SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Looking Back: 20 Years of Malware Evolution
MALWARE EVOLUTION
THE SCALE OF THE THREAT
1
NEW VIRUS
EVERY HOUR
1994
1
NEW VIRUS
EVERY MINUTE
2006
1
NEW VIRUS
EVERY SECOND
2011
310,000
NEW SAMPLES
EVERY DAY
2016
The evolving threat landscape2
Main Figures and Statistics
IT THREAT EVOLUTION: Q1 2016
MAIN STATISTICS Q1 2016
4
Kaspersky Lab solutions repelled 228,420,754 attacks launched from online resources
located all over the world.
74,001,808 unique URLs were recognized as malicious by web antivirus components.
Crypto ransomware attacks were blocked on 372,602 computers of unique users.
Kaspersky Lab mobile security products detected:
2,045,323 installation packages
4,146 new malicious ransomware trojans
2,896 mobile banking Trojans
VULNERABLE APPLICATIONS USED BY
CYBERCRIMINALS
5
The top position in the Q1 2015 rankings was occupied by
the Browsers category (64%), which includes exploits
targeting Web Browsers. This category was also at the top
of the rankings in the last three quarters of 2015.
In Q1 2016, exploits for Adobe Flash Player remained
popular. During the reporting period two new
vulnerabilities in this software were detected:
CVE-2015-8651
CVE-2016-1001
The first exploit pack to add support for these
vulnerabilities was Angler.
One notable event in the first quarter was the use of an
exploit for Silverlight - CVE-2016-0034. At the time of
publication, this vulnerability is used by the Angler and
RIG exploit packs.
Main Figures and Statistics
MOBILE THREATS: Q1 2016
MOBILE THREATS – MAIN STATISTICS Q1 2016
7
Kaspersky Lab detected 2,045,323 malicious installation packages – this is 11 times greater
than in Q4 2015, and 1.2 times more than in Q3 2015.
MOBILE THREATS – MAIN STATISTICS Q1 2016
8
In Q1 2016, adware programs continued to top the rating of detected malicious objects for mobile
devices. The share of adware programs grew 13 p.p. compared to Q4 2015, and reached 42.7%.
Notably, this is lower than in Q3 2015 (52.5%).
MOBILE BANKING TROJANS
9
Over the reporting period, we detected 4,146 mobile banking Trojans, which is 1.7 times more
than in the previous quarter. (percentage of all users attacked)
Current Topics
MALWARE INCIDENTS
11
KASPERSKY SECURITY FOR MOBILE
Proactieve beveiligings-, beheer- en controlelagen voor mobiele endpoints
Mobile Security
• Meerlaagse
anti-malware
• Web Protection
• Detectie van
rooting/jailbreak
Mobile Device
Management
• Exchange
ActiveSync
• iOS MDM
• Samsung KNOX
Mobile Application
Management
• App wrapping
• App Control
• Selective Wipe
Diefstalbescherming
• Vergrendelen/wissen
• Opsporen/Waarschu-
wen/Foto
• SIM Watch
Self Service Portal
• BYOD mogelijk
• Certificaten ophalen
• Diefstalbescherming
Gecentraliseerd beheer
• Alle grote mobiele
platforms
• Andere IT-
beveiligingsdomeinen
RANSOMWARE – PROBLEM OF THE YEAR?
12
2016 has only just got underway, but the first three months have already seen the same amount of
cyber-security events that just a few years ago would have seemed normal for a whole year. The main
underlying trends remained the same, while there was significant growth in trends related to
traditional cybercrime, especially mobile threats and global ransomware epidemics.
Ransomware became the main theme of the quarter after knocking targeted attacks from the top of
the most popular threat rating. Unfortunately, this is a situation that will continue to evolve, and those
behind the extortion could well end up being named "problem of the year".
RANSOMWARE
13
The overall number of encryptor modifications in our Virus Collection to date is at least 15,000.
Nine new encryptor families and 2,900 new modifications were detected in Q1.
In Q1 2016, 372,602 unique users were attacked by encryptors, which is 30% more than in the
previous quarter. Approximately 17% of those attacked were in the corporate sector.
Number of ransomware samples in our collection Number of users attacked by ransomware
14
APPLICATION CONTROL - WHITELISTING
Application
Startup Control
Application
Privilege Control
Controle op
vulnerability
Gedrags-
analyse
CLOUD
Whitelists
Lokale
Whitelists
TELEWERKEN
15
Organisaties die telewerken toestaan, behoren een beleid uit te vaardigen dat de
voorwaarden en beperkingen definieert voor het telewerken.
Device
Control
Application
Control
Web
Control
BEHANDELEN VAN MEDIA
16
Uw organisatie dient procedures te hebben voor het beheer van verwijderbare media
waarop persoonsgegevens worden opgeslagen en die de beveiligingsperimeter van uw
organisatie kunnen verlaten. Denk hierbij ook aan de verwijderbare media in apparatuur
zoals multifunctionele printers en copiers.
Uw organisatie moet de nodige maatregelen bepalen om fysieke media (inclusief papieren
documenten) die persoonsgegevens bevatten tijdens het transport te beschermen tegen
onbevoegde toegang, misbruik of corruptie.
BESCHERMING TEGEN MALWARE
17
Ter bescherming tegen malware (voorkomen, ontdekken en verwijderen/herstellen) behoort
uw informaticadienst anti-malware en herstelsoftware te installeren en regelmatig te
updaten, waarbij computers en media als voorzorgsmaatregel of routematig worden
gescand.
De uitgevoerde scan behoort onder meer:
alle bestanden die via netwerken of via elke vorm van opslagmedium zijn ontvangen, vóór
gebruik op malware te scannen; bijlagen en downloads vóór gebruik. Op malware te
scannen en dit op verschillende cruciale plaatsen in uw netwerkconfiguratie (mailservers,
computers, netwerktoegang...);internetpagina’s op malware te scannen. Nauwkeurige en
informatieve waarschuwingsberichten in het geval van een reële bedreiging kunnen het
bewustzijn van de gebruikers vergroten
MOST TESTED. MOST AWARDED. KASPERSKY LAB PROTECTION.*
18
0%
20%
40%
60%
80%
100%
20 40 60 80 100
N of independent tests/reviews
ScoreofTOP3places
Bitdefender
Sophos
G DATA
Symantec
F-Secure Intel Security (McAfee)
Trend Micro
Avira
Avast
AVG
ESET
Quick Heal
Microsoft
Panda Security
In 2015 Kaspersky Lab products participated in 94
independent tests and reviews. Our products were
awarded 60 firsts and achieved 77 top-three finishes.
Kaspersky Lab
1st places – 60
Participation in 94
tests/reviews
TOP 3 = 82%
BullGuard
* Notes:
• According to summary results of independent tests
in 2015 for corporate, consumer and mobile
products.
• Summary includes independent tests conducted by :
AV-Comparatives, AV-Test, Dennis Technology
Labs, MRG Effitas, NSS Labs, PC Security Labs,
VirusBulletin.
• Tests performed in these programs assess all
protection technologies against known, unknown
and advanced threats.
• The size of the bubble reflects the number of 1st
places achieved.
19
IN DETAIL
WebCollaboration MailTOTAL
Vulnerability
Assesment
Inventories &
License Control
Software
Distribution Patch Management OS Deployment
Data Protection / Encryptie
ADVANCED
Mobile Application
Management
Mobile
Device Management
Device
Control
Application
Control
Web
Control
Beveiliging van file servers
Mobile Endpoint
Security
SELECT
Anti-malware + firewall
Kaspersky
Security
Center
CORE
Cloudondersteuning via het
Kaspersky Security Network (KSN) Endpoint Management Infrastructuur

Weitere ähnliche Inhalte

Was ist angesagt?

Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
galaxy201
 
Whitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6ppWhitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6pp
Eric Zhuo
 
State of Application Security: State of Piracy
State of Application Security: State of PiracyState of Application Security: State of Piracy
State of Application Security: State of Piracy
IBM Security
 
Kaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
Kaseya Connect 2011 - Malwarebytes - Marcin KleczynskiKaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
Kaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
Kaseya
 
Ibm risk management-30min
Ibm risk management-30minIbm risk management-30min
Ibm risk management-30min
Kim Aarenstrup
 
Spyware And Anti Virus Software Presentation
Spyware And Anti Virus Software PresentationSpyware And Anti Virus Software Presentation
Spyware And Anti Virus Software Presentation
amy.covington215944
 

Was ist angesagt? (20)

Madam synopis
Madam synopisMadam synopis
Madam synopis
 
INTSUM
INTSUMINTSUM
INTSUM
 
Continuous Monitoring for Web Application Security
Continuous Monitoring for Web Application SecurityContinuous Monitoring for Web Application Security
Continuous Monitoring for Web Application Security
 
Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...
Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...
Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...
 
Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.
 
Essentials of Web Application Security: what it is, why it matters and how to...
Essentials of Web Application Security: what it is, why it matters and how to...Essentials of Web Application Security: what it is, why it matters and how to...
Essentials of Web Application Security: what it is, why it matters and how to...
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Lookout pegasus-android-technical-analysis
Lookout pegasus-android-technical-analysisLookout pegasus-android-technical-analysis
Lookout pegasus-android-technical-analysis
 
160415 lan and-wan-ctap
160415 lan and-wan-ctap160415 lan and-wan-ctap
160415 lan and-wan-ctap
 
Whitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6ppWhitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6pp
 
State of Application Security: State of Piracy
State of Application Security: State of PiracyState of Application Security: State of Piracy
State of Application Security: State of Piracy
 
Spyware
SpywareSpyware
Spyware
 
DEFINING A SPYWARE
DEFINING A SPYWAREDEFINING A SPYWARE
DEFINING A SPYWARE
 
Kaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
Kaseya Connect 2011 - Malwarebytes - Marcin KleczynskiKaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
Kaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
 
Ibm risk management-30min
Ibm risk management-30minIbm risk management-30min
Ibm risk management-30min
 
Understanding Advanced Threats and How to Prevent Them
Understanding Advanced Threats and How to Prevent ThemUnderstanding Advanced Threats and How to Prevent Them
Understanding Advanced Threats and How to Prevent Them
 
Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting Malware
 
Building an Android Scale Incident Response Process
Building an Android Scale Incident Response ProcessBuilding an Android Scale Incident Response Process
Building an Android Scale Incident Response Process
 
Spyware And Anti Virus Software Presentation
Spyware And Anti Virus Software PresentationSpyware And Anti Virus Software Presentation
Spyware And Anti Virus Software Presentation
 
Zero-Day Vulnerability and Heuristic Analysis
Zero-Day Vulnerability and Heuristic AnalysisZero-Day Vulnerability and Heuristic Analysis
Zero-Day Vulnerability and Heuristic Analysis
 

Andere mochten auch

De boche in Leopold III (P-Magazine)
De boche in Leopold III (P-Magazine)De boche in Leopold III (P-Magazine)
De boche in Leopold III (P-Magazine)
Thierry Debels
 
A Short Introduction To Seattle
A Short Introduction To SeattleA Short Introduction To Seattle
A Short Introduction To Seattle
Howard Creech
 

Andere mochten auch (18)

Eurostat study on the long-term budgetary implications of pension costs
Eurostat study on the long-term budgetary implications of pension costsEurostat study on the long-term budgetary implications of pension costs
Eurostat study on the long-term budgetary implications of pension costs
 
ホリデーシーズンウェビナーQ&A
ホリデーシーズンウェビナーQ&AホリデーシーズンウェビナーQ&A
ホリデーシーズンウェビナーQ&A
 
Bang xs kch
Bang xs kchBang xs kch
Bang xs kch
 
De boche in Leopold III (P-Magazine)
De boche in Leopold III (P-Magazine)De boche in Leopold III (P-Magazine)
De boche in Leopold III (P-Magazine)
 
わかる中級英文法 Grammar in Use Unit 96 ing ed系の形容詞
わかる中級英文法 Grammar in Use Unit 96 ing ed系の形容詞わかる中級英文法 Grammar in Use Unit 96 ing ed系の形容詞
わかる中級英文法 Grammar in Use Unit 96 ing ed系の形容詞
 
Segundo relatório anual sobre incidentes de segurança em redes de automação ...
Segundo relatório anual sobre incidentes de segurança em redes  de automação ...Segundo relatório anual sobre incidentes de segurança em redes  de automação ...
Segundo relatório anual sobre incidentes de segurança em redes de automação ...
 
Inside forti os-v524-r5
Inside forti os-v524-r5Inside forti os-v524-r5
Inside forti os-v524-r5
 
Quick Study for SY0-401 CompTIA Security+ Certification Exam with Practice
Quick Study for SY0-401 CompTIA Security+ Certification Exam with PracticeQuick Study for SY0-401 CompTIA Security+ Certification Exam with Practice
Quick Study for SY0-401 CompTIA Security+ Certification Exam with Practice
 
A Short Introduction To Seattle
A Short Introduction To SeattleA Short Introduction To Seattle
A Short Introduction To Seattle
 
Attract Top International Clients and Scale Your Business
Attract Top International Clients and Scale Your BusinessAttract Top International Clients and Scale Your Business
Attract Top International Clients and Scale Your Business
 
SMB Guide-to-Ransomware
SMB Guide-to-RansomwareSMB Guide-to-Ransomware
SMB Guide-to-Ransomware
 
Sophos Day Belgium - The IT Threat Landscape and what to look out for
Sophos Day Belgium - The IT Threat Landscape and what to look out forSophos Day Belgium - The IT Threat Landscape and what to look out for
Sophos Day Belgium - The IT Threat Landscape and what to look out for
 
Payoneer&马帮在线分享会 - ERP令您的电商之路更轻松!
Payoneer&马帮在线分享会 - ERP令您的电商之路更轻松!Payoneer&马帮在线分享会 - ERP令您的电商之路更轻松!
Payoneer&马帮在线分享会 - ERP令您的电商之路更轻松!
 
わかる英文法 Grammar in Use Unit 25 can, could
わかる英文法 Grammar in Use Unit 25 can, couldわかる英文法 Grammar in Use Unit 25 can, could
わかる英文法 Grammar in Use Unit 25 can, could
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT security
 
What To Do with Employee Engagement Survey Results - Change Them
What To Do with Employee Engagement Survey Results - Change ThemWhat To Do with Employee Engagement Survey Results - Change Them
What To Do with Employee Engagement Survey Results - Change Them
 
Alphorm.com Formation Sophos UTM
Alphorm.com Formation Sophos UTMAlphorm.com Formation Sophos UTM
Alphorm.com Formation Sophos UTM
 
Employee engagement by vinay ravindran (www.vinayravindran.com)
Employee engagement by vinay ravindran (www.vinayravindran.com)Employee engagement by vinay ravindran (www.vinayravindran.com)
Employee engagement by vinay ravindran (www.vinayravindran.com)
 

Ähnlich wie IMPAKT: Verdediging aangaan t.o.v. (on)bekende ransomware:

Key Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your EnterpriseKey Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your Enterprise
Lumension
 
Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...
Deb Birch
 

Ähnlich wie IMPAKT: Verdediging aangaan t.o.v. (on)bekende ransomware: (20)

2016 Trends in Security
2016 Trends in Security 2016 Trends in Security
2016 Trends in Security
 
En msft-scrty-cntnt-e book-cybersecurity
En msft-scrty-cntnt-e book-cybersecurityEn msft-scrty-cntnt-e book-cybersecurity
En msft-scrty-cntnt-e book-cybersecurity
 
The Modern Malware Review March 2013
The Modern Malware Review March 2013The Modern Malware Review March 2013
The Modern Malware Review March 2013
 
The modern-malware-review-march-2013
The modern-malware-review-march-2013 The modern-malware-review-march-2013
The modern-malware-review-march-2013
 
Security O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionSecurity O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat Protection
 
Malware evolution and Endpoint Detection and Response
Malware evolution and Endpoint Detection and Response Malware evolution and Endpoint Detection and Response
Malware evolution and Endpoint Detection and Response
 
Malware evolution and Endpoint Detection and Response Technology
Malware evolution and Endpoint Detection and Response  TechnologyMalware evolution and Endpoint Detection and Response  Technology
Malware evolution and Endpoint Detection and Response Technology
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.
 
Key Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your EnterpriseKey Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your Enterprise
 
Advanced Endpoint Protection
Advanced Endpoint ProtectionAdvanced Endpoint Protection
Advanced Endpoint Protection
 
INSECURE Magazine - 37
INSECURE Magazine - 37INSECURE Magazine - 37
INSECURE Magazine - 37
 
Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...
 
AppTrana SECaaS (Security as a Service)
AppTrana SECaaS (Security as a Service)AppTrana SECaaS (Security as a Service)
AppTrana SECaaS (Security as a Service)
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security report
 
Check point 2015-securityreport
Check point 2015-securityreportCheck point 2015-securityreport
Check point 2015-securityreport
 
Unified application security analyser
Unified application security analyserUnified application security analyser
Unified application security analyser
 
Panda Security - Adaptive Defense
Panda Security - Adaptive DefensePanda Security - Adaptive Defense
Panda Security - Adaptive Defense
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
Michael andersson - att ligga steget före in en allt mer hotfylld värld BC14
Michael andersson - att ligga steget före in en allt mer hotfylld värld BC14Michael andersson - att ligga steget före in en allt mer hotfylld värld BC14
Michael andersson - att ligga steget före in en allt mer hotfylld värld BC14
 
Bitdefender mobile security for android
Bitdefender mobile security for androidBitdefender mobile security for android
Bitdefender mobile security for android
 

Kürzlich hochgeladen

6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 

Kürzlich hochgeladen (20)

𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
 
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 

IMPAKT: Verdediging aangaan t.o.v. (on)bekende ransomware:

  • 1. Looking Back: 20 Years of Malware Evolution MALWARE EVOLUTION
  • 2. THE SCALE OF THE THREAT 1 NEW VIRUS EVERY HOUR 1994 1 NEW VIRUS EVERY MINUTE 2006 1 NEW VIRUS EVERY SECOND 2011 310,000 NEW SAMPLES EVERY DAY 2016 The evolving threat landscape2
  • 3. Main Figures and Statistics IT THREAT EVOLUTION: Q1 2016
  • 4. MAIN STATISTICS Q1 2016 4 Kaspersky Lab solutions repelled 228,420,754 attacks launched from online resources located all over the world. 74,001,808 unique URLs were recognized as malicious by web antivirus components. Crypto ransomware attacks were blocked on 372,602 computers of unique users. Kaspersky Lab mobile security products detected: 2,045,323 installation packages 4,146 new malicious ransomware trojans 2,896 mobile banking Trojans
  • 5. VULNERABLE APPLICATIONS USED BY CYBERCRIMINALS 5 The top position in the Q1 2015 rankings was occupied by the Browsers category (64%), which includes exploits targeting Web Browsers. This category was also at the top of the rankings in the last three quarters of 2015. In Q1 2016, exploits for Adobe Flash Player remained popular. During the reporting period two new vulnerabilities in this software were detected: CVE-2015-8651 CVE-2016-1001 The first exploit pack to add support for these vulnerabilities was Angler. One notable event in the first quarter was the use of an exploit for Silverlight - CVE-2016-0034. At the time of publication, this vulnerability is used by the Angler and RIG exploit packs.
  • 6. Main Figures and Statistics MOBILE THREATS: Q1 2016
  • 7. MOBILE THREATS – MAIN STATISTICS Q1 2016 7 Kaspersky Lab detected 2,045,323 malicious installation packages – this is 11 times greater than in Q4 2015, and 1.2 times more than in Q3 2015.
  • 8. MOBILE THREATS – MAIN STATISTICS Q1 2016 8 In Q1 2016, adware programs continued to top the rating of detected malicious objects for mobile devices. The share of adware programs grew 13 p.p. compared to Q4 2015, and reached 42.7%. Notably, this is lower than in Q3 2015 (52.5%).
  • 9. MOBILE BANKING TROJANS 9 Over the reporting period, we detected 4,146 mobile banking Trojans, which is 1.7 times more than in the previous quarter. (percentage of all users attacked)
  • 11. 11 KASPERSKY SECURITY FOR MOBILE Proactieve beveiligings-, beheer- en controlelagen voor mobiele endpoints Mobile Security • Meerlaagse anti-malware • Web Protection • Detectie van rooting/jailbreak Mobile Device Management • Exchange ActiveSync • iOS MDM • Samsung KNOX Mobile Application Management • App wrapping • App Control • Selective Wipe Diefstalbescherming • Vergrendelen/wissen • Opsporen/Waarschu- wen/Foto • SIM Watch Self Service Portal • BYOD mogelijk • Certificaten ophalen • Diefstalbescherming Gecentraliseerd beheer • Alle grote mobiele platforms • Andere IT- beveiligingsdomeinen
  • 12. RANSOMWARE – PROBLEM OF THE YEAR? 12 2016 has only just got underway, but the first three months have already seen the same amount of cyber-security events that just a few years ago would have seemed normal for a whole year. The main underlying trends remained the same, while there was significant growth in trends related to traditional cybercrime, especially mobile threats and global ransomware epidemics. Ransomware became the main theme of the quarter after knocking targeted attacks from the top of the most popular threat rating. Unfortunately, this is a situation that will continue to evolve, and those behind the extortion could well end up being named "problem of the year".
  • 13. RANSOMWARE 13 The overall number of encryptor modifications in our Virus Collection to date is at least 15,000. Nine new encryptor families and 2,900 new modifications were detected in Q1. In Q1 2016, 372,602 unique users were attacked by encryptors, which is 30% more than in the previous quarter. Approximately 17% of those attacked were in the corporate sector. Number of ransomware samples in our collection Number of users attacked by ransomware
  • 14. 14 APPLICATION CONTROL - WHITELISTING Application Startup Control Application Privilege Control Controle op vulnerability Gedrags- analyse CLOUD Whitelists Lokale Whitelists
  • 15. TELEWERKEN 15 Organisaties die telewerken toestaan, behoren een beleid uit te vaardigen dat de voorwaarden en beperkingen definieert voor het telewerken. Device Control Application Control Web Control
  • 16. BEHANDELEN VAN MEDIA 16 Uw organisatie dient procedures te hebben voor het beheer van verwijderbare media waarop persoonsgegevens worden opgeslagen en die de beveiligingsperimeter van uw organisatie kunnen verlaten. Denk hierbij ook aan de verwijderbare media in apparatuur zoals multifunctionele printers en copiers. Uw organisatie moet de nodige maatregelen bepalen om fysieke media (inclusief papieren documenten) die persoonsgegevens bevatten tijdens het transport te beschermen tegen onbevoegde toegang, misbruik of corruptie.
  • 17. BESCHERMING TEGEN MALWARE 17 Ter bescherming tegen malware (voorkomen, ontdekken en verwijderen/herstellen) behoort uw informaticadienst anti-malware en herstelsoftware te installeren en regelmatig te updaten, waarbij computers en media als voorzorgsmaatregel of routematig worden gescand. De uitgevoerde scan behoort onder meer: alle bestanden die via netwerken of via elke vorm van opslagmedium zijn ontvangen, vóór gebruik op malware te scannen; bijlagen en downloads vóór gebruik. Op malware te scannen en dit op verschillende cruciale plaatsen in uw netwerkconfiguratie (mailservers, computers, netwerktoegang...);internetpagina’s op malware te scannen. Nauwkeurige en informatieve waarschuwingsberichten in het geval van een reële bedreiging kunnen het bewustzijn van de gebruikers vergroten
  • 18. MOST TESTED. MOST AWARDED. KASPERSKY LAB PROTECTION.* 18 0% 20% 40% 60% 80% 100% 20 40 60 80 100 N of independent tests/reviews ScoreofTOP3places Bitdefender Sophos G DATA Symantec F-Secure Intel Security (McAfee) Trend Micro Avira Avast AVG ESET Quick Heal Microsoft Panda Security In 2015 Kaspersky Lab products participated in 94 independent tests and reviews. Our products were awarded 60 firsts and achieved 77 top-three finishes. Kaspersky Lab 1st places – 60 Participation in 94 tests/reviews TOP 3 = 82% BullGuard * Notes: • According to summary results of independent tests in 2015 for corporate, consumer and mobile products. • Summary includes independent tests conducted by : AV-Comparatives, AV-Test, Dennis Technology Labs, MRG Effitas, NSS Labs, PC Security Labs, VirusBulletin. • Tests performed in these programs assess all protection technologies against known, unknown and advanced threats. • The size of the bubble reflects the number of 1st places achieved.
  • 19. 19 IN DETAIL WebCollaboration MailTOTAL Vulnerability Assesment Inventories & License Control Software Distribution Patch Management OS Deployment Data Protection / Encryptie ADVANCED Mobile Application Management Mobile Device Management Device Control Application Control Web Control Beveiliging van file servers Mobile Endpoint Security SELECT Anti-malware + firewall Kaspersky Security Center CORE Cloudondersteuning via het Kaspersky Security Network (KSN) Endpoint Management Infrastructuur

Hinweis der Redaktion

  1. In the last 19 years the number and complexity of malware incidents has increased exponentially – from only one new virus every hour in 1994. In 2016 Kaspersky Lab sees more than 310,000 new malware samples every day. That’s almost four new samples every second!
  2. 11
  3. 14
  4. 19