SlideShare ist ein Scribd-Unternehmen logo
1 von 4
8
  threats
  that even
   antivirus
cannot catch
Malware attacks and data thefts are on the rise as evident from the recent news
headlines. The mere use of antivirus software wouldn’t serve the purpose. The reason
being, antivirus programs block attacks by using patterns or signatures to identify
malicious software code. This signature-based detection was successful when the
threats were lesser and spread over a good time frame. Relying entirely on antivirus
solutions will not serve the purpose now because your system is exposed to threats in
routine situations.
The whitepaper published by John Metzger, Senior Product Marketing Manager, and
Jonathan Shaw, Product Manager at Sophos highlights eight everyday threats in which
we need to update the protection of our PC beyond traditional antivirus program. Let us
look at them and understand their implications:


1.       The zero-day threat

Zero-day threats are those malware threats that are not recognizable as they didn’t
match up with earlier threats. As per the research report, “Zero-day threats can also
exploit zero-day vulnerabilities, or previously unknown security deficiencies that
software vendors have not yet patched.” In March 2011, unknown attackers unleashed
the zero-day attack on RSA Company by infiltrating its servers and stealing sensitive
information.
Preventive measure:
Run security scan on a regular basis to detect and remove the latest threats.


2.       Working outside the firewall

Workplace has become mobile now and has provided opportunity to employees to
access their mails from outside – be it airports, hotels, cafes, or home. This access has
created an unsecured network. Cyber criminals can exploit such vulnerable networks to
push malicious software and spam through Conficker worm.
Preventive measure:
Keep your operating system up-to-date by installing the latest patches.
3.       The unpatched PC

As per the whitepaper, “One small unpatched vulnerability in an application, browser or
operating system can lead to huge problems.” Hackers invade such unpatched
computers with Conficker worms and instruct infected PCs to transmit valuable
information like financial account credentials.
Preventive measure:
Download and install all the latest patches on your computer. According to a Gartner
report, “90% of successful attacks against software vulnerabilities could have been
prevented with an existing patch or configuration setting.”


4.       The uncontrolled application

Many of our favorite personal applications like instant messaging (IM), social networking
sites, peer-to-peer (P2P) clients, voice over IP (VoIP) and games, brings unacceptable
risk or performance issues. As per the research, in 2010, the U.S. Federal Trade
Commission sent letters to almost 100 organizations whose personal information,
including sensitive data about customers and employees, had leaked onto P2P
networks.
Preventive measure:
You can disallow the permission to install unwanted applications.


5.       Web insecurity

One may visit some inappropriate sites, knowingly or unknowingly. These sites often
redirects to sites hosting fake antivirus programs also known as scareware. Infection
can even be spread from a compromised reputable site through browser plug-ins.
Preventive measure:
Use URL filtering mechanism to block all those sites know to host malware like porn,
hate, and gaming sites.
6.       The lost laptop

The difficult thing in a lost laptop is to recover exposed information. In a study
conducted for Intel in 2009, it was found that a single lost or stolen laptop could cost
approximately $50,000 to its owner.
Preventive measure:
Data encryption is the remedy to be used on all laptops and removable storage devices.


7.       Misdirected e-mail

One typo error can send your important documents and confidential data to a wrong e-
mail id. This information can be exploited by criminals for organizing identity thefts.
Preventive measure:
You can ensure that files are encrypted before transferring through e-mails so as to
prevent any damage. You can also use data loss prevention software to warn the
recipient user or block the file transfer.


8.       The infected USB device

USB device bypass your computer’s firewall protection and could be a source of
malicious software.
Preventive measure:
Verify the authenticity of thumb drives and CD before using them. Such removable
media may be contaminated with malware. You can also use software that allows read-
only access to such devices.
Conclusion
The best defense is use an endpoint protection solution that provides multiple layers of
protection, including live antivirus, behavior-based detection, web protection, application
control, patch assessment, network access control, data encryption, data loss
prevention, and device control.

Weitere ähnliche Inhalte

Was ist angesagt?

Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attackMark Silver
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeAaron White
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measuresDnyaneshwar Beedkar
 
Computer security overview
Computer security overviewComputer security overview
Computer security overviewCAS
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpointArifa Ali
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
Malware in penetration testing 1
Malware in penetration testing 1Malware in penetration testing 1
Malware in penetration testing 1Arbab Usmani
 
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hackerDan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hackerDan Vasile
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanismCAS
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESShyam Kumar Singh
 

Was ist angesagt? (20)

Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
It
ItIt
It
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat Landscape
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Hacking
HackingHacking
Hacking
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
Malicious malware breaches - eScan
Malicious malware breaches - eScanMalicious malware breaches - eScan
Malicious malware breaches - eScan
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Computer security
Computer securityComputer security
Computer security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cyber Security Terms
Cyber Security TermsCyber Security Terms
Cyber Security Terms
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Malware in penetration testing 1
Malware in penetration testing 1Malware in penetration testing 1
Malware in penetration testing 1
 
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hackerDan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 

Andere mochten auch

8.začleňˆování signálu pcm 4
8.začleňˆování signálu pcm 48.začleňˆování signálu pcm 4
8.začleňˆování signálu pcm 4olc_user
 
8 tips for gas safety in your home
8 tips for gas safety in your home8 tips for gas safety in your home
8 tips for gas safety in your homediatontonometer
 
8 x 10 Frame Tent Installation Instructions
8 x 10 Frame Tent Installation Instructions8 x 10 Frame Tent Installation Instructions
8 x 10 Frame Tent Installation Instructionscelinatent
 
8 ways to change the world ( English)
8 ways to change the world ( English)8 ways to change the world ( English)
8 ways to change the world ( English)endpoverty2015
 
8 w souffriau - automatische beslissingsondersteuning in toerisme
8   w souffriau - automatische beslissingsondersteuning in toerisme8   w souffriau - automatische beslissingsondersteuning in toerisme
8 w souffriau - automatische beslissingsondersteuning in toerismeresearch4geomatica
 
Web осень 2012 лекция 8
Web осень 2012 лекция 8Web осень 2012 лекция 8
Web осень 2012 лекция 8Technopark
 
8vo curso
8vo curso8vo curso
8vo cursoUNEMI
 
8) what is survey research
8) what is survey research8) what is survey research
8) what is survey researchSyed Osama Rizvi
 
8 weight loos tips
8 weight loos tips8 weight loos tips
8 weight loos tipsDrSchlaf
 

Andere mochten auch (12)

8.začleňˆování signálu pcm 4
8.začleňˆování signálu pcm 48.začleňˆování signálu pcm 4
8.začleňˆování signálu pcm 4
 
8 tips for gas safety in your home
8 tips for gas safety in your home8 tips for gas safety in your home
8 tips for gas safety in your home
 
8 x 10 Frame Tent Installation Instructions
8 x 10 Frame Tent Installation Instructions8 x 10 Frame Tent Installation Instructions
8 x 10 Frame Tent Installation Instructions
 
8 tips 8minutes
8 tips 8minutes8 tips 8minutes
8 tips 8minutes
 
8. uso de you tube
8. uso de you tube8. uso de you tube
8. uso de you tube
 
8 ways to change the world ( English)
8 ways to change the world ( English)8 ways to change the world ( English)
8 ways to change the world ( English)
 
8 w souffriau - automatische beslissingsondersteuning in toerisme
8   w souffriau - automatische beslissingsondersteuning in toerisme8   w souffriau - automatische beslissingsondersteuning in toerisme
8 w souffriau - automatische beslissingsondersteuning in toerisme
 
8 Tarot Card Readings for 2016
8 Tarot Card Readings for 20168 Tarot Card Readings for 2016
8 Tarot Card Readings for 2016
 
Web осень 2012 лекция 8
Web осень 2012 лекция 8Web осень 2012 лекция 8
Web осень 2012 лекция 8
 
8vo curso
8vo curso8vo curso
8vo curso
 
8) what is survey research
8) what is survey research8) what is survey research
8) what is survey research
 
8 weight loos tips
8 weight loos tips8 weight loos tips
8 weight loos tips
 

Ähnlich wie 8 threats that even antivirus cannot catch

Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays worldSibghatullah Khattak
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdfPavelVtek3
 
Ethical hacking.docx
Ethical hacking.docxEthical hacking.docx
Ethical hacking.docxHabeebUllah10
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesAlireza Ghahrood
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsConnecting Up
 
Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0mobileironmarketing
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpointgalaxy201
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfSoo Chin Hock
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]AngelGomezRomero
 

Ähnlich wie 8 threats that even antivirus cannot catch (20)

Information security
Information securityInformation security
Information security
 
Network monitoring white paper
Network monitoring white paperNetwork monitoring white paper
Network monitoring white paper
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
C3
C3C3
C3
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Ethical hacking.docx
Ethical hacking.docxEthical hacking.docx
Ethical hacking.docx
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 
Cn35499502
Cn35499502Cn35499502
Cn35499502
 
Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
M
MM
M
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 
Internet security
Internet securityInternet security
Internet security
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
 
Data security
 Data security  Data security
Data security
 
Hamza
HamzaHamza
Hamza
 

Mehr von iYogi

Commoditization of technology
Commoditization of technologyCommoditization of technology
Commoditization of technologyiYogi
 
Benjamin Franklin Effect – The Ultimate Way to Get Customers to Like You
Benjamin Franklin Effect – The Ultimate Way to Get Customers to Like YouBenjamin Franklin Effect – The Ultimate Way to Get Customers to Like You
Benjamin Franklin Effect – The Ultimate Way to Get Customers to Like YouiYogi
 
Jimmy wales ppt
Jimmy wales pptJimmy wales ppt
Jimmy wales pptiYogi
 
8 steps to smartphone security for android
8 steps to smartphone security for android8 steps to smartphone security for android
8 steps to smartphone security for androidiYogi
 
6 steps to being a top influencer on linked in
6 steps to being a top influencer on linked in6 steps to being a top influencer on linked in
6 steps to being a top influencer on linked iniYogi
 
iYogi reviews via art elaine
iYogi reviews via art  elaineiYogi reviews via art  elaine
iYogi reviews via art elaineiYogi
 
Worldwideweb
WorldwidewebWorldwideweb
WorldwidewebiYogi
 
iYogi Wow Tech Facts: TYPEWRITER
iYogi Wow Tech Facts: TYPEWRITERiYogi Wow Tech Facts: TYPEWRITER
iYogi Wow Tech Facts: TYPEWRITERiYogi
 
Worm
WormWorm
WormiYogi
 
iYogi review by lynn c
iYogi review by lynn ciYogi review by lynn c
iYogi review by lynn ciYogi
 
iYogi reviews via art by marilyn b
iYogi reviews via art by marilyn biYogi reviews via art by marilyn b
iYogi reviews via art by marilyn biYogi
 
Electronic brains
Electronic brainsElectronic brains
Electronic brainsiYogi
 
iYogi reviews via art: Leslie c
iYogi reviews via art: Leslie ciYogi reviews via art: Leslie c
iYogi reviews via art: Leslie ciYogi
 
iYogi review by peggy l
iYogi review by peggy liYogi review by peggy l
iYogi review by peggy liYogi
 
iYogi review by Sandy w
iYogi review by Sandy wiYogi review by Sandy w
iYogi review by Sandy wiYogi
 
Dianna l
Dianna lDianna l
Dianna liYogi
 
iYogi customer review
iYogi customer reviewiYogi customer review
iYogi customer reviewiYogi
 
Customer feedback 1
Customer feedback 1Customer feedback 1
Customer feedback 1iYogi
 
Fathers of Technology
Fathers of TechnologyFathers of Technology
Fathers of TechnologyiYogi
 
Consumer Adoption Of Freemium Products And Services - iYogi
Consumer Adoption Of Freemium Products And Services - iYogiConsumer Adoption Of Freemium Products And Services - iYogi
Consumer Adoption Of Freemium Products And Services - iYogiiYogi
 

Mehr von iYogi (20)

Commoditization of technology
Commoditization of technologyCommoditization of technology
Commoditization of technology
 
Benjamin Franklin Effect – The Ultimate Way to Get Customers to Like You
Benjamin Franklin Effect – The Ultimate Way to Get Customers to Like YouBenjamin Franklin Effect – The Ultimate Way to Get Customers to Like You
Benjamin Franklin Effect – The Ultimate Way to Get Customers to Like You
 
Jimmy wales ppt
Jimmy wales pptJimmy wales ppt
Jimmy wales ppt
 
8 steps to smartphone security for android
8 steps to smartphone security for android8 steps to smartphone security for android
8 steps to smartphone security for android
 
6 steps to being a top influencer on linked in
6 steps to being a top influencer on linked in6 steps to being a top influencer on linked in
6 steps to being a top influencer on linked in
 
iYogi reviews via art elaine
iYogi reviews via art  elaineiYogi reviews via art  elaine
iYogi reviews via art elaine
 
Worldwideweb
WorldwidewebWorldwideweb
Worldwideweb
 
iYogi Wow Tech Facts: TYPEWRITER
iYogi Wow Tech Facts: TYPEWRITERiYogi Wow Tech Facts: TYPEWRITER
iYogi Wow Tech Facts: TYPEWRITER
 
Worm
WormWorm
Worm
 
iYogi review by lynn c
iYogi review by lynn ciYogi review by lynn c
iYogi review by lynn c
 
iYogi reviews via art by marilyn b
iYogi reviews via art by marilyn biYogi reviews via art by marilyn b
iYogi reviews via art by marilyn b
 
Electronic brains
Electronic brainsElectronic brains
Electronic brains
 
iYogi reviews via art: Leslie c
iYogi reviews via art: Leslie ciYogi reviews via art: Leslie c
iYogi reviews via art: Leslie c
 
iYogi review by peggy l
iYogi review by peggy liYogi review by peggy l
iYogi review by peggy l
 
iYogi review by Sandy w
iYogi review by Sandy wiYogi review by Sandy w
iYogi review by Sandy w
 
Dianna l
Dianna lDianna l
Dianna l
 
iYogi customer review
iYogi customer reviewiYogi customer review
iYogi customer review
 
Customer feedback 1
Customer feedback 1Customer feedback 1
Customer feedback 1
 
Fathers of Technology
Fathers of TechnologyFathers of Technology
Fathers of Technology
 
Consumer Adoption Of Freemium Products And Services - iYogi
Consumer Adoption Of Freemium Products And Services - iYogiConsumer Adoption Of Freemium Products And Services - iYogi
Consumer Adoption Of Freemium Products And Services - iYogi
 

Kürzlich hochgeladen

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

8 threats that even antivirus cannot catch

  • 1. 8 threats that even antivirus cannot catch
  • 2. Malware attacks and data thefts are on the rise as evident from the recent news headlines. The mere use of antivirus software wouldn’t serve the purpose. The reason being, antivirus programs block attacks by using patterns or signatures to identify malicious software code. This signature-based detection was successful when the threats were lesser and spread over a good time frame. Relying entirely on antivirus solutions will not serve the purpose now because your system is exposed to threats in routine situations. The whitepaper published by John Metzger, Senior Product Marketing Manager, and Jonathan Shaw, Product Manager at Sophos highlights eight everyday threats in which we need to update the protection of our PC beyond traditional antivirus program. Let us look at them and understand their implications: 1. The zero-day threat Zero-day threats are those malware threats that are not recognizable as they didn’t match up with earlier threats. As per the research report, “Zero-day threats can also exploit zero-day vulnerabilities, or previously unknown security deficiencies that software vendors have not yet patched.” In March 2011, unknown attackers unleashed the zero-day attack on RSA Company by infiltrating its servers and stealing sensitive information. Preventive measure: Run security scan on a regular basis to detect and remove the latest threats. 2. Working outside the firewall Workplace has become mobile now and has provided opportunity to employees to access their mails from outside – be it airports, hotels, cafes, or home. This access has created an unsecured network. Cyber criminals can exploit such vulnerable networks to push malicious software and spam through Conficker worm. Preventive measure: Keep your operating system up-to-date by installing the latest patches.
  • 3. 3. The unpatched PC As per the whitepaper, “One small unpatched vulnerability in an application, browser or operating system can lead to huge problems.” Hackers invade such unpatched computers with Conficker worms and instruct infected PCs to transmit valuable information like financial account credentials. Preventive measure: Download and install all the latest patches on your computer. According to a Gartner report, “90% of successful attacks against software vulnerabilities could have been prevented with an existing patch or configuration setting.” 4. The uncontrolled application Many of our favorite personal applications like instant messaging (IM), social networking sites, peer-to-peer (P2P) clients, voice over IP (VoIP) and games, brings unacceptable risk or performance issues. As per the research, in 2010, the U.S. Federal Trade Commission sent letters to almost 100 organizations whose personal information, including sensitive data about customers and employees, had leaked onto P2P networks. Preventive measure: You can disallow the permission to install unwanted applications. 5. Web insecurity One may visit some inappropriate sites, knowingly or unknowingly. These sites often redirects to sites hosting fake antivirus programs also known as scareware. Infection can even be spread from a compromised reputable site through browser plug-ins. Preventive measure: Use URL filtering mechanism to block all those sites know to host malware like porn, hate, and gaming sites.
  • 4. 6. The lost laptop The difficult thing in a lost laptop is to recover exposed information. In a study conducted for Intel in 2009, it was found that a single lost or stolen laptop could cost approximately $50,000 to its owner. Preventive measure: Data encryption is the remedy to be used on all laptops and removable storage devices. 7. Misdirected e-mail One typo error can send your important documents and confidential data to a wrong e- mail id. This information can be exploited by criminals for organizing identity thefts. Preventive measure: You can ensure that files are encrypted before transferring through e-mails so as to prevent any damage. You can also use data loss prevention software to warn the recipient user or block the file transfer. 8. The infected USB device USB device bypass your computer’s firewall protection and could be a source of malicious software. Preventive measure: Verify the authenticity of thumb drives and CD before using them. Such removable media may be contaminated with malware. You can also use software that allows read- only access to such devices. Conclusion The best defense is use an endpoint protection solution that provides multiple layers of protection, including live antivirus, behavior-based detection, web protection, application control, patch assessment, network access control, data encryption, data loss prevention, and device control.