SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Kaseya and Kaspersky Lab
Cybercrime Threats in 2012: What You
Need to Know


Cynthia James,
Director Business Development, CISSP

September 2012
Agenda


           Kaspersky Lab
           Today’s Threatscape & Top Threats
           10 Internet Safety Tips
           Sources




PAGE 2 |        Kaspersky Lab Presentation   | September 26, 2012
About Kaspersky Lab
     Founded in 1997; largest private anti-malware company – 100%
     focused on anti-malware
     Over $600M annual revenues
     Presence in 19 countries: CEO is Russian; incorporated in the UK;
     new to US market in 2005
     #1 vendor in Germany, France, Spain, Eastern Europe
     America’s distribution: 12,000 outlets; top two vendors (revenue
     & units shipping)
     Top supplier to OEMs/ISVs of anti-malware worldwide
        Aggressively protecting businesses




PAGE 3 |        Kaspersky Lab Presentation   | September 26, 2012
Cybercrime threatscape: malware growth
     Recent years have seen exponential growth in malware.
     200k unique malware samples were identified in 2006; 2M in
     2007, over 15 million by 2009…50 million this past year.




     Now it is the quality of malware that improves annually.


PAGE 4 |       Kaspersky Lab Presentation   | September 26, 2012
Top Security Threats of 2012: backdrop
           Cybercriminals earn over $100 billion annually!

           Cybercrime markets are now very organized and
           sophisticated  everything has a price, most data
           has some value
              Affiliate programs pay hackers to distribute malware

           “Rented” botnets & malware kits for sale

      Code re-use: there’s no such thing
    as “old news” in cybercrime
              Trickle down effect (of tactics)


PAGE 5 |          Kaspersky Lab Presentation   | September 26, 2012
The power of botnets
Kido (aka Conficker) botnet in May 2009 (peak)


    GFLOPS




   When the Kido botnet reached its peak in May 2009 it contained about
   6 mln. zombie machines
   Botnet = an on-line army for rent

PAGE 6 |       Kaspersky Lab Presentation   | September 26, 2012
How infection occurs
      Infection vectors
           Delivered via email spam
           •   Malware link: evil website masquerading as legit
           Legit website that’s been infected
      “Exploit” – the entry mechanism
      Trojans – the tool
      bot + bot + bot = botnet
      Botherder C&C (command & control)


PAGE 7 |        Kaspersky Lab Presentation   | September 26, 2012
On-line bank robberies
           Clampi Trojan
           $100M in 2010 from SMB, SLED
            Goal: steal login and password
             for on-line bank accounts
            Database of over 4500 different
             financially related sites
            Learn about users’ on-line banking activity (times, dates)
            Wait for a break in bank contact
            Recruit money mules
            Transfer money out in sums of under $10K
            Money mule transfers out of the country



PAGE 8 |          Kaspersky Lab Presentation   | September 26, 2012
Top Security Threats 2012
     Named viruses:
       Stuxnet, Flame, APTs
        – Enterprises
       Clampi – SMB
     Hacktivism – good or bad?
     Accelerated discovery of multi-year operations
     (Mac botnet, Flame, etc.)
    What companies or individuals are infected today
    who will only know about it years from now?


PAGE 9 |    Kaspersky Lab Presentation   | September 26, 2012
Biggest Issue in Security 2012 (as always)

            Human beings!
            (impatient, proud, busy, curious…) – RSA’s $71M
            man
             For consumers: save yourself from yourself…
            The blurry boundaries between
            work, home, school – BYOD
             Who else are you jeopardizing?
             Who else is jeopardizing you?


    Best solution: forced patching & AV
PAGE 10 |        Kaspersky Lab Presentation   | September 26, 2012
10 Tips to Better Internet Safety
            1. Your AV is your friend – be patient
            2. Use the best AV possible (not the free
            stuff!)
            3. Always patch when prompted
            4. Never click a link offered by any email
            without checking where it goes (you are
            looking for …marriott.com/ )
            5. Try to get everyone you work or play
            with to follow the same rules!

PAGE 11 |         Kaspersky Lab Presentation   | September 26, 2012
10 Tips to Internet Safety
            6. On-line banking:
              Take the extra security!
              Log on after your AV updates and before
              going to any other websites
            7. Write down passwords (be complex)
            8. Make sure your Macs are protected
            too
            9. Let strange mail get “stale”
            10. Check suspicious email or links via
            phone (or not at all)

PAGE 12 |        Kaspersky Lab Presentation   | September 26, 2012
What Kaspersky Delivers!


            Fastest response to threats
            Cracks more archives and file types
            Consistently rated “the best” by independent
            test organizations
             www.av-test.org
             www.av-comparatives.org
             www.virusbtn.com


PAGE 13 |        Kaspersky Lab Presentation   | September 26, 2012
Fast Response Ensures the Shortest ‘Window of Opportunity’




PAGE 14 |   Kaspersky Lab Presentation   | September 26, 2012
Useful security links!

       KLAB Digest - a proactive security news push:
       KLAB Digest – email me to subscribe: security
       news highlights monthly
       cynthia.james@kaspersky.com
       www.securelist.com
       The more technical version
       www.threatpost.com
       Generic security information - “the first stop for
       security on the web”


  Email me for a free copy of Kaspersky PURE!




PAGE 15 |        Kaspersky Lab Presentation   | September 26, 2012
Thank You

 Kaseya & Kaspersky Lab
 What You Need to Know about Cyber Security in 2012



Cynthia James, Director Business Development, CISSP, Kaspersky Lab
Global Business Development
September 2012
Speakers




      Jeff Keyes        Scott Brackett
  Product Marketing   Product Manager
Kaseya’s Security Solution
• Blended Protection / Unified Platform / Remediation / Partners


                                     Anti-          Partners /
  Patching        Anti-Virus
                                    Malware        Remediation

                                                        Partners
   Operating
    System            Kaseya
                     Antivirus                          Agent
   MS Office                                          Procedures

                                      Kaseya         Monitoring &
                                    AntiMalware        Mobile
                      Kaseya                         Service Desk &
   3rd Party *
                     Endpoint                          Reporting
   Software          Security
  Deployment                                         Scheduling &
                                                     Management

                                                                   18
Show Me How Easy it is to Manage
All My Patches
KAV 1.4 - New Features
• Kaseya Anti-Virus 1.4 additions:
  1.   Manageability
  2.   Manageability
  3.   Manageability
  4.   File Share for updates / installs of endpoints
       dependent upon VSA 6.3

• Requires VSA 6.2 or higher
• Kaspersky 6.0.4 server & workstation
  – can continue managing existing AV 2010
KAV 1.4 Key Points
•   LAN Cache Support – for installs and updates; 6.3 required
•   Detections – filter and add to quarantine
•   Column Sets - definitions out of date/ reboot required/profile compliance issue
•   New Status Flags – 5 from “have active threats” to “reboot required”
•   Advanced Installation Options
     –   Select server and workstation
     –   Remove competing product
     –   Reboot if needed
     –   Prompt user for approval
     –   Skip if offline
     –   Endpoint password for uninstall and change options
•   Profile Visibility
•   Profile Configuration – BIGGEST addition The biggest/most requested change
•   License Management-
     –   Separate pools workstation & server
     –   Licensed from point of time install; not purchase
•   Reporting
•   Alerts
Show Me How Easy it is to Manage
Kaspersky AntiVirus
Resources

•   KAV 1.4 Help Doc
     – http://help.kaseya.com/WebHelp/EN/KAV/1040000/#6830.htm

•   KAV 1.4 Release Notes:
     – http://help.kaseya.com/WebHelp/EN/VSA/KAVReleaseNotes14.htm

•   KAV 1.4 Users Guide:
     – http://help.kaseya.com/WebHelp/EN/KAV/1040000/EN_KAVguide14.pdf

•   Patch Users Guide:
     – http://help.kaseya.com/WebHelp/EN/VSA/6020000/EN_PatchManagement62.
       pdf#view=Fit&navpanes=0



    scott.brackett@kaseya.com
    jeff.keyes@kaseya.com
Patch Management Valu Prop
• Schedule scans
• Manage the Patch status on all machines
  or groups of machines
• Apply policies to individual or groups of
  machines
  – Logical Segmentation
  – Operating System Type
• Test Patches on groups before applying to
  others
• Alert and patch status

Weitere ähnliche Inhalte

Was ist angesagt?

Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for Virtualization
Ariel Martin Beliera
 
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microCw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend micro
TheInevitableCloud
 
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISH
Kirill Kertsenbaum
 

Was ist angesagt? (20)

Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...
Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...
Control Quotient: Adaptive Strategies For Gracefully Losing Control (RSAC US ...
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for Virtualization
 
CSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the CloudCSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the Cloud
 
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_alCss sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
 
Maturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOpsMaturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOps
 
Tolly Report: Stopping Attacks You Can't See
Tolly Report: Stopping Attacks You Can't SeeTolly Report: Stopping Attacks You Can't See
Tolly Report: Stopping Attacks You Can't See
 
Glasswall - How to Prevent, Detect and React to Ransomware incidents
Glasswall - How to Prevent, Detect and React to Ransomware incidentsGlasswall - How to Prevent, Detect and React to Ransomware incidents
Glasswall - How to Prevent, Detect and React to Ransomware incidents
 
Security in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataSecurity in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your Data
 
S360 2015 dev_secops_program
S360 2015 dev_secops_programS360 2015 dev_secops_program
S360 2015 dev_secops_program
 
Web Application Firewall (WAF) DAST/SAST combination
Web Application Firewall (WAF) DAST/SAST combinationWeb Application Firewall (WAF) DAST/SAST combination
Web Application Firewall (WAF) DAST/SAST combination
 
Kaspersky
KasperskyKaspersky
Kaspersky
 
Cloud Security Essentials 2.0 at RSA
Cloud Security Essentials 2.0 at RSACloud Security Essentials 2.0 at RSA
Cloud Security Essentials 2.0 at RSA
 
Introducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentIntroducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light Agent
 
Understanding ransomware
Understanding ransomwareUnderstanding ransomware
Understanding ransomware
 
Symantec Ubiquity
Symantec UbiquitySymantec Ubiquity
Symantec Ubiquity
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...
 
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microCw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend micro
 
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISH
 
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
A Throwaway Deck for Cloud Security Essentials 2.0 delivered at RSA 2016
 

Ähnlich wie Cybercrime Threats in 2012 - What You Need to Know

Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...
Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...
Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...
imagazinepl
 
Automating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceAutomating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and Compliance
Qualys
 

Ähnlich wie Cybercrime Threats in 2012 - What You Need to Know (20)

Kaseya Connect 2013: Becoming A Trusted Security Advisor - It’s Easier Than Y...
Kaseya Connect 2013: Becoming A Trusted Security Advisor - It’s Easier Than Y...Kaseya Connect 2013: Becoming A Trusted Security Advisor - It’s Easier Than Y...
Kaseya Connect 2013: Becoming A Trusted Security Advisor - It’s Easier Than Y...
 
Tenzin thiley bhutia
Tenzin thiley bhutiaTenzin thiley bhutia
Tenzin thiley bhutia
 
Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?
 
Head in the Clouds, Feet on the Ground
Head in the Clouds, Feet on the GroundHead in the Clouds, Feet on the Ground
Head in the Clouds, Feet on the Ground
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applications
 
Get Ready for Web Application Security Testing
Get Ready for Web Application Security TestingGet Ready for Web Application Security Testing
Get Ready for Web Application Security Testing
 
Top Application Security Trends of 2012
Top Application Security Trends of 2012Top Application Security Trends of 2012
Top Application Security Trends of 2012
 
Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOps
 
Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOpsEmpowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOps
 
Solnet dev secops meetup
Solnet dev secops meetupSolnet dev secops meetup
Solnet dev secops meetup
 
Kaspersky Kesb ep10 no_cm_v01a
Kaspersky Kesb ep10 no_cm_v01aKaspersky Kesb ep10 no_cm_v01a
Kaspersky Kesb ep10 no_cm_v01a
 
Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...
Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...
Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...
 
Isday 2017 - Atelier Cisco
Isday 2017 - Atelier CiscoIsday 2017 - Atelier Cisco
Isday 2017 - Atelier Cisco
 
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt Labs
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
Continuous Security Testing
Continuous Security TestingContinuous Security Testing
Continuous Security Testing
 
Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsSecuring Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These Years
 
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
 
Automating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceAutomating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and Compliance
 

Mehr von Kaseya

Mehr von Kaseya (20)

Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
 
Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)
 
Enterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and TechniquesEnterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and Techniques
 
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
 
Reporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA ReportingReporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA Reporting
 
365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365
 
365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365
 
Advanced Administration: Mobile Device Management
Advanced Administration: Mobile Device ManagementAdvanced Administration: Mobile Device Management
Advanced Administration: Mobile Device Management
 
Advanced Administration: Kaseya Traverse
Advanced Administration: Kaseya TraverseAdvanced Administration: Kaseya Traverse
Advanced Administration: Kaseya Traverse
 
Advanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD SuiteAdvanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD Suite
 
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
 
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
 
Security and Backup II: Vision and Direction
Security and Backup II: Vision and DirectionSecurity and Backup II: Vision and Direction
Security and Backup II: Vision and Direction
 
Security and Backup I: OEM Architecture
Security and Backup I: OEM ArchitectureSecurity and Backup I: OEM Architecture
Security and Backup I: OEM Architecture
 
Kaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya Monitoring Suite Overview
Kaseya Monitoring Suite Overview
 
Kaseya Asset Discovery Overview
Kaseya Asset Discovery OverviewKaseya Asset Discovery Overview
Kaseya Asset Discovery Overview
 
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
 
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationAutomation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
 
Kaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner Landscape
 
Advanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorAdvanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual Administrator
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 

Cybercrime Threats in 2012 - What You Need to Know

  • 1. Kaseya and Kaspersky Lab Cybercrime Threats in 2012: What You Need to Know Cynthia James, Director Business Development, CISSP September 2012
  • 2. Agenda Kaspersky Lab Today’s Threatscape & Top Threats 10 Internet Safety Tips Sources PAGE 2 | Kaspersky Lab Presentation | September 26, 2012
  • 3. About Kaspersky Lab Founded in 1997; largest private anti-malware company – 100% focused on anti-malware Over $600M annual revenues Presence in 19 countries: CEO is Russian; incorporated in the UK; new to US market in 2005 #1 vendor in Germany, France, Spain, Eastern Europe America’s distribution: 12,000 outlets; top two vendors (revenue & units shipping) Top supplier to OEMs/ISVs of anti-malware worldwide  Aggressively protecting businesses PAGE 3 | Kaspersky Lab Presentation | September 26, 2012
  • 4. Cybercrime threatscape: malware growth Recent years have seen exponential growth in malware. 200k unique malware samples were identified in 2006; 2M in 2007, over 15 million by 2009…50 million this past year. Now it is the quality of malware that improves annually. PAGE 4 | Kaspersky Lab Presentation | September 26, 2012
  • 5. Top Security Threats of 2012: backdrop Cybercriminals earn over $100 billion annually! Cybercrime markets are now very organized and sophisticated  everything has a price, most data has some value  Affiliate programs pay hackers to distribute malware “Rented” botnets & malware kits for sale Code re-use: there’s no such thing as “old news” in cybercrime  Trickle down effect (of tactics) PAGE 5 | Kaspersky Lab Presentation | September 26, 2012
  • 6. The power of botnets Kido (aka Conficker) botnet in May 2009 (peak) GFLOPS When the Kido botnet reached its peak in May 2009 it contained about 6 mln. zombie machines Botnet = an on-line army for rent PAGE 6 | Kaspersky Lab Presentation | September 26, 2012
  • 7. How infection occurs Infection vectors Delivered via email spam • Malware link: evil website masquerading as legit Legit website that’s been infected “Exploit” – the entry mechanism Trojans – the tool bot + bot + bot = botnet Botherder C&C (command & control) PAGE 7 | Kaspersky Lab Presentation | September 26, 2012
  • 8. On-line bank robberies Clampi Trojan $100M in 2010 from SMB, SLED  Goal: steal login and password for on-line bank accounts  Database of over 4500 different financially related sites  Learn about users’ on-line banking activity (times, dates)  Wait for a break in bank contact  Recruit money mules  Transfer money out in sums of under $10K  Money mule transfers out of the country PAGE 8 | Kaspersky Lab Presentation | September 26, 2012
  • 9. Top Security Threats 2012 Named viruses:  Stuxnet, Flame, APTs – Enterprises  Clampi – SMB Hacktivism – good or bad? Accelerated discovery of multi-year operations (Mac botnet, Flame, etc.) What companies or individuals are infected today who will only know about it years from now? PAGE 9 | Kaspersky Lab Presentation | September 26, 2012
  • 10. Biggest Issue in Security 2012 (as always) Human beings! (impatient, proud, busy, curious…) – RSA’s $71M man  For consumers: save yourself from yourself… The blurry boundaries between work, home, school – BYOD  Who else are you jeopardizing?  Who else is jeopardizing you? Best solution: forced patching & AV PAGE 10 | Kaspersky Lab Presentation | September 26, 2012
  • 11. 10 Tips to Better Internet Safety 1. Your AV is your friend – be patient 2. Use the best AV possible (not the free stuff!) 3. Always patch when prompted 4. Never click a link offered by any email without checking where it goes (you are looking for …marriott.com/ ) 5. Try to get everyone you work or play with to follow the same rules! PAGE 11 | Kaspersky Lab Presentation | September 26, 2012
  • 12. 10 Tips to Internet Safety 6. On-line banking: Take the extra security! Log on after your AV updates and before going to any other websites 7. Write down passwords (be complex) 8. Make sure your Macs are protected too 9. Let strange mail get “stale” 10. Check suspicious email or links via phone (or not at all) PAGE 12 | Kaspersky Lab Presentation | September 26, 2012
  • 13. What Kaspersky Delivers! Fastest response to threats Cracks more archives and file types Consistently rated “the best” by independent test organizations  www.av-test.org  www.av-comparatives.org  www.virusbtn.com PAGE 13 | Kaspersky Lab Presentation | September 26, 2012
  • 14. Fast Response Ensures the Shortest ‘Window of Opportunity’ PAGE 14 | Kaspersky Lab Presentation | September 26, 2012
  • 15. Useful security links! KLAB Digest - a proactive security news push: KLAB Digest – email me to subscribe: security news highlights monthly cynthia.james@kaspersky.com www.securelist.com The more technical version www.threatpost.com Generic security information - “the first stop for security on the web” Email me for a free copy of Kaspersky PURE! PAGE 15 | Kaspersky Lab Presentation | September 26, 2012
  • 16. Thank You Kaseya & Kaspersky Lab What You Need to Know about Cyber Security in 2012 Cynthia James, Director Business Development, CISSP, Kaspersky Lab Global Business Development September 2012
  • 17. Speakers Jeff Keyes Scott Brackett Product Marketing Product Manager
  • 18. Kaseya’s Security Solution • Blended Protection / Unified Platform / Remediation / Partners Anti- Partners / Patching Anti-Virus Malware Remediation Partners Operating System Kaseya Antivirus Agent MS Office Procedures Kaseya Monitoring & AntiMalware Mobile Kaseya Service Desk & 3rd Party * Endpoint Reporting Software Security Deployment Scheduling & Management 18
  • 19. Show Me How Easy it is to Manage All My Patches
  • 20. KAV 1.4 - New Features • Kaseya Anti-Virus 1.4 additions: 1. Manageability 2. Manageability 3. Manageability 4. File Share for updates / installs of endpoints dependent upon VSA 6.3 • Requires VSA 6.2 or higher • Kaspersky 6.0.4 server & workstation – can continue managing existing AV 2010
  • 21. KAV 1.4 Key Points • LAN Cache Support – for installs and updates; 6.3 required • Detections – filter and add to quarantine • Column Sets - definitions out of date/ reboot required/profile compliance issue • New Status Flags – 5 from “have active threats” to “reboot required” • Advanced Installation Options – Select server and workstation – Remove competing product – Reboot if needed – Prompt user for approval – Skip if offline – Endpoint password for uninstall and change options • Profile Visibility • Profile Configuration – BIGGEST addition The biggest/most requested change • License Management- – Separate pools workstation & server – Licensed from point of time install; not purchase • Reporting • Alerts
  • 22. Show Me How Easy it is to Manage Kaspersky AntiVirus
  • 23. Resources • KAV 1.4 Help Doc – http://help.kaseya.com/WebHelp/EN/KAV/1040000/#6830.htm • KAV 1.4 Release Notes: – http://help.kaseya.com/WebHelp/EN/VSA/KAVReleaseNotes14.htm • KAV 1.4 Users Guide: – http://help.kaseya.com/WebHelp/EN/KAV/1040000/EN_KAVguide14.pdf • Patch Users Guide: – http://help.kaseya.com/WebHelp/EN/VSA/6020000/EN_PatchManagement62. pdf#view=Fit&navpanes=0 scott.brackett@kaseya.com jeff.keyes@kaseya.com
  • 24. Patch Management Valu Prop • Schedule scans • Manage the Patch status on all machines or groups of machines • Apply policies to individual or groups of machines – Logical Segmentation – Operating System Type • Test Patches on groups before applying to others • Alert and patch status

Hinweis der Redaktion

  1. Points to make here: Even when presenting in a more educational (product free) format, we should say – this a slide to make you feel comfortable with who Kaspersky is today and give you confidence in the fact that we have the expertise to educate you on cybercrime. It’s also a good primer on how to pick any AV company whose product you use. Most importantly they should have a worldwide focus and millions of end points, because most cybercriminals test and tune their malware before they mass distribute it. So if we can catch it when it first appears, you’ll be protected by the time it reaches you. You can see that Kaspersky has: Millions of end pointsWW presence (for sampling and solutions) And: Kaspersky began distributing in the US only since 2005, but that was after rising to the top of every other AV market in the world. We’ve progressed quickly. Many people haven’t kept up with our growth because it’s been so rapid. When I started 5 years ago we were in the $100 million revenue range; today we have over $600M in revenues. Revenues do matter because a significant amount of that money goes back into our R&D, and they help us hire our worldwide staff – right now that’s about 2500 employees and a huge number of those are actively engaged in creating solutions to malware. We’re proud to be the leaders in providing technology to OEMs and ISVs (define what OEM means if your audience is unlikely to know). Overwhelmingly we are selected by companies like (list any which are not competitive). These OEMs and ISVs have very stringent technical requirements and are able to choose among all vendors. In fact our first ever deal back in 1997 involved licensing the technology to a company who sold to other businesses. Of course we credit the fact we are selected most often to the superiority of our solution.
  2. This is a visual representation of what I’m talking about. Kaspersky has a unique genealogy in the anti-malware community because we started out doing technology licensing deals. (Describe OEM briefly.) We licensed our technology to a company who then used it to protect other companies. This matters because in those days – back in the late 1990’s – home users who even had internet connections were still forcing a connection. It wasn’t even close to being “always on”, and getting updates every 48 hours was fine. But businesses were on the leading edge – they came on-line fastest with websites and customer interactivity, etc. So the technical requirement for protecting them was much more stringent than it was for home users. Serving the very demanding segment of business users forced us to compress the vulnerability window as much as possible and become really efficient about delivering the smallest updates possible.