SlideShare ist ein Scribd-Unternehmen logo
1 von 43
THE  N EW  B L ACK 1
2 http://sg.linkedin.com/in/vishalkapoorinfotech
3 It’s déjà vu All Over Again
4
5 The Network Is The Computer
6
7
8 .com
9 The Return Of The WWW
10 S E C U R I T Y I S P L A S M A H O T AGAIN!
11
12 If You’re Going To Risk Going To Jail… $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ …It Might As Well Be For Money.
13
14 Doesn’t Pay ??? Crime Symantec Intelligence Quarterly  April-June 2010
15
16 The Walking Dead Bot Networks
17 Master Controller C&C Servers Suckers
18 Phishing Rent-A-Bot Denial Of Service Spam
PPI PPI PPI PPI
$49.95 PPI PPI PPI PPI PPI: Pay Per Install
Two Week Sales Leaders 10 cents per installation “Some of the biggest earners made more than $330,000 a month in commissions.” 50-90% of profit PPI Source: Brian Krebs, Security Fix, Washington Post, 3/16/2009
23 How End Users Get Infected Not  Obvious Not  Obvious Scary! Obvious Clicking link at trusted site Clicking on a email link Visiting high risk sites Just visiting a trusted site Clicking link at trusted site Stupid You & I
24 1st Line Of Defense: Common Sense  2nd Line Of Defense: Your AV
3 Components of Every Single AV Product on Earth Name   Fingerprint 11010101010101 Devil … Death 00011101010101 Signatures and repair instructions Scans files and executes repairs Killer UI, bells-and-whistles and alerts 25
26
27
28
29
30
31
32
33
34
35
36
A Web Page is a set of files & images Global2.css Logo.gif N360stor.gif Index.jsp Threatcon.gif Buyo.jsp Pca.gif Index.html Symantec.js Recentnews.gif
41
42 What Beyond Today’s Signature-Based AV??? Switch to Reputation Based Security presn.
43 Acknowledgements http://www.psdgraphics.com/icons/black-laptop-icon/ http://www.psdgraphics.com/icons/psd-white-laptop-icon/ http://dottech.org/tipsntricks/4932 http://penciltool.deviantart.com/ http://thedailyblonde.com/2009/07/would-you-like-fries-with-that/ http://www.mannythemovieguy.com/index.php?m=01&y=09&entry=entry090130-030249 http://www.freakingnews.com/Roadside-Breakdown-Pictures-55104.asp http://gertiecranker.blogspot.com/2009/09/rip-associations-off-stage.html  http://sohowww.nascom.nasa.gov/gallery/images/eit001.html  http://exceptionsnoted.wordpress.com/2010/01/  http://noiseatniagara.com/DThorp/SpenceDiamonds/home.html  http://www.greenlionlawncare.com/payment.html  http://visualartmsc.blogspot.com/  http://www.gamespot.com/pages/unions/forums/show_msgs.php?topic_id=24526800&union_id=1027  http://www.blind.org.ph/wayshelp/bancnet.html  http://usedbooksblog.com/blog/2008/12/  http://www.freeiconsweb.com/Mac_server_icons.html  http://chrissygardner.blogspot.com/ http://www.flickr.com/photos/sammorar/2926615695/

Weitere ähnliche Inhalte

Ähnlich wie Security - The New Black

Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check Symantec
 
Hum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraudHum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraudRay Brannon
 
The Future of Computer Security and Cybercrime
The Future of Computer Security and CybercrimeThe Future of Computer Security and Cybercrime
The Future of Computer Security and CybercrimeCraig Heath
 
The Balanced Engineer
The Balanced EngineerThe Balanced Engineer
The Balanced EngineerDug Song
 
Chapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcChapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcRay Brannon
 
IRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing SitesIRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing SitesIRJET Journal
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developerSteve Poole
 
Centurylink 2018 threat report
Centurylink 2018 threat reportCenturylink 2018 threat report
Centurylink 2018 threat reportAndrew Prosser
 
Top 5 Cryptocurrency Scam Risk Factors
Top 5 Cryptocurrency Scam Risk FactorsTop 5 Cryptocurrency Scam Risk Factors
Top 5 Cryptocurrency Scam Risk FactorsMaxim Kozlovsky
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessGreg Wartes, MCP
 
infoShare 2011 - Paweł Krawczyk - Why care about application security (open)
infoShare 2011 - Paweł Krawczyk - Why care about application security (open)infoShare 2011 - Paweł Krawczyk - Why care about application security (open)
infoShare 2011 - Paweł Krawczyk - Why care about application security (open)Infoshare
 
Integral Ad Science Digital Ad Fraud Presentation
Integral Ad Science Digital Ad Fraud PresentationIntegral Ad Science Digital Ad Fraud Presentation
Integral Ad Science Digital Ad Fraud PresentationIntegral Ad Science
 
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...Jonathan Care
 
Why care about application security
Why care about application securityWhy care about application security
Why care about application securityPawel Krawczyk
 
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...HackIT Ukraine
 

Ähnlich wie Security - The New Black (20)

Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check
 
INT 1010 10-3.pdf
INT 1010 10-3.pdfINT 1010 10-3.pdf
INT 1010 10-3.pdf
 
Hum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraudHum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraud
 
The Future of Computer Security and Cybercrime
The Future of Computer Security and CybercrimeThe Future of Computer Security and Cybercrime
The Future of Computer Security and Cybercrime
 
The Balanced Engineer
The Balanced EngineerThe Balanced Engineer
The Balanced Engineer
 
Chapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcChapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated Communicationcmc
 
IRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing SitesIRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing Sites
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developer
 
Centurylink 2018 threat report
Centurylink 2018 threat reportCenturylink 2018 threat report
Centurylink 2018 threat report
 
La pecera 3
La pecera 3La pecera 3
La pecera 3
 
Stu w25 a
Stu w25 aStu w25 a
Stu w25 a
 
Top 5 Cryptocurrency Scam Risk Factors
Top 5 Cryptocurrency Scam Risk FactorsTop 5 Cryptocurrency Scam Risk Factors
Top 5 Cryptocurrency Scam Risk Factors
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
 
infoShare 2011 - Paweł Krawczyk - Why care about application security (open)
infoShare 2011 - Paweł Krawczyk - Why care about application security (open)infoShare 2011 - Paweł Krawczyk - Why care about application security (open)
infoShare 2011 - Paweł Krawczyk - Why care about application security (open)
 
Integral Ad Science Digital Ad Fraud Presentation
Integral Ad Science Digital Ad Fraud PresentationIntegral Ad Science Digital Ad Fraud Presentation
Integral Ad Science Digital Ad Fraud Presentation
 
News Bytes - December 2010
News Bytes - December 2010News Bytes - December 2010
News Bytes - December 2010
 
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
 
Why care about application security
Why care about application securityWhy care about application security
Why care about application security
 
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
 
Threat report h1_2013
Threat report h1_2013Threat report h1_2013
Threat report h1_2013
 

Kürzlich hochgeladen

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 

Kürzlich hochgeladen (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 

Security - The New Black

  • 1. THE N EW B L ACK 1
  • 3. 3 It’s déjà vu All Over Again
  • 4. 4
  • 5. 5 The Network Is The Computer
  • 6. 6
  • 7. 7
  • 9. 9 The Return Of The WWW
  • 10. 10 S E C U R I T Y I S P L A S M A H O T AGAIN!
  • 11. 11
  • 12. 12 If You’re Going To Risk Going To Jail… $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ …It Might As Well Be For Money.
  • 13. 13
  • 14. 14 Doesn’t Pay ??? Crime Symantec Intelligence Quarterly April-June 2010
  • 15. 15
  • 16. 16 The Walking Dead Bot Networks
  • 17. 17 Master Controller C&C Servers Suckers
  • 18. 18 Phishing Rent-A-Bot Denial Of Service Spam
  • 19.
  • 20. PPI PPI PPI PPI
  • 21. $49.95 PPI PPI PPI PPI PPI: Pay Per Install
  • 22. Two Week Sales Leaders 10 cents per installation “Some of the biggest earners made more than $330,000 a month in commissions.” 50-90% of profit PPI Source: Brian Krebs, Security Fix, Washington Post, 3/16/2009
  • 23. 23 How End Users Get Infected Not Obvious Not Obvious Scary! Obvious Clicking link at trusted site Clicking on a email link Visiting high risk sites Just visiting a trusted site Clicking link at trusted site Stupid You & I
  • 24. 24 1st Line Of Defense: Common Sense 2nd Line Of Defense: Your AV
  • 25. 3 Components of Every Single AV Product on Earth Name Fingerprint 11010101010101 Devil … Death 00011101010101 Signatures and repair instructions Scans files and executes repairs Killer UI, bells-and-whistles and alerts 25
  • 26. 26
  • 27. 27
  • 28. 28
  • 29. 29
  • 30. 30
  • 31. 31
  • 32. 32
  • 33. 33
  • 34. 34
  • 35. 35
  • 36. 36
  • 37. A Web Page is a set of files & images Global2.css Logo.gif N360stor.gif Index.jsp Threatcon.gif Buyo.jsp Pca.gif Index.html Symantec.js Recentnews.gif
  • 38.
  • 39.
  • 40.
  • 41. 41
  • 42. 42 What Beyond Today’s Signature-Based AV??? Switch to Reputation Based Security presn.
  • 43. 43 Acknowledgements http://www.psdgraphics.com/icons/black-laptop-icon/ http://www.psdgraphics.com/icons/psd-white-laptop-icon/ http://dottech.org/tipsntricks/4932 http://penciltool.deviantart.com/ http://thedailyblonde.com/2009/07/would-you-like-fries-with-that/ http://www.mannythemovieguy.com/index.php?m=01&y=09&entry=entry090130-030249 http://www.freakingnews.com/Roadside-Breakdown-Pictures-55104.asp http://gertiecranker.blogspot.com/2009/09/rip-associations-off-stage.html http://sohowww.nascom.nasa.gov/gallery/images/eit001.html http://exceptionsnoted.wordpress.com/2010/01/ http://noiseatniagara.com/DThorp/SpenceDiamonds/home.html http://www.greenlionlawncare.com/payment.html http://visualartmsc.blogspot.com/ http://www.gamespot.com/pages/unions/forums/show_msgs.php?topic_id=24526800&union_id=1027 http://www.blind.org.ph/wayshelp/bancnet.html http://usedbooksblog.com/blog/2008/12/ http://www.freeiconsweb.com/Mac_server_icons.html http://chrissygardner.blogspot.com/ http://www.flickr.com/photos/sammorar/2926615695/

Hinweis der Redaktion

  1. PPI = Pay Per Install