SlideShare ist ein Scribd-Unternehmen logo
1 von 30
AVG.COM.AU
AVG.CO.NZ




Emerging Threats and Trends
Michael McKinnon, Security Advisor




               An Avalanche Technology Group Company
Emerging Threats & Trends - Overview

• Current Threats

   • Toolkits, Spam, Mobile, Printed Malware,
     Fake Anti-Virus, Ransomware

• Trends & Emerging

   • Facebook, Mobile security, DNSSEC, Anonymous

• Dispel some common myths along the way 




                                                    2
Current Threats
• Compiled from our local support team; and
• AVG Community Powered Threat Report, Q4 2011




                                                 3
Blackhole Toolkit – What is it?

• Web based, distribution system for exploits and
  malware; runs on a private or compromised server




                                                     4
Blackhole Toolkit – Targets many platforms

• Allows them to target many platforms, including Mac!




                                                         5
Blackhole Toolkit – Features & facts
• Other key “features”:

    • Analytics network

    • Built-in anti-virus scanning to avoid detection

    • Does many complex tasks very easily

• Facts:

    • In the last ¼ of 2011 it accounted for 80.2% of all known toolkits
      being used

    • Exploit toolkits account for 58% of threat activity on malicious
      websites




                                                                           6
Blackhole Toolkit – Mitigation

• Always keep computers updated with latest patches to
  avoid 0day vulnerabilities

• Run up to date Internet Security solutions – but you
  already know that!




                                                         7
Spam – SNAP POLL

• In Q4 of 2011, which country sent the most spam?



• China

• Romania

• United States

• Israel




                                                     8
Spam – Top countries




                       9
Spam – Top domains




                     10
Spam – Mitigation

• Run an anti-spam solution on servers & desktops

• Be proactive and know basic email handling tips

• We’ll be providing some tips and resources on how to
  spot email scams in the near future…




                                                         11
Mobile Threats – Rogue apps

• Affecting mostly Android phone and tablet users




                                                    12
Mobile Threats – Rogue apps

• In Q4 we reported the emergence of rogue “signed”
  applications available in the Android Marketplace

• Signed with stolen/leaked digital certificates

• Permission prompts on Android is weak – doesn’t make
  the user think at all

• Risks are mostly around spying and premium SMS

• Google has recently announced they are scanning apps
  in the Marketplace with “bouncer”




                                                         13
Mobile Threats – Mitigation

• Update your Android device – if you cannot upgrade
  past Android 2.2 then BUY A NEW PHONE! (Same can
  be said of older iPhones stuck on iOS 4.3)

• ONLY install applications from the Android Marketplace
  – nowhere else

• Have a look at AVG Mobilation for scanning




                                                           14
Printed Malware – QR codes




                             15
Printed Malware – QR codes


Just like URL shorteners (like bit.ly for
example), QR codes don’t reveal too much about
themselves until you use them

In Q4 2011 we observed a QR code being used
in a Russian forum website that linked to a
malicious mobile app

These are something to keep your eye
on, especially with large, well-known, trusted
brands starting to use them for marketing




                                                 16
Fake AV – What is it?

• Our support team has been helping clean up the
  following Fake AV’s for customers:

   • Security Shield

   • System Fix

   • XP Antivirus 2012

   • Internet Security 2012

• Let’s have a look at what they can do…




                                                   17
Fake AV – Fake “Blue Screen of Death”




                                        18
Fake AV – Nag screens and pop-ups




                                    19
Fake AV – Mitigation & removal

• Can be very tricky to remove completely, usually
  involves reverting to safe-mode and removing files
  manually

• Some tricks for removal have, in some cases, been to
  enter the fake AV licence key to get rid of it!

• Preventing fake AV from being installed usually involves
  keeping the PC up to date, in combination with some
  user awareness




                                                             20
Ransomware – What is it?

• Has been observed being served up by Blackhole
  toolkits

• Unlike fake AV – this malicious code just locks up your
  computer and demands money!

• Usually pretends to be
  from the government or
  a law enforcement
  agency




                                                            21
Ransomware – Your PC has been seized!




                                        22
Ransomware – Mitigation

• Update, update, update!

• Since the vector for this is 0day vulnerabilities, usually
  exploited by a toolkit (like Blackhole) – staying updated
  is the first line of defence

• And, of course, AVG 2012 Internet Security

• Browsing questionable websites (i.e. user habit) could
  also be a contributory factor in these examples




                                                               23
Trends & Emerging Threats
• Predictions for 2012
• And some overall stats and trends




                                      24
Top 10 Web Threats – Q4 2011




                               25
Trends & Emerging – Facebook or Scambook?

• Global spam levels are decreasing

• Scammers are now using Facebook, which provides:

   • Instant access to 850+ million users

   • Built-in word of mouth provides viral spread

   • Default “trust” with Facebook is still high




                                                     26
Trends & Emerging – Mobile Security

• Did you know?

   • Lost/stolen smartphones & tablets can be located using
     GPS tracking

   • Mobile devices can be remote wiped if fallen into the
     wrong hands

   • PIN number should always be used, but also
     these can be activated remotely




                                                              27
Trends & Emerging – DNSSEC

• The Domain Name System (DNS) is vulnerable, so
  DNSSEC promises to cryptographically secure it

• We should see improvements over time with true
  verification of legitimate sites, good for eCommerce and
  consumer confidence online

• Will make stolen SSL certificates much harder to exploit
  in the wild

• Should start to have some impacts on
  reducing spam levels further, in conjunction
  with DMARC




                                                             28
Trends & Emerging – #opGlobalBlackout

• “Anonymous” announced that it is attempting to bring
  down the Internet on 31st March 2012

• http://pastebin.com/NKbnh8q8

• Will be interesting to see what happens, if anything, I
  suspect the Internet will be just fine 

• No doubt it will hit the news




                                                            29
Thank You!



  Connect with us to stay up to date with the latest news and information
  about online threats and scams. We also provide simple and useful
  security tips, designed to keep out community safe.

  Come and say hello!



                 twitter.com/avgaunz                         facebook.com/avgaunz




  Copyright © 2012 AVG (AU/NZ) Pty Ltd, an Avalanche Technology Group company. All rights reserved.
                                                                                                      30

Weitere ähnliche Inhalte

Was ist angesagt?

csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBCapyn
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day ConferenceBrian Pichman
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataAccellis Technology Group
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2Santosh Satam
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)Vince Verbeke
 
Network and Endpoint Security v1.0 (2017)
Network and Endpoint Security v1.0 (2017)Network and Endpoint Security v1.0 (2017)
Network and Endpoint Security v1.0 (2017)Rui Miguel Feio
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamMohammed Adam
 
Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby presentation to cloud workshop 2016Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby presentation to cloud workshop 2016Tim Willoughby
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, LondonJohn Palfreyman
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProRonald Soh
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsVince Verbeke
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber Security Infotech
 
Senior Technology Education
Senior Technology EducationSenior Technology Education
Senior Technology EducationSummerpair77
 
Balancing Your Internet Cyber-Life with Privacy and Security
Balancing Your Internet Cyber-Life with Privacy and SecurityBalancing Your Internet Cyber-Life with Privacy and Security
Balancing Your Internet Cyber-Life with Privacy and Securityevolutionaryit
 
The Danger of the Future of Technology
The Danger of the Future of TechnologyThe Danger of the Future of Technology
The Danger of the Future of TechnologyJacquireEllis
 
Cybersecurity Risks In the Mobile Environment
Cybersecurity Risks In the Mobile EnvironmentCybersecurity Risks In the Mobile Environment
Cybersecurity Risks In the Mobile EnvironmentHamilton Turner
 

Was ist angesagt? (20)

csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day Conference
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
 
Network and Endpoint Security v1.0 (2017)
Network and Endpoint Security v1.0 (2017)Network and Endpoint Security v1.0 (2017)
Network and Endpoint Security v1.0 (2017)
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby presentation to cloud workshop 2016Tim Willoughby presentation to cloud workshop 2016
Tim Willoughby presentation to cloud workshop 2016
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, London
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
Seguridad de la Información y Controles contra Hackers - Getting hacked 101 ...
Seguridad de la Información y Controles contra Hackers - Getting hacked 101  ...Seguridad de la Información y Controles contra Hackers - Getting hacked 101  ...
Seguridad de la Información y Controles contra Hackers - Getting hacked 101 ...
 
Senior Technology Education
Senior Technology EducationSenior Technology Education
Senior Technology Education
 
Balancing Your Internet Cyber-Life with Privacy and Security
Balancing Your Internet Cyber-Life with Privacy and SecurityBalancing Your Internet Cyber-Life with Privacy and Security
Balancing Your Internet Cyber-Life with Privacy and Security
 
The Danger of the Future of Technology
The Danger of the Future of TechnologyThe Danger of the Future of Technology
The Danger of the Future of Technology
 
Cybersecurity Risks In the Mobile Environment
Cybersecurity Risks In the Mobile EnvironmentCybersecurity Risks In the Mobile Environment
Cybersecurity Risks In the Mobile Environment
 

Andere mochten auch (10)

Cyber security
Cyber securityCyber security
Cyber security
 
Threats to online security and data
Threats to online security and dataThreats to online security and data
Threats to online security and data
 
New Threats to Data Security
New Threats to Data SecurityNew Threats to Data Security
New Threats to Data Security
 
2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting
 
Cybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecurityCybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecurity
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
 
Online Security
Online SecurityOnline Security
Online Security
 
Information Security Challenges & Opportunities
Information Security Challenges & OpportunitiesInformation Security Challenges & Opportunities
Information Security Challenges & Opportunities
 
E-commerce Security and Threats
E-commerce Security and ThreatsE-commerce Security and Threats
E-commerce Security and Threats
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 

Ähnlich wie Emerging Threats and Trends in Online Security

E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpo...
E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpo...E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpo...
E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpo...Lumension
 
Surfing with Sharks KS ED TECH 2012
Surfing with Sharks   KS ED TECH 2012Surfing with Sharks   KS ED TECH 2012
Surfing with Sharks KS ED TECH 2012inf8nity
 
Malware in the Wild: Evolving to Evade Detection
Malware in the Wild: Evolving to Evade DetectionMalware in the Wild: Evolving to Evade Detection
Malware in the Wild: Evolving to Evade DetectionLastline, Inc.
 
Kaseya Connect 2012 – A Kaspersky Researcher Perspective
Kaseya Connect 2012 – A Kaspersky Researcher PerspectiveKaseya Connect 2012 – A Kaspersky Researcher Perspective
Kaseya Connect 2012 – A Kaspersky Researcher PerspectiveKaseya
 
PoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail IndustryPoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail IndustryInvincea, Inc.
 
Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010Agora Group
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxZarwashgulrez
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security InnovationPriyanka Aash
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMohsin Dahar
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptxLakshayNRReddy
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptxTayyabaAbbas4
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer securityPrajktaGN
 
Seven Effective Habits When Using The Internet
Seven Effective Habits When Using The InternetSeven Effective Habits When Using The Internet
Seven Effective Habits When Using The InternetHelen Dixon
 
LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014Ashlie Steele
 
Get Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and OrganizationGet Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and OrganizationSecurity Innovation
 

Ähnlich wie Emerging Threats and Trends in Online Security (20)

Cybersecurity Concerns You Should be Thinking About
Cybersecurity Concerns You Should be Thinking AboutCybersecurity Concerns You Should be Thinking About
Cybersecurity Concerns You Should be Thinking About
 
E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpo...
E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpo...E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpo...
E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpo...
 
Surfing with Sharks KS ED TECH 2012
Surfing with Sharks   KS ED TECH 2012Surfing with Sharks   KS ED TECH 2012
Surfing with Sharks KS ED TECH 2012
 
Malware in the Wild: Evolving to Evade Detection
Malware in the Wild: Evolving to Evade DetectionMalware in the Wild: Evolving to Evade Detection
Malware in the Wild: Evolving to Evade Detection
 
Kaseya Connect 2012 – A Kaspersky Researcher Perspective
Kaseya Connect 2012 – A Kaspersky Researcher PerspectiveKaseya Connect 2012 – A Kaspersky Researcher Perspective
Kaseya Connect 2012 – A Kaspersky Researcher Perspective
 
Spyware
SpywareSpyware
Spyware
 
PoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail IndustryPoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail Industry
 
Declaration of malWARe
Declaration of malWAReDeclaration of malWARe
Declaration of malWARe
 
Spyware
SpywareSpyware
Spyware
 
Mobile Apps Security
Mobile Apps SecurityMobile Apps Security
Mobile Apps Security
 
Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptx
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
 
Seven Effective Habits When Using The Internet
Seven Effective Habits When Using The InternetSeven Effective Habits When Using The Internet
Seven Effective Habits When Using The Internet
 
LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014
 
Get Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and OrganizationGet Smart about Ransomware: Protect Yourself and Organization
Get Smart about Ransomware: Protect Yourself and Organization
 

Mehr von AVG Technologies AU

How I'd hack into your business and how you can stop me!
How I'd hack into your business and how you can stop me!How I'd hack into your business and how you can stop me!
How I'd hack into your business and how you can stop me!AVG Technologies AU
 
How To Be Facebook Friends With The Boss & Keep Your Job
How To Be Facebook Friends With The Boss & Keep Your JobHow To Be Facebook Friends With The Boss & Keep Your Job
How To Be Facebook Friends With The Boss & Keep Your JobAVG Technologies AU
 
Keeping hackers out of your POS!
Keeping hackers out of your POS!Keeping hackers out of your POS!
Keeping hackers out of your POS!AVG Technologies AU
 
Computing on the Move - Mobile Security
Computing on the Move - Mobile SecurityComputing on the Move - Mobile Security
Computing on the Move - Mobile SecurityAVG Technologies AU
 
AVG Community Powered Threat Report: Q1 2012
AVG Community Powered Threat Report: Q1 2012AVG Community Powered Threat Report: Q1 2012
AVG Community Powered Threat Report: Q1 2012AVG Technologies AU
 
eSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers SafeeSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers SafeAVG Technologies AU
 

Mehr von AVG Technologies AU (8)

How I'd hack into your business and how you can stop me!
How I'd hack into your business and how you can stop me!How I'd hack into your business and how you can stop me!
How I'd hack into your business and how you can stop me!
 
AVG Threat Report Q4 2012
AVG Threat Report Q4 2012AVG Threat Report Q4 2012
AVG Threat Report Q4 2012
 
AVG Q3 2012 Threat Report
AVG Q3 2012 Threat ReportAVG Q3 2012 Threat Report
AVG Q3 2012 Threat Report
 
How To Be Facebook Friends With The Boss & Keep Your Job
How To Be Facebook Friends With The Boss & Keep Your JobHow To Be Facebook Friends With The Boss & Keep Your Job
How To Be Facebook Friends With The Boss & Keep Your Job
 
Keeping hackers out of your POS!
Keeping hackers out of your POS!Keeping hackers out of your POS!
Keeping hackers out of your POS!
 
Computing on the Move - Mobile Security
Computing on the Move - Mobile SecurityComputing on the Move - Mobile Security
Computing on the Move - Mobile Security
 
AVG Community Powered Threat Report: Q1 2012
AVG Community Powered Threat Report: Q1 2012AVG Community Powered Threat Report: Q1 2012
AVG Community Powered Threat Report: Q1 2012
 
eSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers SafeeSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers Safe
 

Kürzlich hochgeladen

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 

Kürzlich hochgeladen (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 

Emerging Threats and Trends in Online Security

  • 1. AVG.COM.AU AVG.CO.NZ Emerging Threats and Trends Michael McKinnon, Security Advisor An Avalanche Technology Group Company
  • 2. Emerging Threats & Trends - Overview • Current Threats • Toolkits, Spam, Mobile, Printed Malware, Fake Anti-Virus, Ransomware • Trends & Emerging • Facebook, Mobile security, DNSSEC, Anonymous • Dispel some common myths along the way  2
  • 3. Current Threats • Compiled from our local support team; and • AVG Community Powered Threat Report, Q4 2011 3
  • 4. Blackhole Toolkit – What is it? • Web based, distribution system for exploits and malware; runs on a private or compromised server 4
  • 5. Blackhole Toolkit – Targets many platforms • Allows them to target many platforms, including Mac! 5
  • 6. Blackhole Toolkit – Features & facts • Other key “features”: • Analytics network • Built-in anti-virus scanning to avoid detection • Does many complex tasks very easily • Facts: • In the last ¼ of 2011 it accounted for 80.2% of all known toolkits being used • Exploit toolkits account for 58% of threat activity on malicious websites 6
  • 7. Blackhole Toolkit – Mitigation • Always keep computers updated with latest patches to avoid 0day vulnerabilities • Run up to date Internet Security solutions – but you already know that! 7
  • 8. Spam – SNAP POLL • In Q4 of 2011, which country sent the most spam? • China • Romania • United States • Israel 8
  • 9. Spam – Top countries 9
  • 10. Spam – Top domains 10
  • 11. Spam – Mitigation • Run an anti-spam solution on servers & desktops • Be proactive and know basic email handling tips • We’ll be providing some tips and resources on how to spot email scams in the near future… 11
  • 12. Mobile Threats – Rogue apps • Affecting mostly Android phone and tablet users 12
  • 13. Mobile Threats – Rogue apps • In Q4 we reported the emergence of rogue “signed” applications available in the Android Marketplace • Signed with stolen/leaked digital certificates • Permission prompts on Android is weak – doesn’t make the user think at all • Risks are mostly around spying and premium SMS • Google has recently announced they are scanning apps in the Marketplace with “bouncer” 13
  • 14. Mobile Threats – Mitigation • Update your Android device – if you cannot upgrade past Android 2.2 then BUY A NEW PHONE! (Same can be said of older iPhones stuck on iOS 4.3) • ONLY install applications from the Android Marketplace – nowhere else • Have a look at AVG Mobilation for scanning 14
  • 15. Printed Malware – QR codes 15
  • 16. Printed Malware – QR codes Just like URL shorteners (like bit.ly for example), QR codes don’t reveal too much about themselves until you use them In Q4 2011 we observed a QR code being used in a Russian forum website that linked to a malicious mobile app These are something to keep your eye on, especially with large, well-known, trusted brands starting to use them for marketing 16
  • 17. Fake AV – What is it? • Our support team has been helping clean up the following Fake AV’s for customers: • Security Shield • System Fix • XP Antivirus 2012 • Internet Security 2012 • Let’s have a look at what they can do… 17
  • 18. Fake AV – Fake “Blue Screen of Death” 18
  • 19. Fake AV – Nag screens and pop-ups 19
  • 20. Fake AV – Mitigation & removal • Can be very tricky to remove completely, usually involves reverting to safe-mode and removing files manually • Some tricks for removal have, in some cases, been to enter the fake AV licence key to get rid of it! • Preventing fake AV from being installed usually involves keeping the PC up to date, in combination with some user awareness 20
  • 21. Ransomware – What is it? • Has been observed being served up by Blackhole toolkits • Unlike fake AV – this malicious code just locks up your computer and demands money! • Usually pretends to be from the government or a law enforcement agency 21
  • 22. Ransomware – Your PC has been seized! 22
  • 23. Ransomware – Mitigation • Update, update, update! • Since the vector for this is 0day vulnerabilities, usually exploited by a toolkit (like Blackhole) – staying updated is the first line of defence • And, of course, AVG 2012 Internet Security • Browsing questionable websites (i.e. user habit) could also be a contributory factor in these examples 23
  • 24. Trends & Emerging Threats • Predictions for 2012 • And some overall stats and trends 24
  • 25. Top 10 Web Threats – Q4 2011 25
  • 26. Trends & Emerging – Facebook or Scambook? • Global spam levels are decreasing • Scammers are now using Facebook, which provides: • Instant access to 850+ million users • Built-in word of mouth provides viral spread • Default “trust” with Facebook is still high 26
  • 27. Trends & Emerging – Mobile Security • Did you know? • Lost/stolen smartphones & tablets can be located using GPS tracking • Mobile devices can be remote wiped if fallen into the wrong hands • PIN number should always be used, but also these can be activated remotely 27
  • 28. Trends & Emerging – DNSSEC • The Domain Name System (DNS) is vulnerable, so DNSSEC promises to cryptographically secure it • We should see improvements over time with true verification of legitimate sites, good for eCommerce and consumer confidence online • Will make stolen SSL certificates much harder to exploit in the wild • Should start to have some impacts on reducing spam levels further, in conjunction with DMARC 28
  • 29. Trends & Emerging – #opGlobalBlackout • “Anonymous” announced that it is attempting to bring down the Internet on 31st March 2012 • http://pastebin.com/NKbnh8q8 • Will be interesting to see what happens, if anything, I suspect the Internet will be just fine  • No doubt it will hit the news 29
  • 30. Thank You! Connect with us to stay up to date with the latest news and information about online threats and scams. We also provide simple and useful security tips, designed to keep out community safe. Come and say hello! twitter.com/avgaunz facebook.com/avgaunz Copyright © 2012 AVG (AU/NZ) Pty Ltd, an Avalanche Technology Group company. All rights reserved. 30