SlideShare ist ein Scribd-Unternehmen logo
1 von 49
Downloaden Sie, um offline zu lesen
Protecting the irreplaceable | f-secure.com
Threat Eye-Opener
Bryan Ford – Head of Operator Sales

August 15th, 2012



Protecting the irreplaceable | f-secure.com
Agenda
• Definition of Terms
• History of Malware
• Recent Attacks – Stuxnet & Ghost Click
• Online Safety Tips
• Mobile Threats
• Frontier Secure
• Q&A




| © August 15, 2012, F-Secure Corporation
Industry Terms
• Malware - Software that is intended to damage or disable computers and
  computer systems
• Botnets - A botnet is a collection of internet-connected computers whose
  security defenses have been breached and control ceded to an unknown party
• SSL - (Secure Sockets Layer) is the standard security technology for
  establishing an encrypted link between a web server and a browser




| © August 15, 2012, F-Secure Corporation
We used to be fighting these...




• Chen-Ing Hau                              Joseph McElroy         Benny
  Author of                                 Hacked the Fermi lab   Ex-29A
  the CIH virus
                                            network




| © August 15, 2012, F-Secure Corporation
Case Tariq al-Daour




| © August 15, 2012, F-Secure Corporation
Malware Trends




| © August 15, 2012, F-Secure Corporation
Malware Trends

 Number of malware
                                            •   Numbers continue to rise
                                                exponentially




| © August 15, 2012, F-Secure Corporation
Malware Trends




| © August 15, 2012, F-Secure Corporation
Malware Trends
• Malware writing is becoming more professional




| © August 15, 2012, F-Secure Corporation
Malware Trends
• Malware writing is becoming more professional
• Previously undiscovered vulnerabilities are worth a lot on the black market




| © August 15, 2012, F-Secure Corporation
Malware Trends


• Previously undiscovered vulnerabilities are worth a lot on the black market




| © August 15, 2012, F-Secure Corporation
Malware Trends




Q: How expensive would such vulnerabilities be?




| © August 15, 2012, F-Secure Corporation
Malware Trends




A: A single form of malware in a popular version of
Windows could go for anything between $50,000 to
$500,000.




| © August 15, 2012, F-Secure Corporation
Malware Trends
• The aims are simple and depend on the group involved:
• Money from spam, scams and fakes
• Hacktivism to increase public exposure of an issue




| © August 15, 2012, F-Secure Corporation
Malware Trends
• The aims are simple and depend on the group involved:
• Money from spam, scams and fakes
• Hacktivism to increase public exposure of an issue




| © August 15, 2012, F-Secure Corporation
Malware Trends


• Money from spam, scams and fakes
• Hacktivism to increase public exposure of an issue




| © August 15, 2012, F-Secure Corporation
Malware Trends



• Hacktivism to increase public exposure of an issue




| © August 15, 2012, F-Secure Corporation
Malware Trends




| © August 15, 2012, F-Secure Corporation
| © August 15, 2012, F-Secure Corporation
| © August 15, 2012, F-Secure Corporation
Malware trends




| © August 15, 2012, F-Secure Corporation
Malware trends
Case:




| © August 15, 2012, F-Secure Corporation
Malware trends
Case:
Stuxnet




| © August 15, 2012, F-Secure Corporation
Malware trends
Case:
Stuxnet

More information:




| © August 15, 2012, F-Secure Corporation
Malware trends
Case:
Stuxnet

More information:
http://www.f-secure.com/weblog/
archives/00002066.html




| © August 15, 2012, F-Secure Corporation
Malware trends
Case:
Stuxnet

More information:
http://www.f-secure.com/weblog/
archives/00002066.html




| © August 15, 2012, F-Secure Corporation
Malware trends
Case:
”Ghost Click”




More information:
http://www.f-secure.com/weblog/archives/
00002268.html



| © August 15, 2012, F-Secure Corporation
Malware trends
Case:
”Ghost Click”




More information:
http://www.f-secure.com/weblog/archives/
00002268.html



| © August 15, 2012, F-Secure Corporation
Safer online banking




| © August 15, 2012, F-Secure Corporation
Safer online banking




| © August 15, 2012, F-Secure Corporation
Safer online banking

       • Banks provide safety instuctions
       • No pop-ups
       • PIN only asked once

       • https:// address (Hypertext Transfer Protocol over Secure Socket Layer)
       • always when banking and dealing with credit card number in an online
         store

       • Paying with credit card or online payment service provider (PayPal) is
         safer




| © August 15, 2012, F-Secure Corporation
Safer online banking

       • Banks provide safety instuctions
       • No pop-ups
       • PIN only asked once

       • https:// address (Hypertext Transfer Protocol over Secure Socket Layer)
       • always when banking and dealing with credit card number in an online
         store

       • Paying with credit card or online payment service provider (PayPal) is
         safer




| © August 15, 2012, F-Secure Corporation
Safer online banking

       • Banks provide safety instuctions
       • No pop-ups
       • PIN only asked once

       • https:// address (Hypertext Transfer Protocol over Secure Socket Layer)
       • always when banking and dealing with credit card number in an online
         store

       • Paying with credit card or online payment service provider (PayPal) is
         safer




| © August 15, 2012, F-Secure Corporation
Safer social networking




| © August 15, 2012, F-Secure Corporation
Safer social networking




| © August 15, 2012, F-Secure Corporation
Safer social networking

 • Danger of revealing too much
 • Caution with personal details
 • Pictures stay on the Internet forever

 •   Privacy?
 •   Privacy settings
 •   Strong passwords
 •   Identity theft, spam, targeted attacks

 • Maintaining a good reputation




| © August 15, 2012, F-Secure Corporation
Safer social networking

 • Danger of revealing too much
 • Caution with personal details
 • Pictures stay on the Internet forever

 •   Privacy?
 •   Privacy settings
 •   Strong passwords
 •   Identity theft, spam, targeted attacks

 • Maintaining a good reputation




| © August 15, 2012, F-Secure Corporation
Safer social networking

 • Danger of revealing too much
 • Caution with personal details
 • Pictures stay on the Internet forever

 •   Privacy?
 •   Privacy settings
 •   Strong passwords
 •   Identity theft, spam, targeted attacks

 • Maintaining a good reputation




| © August 15, 2012, F-Secure Corporation
Safer social networking

 • Danger of revealing too much
 • Caution with personal details
 • Pictures stay on the Internet forever

 •   Privacy?
 •   Privacy settings
 •   Strong passwords
 •   Identity theft, spam, targeted attacks

 • Maintaining a good reputation




| © August 15, 2012, F-Secure Corporation
Well-being in a mobile world




| © August 15, 2012, F-Secure Corporation
Well-being in a mobile world
• Lots of information on your mobile
• Crime against Android multiplying
• Malware via Bluetooth and web download
• Spy-tools
• Recording
• Monitoring calls, SMS, multimedia, email
• Locating phone via GPS




| © August 15, 2012, F-Secure Corporation
Well-being in a mobile world
• Lots of information on your mobile
• Crime against Android multiplying
• Malware via Bluetooth and web download
• Spy-tools
• Recording
• Monitoring calls, SMS, multimedia, email
• Locating phone via GPS




| © August 15, 2012, F-Secure Corporation
Well-being in a mobile world
• Lots of information on your mobile
• Crime against Android multiplying
• Malware via Bluetooth and web download
• Spy-tools
• Recording
• Monitoring calls, SMS, multimedia, email
• Locating phone via GPS




| © August 15, 2012, F-Secure Corporation
Well-being in a mobile world
• Lots of information on your mobile
• Crime against Android multiplying
• Malware via Bluetooth and web download
• Spy-tools
• Recording
• Monitoring calls, SMS, multimedia, email
• Locating phone via GPS




| © August 15, 2012, F-Secure Corporation
Well-being in a mobile world
• Lots of information on your mobile
• Crime against Android multiplying
• Malware via Bluetooth and web download
• Spy-tools
• Recording
• Monitoring calls, SMS, multimedia, email
• Locating phone via GPS




| © August 15, 2012, F-Secure Corporation
Frontier Secure – Max Security
•       Single Integrated product :
    •     Antivirus Protection

    •     Anti Spyware
    •     Personal Firewall
    •     Browsing Protection
    •     Spam Filtering
    •     Automatic Updates

• Live 24/7 Support
• PC & Mac Support




| © August 15, 2012, F-Secure Corporation
Q&A

www.frontier.com/security




| © August 15, 2012, F-Secure Corporation
Brought to you by:




A MORE DEDICATED CONNECTION




 Thank You
 Call: 1-866-408-0233

Weitere ähnliche Inhalte

Ähnlich wie Security for Small Business

Ghostery Enterprise Security Study
Ghostery Enterprise Security StudyGhostery Enterprise Security Study
Ghostery Enterprise Security StudyGhostery, Inc.
 
NATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-UpsNATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-UpsBenjamin Rohé
 
The ever increasing threat of cyber crime
The ever increasing threat of cyber crimeThe ever increasing threat of cyber crime
The ever increasing threat of cyber crimeNathan Desfontaines
 
Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015
Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015
Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015Ghostery, Inc.
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Business Days
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security SeminarJeremy Quadri
 
Ghostery Enterprise EU Security Study
Ghostery Enterprise EU Security StudyGhostery Enterprise EU Security Study
Ghostery Enterprise EU Security StudyGhostery, Inc.
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsGDSCCVR
 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace RisksParag Deodhar
 
Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Advanced monitoring
 
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Data Breaches - Sageworks, Inc., Webinar Series by Douglas JamborData Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Data Breaches - Sageworks, Inc., Webinar Series by Douglas JamborTurner and Associates, Inc.
 
Appaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applicationsAppaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applicationsJulien Ott
 
Don't Trust, And Verify - Mobile Application Attacks
Don't Trust, And Verify - Mobile Application AttacksDon't Trust, And Verify - Mobile Application Attacks
Don't Trust, And Verify - Mobile Application AttacksPrathan Phongthiproek
 
BYOD and Security Trends
BYOD and Security TrendsBYOD and Security Trends
BYOD and Security TrendsCisco Russia
 
IT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide DeckIT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide DeckDon Gulling
 
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...Visa
 
Top Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsTop Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsDenim Group
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things The Center for Identity
 

Ähnlich wie Security for Small Business (20)

Ghostery Enterprise Security Study
Ghostery Enterprise Security StudyGhostery Enterprise Security Study
Ghostery Enterprise Security Study
 
NATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-UpsNATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-Ups
 
The ever increasing threat of cyber crime
The ever increasing threat of cyber crimeThe ever increasing threat of cyber crime
The ever increasing threat of cyber crime
 
Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015
Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015
Developing Mobile Trust in Today's E-Privacy Landscape - Webinar 11/19/2015
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
Ghostery Enterprise EU Security Study
Ghostery Enterprise EU Security StudyGhostery Enterprise EU Security Study
Ghostery Enterprise EU Security Study
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
 
KPMG-converted.pptx
KPMG-converted.pptxKPMG-converted.pptx
KPMG-converted.pptx
 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace Risks
 
Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.
 
Security risks with fake apps
Security risks with fake appsSecurity risks with fake apps
Security risks with fake apps
 
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Data Breaches - Sageworks, Inc., Webinar Series by Douglas JamborData Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
 
Appaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applicationsAppaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applications
 
Don't Trust, And Verify - Mobile Application Attacks
Don't Trust, And Verify - Mobile Application AttacksDon't Trust, And Verify - Mobile Application Attacks
Don't Trust, And Verify - Mobile Application Attacks
 
BYOD and Security Trends
BYOD and Security TrendsBYOD and Security Trends
BYOD and Security Trends
 
IT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide DeckIT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide Deck
 
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
 
Top Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsTop Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for Applications
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 

Kürzlich hochgeladen

Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLkapoorjyoti4444
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...amitlee9823
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000dlhescort
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPanhandleOilandGas
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture conceptP&CO
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...lizamodels9
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876dlhescort
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon investment
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noidadlhescort
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Anamikakaur10
 

Kürzlich hochgeladen (20)

Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 

Security for Small Business

  • 2. Threat Eye-Opener Bryan Ford – Head of Operator Sales August 15th, 2012 Protecting the irreplaceable | f-secure.com
  • 3. Agenda • Definition of Terms • History of Malware • Recent Attacks – Stuxnet & Ghost Click • Online Safety Tips • Mobile Threats • Frontier Secure • Q&A | © August 15, 2012, F-Secure Corporation
  • 4. Industry Terms • Malware - Software that is intended to damage or disable computers and computer systems • Botnets - A botnet is a collection of internet-connected computers whose security defenses have been breached and control ceded to an unknown party • SSL - (Secure Sockets Layer) is the standard security technology for establishing an encrypted link between a web server and a browser | © August 15, 2012, F-Secure Corporation
  • 5. We used to be fighting these... • Chen-Ing Hau Joseph McElroy Benny Author of Hacked the Fermi lab Ex-29A the CIH virus network | © August 15, 2012, F-Secure Corporation
  • 6. Case Tariq al-Daour | © August 15, 2012, F-Secure Corporation
  • 7. Malware Trends | © August 15, 2012, F-Secure Corporation
  • 8. Malware Trends Number of malware • Numbers continue to rise exponentially | © August 15, 2012, F-Secure Corporation
  • 9. Malware Trends | © August 15, 2012, F-Secure Corporation
  • 10. Malware Trends • Malware writing is becoming more professional | © August 15, 2012, F-Secure Corporation
  • 11. Malware Trends • Malware writing is becoming more professional • Previously undiscovered vulnerabilities are worth a lot on the black market | © August 15, 2012, F-Secure Corporation
  • 12. Malware Trends • Previously undiscovered vulnerabilities are worth a lot on the black market | © August 15, 2012, F-Secure Corporation
  • 13. Malware Trends Q: How expensive would such vulnerabilities be? | © August 15, 2012, F-Secure Corporation
  • 14. Malware Trends A: A single form of malware in a popular version of Windows could go for anything between $50,000 to $500,000. | © August 15, 2012, F-Secure Corporation
  • 15. Malware Trends • The aims are simple and depend on the group involved: • Money from spam, scams and fakes • Hacktivism to increase public exposure of an issue | © August 15, 2012, F-Secure Corporation
  • 16. Malware Trends • The aims are simple and depend on the group involved: • Money from spam, scams and fakes • Hacktivism to increase public exposure of an issue | © August 15, 2012, F-Secure Corporation
  • 17. Malware Trends • Money from spam, scams and fakes • Hacktivism to increase public exposure of an issue | © August 15, 2012, F-Secure Corporation
  • 18. Malware Trends • Hacktivism to increase public exposure of an issue | © August 15, 2012, F-Secure Corporation
  • 19. Malware Trends | © August 15, 2012, F-Secure Corporation
  • 20. | © August 15, 2012, F-Secure Corporation
  • 21. | © August 15, 2012, F-Secure Corporation
  • 22. Malware trends | © August 15, 2012, F-Secure Corporation
  • 23. Malware trends Case: | © August 15, 2012, F-Secure Corporation
  • 24. Malware trends Case: Stuxnet | © August 15, 2012, F-Secure Corporation
  • 25. Malware trends Case: Stuxnet More information: | © August 15, 2012, F-Secure Corporation
  • 28. Malware trends Case: ”Ghost Click” More information: http://www.f-secure.com/weblog/archives/ 00002268.html | © August 15, 2012, F-Secure Corporation
  • 29. Malware trends Case: ”Ghost Click” More information: http://www.f-secure.com/weblog/archives/ 00002268.html | © August 15, 2012, F-Secure Corporation
  • 30. Safer online banking | © August 15, 2012, F-Secure Corporation
  • 31. Safer online banking | © August 15, 2012, F-Secure Corporation
  • 32. Safer online banking • Banks provide safety instuctions • No pop-ups • PIN only asked once • https:// address (Hypertext Transfer Protocol over Secure Socket Layer) • always when banking and dealing with credit card number in an online store • Paying with credit card or online payment service provider (PayPal) is safer | © August 15, 2012, F-Secure Corporation
  • 33. Safer online banking • Banks provide safety instuctions • No pop-ups • PIN only asked once • https:// address (Hypertext Transfer Protocol over Secure Socket Layer) • always when banking and dealing with credit card number in an online store • Paying with credit card or online payment service provider (PayPal) is safer | © August 15, 2012, F-Secure Corporation
  • 34. Safer online banking • Banks provide safety instuctions • No pop-ups • PIN only asked once • https:// address (Hypertext Transfer Protocol over Secure Socket Layer) • always when banking and dealing with credit card number in an online store • Paying with credit card or online payment service provider (PayPal) is safer | © August 15, 2012, F-Secure Corporation
  • 35. Safer social networking | © August 15, 2012, F-Secure Corporation
  • 36. Safer social networking | © August 15, 2012, F-Secure Corporation
  • 37. Safer social networking • Danger of revealing too much • Caution with personal details • Pictures stay on the Internet forever • Privacy? • Privacy settings • Strong passwords • Identity theft, spam, targeted attacks • Maintaining a good reputation | © August 15, 2012, F-Secure Corporation
  • 38. Safer social networking • Danger of revealing too much • Caution with personal details • Pictures stay on the Internet forever • Privacy? • Privacy settings • Strong passwords • Identity theft, spam, targeted attacks • Maintaining a good reputation | © August 15, 2012, F-Secure Corporation
  • 39. Safer social networking • Danger of revealing too much • Caution with personal details • Pictures stay on the Internet forever • Privacy? • Privacy settings • Strong passwords • Identity theft, spam, targeted attacks • Maintaining a good reputation | © August 15, 2012, F-Secure Corporation
  • 40. Safer social networking • Danger of revealing too much • Caution with personal details • Pictures stay on the Internet forever • Privacy? • Privacy settings • Strong passwords • Identity theft, spam, targeted attacks • Maintaining a good reputation | © August 15, 2012, F-Secure Corporation
  • 41. Well-being in a mobile world | © August 15, 2012, F-Secure Corporation
  • 42. Well-being in a mobile world • Lots of information on your mobile • Crime against Android multiplying • Malware via Bluetooth and web download • Spy-tools • Recording • Monitoring calls, SMS, multimedia, email • Locating phone via GPS | © August 15, 2012, F-Secure Corporation
  • 43. Well-being in a mobile world • Lots of information on your mobile • Crime against Android multiplying • Malware via Bluetooth and web download • Spy-tools • Recording • Monitoring calls, SMS, multimedia, email • Locating phone via GPS | © August 15, 2012, F-Secure Corporation
  • 44. Well-being in a mobile world • Lots of information on your mobile • Crime against Android multiplying • Malware via Bluetooth and web download • Spy-tools • Recording • Monitoring calls, SMS, multimedia, email • Locating phone via GPS | © August 15, 2012, F-Secure Corporation
  • 45. Well-being in a mobile world • Lots of information on your mobile • Crime against Android multiplying • Malware via Bluetooth and web download • Spy-tools • Recording • Monitoring calls, SMS, multimedia, email • Locating phone via GPS | © August 15, 2012, F-Secure Corporation
  • 46. Well-being in a mobile world • Lots of information on your mobile • Crime against Android multiplying • Malware via Bluetooth and web download • Spy-tools • Recording • Monitoring calls, SMS, multimedia, email • Locating phone via GPS | © August 15, 2012, F-Secure Corporation
  • 47. Frontier Secure – Max Security • Single Integrated product : • Antivirus Protection • Anti Spyware • Personal Firewall • Browsing Protection • Spam Filtering • Automatic Updates • Live 24/7 Support • PC & Mac Support | © August 15, 2012, F-Secure Corporation
  • 48. Q&A www.frontier.com/security | © August 15, 2012, F-Secure Corporation
  • 49. Brought to you by: A MORE DEDICATED CONNECTION Thank You Call: 1-866-408-0233