Cybercrime & solutions for Home users and Small Businesses



Similar documents
Attacks from the Inside

The Mobile Malware Problem

Integrated Protection for Systems. João Batista Territory Manager

KASPERSKY SMALL OFFICE SECURITY (Version 3) Features List

McAfee Total Protection Reduce the Complexity of Managing Security

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Customer Value Enhancement, Endpoint Security Products Global, 2011

Stopping zombies, botnets and other - and web-borne threats

Introduction (Contd )

A progressive and integrated approach to protecting corporate networks

Cyber Security Solutions:

Spyware: Securing gateway and endpoint against data theft

OUR MISSION IS TO PROTECT EVERYONE FROM CYBERCRIME

KASPERSKY LAB TECHNOLOGY LEADERSHIP

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Security

BE SAFE ONLINE: Lesson Plan

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Information Security Threat Trends

Technical Product Overview. Employing cloud-based technologies to address security risks to endpoint systems

OutbreakShield Effective and Immediate Protection against Virus Outbreaks

Importance of Web Application Firewall Technology for Protecting Web-based Resources

WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security

Malware & Botnets. Botnets

Identity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

CYBEROAM UTM s. Outbound Spam Protection Subscription for Service Providers. Securing You. Our Products.

Emerging Security Technological Threats

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Top tips for improved network security

Kaspersky Endpoint Security 8 for Windows and Kaspersky Security Center

BitDefender Client Security Workstation Security and Management

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

ABOUT LAVASOFT. Contact. Lavasoft Product Sheet: Ad-Aware Pro Security

Top 10 Tips to Keep Your Small Business Safe

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

AVG AntiVirus Free Edition

Endpoint Security and the Case For Automated Sandboxing

Why AVG? Reasons to choose AVG. The AVG Difference: People who know security recommend AVG

Don t Fall Victim to Cybercrime:

World-class security solutions for your business. Business Products. C a t a l o g u e

Technology in Action. Alan Evans Kendall Martin Mary Anne Poatsy. Eleventh Edition. Copyright 2015 Pearson Education, Inc.

STPIC/Admin/002/ / Date: Sub: Quotation for purchase/renewal of Anti Virus Software Reg.

KASPERSKY ENDPOINT SECURITY FOR BUSINESS: TECHNOLOGY IN ACTION

McAfee Internet Security Suite Quick-Start Guide

SECURE SHARING AND COMMUNICATION. Protection for servers, and collaboration

For Businesses with more than 25 seats.

Secure Your Mobile Workplace

What Do You Mean My Cloud Data Isn t Secure?

Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013

How to Use Windows Firewall With User Account Control (UAC)

2009 Antispyware Coalition Public Workshop

Fighting Cyber Crime in the Telecommunications Industry. Sachi Chakrabarty

Kaspersky Security Network

Alexander Nikov. 9. Information Assurance and Security, Protecting Information Resources. Learning Objectives. You re on Facebook? Watch Out!

Countermeasures against Spyware

Defending Behind The Device Mobile Application Risks

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

Endpoint Security 2.0: The Emerging Role of Application Whitelisting Solutions. Todd Schell

Security A to Z the most important terms

Ethical Hacking Course Layout

Feature List for Kaspersky Security for Mobile

Transcription:

Cybercrime & solutions for Home users and Small Businesses Eddy Willems Security Evangelist EICAR Director Information & Press Eddy.Willems@kaspersky.be

Agenda About Kaspersky Lab History Cyber Crime... Future

About Kaspersky Lab International leader in internet security, visionary part Gartner quadrant Advanced antivirus, antispyware, antispam and firewall More than 250 million protected users worldwide 10 R&D and virus labs worldwide Over 1400 employees, 450 developers & engineers Local sales, marketing and technical support Local virus detection by Benelux virus lab Fast reaction time and automatic hourly updates

Leading IT security players worldwide Have Chosen Kaspersky Lab Technology

The Kaspersky Virus Lab - sharing knowledge through malware research Antivirus experts and virus analysts Industry-leading knowledge resource http://www.viruslist.com Our team of virus analysts is active in AVIEN (Anti-Virus Information Exchange Network) CARO (Computer Antivirus Research Organization) ICSA (International Computer Security Association) AVAR (Association of Antivirus Asia Researchers) IMPACT (international partnership dedicated to combating terrorist activities in the area of information technology) EICAR (European Institute for Computer AntiVirus Research)

TIME

Some History: The old days!

Some years ago... Virus SPAM Worm Trojan

Today s Threats Trojan Worm Virus Root-kits Bot Zombie Keystroke logger Spyware Screen Pharming grabber Password grabber Phishing Remote- Control Agent Premium- Rate Dialer SPAM Adware

What are the real threats? Worms Adware Spyware Internal Hacker Viruses Bad Stuff Data Theft PeerToPeer attacks Spam External Hacker Exploits User Phishing Identity Theft Vulnerabilities DDoS Mailers DoS

The end of global epidemics 25 20 Epidemics 15 10 5 0 2002 2003 2004 2005 2006 2007 Quarters Source: Kaspersky Lab

Increasing Numbers 1.600.000 1.400.000 KL records 1.200.000 1.000.000 800.000 600.000 400.000 200.000 0 98 99 00 01 02 03 04 05 06 07 08 Source: Kaspersky Lab

Cyber crime Types of malware in daily updates 500 Cyber vandalism Petty fraud 400 300 200 100 Cyber crime 0 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 Source: Kaspersky Lab

The Ecosystem E-Criminals Victims Police ITTP Industry

The Rogues Gallery The Script Kiddies Chen Ing-Hau 24 (Taiwan) Arrested September 21, 2000 for the CIH virus Jeffrey Lee Parson 18 (USA) Arrested August 29, 2003 for the Lovesan.b virus Sven Jaschan 18 (Germany) Arrested May 7, 2004 for NetSky and Sasser viruses

The Rogues Gallery Binary Thieves Jeanson James Ancheta 20 (USA) Arrested November 3, 2005 for creating zombie networks and leasing them for spam mailing and DDoS attacks on websites Farid Essebar -18 (Morocco), Atilla Ekici 21 (Turkey) Arrested on August 26, 2005 for creating zombie networks using Mytob and Zotob (Bozori) worms

Today we are fighting these! Jeremy Jaynes Millionaire, and a spammer Jay Echouafni CEO, and a DDoS attacker Andrew Schwarmkoff Member of Russian mob, and a phisher

One of the big problems: Botnets

What is a botnet? part 1

What is a botnet? part 2

What is a botnet? part 3

What can you see?

Using botnet DDoS for fun and glory Sending spam, making spamlists Phishing Stealing private data Ransoming Botnet renting

New territories: Social Networking Blogs, forums Wiki MySpace, YouTube Other online communities: Who s on Facebook?

CyberCrime is Big Business Profitability Easy to do (technically and morally) Low risk business New services that are profitable to attack

Today s Networks Lack Clear, Crisp Boundaries Internal/External network Individual Users connect from multiple locations Managed/Unmanaged devices Individual devices operate both inside the network, and on public networks New Devices on the Network Internet eg. SmartPhones, etc. Network Telecomm uters Contrac Mobile Users Wireless Users

Top 10: Safe Internet Security Tips 1. Make backups 2. Update software regularly and check this 3. Use upgraded anti-virus/spyware software and update regularly and check this 4. Use a personal desktop firewall 5. Use difficult passwords 6. Be very carefull with unknown files or programs 7. Surf sure and browse logically 8. Thnik twice when leaving personal data somewhere 9. do not react on SPAM 10. Use common sense

What do we really need? Worms Adware Spyware Internal Hacker Viruses Bad Stuff Data Theft PeerToPeer attacks Spam External Hacker Exploits User Phishing Identity Theft Vulnerabilities DDoS Mailers DoS

Thank you

KOSS

Kaspersky Open Space Security

So what do we have? A perfect combination of. Legendary good detection with very quick reaction time New improved scanning engine with rootkit cleaning Improved Heuristic scanner (emulation+sandbox) Behaviour blocker + HIPS (proactive detection) An easy firewall Anti-Spam Vulnerability Scanner Web control and Device control Within one easy package!!!

Don t forget KMS

Kaspersky Anti-Virus Mobile On-access monitor intercepts all data channels On-demand monitor for manual scan SMS spam filtering and other value-add features Firewall Anti-theft: SMS Block, SMS Clean, SIM Watch : Unique feature Digitally signed updates via WAP, HTTP or from PC folder Minimal amount of system resources used Flexible customization options for OEMs, mobile operators, device vendors and content providers Supports all popular devices, including SonyEricsson, NOKIA, Siemens, Samsung, Panasonic, Sendo and other vendors Available for Symbian, Windows Mobile

A different view... KHSS

What do we offer? Kaspersky Hosted Mail Security Cascaded Virus protection Comprehensive Spam protection Content Control Inbound and Outbound Scalable Reporting Kaspersky Hosted Web Security Virus protection Content Control URL-Filter Scalable Reporting Kaspersky Hosted IM Security Virus protection SPIM protection Content Control Scalable Reporting

Consumer v2009 KAV & KIS

New Technologies in v2009 KAV / KIS v2009 (8.0) : AV signatures + PDM+ Emulator + Improved Heuristics - Behaviour control {Security Rating, WhiteListing, Rules engine} => Improved HIPS - Vulnerability Checker - Virtual Keyboard - In-the Cloud protection: Kaspersky Security Network - Online Check + Rescue Disk Image - Improved Anti-Rootkit - Improved Firewall - Improved Parental Control - Easier Wizards First Hybrid Technology Product in the world

Automatic Classification of Applications Avantages : Each application is automatically categorized based on criteria managed by KIS 2009 Much less user interaction needed while less false postives

Thank you! Questions? Eddy Willems Eddy.Willems@kaspersky.be