This presentation discusses how money has become the leading motivator for cybercriminals to spread malware. From social media to SEO, malware is spreading at a faster rate every year. Learn more and find out what you can do to protect yourself and your data.
For more on the Money Behind Malware, visit: http://bit.ly/VnDhv4
6. Koobface
What is it capable of?
Steal software keys
Upload stored
passwords
Web server/DNS proxy
Search hijacking (PPC)
CAPTCHA busting
Fake AV
Social network spam bot
24. Complete Security
Endpoint Web Email Data Mobile Network
Reduce attack surface Protect everywhere Stop attacks and breaches Keep people working
URL Filtering Web Application Endpoint Web Encryption Data Control Access control Automation WiFi security
Firewall Protection for cloud
Anti-spam Patch Manager Mobile Control Virtualization Anti-malware User education Visibility Local self-help
Application Mobile app Clean up Technical
Device Control Secure branch Intrusion Firewall
Control security support
offices prevention
Encryption Live Protection Email
encryption
24
25. Why you’re safer in our world
You’ll get better threat and data protection more simply, and more cost effectively
• Complete security that works better together
• Defense in depth you can actually deploy
You’ll also see the benefits of consolidating your security vendors:
Consolidated licensing costs
One trusted partner for support
Complete Without Active
Security Complexity Protection
25
26. Latest News http://nakedsecurity.sophos.com
Podcasts http://podcasts.sophos.com
Security Hub http://www.sophos.com/security
@chetwisniewski on Twitter
Contact me
chesterw@sophos.com
App.net/chester
Chester Wisniewski on G+
27. Staying ahead of the curve
US and Canada
1-866-866-2802
NASales@sophos.com
UK and Worldwide
+ 44 1235 55 9933
Sales@sophos.com
http://www.sophos.com/en-us/security-news-
trends/security-trends/money-behind-
malware-threats.aspx
Hinweis der Redaktion
PARTNERKA is a slang word known to a group of internet “professionals” and is short for “partner network” or in plain English – Russian Internet Affiliate Network
Complete security means we don’t just detect threats, we:Reduce the attack surface – We address the things that bring risk like vulnerabilities and applications.Protect everywhere – We make sure your users are protected wherever they are and whatever device they’re using.Stop attacks and breaches – Of course we can detect and prevent threats and data loss. But we’ve moved beyond signatures with innovations like live protection, which means we can stop new threats instantly.Crucially, we Keep people working – Both your users and the IT team. We engineer our products to simplify the tasks that take too much time today, like cleaning up infections and recovering forgotten passwords. So, as the threat and the ways that we use IT for work evolve, so does your protection. We stay on top of them, to simply give you all you need to stay secure. We engineer our products to work better together. And we look for opportunities to unify endpoint agents, gateway defenses, security policies and intelligence so it’s even easier.Agents – for every device, combining security to maximise protection and performanceAt the Gateway – virtual or hardware appliances and software options that match your protection priorities and sizeThroughPolicies - We let you create a policy once, and apply it anywhere to give you consistent protection and user experienceFrom our Labs - our experts have visibility of all aspects of security threats and use that expertise to actively fine-tune your protection for you and deliver instantly from the cloud
We hope you can see how complete security helps you at every point in the the threat lifecycle. And is engineered so you can actually use it. But there are other advantages too, like multi product discounts and unrivalled technical support from a single point.