Mobile Exploit Intelligence Project
|
|
|
- Beryl Riley
- 10 years ago
- Views:
Transcription
1 Mobile Exploit Intelligence Project Dan Guido, Trail of Bits Mike Arpaia, isec Partners Blackberry, 06/2013
2 Mobile Device Security Thesis Mobile devices are loading up with data E- mail, line of business apps, login credentials Lots of possibilities to compromise mobile devices Insecure data storage, app- to- app, NFC, web browser, Very few vectors explored in actual attacks Why is that? What motivates attackers? Isn t it easy? What attacks do I need to defend against now? Actual vs Probable vs Possible How will things change (or not) tomorrow? 2
3 Millions of Mobile Attacks Attack Vector Exploits Platform * Android and ios,
4 What are we doing wrong?
5 Look at Attacks, Not Vulnerabilities X X ßActual attacks ßProbable X ßStunt hacking X ßFUD Attackers choose the least cost path to their objective 5
6 Attacker Math 101 Cost(Attack) < Potential Revenue Attacks must be financially profitable Attacks must scale according to resources Cost(Attack) = Cost(Vector) + Cost(Escalation) What we know from Mobile OS architectures Cost of Attack Ease Enforcement Established Process Potential Revenue # of Targets Value of Data Ability to Monetize 6
7 Setting it up Develop malware Mobile Malware Today Add malware to many applications Scaling it out Put malware online (app store) Drive installations (SMS, e- mail, ads) Accessing data Exploit a flaw to access user data Send stolen data back to attacker 7
8 Intrusion Kill Chains Systematic process that an intrusion must follow Deficiency in one step will disrupt the process Evolves response beyond point of compromise Prevents myopic focus on vulnerabilities or malware Identifies attacker reuse of tools and infrastructure Guides our analysis and implementation of defenses Align defenses to specific processes an attacker takes Force attackers to make difficult strategic adjustments Mike Cloppert - Security Intelligence: Defining APT Campaigns 8
9 Where are Mobile Drive-Bys? Mobile Town Desktop City
10 Less Mobile Web Targets ~8% of total web traffic comes from mobile devices Breakdown by version / features (+ varying rates of feature support) 10
11 Lack of Ads Limits Targeting Potential Normal Website Mobile Website Mobile App 11
12 Browser Exploits are Harder Internet Browser Permissions.INTERNET.ACCESS_FINE_LOCATION.ACCESS_COARSE_LOCATION.ACCESS_FINE_LOCATION.ACCESS_DOWNLOAD_MANAGER.ACCESS_NETWORK_STATE.ACCESS_WIFI_STATE.SET_WALLPAPER Kernel Drivers.WAKE_LOCK.WRITE_EXTERNAL_STORAGE.SEND_DOWNLOAD_COMPLETED_INTENTS 12
13 Mobile Browser Tradeoffs Cost of Attack How to Drive Installs? No Flash Limited Ads 2x Exploits Required Where to get them? Version support? New Payload Required What code to run? How to persist access? Potential Revenue Lower # of targets Mobile web, meh Fragmented market Different vendors Different versions 13
14 Scaling the Setup 1. Develop malware 2. Add malware to many applications 3. Put malware online
15 Better Targets, Unique to Mobile Incentives Browser Exploits Malicious Apps # of Targets Minimal All Devices (300 mil+) Ability to Target Ads App Store SEO, Lures Ease of Exploit Multiple Exploits Single Exploit Enforcement Anonymous Anonymous? App stores look like a great value proposition! 15
16 Scaling Malicious App (Android) Automated Controls Signup Cost Malicious App Developed Use New IP Submit Credit Card Payment Receive SMS Review Cost App on Google Play Pass Security Review Security Review Less Effective Submit App (Dynamic OK) Apps Can Change 16
17 17
18 Scaling Malicious App (Apple) Signup Cost Malicious App Developed Unknown Fraud Controls + CC# Submit App (No Dynamic Code) Verify Identity Automated Controls Review Cost App on ios App Store Pass Security Review Pass Content Review Human Review 18
19 Think Different Automate new LLCs > Automate new CC#/SMS/IPs Forces malware authors to scale with humans Restrict dynamic code by policy Easy to detect attempts to circumvent Enables review of code that actually runs on device 19
20 Charlie Miller, a Success Story Identified vulnerability in ios code- signing Send down new executable code at runtime Bypass Apple review (default on Android!) InstaStock got Charlie InstaBanned Removed from dev program Charlie can t submit any more apps Get fake gov- backed ID, LLC and DUNS # Or, another human with those documents 20
21 Malicious App Campaigns Apple App Store Google Marketplace * data from 2012, still the same in spirit 21
22 Scaling the Heist 5. Access data outside the app sandbox 6. Send stolen data to a remote location 7. Abuse the data somehow to make money
23 Jailbreak Development Mitigation ios Android BB10 Code Injection (1) Code Signing No- execute No- execute Randomization (2) Strong ASLR ASLR ASLR Containment (3) Seatbelt UNIX Perms Abilities PathTrust Shell Available (4) No Yes Yes 1. Payload development w/ code- signing is a PITA (Partial vs Full ROP) 2. Does ASLR matter for local exploits? 3. UNIX permissions expose a large kernel attack surface 4. Shell access makes jailbreak development easier (ex. ASLR less effective) 23
24 Jailbreaks are a Reality! My Gingerbreak works, but I wont release it before a couple of devices are in the wild so the issue is not fixed before it can become useful. - - stealth (prior to releasing Gingerbreak) Must prevent malicious use of jailbreaks 1. Mitigations slow down development 2. Patch quickly to decrease potential revenue 3. Discourage remote jailbreaks, enable local ones 4. Disincentivize jailbreak community (Chromebook) Effective patching lets users self- segregate Choose to be patched or choose run a jailbreak 24
25 Waiting for Handouts Malware Authors 0 Dan Rosenberg Justin Case Ken Millington unrevoked sc2k Oberheide / Larimer Revolutionary Scott Walker Stealth Affects Android Affects Particular Handset 25
26 Malware Devs are Choosy Exploit Name Last Affected Version Abused? Exploid 2.1 YES RageAgainstTheCage YES Zimperlich No KillingInTheNameOf No Psneuter No GingerBreak YES zergrush** No Levitator No Mempodroid** No (diff offset per device) PERF_EVENTS CURRENT! Not yet! 26
27 Market Size How does patching affect potential revenue?
28 Android Maximizes Potential Revenue Platform 03/12/2012 4/18/ /04/ /03/ X Cupcake / Donut Eclair Froyo Gingerbread X Honeycomb X ICS x Jelly Bean x Jelly Bean 4.0 Android Exploit Exploid (2.1) RageAgainstTheCage (2.2.1) Time to Patch 50% 294 days > 240 days 28
29 Android Jailbreak Equivalents Android Private Signing Keys jsmshider: Affects custom ROMs only Request Device Admin API Privs DroidLive: Request SMS privileges Almost 100% of non- jailbreak malware SMS short codes, bank two- factor auth, etc 29
30 ios Limits Potential Revenue Vulnerability Exploit Patch Availability Malformed CFF Star (JailbreakMe 2.0) 10 days T1 Font Int Overflow Saffron (JailbreakMe 3.0) 9 days smith.org/blog/2012/03/10/ios- 5- dot- 1- upgrade- stats/index.html 30
31 Privilege Escalation Takeaways Malware authors have no ability to write exploits The only exploits abused are public jailbreak exploits Cost to exploit Android is significantly lower than ios App permissions required to jailbreak? NONE Many available jailbreaks, easier to deliver to device Lack of Android patches create an opportunity 60% of Android devices affected by a public jailbreak If you can install an app, you can take over Android 31
32 Recap
33 Attacker Workflow Recap (ios) MalwareDev Learn Objective- C programming AppDev Expose Repackage app with an already public jailbreak (no runtime mods) Register an LLC / steal a real ID, make app store account Hope that a public jailbreak in your app evades detection Installs Hire a spammer to drive install of jailbreak app (can t be ad- hoc) Escalate Run the jailbreak and payload embedded in your app C&C Call out to a server you control, dump data there Actions Sell data to broker and cash out 33
34 Attacker Workflow Recap (Android) MalwareDev Learn C programming AppDev Repackage app with malware you just wrote Expose Purchase stolen credit card, submit app to store (repeat as needed) Installs Hire a spammer to drive installs of innocuous app (can be adhoc) Escalate Download and run jailbreak when available C&C Call out to a server you control, dump data there Actions Sell data to broker and cash out 34
35 Android Mitigation Outlook Chrome for Android Makes browser exploits hard Not an exploited vector now No effect on current Android malware SEAndroid Kills userspace jailbreaks, but not kernel! Kernel exploits demonstrated on ios What handsets will use it? ASLR in Ice Cream Sandwich 4.x Little to no effect on privilege escalations Useful to make browser exploits difficult Can t help 300+ million existing devices Google is ahead of threats that don t exist yet, but far behind on ones that do 35
36 What Works? Require identification during App Store signup Discrepancy in value between malware and legit devs Ban real- world identities, not e- mail addresses Use policy to make app review more effective Deny apps obfuscation, runtimes, self- updating Detect unique patterns of malicious app distribution AppStore SEO, spam e- mails, SMS, advertisements Patch quickly to deny profitability of jailbreaks Disincentivize creation of them at all! Further tighten Abilities, restrict ability to run new code 36
37 Predictions Malware continues to be App and Android- centric Bouncer gained only a temporary upper hand Inability to patch creates market opportunity Innovation will revolve around Driving Installs Eg. NotCompatible via web, Zeus via sideloading, etc Lots of possible attacks ignored by real attackers ios will steer clear of similar attacks for now Web is probable vector only when value high enough Attackers are resource- constrained and rational 37
38 Questions / Comments dan@trailo{its.com 38
39 References Attacker Math 101, Dino Dai Zovi ios Security Evaluation, Dino Dai Zovi eval Exploit Intelligence Project, Dan Guido Lookout Security Mobile Threat Report threat- report Contagio Mini Dump, Mila Dissecting Android Malware, Yajin Zhou, Xuxian Jiang Androguard, Anthony Desnos Dissecting the Android Bouncer, Jon Oberheide and Charlie Miller 39
Defending Behind The Device Mobile Application Risks
Defending Behind The Device Mobile Application Risks Tyler Shields Product Manager and Strategist Veracode, Inc Session ID: MBS-301 Session Classification: Advanced Agenda The What The Problem Mobile Ecosystem
Advanced Online Threat Protection: Defending. Malware and Fraud. Andrew Bagnato Senior Systems Engineer
Advanced Online Threat Protection: Defending Your Online Banking Customers Against Modern Malware and Fraud Andrew Bagnato Senior Systems Engineer Agenda Modern malware a targets Account credentials Financial
Next-Generation Penetration Testing. Benjamin Mossé, MD, Mossé Security
Next-Generation Penetration Testing Benjamin Mossé, MD, Mossé Security About Me Managing Director of Mossé Security Creator of an Mossé Cyber Security Institute - in Melbourne +30,000 machines compromised
PREVENTING ZERO-DAY ATTACKS IN MOBILE DEVICES
PREVENTING ZERO-DAY ATTACKS IN MOBILE DEVICES Ira Winkler Codenomicon Session ID: MBS-W05 Session Classification: Intermediate Zero Day Attacks Zero day attacks are rising in prominence They tend to be
01. Introduction of Android
01. Introduction of Android Goal Understand the concepts and features of the Android Install the complete Android development environment Find out the one-click install Android development environment
Android Architecture. Alexandra Harrison & Jake Saxton
Android Architecture Alexandra Harrison & Jake Saxton Overview History of Android Architecture Five Layers Linux Kernel Android Runtime Libraries Application Framework Applications Summary History 2003
Agenda. 3 2012, Palo Alto Networks. Confidential and Proprietary.
Agenda Evolution of the cyber threat How the cyber threat develops Why traditional systems are failing Need move to application controls Need for automation 3 2012, Palo Alto Networks. Confidential and
Enterprise Apps: Bypassing the Gatekeeper
Enterprise Apps: Bypassing the Gatekeeper By Avi Bashan and Ohad Bobrov Executive Summary The Apple App Store is a major part of the ios security paradigm, offering a central distribution process that
BYPASSING THE ios GATEKEEPER
BYPASSING THE ios GATEKEEPER AVI BASHAN Technology Leader Check Point Software Technologies, Ltd. OHAD BOBROV Director, Mobile Threat Prevention Check Point Software Technologies, Ltd. EXECUTIVE SUMMARY
Tutorial on Smartphone Security
Tutorial on Smartphone Security Wenliang (Kevin) Du Professor [email protected] Smartphone Usage Smartphone Applications Overview» Built-in Protections (ios and Android)» Jailbreaking and Rooting» Security
Android Security. Device Management and Security. by Stephan Linzner & Benjamin Reimold
Android Security Device Management and Security by Stephan Linzner & Benjamin Reimold Introducing Stephan Linzner Benjamin Reimold Consultant, Software Engineer Mobile Developer Founder of Stuttgart GTUG
Workday Mobile Security FAQ
Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy
Practical Attacks against Mobile Device Management (MDM) Michael Shaulov, CEO Daniel Brodie, Security Researcher Lacoon Mobile Security
Practical Attacks against Mobile Device Management (MDM) Michael Shaulov, CEO Daniel Brodie, Security Researcher Lacoon Mobile Security March 14, 2013 About: Daniel Security researcher for almost a decade
Enterprise Mobile Threat Report
Enterprise Mobile Threat Report The State of ios and Android Security Threats to Enterprise Mobility I. Introduction This report examines enterprise security threats for ios and Android. While Android
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
Henry Ford Health System Citrix Access Gateway Support Details
Access Disclaimer: Henry Ford Health System Citrix Access Gateway Support Details Last Updated: April 9 th, 2014 This document assumes that you already have an ID to access the Henry Ford Health System
Android Security - Common attack vectors
Institute of Computer Science 4 Communication and Distributed Systems Rheinische Friedrich-Wilhelms-Universität Bonn, Germany Lab Course: Selected Topics in Communication Management Android Security -
Enterprise Mobile Security. Managing App Sideloading Threats on ios
Enterprise Mobile Security Managing App Sideloading Threats on ios I. Introduction II. The Path to App Sideloading Through rigorous app review Apple has lowered the risk of downloading malware from its
BYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
Post-Access Cyber Defense
Post-Access Cyber Defense Dr. Vipin Swarup Chief Scientist, Cyber Security The MITRE Corporation November 2015 Approved for Public Release; Distribution Unlimited. 15-3647. 2 Cyber Security Technical Center
This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware
How to Execute Your Next Generation of Mobile Initiatives Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware Company Facts 12000 1,800 employees 150 countries 17 languages 11 global
How To Protect Your Mobile Device From Attack
Manage and Secure the Mobile Data, Not Just the Device Stijn Paumen VP Business Development, Wandera The Great Platform Shift 60,000,000 iphone BlackBerry 50,000,000 40,000,000 30,000,000 20,000,000 10,000,000
Adobe Flash Player and Adobe AIR security
Adobe Flash Player and Adobe AIR security Both Adobe Flash Platform runtimes Flash Player and AIR include built-in security and privacy features to provide strong protection for your data and privacy,
Anti-exploit tools: The next wave of enterprise security
Anti-exploit tools: The next wave of enterprise security Intro From malware and ransomware to increasingly common state-sponsored attacks, organizations across industries are struggling to stay ahead of
THREAT VISIBILITY & VULNERABILITY ASSESSMENT
THREAT VISIBILITY & VULNERABILITY ASSESSMENT Date: April 15, 2015 IKANOW Analysts: Casey Pence IKANOW Platform Build: 1.34 11921 Freedom Drive, Reston, VA 20190 IKANOW.com TABLE OF CONTENTS 1 Key Findings
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities Protecting a business s IT infrastructure is complex. Take, for example, a retailer operating a standard multi-tier infrastructure
Rational AppScan & Ounce Products
IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders
Presented by: Mike Morris and Jim Rumph
Presented by: Mike Morris and Jim Rumph Introduction MICHAEL MORRIS, CISA Systems Partner JIM RUMPH, CISA Systems Manager Objectives To understand how layered security assists in securing your network
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Critical Security Controls
Critical Security Controls Session 2: The Critical Controls v1.0 Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter The Critical Security Controls The Critical Security
Android vs. Apple ios Security Showdown Tom Eston
Android vs. Apple ios Security Showdown Tom Eston About Your Presenter Tom Eston CISSP, GWAPT Manger of the SecureState Profiling & Penetration Team Specializing in Attack & Penetration, Mobile Security
Analysis of advanced issues in mobile security in android operating system
Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of
How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER
WHITE PAPER CHALLENGES Protecting company systems and data from costly hacker intrusions Finding tools and training to affordably and effectively enhance IT security Building More Secure Companies (and
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Agenda Information Security Trends Year 2014 in Review Outlook for 2015 Advice to the Public Hong Kong Computer Emergency Response Team Coordination
Lecture Embedded System Security A. R. Sadeghi, @TU Darmstadt, 2011 2012 Introduction Mobile Security
Smartphones and their applications have become an integral part of information society Security and privacy protection technology is an enabler for innovative business models Recent research on mobile
Software that provides secure access to technology, everywhere.
Software that provides secure access to technology, everywhere. Joseph Patrick Schorr @JoeSchorr October, 2015 2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 1 Agenda What are we dealing with? How
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK John T Lounsbury Vice President Professional Services, Asia Pacific INTEGRALIS Session ID: MBS-W01 Session Classification: Advanced
Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
Mobile Device Management
1. Introduction Mobile Device Management This document introduces security risks with mobile devices, guidelines for managing the security of mobile devices in the Enterprise, strategies for mitigating
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Harvesting Developer Credentials in Android Apps
8 th ACM Conference on Security and Privacy in Wireless and Mobile Networks, New York City, Jun 24-26 Harvesting Developer Credentials in Android Apps Yajin Zhou, Lei Wu, Zhi Wang, Xuxian Jiang Florida
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
Top five strategies for combating modern threats Is anti-virus dead?
Top five strategies for combating modern threats Is anti-virus dead? Today s fast, targeted, silent threats take advantage of the open network and new technologies that support an increasingly mobile workforce.
Beyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
The Web AppSec How-to: The Defenders Toolbox
The Web AppSec How-to: The Defenders Toolbox Web application security has made headline news in the past few years. Incidents such as the targeting of specific sites as a channel to distribute malware
The Case for SE Android. Stephen Smalley [email protected] Trust Mechanisms (R2X) National Security Agency
The Case for SE Android Stephen Smalley [email protected] Trust Mechanisms (R2X) National Security Agency 1 Android: What is it? Linux-based software stack for mobile devices. Very divergent from typical
Why Device Fingerprinting Provides Better Network Security than IP Blocking. How to transform the economics of hacking in your favor
Why Device Fingerprinting Provides Better Network Security than IP Blocking How to transform the economics of hacking in your favor Why Device Fingerprinting Provides Better Network Security than IP Blocking
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant What infrastructure security really means? Infrastructure Security is Making sure that your system services are always running
CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC
: INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS 1 FIVE KEY RECOMMENDATIONS During 2014, NTT Group supported response efforts for a variety of incidents. Review of these engagements revealed some observations
Trend Micro Incorporated Research Paper 2012. Adding Android and Mac OS X Malware to the APT Toolbox
Trend Micro Incorporated Research Paper 2012 Adding Android and Mac OS X Malware to the APT Toolbox Contents Abstract... 1 Introduction... 1 Technical Analysis... 2 Remote Access Trojan Functionality...
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
Utilizing Pervasive Application Monitoring and File Origin Tracking in IT Security
4 0 0 T o t t e n P o n d R o a d W a l t h a m, M A 0 2 4 5 1 7 8 1. 8 1 0. 4 3 2 0 w w w. v i e w f i n i t y. c o m Utilizing Pervasive Application Monitoring and File Origin Tracking in IT Security
It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions
It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions Your home is your business and your farm is your network. But who has access to it? Can you protect
Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms
Overview Common Internet Threats Tom Chothia Computer Security, Lecture 19 Phishing Sites Trojans, Worms, Viruses, Drive-bydownloads Net Fast Flux Domain Flux Infiltration of a Net Underground economy.
Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus
Mobile Application Hacking for Android and iphone 4-Day Hands-On Course Syllabus Android and iphone Mobile Application Hacking 4-Day Hands-On Course Course description This course will focus on the techniques
Computer Security DD2395
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh11/ Fall 2011 Sonja Buchegger [email protected] Lecture 7 Malicious Software DD2395 Sonja Buchegger 1 Course Admin Lab 2: - prepare
Practical Attacks against Mobile Device Management (MDM)
Practical Attacks against Mobile Device Management (MDM) Daniel Brodie, Sr. Security Researcher, Lacoon Mobile Security Introduction Mobile Device Management (MDM) solutions are perceived to be the ultimate
5 Steps to Advanced Threat Protection
5 Steps to Advanced Threat Protection Agenda Endpoint Protection Gap Profile of Advanced Threats Consensus Audit Guidelines 5 Steps to Advanced Threat Protection Resources 20 Years of Chasing Malicious
Breaking the Cyber Attack Lifecycle
Breaking the Cyber Attack Lifecycle Palo Alto Networks: Reinventing Enterprise Operations and Defense March 2015 Palo Alto Networks 4301 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com
Exactly the Same, but Different
Exactly the Same, but Different 1 Shayne Champion, CISSP, CISA, GSEC, ABCP Program Manager GO Cyber Security TVA v1.0 Agenda Define Mobile Device Security o o Similarities Differences Things you Should
Security challenges for internet technologies on mobile devices
Security challenges for internet technologies on mobile devices - Geir Olsen [[email protected]], Senior Program Manager for Security Windows Mobile, Microsoft Corp. - Anil Dhawan [[email protected]],
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY
QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY EXPLOIT KITS UP 75 PERCENT The Infoblox DNS Threat Index, powered by IID, stood at 122 in the third quarter of 2015, with exploit kits up 75 percent
Spear Phishing Attacks Why They are Successful and How to Stop Them
White Paper Spear Phishing Attacks Why They are Successful and How to Stop Them Combating the Attack of Choice for Cybercriminals White Paper Contents Executive Summary 3 Introduction: The Rise of Spear
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis? This paper presents a scenario in which an attacker attempts to hack into the internal network
Seven Things To Consider When Evaluating Privileged Account Security Solutions
Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information Proteggere i dati direttamente nel database Una proposta tecnologica Angelo Maria Bosis Sales Consulting Senior Manager
Android Programming and Security
Android Programming and Security Dependable and Secure Systems Andrea Saracino [email protected] Outlook (1) The Android Open Source Project Philosophy Players Outlook (2) Part I: Android System
JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM
JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM May 2015 Nguyễn Tiến Đức ASEAN Security Specialist Agenda Modern Malware: State of the Industry Dynamic Threat Intelligence on the Firewall
Securing OS Legacy Systems Alexander Rau
Securing OS Legacy Systems Alexander Rau National Information Security Strategist Sample Agenda 1 Today s IT Challenges 2 Popular OS End of Support & Challenges for IT 3 How to protect Legacy OS systems
Making Client-side Java Secure with Bromium vsentry
Making Client-side Java Secure with Bromium vsentry Making Client-side Java Secure Client-side Java has become somewhat of an IT pariah, primarily as a result of the growing list of Java vulnerabilities
Mobile Device Security: What s Coming Next?
Mobile Device Security: What s Coming Next? By James Lyne, Director of Technology Strategy The mobile device revolution is quite possibly the most significant change in computing since we shifted from
Enterprise Mobility Report 06/2015. Creation date: 1.7.2015. Vlastimil Turzík
06/2015 Creation date: 1.7.2015 Author: Vlastimil Turzík Content Content... 2 Introduction... 4 ios... 4 Vulnerability... 4 ios Mail App Vulnerability Allows Hackers To Steal icloud Passwords... 4 Versions:
SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal
WHITE PAPER SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM Why Automated Analysis Tools are not Created Equal SECURITY REIMAGINED CONTENTS Executive Summary...3 Introduction: The Rise
