Mobile Malware Network View. Kevin McNamee : Alcatel-Lucent
|
|
|
- Joshua Robbins
- 10 years ago
- Views:
Transcription
1 Mobile Malware Network View Kevin McNamee : Alcatel-Lucent
2 Agenda Introduction How the data is collected Lies, Damn Lies and Statistics Windows PC Malware Android Malware Network Impact Examples of malware DDOS
3 Monitoring the Mobile Network Monitor GTP-C traffic - Maps IMSI, APN & EMEI to IP address - Associates infection with a specific device or user Monitor GTP-U traffic - Malware C&C - Exploits - DDOS - Hacking NodeB MOBILE NETWORK SECURITY ANALYTICS Alert Aggregation & Analysis SGSN Malware Detection Sensor 10GE or GE Forensic Analysis RAN enodeb RNC Alternate Tap (Iu-PS and S1-u) SGW Recommended Tap (Gn and S5/8) GGSN/PGW Alternate tap choice (Gi and SGi) Internet 3
4 Monitoring the Mobile Network Analytics Provides - Raw security alerts - Trigger packets - Infection history by device - Infection history by malware Reports - Most active malware - Network impact - Infection rates NodeB MOBILE NETWORK SECURITY ANALYTICS Alert Aggregation & Analysis SGSN Malware Detection Sensor 10GE or GE Forensic Analysis RAN enodeb RNC Alternate Tap (Iu-PS and S1-u) SGW Recommended Tap (Gn and S5/8) GGSN/PGW Alternate tap choice (Gi and SGi) Internet 4
5 Detection Rules Development Process MALWARE SAMPLES VIRUS VAULT 120K+ ANALYZED PER DAY 30M+ Active samples SANDBOX MALWARE TRAFFIC LIBRARY RULES DEVELOPMENT RULES LIBRARY TRAFFIC POLICY ZERO DAY BEHAVIORAL RULES DEPLOYMENT-SPECIFIC RULE SETS RULES REPOSITORY RULE ACTIVATION QUALITY TESTING FIELD TESTING IN LIVE NETWORKS FEEDBACK FROM FIELD TESTS 5
6 Infection Rate C&C detection measures actual infections as seen from the network Problem is growing (by 25% in 2014) LTE device 5 times more likely to be infected 6
7 However Estimates of Mobile Malware infection rates vary wildly - ALU, Lookout & Google report 0.4% to 0.6% - Verizon Breach Report quoted 0.03% - Damballa quoted % at RSA. Google: US English devices have a PHA (potentially harmful app) installed on about 0.4% of devices, which is about 0.2% below the worldwide average. Source: Google Report Android Security 2014 Year in Review 7
8 Also Watch out for bad reporting in the press Slight change in word order makes a huge difference: What was said: 31.7% of infected devices are in China What was reported in the press: 31.7% of devices in China are infected Source: NQ Mobile (2013) See: 8
9 Number of Mobile malware samples grew 161% in 2014 Samples grew by 161% in % in Android space Download the full report on the Alcatel-Lucent website Source: Alcatel-Lucent 2014 Malware Report 9
10 Android and Windows PC are the biggest targets ~50% of infected devices are Android ~50% are Windows PCs connected to the mobile network <1% iphone, Blackberry, Symbian, Windows Mobile Note recent reduction in Android infections 10
11 Infection Rate by Device Type 11
12 Windows Malware impacts mobile networks Mainstream Professional Cybercrime Types - Botnets, Rootkits, SPAM, Identity Theft, Banking Trojans, DDOS, Ad-Click, Bitcoin, FakeAV, Ransomware, Hacktivism, Spyware Examples - Proxy bot creates 800,000 TCP sessions and consumes 3GBytes of data in 24 hr period. - Roaming user draws botnet traffic from 4000 botnet peers around the world, all backhauled via his home network. - Bot checks in with C&C server every minute causing the radio connection to be reestablished each time. 12
13 Impact On the network - Bandwidth consumption - Radio signaling - Airtime Impact on user - Identity theft due to key loggers and password stealers - Financial loss due to banking trojans - Excessive charges due bandwidth usage - Extortion due to ransomware - Performance degradation due to consumption of computing and network resources. - Embarrassment from spaming and infecting friends 13
14 Android is mobile target of choice Mostly trojanized apps from 3 rd party app stores or Google Play Installed by victim as a result of phishing or social engineering. Types (varies by region) : Adware, Info Stealers, Spy Phone, SMS Trojans, Banking Trojans, Fake Security Software Impact is low on the network so far but moderate to high on users 14
15 Android Malware Lacks Sophistication - C&C servers are hard coded in the source code as URL s, domain names or IP addresses. - The C&C protocol is not robust and can be disrupted by taking out a single server. - The malware make no real attempt to conceal itself or avoid detection by anti-virus software. - The malware makes no attempt at persistence and can be removed by a simple uninstall. 15
16 Why Android? Sideloading - Android apps can be download and installed from anywhere. - This provides the malware developer with an easy way to deliver the malware. - Some third part app stores specialize in pirated software with a high malware content. Google Play - Survey of 130k free apps in early 2014 showed 1/700 had some sort of malware content. - Google has greatly improved on this since then. 16
17 Why Android? App Hijacking is trivial 1. Get the APK file for the target app 2. Open it using apktool d 3. Cut and paste the Trojan smali code directories into target app 4. Edit the oncreate() function in the apps main activity to invoke the Trojan service 5. Edit manifest to add the Trojan service and any required permissions 6. Rebuild the app using apktool b 7. Use jarsigner to sign the app (any key will do). 8. Use zipalign to complete the process This of course can be scripted 17
18 Android vs Apple app security Signed with self signed certificates that are created by the developer. Available from a large number of third party app stores Signed with certificates issued by Apple and linked to the developer registration information. Only available from Apple. 18
19 Malware impacts the network and the user Bandwidth SPAM DDOS Ad-Click Fraud Signaling Command & Control Ad-Click Fraud Scanning Air Time Command & Control Ad-Click Fraud Scanning Customer Experience Identity Theft Financial Loss Excessive Charges Extortion Performance Embarrassment 19
20 Top 20 Android Malware 20
21 UAPUSH Uapush.A is an Android adware Trojan with a moderate threat level Sends IMSI, IMEI, contact information, bookmarks and call history to a C&C server in China It also may send Short Message Service (SMS) messages without the user s consent. Activity on this decreased steadily since the first half of the year. 21
22 SMSTRACKER SMSTracker is an Android spyphone app that provides a complete remote phone tracking and monitoring system for Android phones. It allows the attacker to remotely track and monitor all SMS, Multimedia Messaging Service (MMS), text messages, voice calls, GPS locations and browser history. This is also known as Android.Monitor.Gizmo.A. 22
23 NOTCOMPATIBLE Web Proxy Bot ported from Windows to Android environment. Uses same C&C as Windows version. Allows remote miscreants to anonymously browse the web through the victim s phone. Consumes lots of bandwidth 165MB in two hours over 300K TCP sessions Infection rate is currently only 0.03% In a network of 1M users that s 600GB per day 23
24 KOLER Koler is an Android scareware Trojan that claims it has encrypted all the data on your phone and demands a ransom to restore the data. The victims are usually visitors to Internet-based pornographic sites, who are duped into downloading and installing a premium access video player. The malware lock-screen is customized depending on the location of the phone. The screen image is from a United States based phone. 24
25 FAKEFLASH FakeFlash is a scam application distributed under the name Install Flash Player 11. It charges money for downloading and installing the Adobe Flash Player. 25
26 Mobile Spyware Mobile spyware is definitely on the increase. Six of the mobile malware in the 2014 top 20 list are mobile spyware. These are apps that are used to spy on the phone s owner. They track the phone s location, monitor ingoing and outgoing calls and text messages, monitor and track the victim s web browsing. Used by individuals, private investigators and in cyber espionage. 26
27 Impact of Scanning Cyber-criminals and security researchers often scan the Internet for vulnerable devices. In mobile networks these scans can cause excessive radio paging and signaling as large numbers of idle devices must be reconnected to the network to respond to the scan. Not a problem if the mobile subnets are NATed Network Scan 27
28 DNS Amplification DDOS Attack in Mobile Network Mobile Wifi devices have been used in DNS DDOS amplification attacks Device configuration problem caused some devices to provide an internet facing recursive DNS service This attack is very similar to the Spark DDoS attack on Sept 8-9th 2014 in New-Zealand, where the mobile and fixed data services were down due to 138 compromised devices 28
29 Conclusion Mobile Malware - Currently lacks sophistication - Has relatively low infection rates (0.1%) - Greenfield opportunities include: - Spyphone (Tracking family, Private Investigators, Cyber Espionage) - SMS Trojans Things to watch for - Botnets move to mobile devices for SMS & Voice SPAM - More sophisticated C&C, persistence & stealth - DDOS against SMS and Voice - Hactivism goes mobile - Internet of Things gets hit 29
30 Questions?
How To Understand The Impact Of Malware On A Network
Black Hat Mobile Security Summit London 2015 Table of contents Introduction... 1 Monitoring malware in the mobile network... 1 Maintaining the detection rules... 2 Infection rate... 3 Misquoted in the
Protecting against Mobile Attacks
2014-APR-17 Protecting against Mobile Attacks Frankie Wong Security Analyst, HKCERT 1 Image source: http://www.techweekeurope.co.uk/news/mobile-malware-record-mcafee-125537 2 Agenda Attacks moving to mobile
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
trends in mobile malware and importance of network based user protection
trends in mobile malware and importance of network based user protection Sicherheitsnetzwerk München: Praxisforum Anwender und Anbieter im Dialog Mobile Sicherheit im Unternehmen Joachim Lüken, Nokia Networks,
Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix
Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to
Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013
Security workshop Belnet Aris Adamantiadis Brussels 18 th April 2013 Agenda What is a botnet? Symptoms How does it work? Life cycle How to fight against botnets? Proactive and reactive NIDS 2 What is a
Innovations in Network Security
Innovations in Network Security Michael Singer April 18, 2012 AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies.
Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014
Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014 Lisa D. Traina, CPA, CITP, CGMA Lisa Traina utilizes her 30+ years of experience as a CPA, CITP and CGMA
Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)
Indian Computer Emergency Response Team (CERT-In) Annual Report (2010) Indian Computer Emergency Response Team (CERT-In) Department of Information Technology Ministry of Communications & Information Technology
BOTNETS. Douwe Leguit, Manager Knowledge Center GOVCERT.NL
BOTNETS Douwe Leguit, Manager Knowledge Center GOVCERT.NL Agenda Bots: what is it What is its habitat How does it spread What are its habits Dutch cases Ongoing developments Visibility of malware vs malicious
FORBIDDEN - Ethical Hacking Workshop Duration
Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once
About Botnet, and the influence that Botnet gives to broadband ISP
About net, and the influence that net gives to broadband ISP Masaru AKAI BB Technology / SBB-SIRT Agenda Who are we? What is net? About Telecom-ISAC-Japan Analyzing code How does net work? BB Technology
Current Threat Scenario and Recent Attack Trends
Current Threat Scenario and Recent Attack Trends Anil Sagar Additional Director Indian Computer Emergency Response Team (CERT-In) Objectives Current Cyber space Nature of cyberspace and associated risks
Loophole+ with Ethical Hacking and Penetration Testing
Loophole+ with Ethical Hacking and Penetration Testing Duration Lecture and Demonstration: 15 Hours Security Challenge: 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said,
DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest
DDoS Attacks: The Latest Threat to Availability Dr. Bill Highleyman Managing Editor Availability Digest The Anatomy of a DDoS Attack Sombers Associates, Inc. 2013 2 What is a Distributed Denial of Service
QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY
QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY EXPLOIT KITS UP 75 PERCENT The Infoblox DNS Threat Index, powered by IID, stood at 122 in the third quarter of 2015, with exploit kits up 75 percent
Tutorial on Smartphone Security
Tutorial on Smartphone Security Wenliang (Kevin) Du Professor [email protected] Smartphone Usage Smartphone Applications Overview» Built-in Protections (ios and Android)» Jailbreaking and Rooting» Security
G Data Mobile MalwareReport. Half-Year Report July December 2013. G Data SecurityLabs
G Data Mobile MalwareReport Half-Year Report July December 2013 G Data SecurityLabs Contents At a glance... 2 Android malware: share of PUPs increasing significantly... 3 Android.Application consists of
TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY. Mark Villinski @markvillinski
TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY Mark Villinski @markvillinski Why do we have to educate employees about cybersecurity? 2014 Corporate Threats Survey 94% of business s suffered one
Norton Mobile Privacy Notice
Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy
Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus
cdoulig at unipi dot gr Department of Informatics University of Piraeus Safety & Security in Cyber Space: Building up Trust in the EU Athens, 6-7 March 2014 Cybersecurity: where do we stand? Major Trends
Knowing Your Enemy How Your Business is Attacked. Andrew Rogoyski June 2014
Knowing Your Enemy How Your Business is Attacked Andrew Rogoyski June 2014 Why Cyber is the New Security 1986: Lawrence Berkeley NL discovers attempt to copy US Government Information on Arpanet 1988:
isheriff CLOUD SECURITY
isheriff CLOUD SECURITY isheriff is the industry s first cloud-based security platform: providing fully integrated endpoint, Web and email security, delivered through a single Web-based management console
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Agenda Information Security Trends Year 2014 in Review Outlook for 2015 Advice to the Public Hong Kong Computer Emergency Response Team Coordination
How Attackers are Targeting Your Mobile Devices. Wade Williamson
How Attackers are Targeting Your Mobile Devices Wade Williamson Today s Agenda Brief overview of mobile computing today Understanding the risks Analysis of recently discovered malware Protections and best
The SMB Cyber Security Survival Guide
The SMB Cyber Security Survival Guide Stephen Cobb, CISSP Security Evangelist The challenge A data security breach can put a business out of business or create serious unbudgeted costs To survive in today
BotNets- Cyber Torrirism
BotNets- Cyber Torrirism Battling the threats of internet Assoc. Prof. Dr. Sureswaran Ramadass National Advanced IPv6 Center - Director Why Talk About Botnets? Because Bot Statistics Suggest Assimilation
Malware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
Protecting the Infrastructure: Symantec Web Gateway
Protecting the Infrastructure: Symantec Web Gateway 1 Why Symantec for Web Security? Flexibility and Choice Best in class hosted service, appliance, and virtual appliance (upcoming) deployment options
FIGHTING FRAUD ON 4G. Neutralising threats in the LTE ecosystem
FIGHTING FRAUD ON 4G Neutralising threats in the LTE ecosystem TABLE OF CONTENTS Introduction...3 New and Old Vulnerabilities...4 Identity Management...5 A Unified Response...6 Data Mining...7 An Evolving
Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms
Overview Common Internet Threats Tom Chothia Computer Security, Lecture 19 Phishing Sites Trojans, Worms, Viruses, Drive-bydownloads Net Fast Flux Domain Flux Infiltration of a Net Underground economy.
NQ Mobile Security Frequently Asked Questions (FAQs) for Android
NQ Mobile Security Frequently Asked Questions (FAQs) for Android Introducing Mobile Security NQ Mobile Security protects your mobile device against viruses and malware, while keeping your system running
DDoS Attacks Can Take Down Your Online Services
DDoS Attacks Can Take Down Your Online Services Dr. Bill Highleyman Managing Editor, Availability Digest Continuity Insights New York 2014 October 8, 2014 [email protected] Who Am I? Dr. Bill
Security A to Z the most important terms
Security A to Z the most important terms Part 1: A to D UNDERSTAND THE OFFICIAL TERMINOLOGY. This is F-Secure Labs. Learn more about the most important security terms with our official explanations from
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
Codes of Connection for Devices Connected to Newcastle University ICT Network
Code of Connection (CoCo) for Devices Connected to the University s Author Information Security Officer (Technical) Version V1.1 Date 23 April 2015 Introduction This Code of Connection (CoCo) establishes
10 Quick Tips to Mobile Security
10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22
WHITE PAPER. Understanding How File Size Affects Malware Detection
WHITE PAPER Understanding How File Size Affects Malware Detection FORTINET Understanding How File Size Affects Malware Detection PAGE 2 Summary Malware normally propagates to users and computers through
Emerging Security Technological Threats
Emerging Security Technological Threats Jamie Gillespie Training and Education Team Leader, AusCERT About AusCERT Australia s national CERT Collect, monitor, advise on threats and vulnerabilities Incident
OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft
OVERVIEW 2 1. Cyber Crime Unit organization 2. Legal framework 3. Identity theft modus operandi 4. How to avoid online identity theft 5. Main challenges for investigation 6. Conclusions ORGANIZATION 3
Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University
Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1 Awareness of BYOD Security Concerns Benjamin Tillett-Wakeley East Carolina University AWARENESS OF BYOD SECURITY CONCERNS 2 Abstract This paper will
The Increasing Threat of Malware for Android Devices. 6 Ways Hackers Are Stealing Your Private Data and How to Stop Them
The Increasing Threat of Malware for Android Devices 6 Ways Hackers Are Stealing Your Private Data and How to Stop Them INTRODUCTION If you own a smartphone running the Android operating system, like the
Who s Doing the Hacking?
Who s Doing the Hacking? 1 HACKTIVISTS Although the term hacktivist refers to cyber attacks conducted in the name of political activism, this segment of the cyber threat spectrum covers everything from
Course Content: Session 1. Ethics & Hacking
Course Content: Session 1 Ethics & Hacking Hacking history : How it all begin Why is security needed? What is ethical hacking? Ethical Hacker Vs Malicious hacker Types of Hackers Building an approach for
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
KASPERSKY SMALL OFFICE SECURITY (Version 3) Features List
KASPERSKY SMALL OFFICE SECURITY (Version 3) Features List Contents Overview... 3 Features list for Personal Computer and File Server... 3 Computer Security... 3 Internet Security... 4 Backup & Restore...
Enterprise Mobile Threat Report
Enterprise Mobile Threat Report The State of ios and Android Security Threats to Enterprise Mobility I. Introduction This report examines enterprise security threats for ios and Android. While Android
ZNetLive Malware Monitoring
Introduction The criminal ways of distributing malware or malicious software online have gone through a change in past years. In place of using USB drives, attachments or disks to distribute viruses, hackers
Corporate Account Takeover & Information Security Awareness. Customer Training
Corporate Account Takeover & Information Security Awareness Customer Training No computer system can provide absolute security under all conditions. NO SECURITY MEASURE OR LIST OF SECURITY MEASURES CAN
White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks
White paper Phishing, Vishing and Smishing: Old Threats Present New Risks How much do you really know about phishing, vishing and smishing? Phishing, vishing, and smishing are not new threats. They have
THREAT VISIBILITY & VULNERABILITY ASSESSMENT
THREAT VISIBILITY & VULNERABILITY ASSESSMENT Date: April 15, 2015 IKANOW Analysts: Casey Pence IKANOW Platform Build: 1.34 11921 Freedom Drive, Reston, VA 20190 IKANOW.com TABLE OF CONTENTS 1 Key Findings
Better protection for customers, and recurring revenue for you!
AVG AntiVirus Better protection for customers, and recurring revenue for you! Offer your customers the latest protection without draining your resources. A single, central management platform alerts when
What Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
Malware Trend Report, Q2 2014 April May June
Malware Trend Report, Q2 2014 April May June 5 August 2014 Copyright RedSocks B.V. 2014. All Rights Reserved. Table of Contents 1. Introduction... 3 2. Overview... 4 2.1. Collecting Malware... 5 2.2. Processing...
Property of Secure Network Technologies-Do Not Distribute or Post Without Written Permission-Copyrights and Trademark Apply
Malware - Mules & Money Mobile Edition v2.0 By Steve Stasiukonis What We Do Security Assessments & Penetration Tests Incident Response Digital Investigation & Forensic Services Technical Surveillance Countermeasure
ENTERPRISE MOBILE THREATS. 2014: A Year In Review. I. Introduction. Methodology. Key Highlights ENTERPRISE
ENTERPRISE ENTERPRISE MOBILE THREATS 04: A Year In Review that a single security breach on a mobile device can put an entire organization at risk. Specifically, organizations face three types of security
U.S. Cellular Mobile Data Security. User Guide Version 00.01
U.S. Cellular Mobile Data Security User Guide Version 00.01 Table of Contents Install U.S. Cellular Mobile Data Security...3 Activate U.S. Cellular Mobile Data Security...3 Main Interface...3 Checkup...4
4/20/2015. Fraud Watch Campaign. AARP is Fighting for You. AARP is Fighting for You. Campaign Tactics. AARP can help you Spot & Report Fraud
AARP can help you Spot & Report Fraud Fraud Fighter Call Center: Talk to a volunteer trained in how to spot and report fraud. Call the Fraud Fighter Call Center at (877) 908-3360 Fraud Watch Campaign What
BE SAFE ONLINE: Lesson Plan
BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take
Computer Protection. Computer Protection. Computer Protection 5/1/2013. Classic Battle of Good vs Evil. David Watterson & Ross Cavazos
David Watterson & Ross Cavazos Chief Information Officer IT Director City of Billings Yellowstone County Local Government IT Group Vice-Chairmen Classic Battle of Good vs Evil GOOD EVIL Firewall E-Mail
BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager
BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager 1 AGENDA Mobile Explosion Mobile Trends BYOD Benefits, Challenges and Threats BYOD Security BYOD Strategy
Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM
JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM May 2015 Nguyễn Tiến Đức ASEAN Security Specialist Agenda Modern Malware: State of the Industry Dynamic Threat Intelligence on the Firewall
Ed Ferrara, MSIA, CISSP [email protected]. Fox School of Business
MIS 5208 Week 4 Cybersecurity & Fraud Ed Ferrara, MSIA, CISSP [email protected] Hacking Source: www.youtube.com Computer Crime A cyber breach is any event that intentionally or unintentionally causes
DATA SHEET. What Darktrace Finds
DATA SHEET What Darktrace Finds Darktrace finds anomalies that bypass other security tools, due to the uniqueness of the Enterprise Immune System, capable of detecting threats without reliance on rules,
Operation Liberpy : Keyloggers and information theft in Latin America
Operation Liberpy : Keyloggers and information theft in Latin America Diego Pérez Magallanes Malware Analyst Pablo Ramos HEAD of LATAM Research Lab 7/7/2015 version 1.1 Contents Introduction... 3 Operation
Guideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
Cyber Security Metrics Dashboards & Analytics
Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics
Security Engineering Part III Network Security. Intruders, Malware, Firewalls, and IDSs
Security Engineering Part III Network Security Intruders, Malware, Firewalls, and IDSs Juan E. Tapiador [email protected] Department of Computer Science, UC3M Security Engineering 4th year BSc in Computer
INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. [email protected]
INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library [email protected] Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup
Malicious Network Traffic Analysis
Malicious Network Traffic Analysis Uncover system intrusions by identifying malicious network activity. There are a tremendous amount of network based attacks to be aware of on the internet today and the
INTERNET SECURITY THREAT REPORT
APRIL 2015 VOLUME 20 INTERNET SECURITY THREAT REPORT APPENDICES 2 2015 Internet Security Threat Report Appendices THREAT ACTIVITY TRENDS MALICIOUS CODE TRENDS SPAM & FRAUD ACTIVITY TRENDS VULNERABILITY
Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
MOBILE MALWARE REPORT
TRUST IN MOBILE MALWARE REPORT THREAT REPORT: H2/2014 CONTENTS At a Glance 03-03 Forecasts and trends 04-04 Current situation: 4.500 new Android malware instances every day 05-05 Third-party App-Stores
Advanced Online Threat Protection: Defending. Malware and Fraud. Andrew Bagnato Senior Systems Engineer
Advanced Online Threat Protection: Defending Your Online Banking Customers Against Modern Malware and Fraud Andrew Bagnato Senior Systems Engineer Agenda Modern malware a targets Account credentials Financial
Threat Events: Software Attacks (cont.)
ROOTKIT stealthy software with root/administrator privileges aims to modify the operation of the OS in order to facilitate a nonstandard or unauthorized functions unlike virus, rootkit s goal is not to
Advanced Persistent Threats
White Paper INTRODUCTION Although most business leaders and IT managers believe their security technologies adequately defend against low-level threats, instances of (APTs) have increased. APTs, which
Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop.
Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop. Our aim is to address the students apprehensions and anxieties regarding their career prospects in Ethical
Practical Attacks against Mobile Device Management (MDM) Michael Shaulov, CEO Daniel Brodie, Security Researcher Lacoon Mobile Security
Practical Attacks against Mobile Device Management (MDM) Michael Shaulov, CEO Daniel Brodie, Security Researcher Lacoon Mobile Security March 14, 2013 About: Daniel Security researcher for almost a decade
