracode, Inc Session ID: MBS-301 Session Classification: Advanced Agenda The What The Problem Mobile Ecosystem
Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM
Internet Security Protecting Your Business Hayden Johnston & Rik Perry WYSCOM Introduction Protecting Your Network Securing Your Information Standards & Best Practices Tools & Options Into The Future Creating
Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014
Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014 Lisa D. Traina, CPA, CITP, CGMA Lisa Traina utilizes her 30+ years of experience as a CPA, CITP and CGMA
HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments
HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments OVERVIEW This document explains the functionality of Security for Virtual and Cloud Environments (SVCE) - what
KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security
KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT Open Space Security Cyber-attacks are real. Today alone, Lab technology prevented nearly 3 million of them aimed at our customers worldwide.
White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks
White paper Phishing, Vishing and Smishing: Old Threats Present New Risks How much do you really know about phishing, vishing and smishing? Phishing, vishing, and smishing are not new threats. They have
Endpoint Security 2.0: The Emerging Role of Application Whitelisting Solutions. Todd Schell
Endpoint Security 2.0: The Emerging Role of Application Whitelisting Solutions Todd Schell [email protected] Director, Product Engineering CoreTrace TM December 2008 Today s Endpoint Control Challenges
Security A to Z the most important terms
Security A to Z the most important terms Part 1: A to D UNDERSTAND THE OFFICIAL TERMINOLOGY. This is F-Secure Labs. Learn more about the most important security terms with our official explanations from
Ethical Hacking Course Layout
Ethical Hacking Course Layout Introduction to Ethical Hacking o What is Information Security? o Problems faced by the Corporate World o Why Corporate needs Information Security? Who is a Hacker? o Type
Feature List for Kaspersky Security for Mobile
Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance
