SlideShare a Scribd company logo
1 of 14
Download to read offline
What's Next ?


Alexandru BĂLAN
<abalan@bitdefender.com>
Short Summary

• Last year...
   – Types of malware
   – Should AV producers take care of Linux boxes as well
     ?
• Now...
   – More threats
   – More defenses
• What's next ?
Last year we talked about...


• Examples of malware (viruses, rootkits,
  exploits, social engineering)‫‏‬
• Windows people having all the “fun”
• Apparently there's no need right now for AV
  producers to extend their focus to *NIX
  firewalls, rootkits and so on.
However

• The industry is shifting from protecting the data to
  protecting the information
• If companies have any number of employees at all,
  studies show and human nature shows that there's always
  going to be be somebody that is going to try and take
  advantage of the system
• New threats are emerging
Now..


• More threats (not necessarily new)‫‏‬
  – Botnets
  – Code running on your computer (client side
    javascript)‫‏‬
  – Tons of php/sql_injection/other exploits.
  – The human factor is (as expected) an
    increasing risk
What do you see as tomorrow's threats and defenses ?



Examples:
• Cisco/IOS rootkit
   – Presented at EUSecWest London UK – May 2008
   – Just “an interesting concept ?”
   Sebastian Muniz: I've been told by the cousin of a friend
    of my girlfriend that this kind of rootkit has previously
    been used :)‫‏‬



                   Source: http://eusecwest.com/sebastian-muniz-da-ios-rootkit.html
What do you see as tomorrow's threats and defenses ?



• Web OS – It's going to happen!
• Threats from and through social networks (read: facebook,
  myspace, ect, ect) are just an example:
   – It's not exactly spam and it's not exactly phishing. You
     can't even call it “tricking the user”. The users are
     ignorant enough to click everything and get in contact
     with everyone
   – 5 out of 10 “add me” requests are approved on IM
   – 7 out of 10 “add me” requests are approved in SNS
   – Usually comments are on a “accept all” basis
What do you see as tomorrow's threats and defenses ?



• Phlashing – Remote DOS in any device that supports
  firmware update
     – Attacking system firmware isn't a new tactic—the
       CIH/Chernobyl virus was capable of overwriting BIOS
       firmware back in 1998—but focusing such attacks on
       network hardware would be an unusual step, and could
       prove quite successful in at least the short term.



  Source: http://arstechnica.com/news.ars/post/20080520-phlashing-attacks-could-render-network-
  hardware-useless.html
What do you see as tomorrow's threats and defenses ?



• “14-Year-Old Turns Tram System Into Personal Train Set”
   – A Polish teenager allegedly turned the tram system in
     the city of Lodz into his own personal train set,
     triggering chaos and derailing four vehicles in the
     process. Twelve people were injured in one of the
     incidents.
   – The 14-year-old modified a TV remote control so that it
     could be used to change track points


                         Source : http://www.theregister.co.uk/2008/01/11/tram_hack/
What do you see as tomorrow's threats and defenses ?



• Firewire DMA bug (connect a laptop to a firewire port, trick
  the machine into allowing you read/write memory access)‫‏‬
   – A tool targeting mainly Windows XP systems has been
     released by Adam Boileau
   – To use the tool, hackers must connect a Linux-based
     computer to a Firewire port on the target machine. The
     machine is then tricked into allowing the attacking
     computer to have read and write access to its memory.

         Source: http://www.theage.com.au/news/security/hack-into-a-windows-pc-no-password-
         needed/2008/03/04/1204402423638.html
The conclusion

• Innovation and allocating resources to develop a solution
  for a future threat (i.e. cisco anti-rootkit) is risky.
• Awareness is still low and surprisingly, getting lower.
  10/10 random people asked, will not bother with security
  for “exotic” threats.
• Leaks from the underground have been plugged. We
  haven't heard about anything tasty in some years. This
  silence is a bad sign
The conclusion (cont)‫‏‬




Because of the above, it's difficult to predict and develop the
  security solution for tomorrow and it's increasingly easy for
  attackers to predict where and how to strike next.
What can YOU do

• Share information !
• Demand more from the industry. No matter how crazy it
  might sound today it might just be something we won't be
  able to live without tomorrow
• Don't be afraid to “waste resources” with innovation.
• Let us know. Send your requests and thoughts
  toabalan@bitdefender.com . My spam filters as well as
  our research teams will be happy to take note of them
Q&A

More Related Content

What's hot

Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System ThreatsDrishti Bhalla
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsLeelet1121
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESShyam Kumar Singh
 
Introduction to Ethical Hacking
Introduction to Ethical Hacking Introduction to Ethical Hacking
Introduction to Ethical Hacking Nasir Bhutta
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internetArthur Landry
 
Information-Security-Lecture-6.pptx
Information-Security-Lecture-6.pptxInformation-Security-Lecture-6.pptx
Information-Security-Lecture-6.pptxanbersattar
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxanbersattar
 
Information-Security-Lecture-4.pptx
Information-Security-Lecture-4.pptxInformation-Security-Lecture-4.pptx
Information-Security-Lecture-4.pptxanbersattar
 
Information-Security-Lecture-7.pptx
Information-Security-Lecture-7.pptxInformation-Security-Lecture-7.pptx
Information-Security-Lecture-7.pptxanbersattar
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeMurray Security Services
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Virusesmkgspsu
 
CSFI Stuxnet Report
CSFI Stuxnet ReportCSFI Stuxnet Report
CSFI Stuxnet ReportAmr Ali
 
Ite pc v40_chapter9_edited_h
Ite pc v40_chapter9_edited_hIte pc v40_chapter9_edited_h
Ite pc v40_chapter9_edited_hDave Arvin
 
xDEFENSE: An Extended DEFENSE for mitigating Next Generation Intrusions
xDEFENSE: An Extended DEFENSE for mitigating Next Generation IntrusionsxDEFENSE: An Extended DEFENSE for mitigating Next Generation Intrusions
xDEFENSE: An Extended DEFENSE for mitigating Next Generation IntrusionsVivek Venugopalan
 
Kaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst SummitKaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst SummitPR Americas
 
SOTWARE INFRINGEMENT
SOTWARE INFRINGEMENTSOTWARE INFRINGEMENT
SOTWARE INFRINGEMENTHunny Jummani
 

What's hot (20)

Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Hacking for Dummies 2
Hacking for Dummies 2Hacking for Dummies 2
Hacking for Dummies 2
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Introduction to Ethical Hacking
Introduction to Ethical Hacking Introduction to Ethical Hacking
Introduction to Ethical Hacking
 
News Bytes - May 2015
News Bytes - May 2015News Bytes - May 2015
News Bytes - May 2015
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internet
 
Information-Security-Lecture-6.pptx
Information-Security-Lecture-6.pptxInformation-Security-Lecture-6.pptx
Information-Security-Lecture-6.pptx
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptx
 
Information-Security-Lecture-4.pptx
Information-Security-Lecture-4.pptxInformation-Security-Lecture-4.pptx
Information-Security-Lecture-4.pptx
 
Information_Security_Class
Information_Security_ClassInformation_Security_Class
Information_Security_Class
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Information-Security-Lecture-7.pptx
Information-Security-Lecture-7.pptxInformation-Security-Lecture-7.pptx
Information-Security-Lecture-7.pptx
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber Crime
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
CSFI Stuxnet Report
CSFI Stuxnet ReportCSFI Stuxnet Report
CSFI Stuxnet Report
 
Ite pc v40_chapter9_edited_h
Ite pc v40_chapter9_edited_hIte pc v40_chapter9_edited_h
Ite pc v40_chapter9_edited_h
 
xDEFENSE: An Extended DEFENSE for mitigating Next Generation Intrusions
xDEFENSE: An Extended DEFENSE for mitigating Next Generation IntrusionsxDEFENSE: An Extended DEFENSE for mitigating Next Generation Intrusions
xDEFENSE: An Extended DEFENSE for mitigating Next Generation Intrusions
 
Kaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst SummitKaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst Summit
 
SOTWARE INFRINGEMENT
SOTWARE INFRINGEMENTSOTWARE INFRINGEMENT
SOTWARE INFRINGEMENT
 

Viewers also liked

7 good lives vs rp
7 good lives vs rp7 good lives vs rp
7 good lives vs rpAnna Salter
 
"Open Source ERP Projects and Opportunities for the Romanian Market" by Thoma...
"Open Source ERP Projects and Opportunities for the Romanian Market" by Thoma..."Open Source ERP Projects and Opportunities for the Romanian Market" by Thoma...
"Open Source ERP Projects and Opportunities for the Romanian Market" by Thoma...eLiberatica
 
"Write the Future Open Standards Open Source OpenOffice" by Louis Suarez-Pott...
"Write the Future Open Standards Open Source OpenOffice" by Louis Suarez-Pott..."Write the Future Open Standards Open Source OpenOffice" by Louis Suarez-Pott...
"Write the Future Open Standards Open Source OpenOffice" by Louis Suarez-Pott...eLiberatica
 
"Sun Open Source Universe" by Vassilis Boulogiorgos @ eLiberatica 2008
"Sun Open Source Universe" by Vassilis Boulogiorgos @ eLiberatica 2008"Sun Open Source Universe" by Vassilis Boulogiorgos @ eLiberatica 2008
"Sun Open Source Universe" by Vassilis Boulogiorgos @ eLiberatica 2008eLiberatica
 
"SocrateOpen after two years" by Remus Cazacu @ eLiberatica 2008
"SocrateOpen after two years" by Remus Cazacu @ eLiberatica 2008"SocrateOpen after two years" by Remus Cazacu @ eLiberatica 2008
"SocrateOpen after two years" by Remus Cazacu @ eLiberatica 2008eLiberatica
 
"Understanding Free Software and Open Source Licensing" by Zak Greant @ eLibe...
"Understanding Free Software and Open Source Licensing" by Zak Greant @ eLibe..."Understanding Free Software and Open Source Licensing" by Zak Greant @ eLibe...
"Understanding Free Software and Open Source Licensing" by Zak Greant @ eLibe...eLiberatica
 
Countus Ballon Spektakel 2010
Countus Ballon Spektakel 2010Countus Ballon Spektakel 2010
Countus Ballon Spektakel 2010jaccov
 
"Dell and Open Source" by Serban Zirnovan @ eLiberatica 2008
"Dell and Open Source" by Serban Zirnovan @ eLiberatica 2008"Dell and Open Source" by Serban Zirnovan @ eLiberatica 2008
"Dell and Open Source" by Serban Zirnovan @ eLiberatica 2008eLiberatica
 

Viewers also liked (8)

7 good lives vs rp
7 good lives vs rp7 good lives vs rp
7 good lives vs rp
 
"Open Source ERP Projects and Opportunities for the Romanian Market" by Thoma...
"Open Source ERP Projects and Opportunities for the Romanian Market" by Thoma..."Open Source ERP Projects and Opportunities for the Romanian Market" by Thoma...
"Open Source ERP Projects and Opportunities for the Romanian Market" by Thoma...
 
"Write the Future Open Standards Open Source OpenOffice" by Louis Suarez-Pott...
"Write the Future Open Standards Open Source OpenOffice" by Louis Suarez-Pott..."Write the Future Open Standards Open Source OpenOffice" by Louis Suarez-Pott...
"Write the Future Open Standards Open Source OpenOffice" by Louis Suarez-Pott...
 
"Sun Open Source Universe" by Vassilis Boulogiorgos @ eLiberatica 2008
"Sun Open Source Universe" by Vassilis Boulogiorgos @ eLiberatica 2008"Sun Open Source Universe" by Vassilis Boulogiorgos @ eLiberatica 2008
"Sun Open Source Universe" by Vassilis Boulogiorgos @ eLiberatica 2008
 
"SocrateOpen after two years" by Remus Cazacu @ eLiberatica 2008
"SocrateOpen after two years" by Remus Cazacu @ eLiberatica 2008"SocrateOpen after two years" by Remus Cazacu @ eLiberatica 2008
"SocrateOpen after two years" by Remus Cazacu @ eLiberatica 2008
 
"Understanding Free Software and Open Source Licensing" by Zak Greant @ eLibe...
"Understanding Free Software and Open Source Licensing" by Zak Greant @ eLibe..."Understanding Free Software and Open Source Licensing" by Zak Greant @ eLibe...
"Understanding Free Software and Open Source Licensing" by Zak Greant @ eLibe...
 
Countus Ballon Spektakel 2010
Countus Ballon Spektakel 2010Countus Ballon Spektakel 2010
Countus Ballon Spektakel 2010
 
"Dell and Open Source" by Serban Zirnovan @ eLiberatica 2008
"Dell and Open Source" by Serban Zirnovan @ eLiberatica 2008"Dell and Open Source" by Serban Zirnovan @ eLiberatica 2008
"Dell and Open Source" by Serban Zirnovan @ eLiberatica 2008
 

Similar to "BitDefender - What's Next" by Alexandru Balan @ eLiberatica 2008

Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII studentsAkiumi Hasegawa
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays worldSibghatullah Khattak
 
The difference between a duck
The difference between a duckThe difference between a duck
The difference between a duckSensePost
 
Network security
Network securityNetwork security
Network securitymena kaheel
 
A tale of mobile threats
A tale of mobile threatsA tale of mobile threats
A tale of mobile threatsVincenzo Iozzo
 
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana   iisf...Web security – application security roads to software security nirvana   iisf...
Web security – application security roads to software security nirvana iisf...Eoin Keary
 
Information Security - A Discussion
Information Security  - A DiscussionInformation Security  - A Discussion
Information Security - A DiscussionKaushik Patra
 
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdfUnit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdfSujanTimalsina5
 
Making the case for sandbox v1.1 (SD Conference 2007)
Making the case for sandbox v1.1 (SD Conference 2007)Making the case for sandbox v1.1 (SD Conference 2007)
Making the case for sandbox v1.1 (SD Conference 2007)Dinis Cruz
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITYafaque jaya
 
Formative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering AttacksFormative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering AttacksDamaineFranklinMScBE
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdfPavelVtek3
 

Similar to "BitDefender - What's Next" by Alexandru Balan @ eLiberatica 2008 (20)

Security
SecuritySecurity
Security
 
Hacking 10 2010
Hacking 10 2010Hacking 10 2010
Hacking 10 2010
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
The difference between a duck
The difference between a duckThe difference between a duck
The difference between a duck
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
C3
C3C3
C3
 
Information security
Information securityInformation security
Information security
 
A tale of mobile threats
A tale of mobile threatsA tale of mobile threats
A tale of mobile threats
 
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana   iisf...Web security – application security roads to software security nirvana   iisf...
Web security – application security roads to software security nirvana iisf...
 
Information Security - A Discussion
Information Security  - A DiscussionInformation Security  - A Discussion
Information Security - A Discussion
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdfUnit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
 
Making the case for sandbox v1.1 (SD Conference 2007)
Making the case for sandbox v1.1 (SD Conference 2007)Making the case for sandbox v1.1 (SD Conference 2007)
Making the case for sandbox v1.1 (SD Conference 2007)
 
Network monitoring white paper
Network monitoring white paperNetwork monitoring white paper
Network monitoring white paper
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Formative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering AttacksFormative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering Attacks
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
Network Security
Network SecurityNetwork Security
Network Security
 

More from eLiberatica

"Komodo - Why we chose to make our product open source" by Shane Caraveo @ eL...
"Komodo - Why we chose to make our product open source" by Shane Caraveo @ eL..."Komodo - Why we chose to make our product open source" by Shane Caraveo @ eL...
"Komodo - Why we chose to make our product open source" by Shane Caraveo @ eL...eLiberatica
 
"Introducing Red Hat Training Center" by Radu Radulescu @ eLiberatica 2008
"Introducing Red Hat Training Center" by Radu Radulescu @ eLiberatica 2008"Introducing Red Hat Training Center" by Radu Radulescu @ eLiberatica 2008
"Introducing Red Hat Training Center" by Radu Radulescu @ eLiberatica 2008eLiberatica
 
"HP vision Governing the use of open source" by Martin Michlmayr @ eLiberatic...
"HP vision Governing the use of open source" by Martin Michlmayr @ eLiberatic..."HP vision Governing the use of open source" by Martin Michlmayr @ eLiberatic...
"HP vision Governing the use of open source" by Martin Michlmayr @ eLiberatic...eLiberatica
 
"Open Source Software Middleware for The Internet of Things - Project ASPIRE"...
"Open Source Software Middleware for The Internet of Things - Project ASPIRE"..."Open Source Software Middleware for The Internet of Things - Project ASPIRE"...
"Open Source Software Middleware for The Internet of Things - Project ASPIRE"...eLiberatica
 
"Introducing eConference" by Eugen Rotariu @ eLiberatica 2008
"Introducing eConference" by Eugen Rotariu @ eLiberatica 2008"Introducing eConference" by Eugen Rotariu @ eLiberatica 2008
"Introducing eConference" by Eugen Rotariu @ eLiberatica 2008eLiberatica
 
"Mozilla Messaging and Thunderbird - why and how" by David Ascher @ eLiberati...
"Mozilla Messaging and Thunderbird - why and how" by David Ascher @ eLiberati..."Mozilla Messaging and Thunderbird - why and how" by David Ascher @ eLiberati...
"Mozilla Messaging and Thunderbird - why and how" by David Ascher @ eLiberati...eLiberatica
 
"For the first time in Europe Digital ID providers and OpenID service for Rom...
"For the first time in Europe Digital ID providers and OpenID service for Rom..."For the first time in Europe Digital ID providers and OpenID service for Rom...
"For the first time in Europe Digital ID providers and OpenID service for Rom...eLiberatica
 
"Standing on the Shoulders of Giants" by Brian King @ eLiberatica 2008
"Standing on the Shoulders of Giants" by Brian King @ eLiberatica 2008"Standing on the Shoulders of Giants" by Brian King @ eLiberatica 2008
"Standing on the Shoulders of Giants" by Brian King @ eLiberatica 2008eLiberatica
 
"Legal aspects related to a FLOSS based model business" by Bogdan Manolea @ e...
"Legal aspects related to a FLOSS based model business" by Bogdan Manolea @ e..."Legal aspects related to a FLOSS based model business" by Bogdan Manolea @ e...
"Legal aspects related to a FLOSS based model business" by Bogdan Manolea @ e...eLiberatica
 
"OSS in Public Administrations - A short Report from the European Level" by B...
"OSS in Public Administrations - A short Report from the European Level" by B..."OSS in Public Administrations - A short Report from the European Level" by B...
"OSS in Public Administrations - A short Report from the European Level" by B...eLiberatica
 
"The Future of Enterprise Content Management" by Aleksander Farstad @ eLibera...
"The Future of Enterprise Content Management" by Aleksander Farstad @ eLibera..."The Future of Enterprise Content Management" by Aleksander Farstad @ eLibera...
"The Future of Enterprise Content Management" by Aleksander Farstad @ eLibera...eLiberatica
 
"Integrating Open Source into Your Business" by Adam Jollans @ eLiberatica 2008
"Integrating Open Source into Your Business" by Adam Jollans @ eLiberatica 2008"Integrating Open Source into Your Business" by Adam Jollans @ eLiberatica 2008
"Integrating Open Source into Your Business" by Adam Jollans @ eLiberatica 2008eLiberatica
 
"Open Source at Microsoft" by Zoli Herczeg @ eLiberatica 2008
"Open Source at Microsoft" by Zoli Herczeg @ eLiberatica 2008"Open Source at Microsoft" by Zoli Herczeg @ eLiberatica 2008
"Open Source at Microsoft" by Zoli Herczeg @ eLiberatica 2008eLiberatica
 
"The Past Present and Future of the Mozilla Foundation" by Zak Greant @ eLibe...
"The Past Present and Future of the Mozilla Foundation" by Zak Greant @ eLibe..."The Past Present and Future of the Mozilla Foundation" by Zak Greant @ eLibe...
"The Past Present and Future of the Mozilla Foundation" by Zak Greant @ eLibe...eLiberatica
 
"Open Source and the Evolution of Communication" by Zak Greant @ eLiberatica ...
"Open Source and the Evolution of Communication" by Zak Greant @ eLiberatica ..."Open Source and the Evolution of Communication" by Zak Greant @ eLiberatica ...
"Open Source and the Evolution of Communication" by Zak Greant @ eLiberatica ...eLiberatica
 
"Building Careers with Free Software and Open Source" by Zak Greant @ eLibera...
"Building Careers with Free Software and Open Source" by Zak Greant @ eLibera..."Building Careers with Free Software and Open Source" by Zak Greant @ eLibera...
"Building Careers with Free Software and Open Source" by Zak Greant @ eLibera...eLiberatica
 
"Open Source and Sun" by Vassilis Boulogiorgos @ eLiberatica 2007
"Open Source and Sun" by Vassilis Boulogiorgos @ eLiberatica 2007"Open Source and Sun" by Vassilis Boulogiorgos @ eLiberatica 2007
"Open Source and Sun" by Vassilis Boulogiorgos @ eLiberatica 2007eLiberatica
 
"Real Time Ethernet Cryptor Based on Linux" by Tiberiu Socaciu @ eLiberatica ...
"Real Time Ethernet Cryptor Based on Linux" by Tiberiu Socaciu @ eLiberatica ..."Real Time Ethernet Cryptor Based on Linux" by Tiberiu Socaciu @ eLiberatica ...
"Real Time Ethernet Cryptor Based on Linux" by Tiberiu Socaciu @ eLiberatica ...eLiberatica
 
"Are You Afraid of the Semantic Web" by Sabin Corneliu Buraga @ eLiberatica 2007
"Are You Afraid of the Semantic Web" by Sabin Corneliu Buraga @ eLiberatica 2007"Are You Afraid of the Semantic Web" by Sabin Corneliu Buraga @ eLiberatica 2007
"Are You Afraid of the Semantic Web" by Sabin Corneliu Buraga @ eLiberatica 2007eLiberatica
 
"Open Source in the ERP CRM solutions arena Case study SocrateOpen powered by...
"Open Source in the ERP CRM solutions arena Case study SocrateOpen powered by..."Open Source in the ERP CRM solutions arena Case study SocrateOpen powered by...
"Open Source in the ERP CRM solutions arena Case study SocrateOpen powered by...eLiberatica
 

More from eLiberatica (20)

"Komodo - Why we chose to make our product open source" by Shane Caraveo @ eL...
"Komodo - Why we chose to make our product open source" by Shane Caraveo @ eL..."Komodo - Why we chose to make our product open source" by Shane Caraveo @ eL...
"Komodo - Why we chose to make our product open source" by Shane Caraveo @ eL...
 
"Introducing Red Hat Training Center" by Radu Radulescu @ eLiberatica 2008
"Introducing Red Hat Training Center" by Radu Radulescu @ eLiberatica 2008"Introducing Red Hat Training Center" by Radu Radulescu @ eLiberatica 2008
"Introducing Red Hat Training Center" by Radu Radulescu @ eLiberatica 2008
 
"HP vision Governing the use of open source" by Martin Michlmayr @ eLiberatic...
"HP vision Governing the use of open source" by Martin Michlmayr @ eLiberatic..."HP vision Governing the use of open source" by Martin Michlmayr @ eLiberatic...
"HP vision Governing the use of open source" by Martin Michlmayr @ eLiberatic...
 
"Open Source Software Middleware for The Internet of Things - Project ASPIRE"...
"Open Source Software Middleware for The Internet of Things - Project ASPIRE"..."Open Source Software Middleware for The Internet of Things - Project ASPIRE"...
"Open Source Software Middleware for The Internet of Things - Project ASPIRE"...
 
"Introducing eConference" by Eugen Rotariu @ eLiberatica 2008
"Introducing eConference" by Eugen Rotariu @ eLiberatica 2008"Introducing eConference" by Eugen Rotariu @ eLiberatica 2008
"Introducing eConference" by Eugen Rotariu @ eLiberatica 2008
 
"Mozilla Messaging and Thunderbird - why and how" by David Ascher @ eLiberati...
"Mozilla Messaging and Thunderbird - why and how" by David Ascher @ eLiberati..."Mozilla Messaging and Thunderbird - why and how" by David Ascher @ eLiberati...
"Mozilla Messaging and Thunderbird - why and how" by David Ascher @ eLiberati...
 
"For the first time in Europe Digital ID providers and OpenID service for Rom...
"For the first time in Europe Digital ID providers and OpenID service for Rom..."For the first time in Europe Digital ID providers and OpenID service for Rom...
"For the first time in Europe Digital ID providers and OpenID service for Rom...
 
"Standing on the Shoulders of Giants" by Brian King @ eLiberatica 2008
"Standing on the Shoulders of Giants" by Brian King @ eLiberatica 2008"Standing on the Shoulders of Giants" by Brian King @ eLiberatica 2008
"Standing on the Shoulders of Giants" by Brian King @ eLiberatica 2008
 
"Legal aspects related to a FLOSS based model business" by Bogdan Manolea @ e...
"Legal aspects related to a FLOSS based model business" by Bogdan Manolea @ e..."Legal aspects related to a FLOSS based model business" by Bogdan Manolea @ e...
"Legal aspects related to a FLOSS based model business" by Bogdan Manolea @ e...
 
"OSS in Public Administrations - A short Report from the European Level" by B...
"OSS in Public Administrations - A short Report from the European Level" by B..."OSS in Public Administrations - A short Report from the European Level" by B...
"OSS in Public Administrations - A short Report from the European Level" by B...
 
"The Future of Enterprise Content Management" by Aleksander Farstad @ eLibera...
"The Future of Enterprise Content Management" by Aleksander Farstad @ eLibera..."The Future of Enterprise Content Management" by Aleksander Farstad @ eLibera...
"The Future of Enterprise Content Management" by Aleksander Farstad @ eLibera...
 
"Integrating Open Source into Your Business" by Adam Jollans @ eLiberatica 2008
"Integrating Open Source into Your Business" by Adam Jollans @ eLiberatica 2008"Integrating Open Source into Your Business" by Adam Jollans @ eLiberatica 2008
"Integrating Open Source into Your Business" by Adam Jollans @ eLiberatica 2008
 
"Open Source at Microsoft" by Zoli Herczeg @ eLiberatica 2008
"Open Source at Microsoft" by Zoli Herczeg @ eLiberatica 2008"Open Source at Microsoft" by Zoli Herczeg @ eLiberatica 2008
"Open Source at Microsoft" by Zoli Herczeg @ eLiberatica 2008
 
"The Past Present and Future of the Mozilla Foundation" by Zak Greant @ eLibe...
"The Past Present and Future of the Mozilla Foundation" by Zak Greant @ eLibe..."The Past Present and Future of the Mozilla Foundation" by Zak Greant @ eLibe...
"The Past Present and Future of the Mozilla Foundation" by Zak Greant @ eLibe...
 
"Open Source and the Evolution of Communication" by Zak Greant @ eLiberatica ...
"Open Source and the Evolution of Communication" by Zak Greant @ eLiberatica ..."Open Source and the Evolution of Communication" by Zak Greant @ eLiberatica ...
"Open Source and the Evolution of Communication" by Zak Greant @ eLiberatica ...
 
"Building Careers with Free Software and Open Source" by Zak Greant @ eLibera...
"Building Careers with Free Software and Open Source" by Zak Greant @ eLibera..."Building Careers with Free Software and Open Source" by Zak Greant @ eLibera...
"Building Careers with Free Software and Open Source" by Zak Greant @ eLibera...
 
"Open Source and Sun" by Vassilis Boulogiorgos @ eLiberatica 2007
"Open Source and Sun" by Vassilis Boulogiorgos @ eLiberatica 2007"Open Source and Sun" by Vassilis Boulogiorgos @ eLiberatica 2007
"Open Source and Sun" by Vassilis Boulogiorgos @ eLiberatica 2007
 
"Real Time Ethernet Cryptor Based on Linux" by Tiberiu Socaciu @ eLiberatica ...
"Real Time Ethernet Cryptor Based on Linux" by Tiberiu Socaciu @ eLiberatica ..."Real Time Ethernet Cryptor Based on Linux" by Tiberiu Socaciu @ eLiberatica ...
"Real Time Ethernet Cryptor Based on Linux" by Tiberiu Socaciu @ eLiberatica ...
 
"Are You Afraid of the Semantic Web" by Sabin Corneliu Buraga @ eLiberatica 2007
"Are You Afraid of the Semantic Web" by Sabin Corneliu Buraga @ eLiberatica 2007"Are You Afraid of the Semantic Web" by Sabin Corneliu Buraga @ eLiberatica 2007
"Are You Afraid of the Semantic Web" by Sabin Corneliu Buraga @ eLiberatica 2007
 
"Open Source in the ERP CRM solutions arena Case study SocrateOpen powered by...
"Open Source in the ERP CRM solutions arena Case study SocrateOpen powered by..."Open Source in the ERP CRM solutions arena Case study SocrateOpen powered by...
"Open Source in the ERP CRM solutions arena Case study SocrateOpen powered by...
 

Recently uploaded

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Recently uploaded (20)

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

"BitDefender - What's Next" by Alexandru Balan @ eLiberatica 2008

  • 1. What's Next ? Alexandru BĂLAN <abalan@bitdefender.com>
  • 2. Short Summary • Last year... – Types of malware – Should AV producers take care of Linux boxes as well ? • Now... – More threats – More defenses • What's next ?
  • 3. Last year we talked about... • Examples of malware (viruses, rootkits, exploits, social engineering)‫‏‬ • Windows people having all the “fun” • Apparently there's no need right now for AV producers to extend their focus to *NIX firewalls, rootkits and so on.
  • 4. However • The industry is shifting from protecting the data to protecting the information • If companies have any number of employees at all, studies show and human nature shows that there's always going to be be somebody that is going to try and take advantage of the system • New threats are emerging
  • 5. Now.. • More threats (not necessarily new)‫‏‬ – Botnets – Code running on your computer (client side javascript)‫‏‬ – Tons of php/sql_injection/other exploits. – The human factor is (as expected) an increasing risk
  • 6. What do you see as tomorrow's threats and defenses ? Examples: • Cisco/IOS rootkit – Presented at EUSecWest London UK – May 2008 – Just “an interesting concept ?” Sebastian Muniz: I've been told by the cousin of a friend of my girlfriend that this kind of rootkit has previously been used :)‫‏‬ Source: http://eusecwest.com/sebastian-muniz-da-ios-rootkit.html
  • 7. What do you see as tomorrow's threats and defenses ? • Web OS – It's going to happen! • Threats from and through social networks (read: facebook, myspace, ect, ect) are just an example: – It's not exactly spam and it's not exactly phishing. You can't even call it “tricking the user”. The users are ignorant enough to click everything and get in contact with everyone – 5 out of 10 “add me” requests are approved on IM – 7 out of 10 “add me” requests are approved in SNS – Usually comments are on a “accept all” basis
  • 8. What do you see as tomorrow's threats and defenses ? • Phlashing – Remote DOS in any device that supports firmware update – Attacking system firmware isn't a new tactic—the CIH/Chernobyl virus was capable of overwriting BIOS firmware back in 1998—but focusing such attacks on network hardware would be an unusual step, and could prove quite successful in at least the short term. Source: http://arstechnica.com/news.ars/post/20080520-phlashing-attacks-could-render-network- hardware-useless.html
  • 9. What do you see as tomorrow's threats and defenses ? • “14-Year-Old Turns Tram System Into Personal Train Set” – A Polish teenager allegedly turned the tram system in the city of Lodz into his own personal train set, triggering chaos and derailing four vehicles in the process. Twelve people were injured in one of the incidents. – The 14-year-old modified a TV remote control so that it could be used to change track points Source : http://www.theregister.co.uk/2008/01/11/tram_hack/
  • 10. What do you see as tomorrow's threats and defenses ? • Firewire DMA bug (connect a laptop to a firewire port, trick the machine into allowing you read/write memory access)‫‏‬ – A tool targeting mainly Windows XP systems has been released by Adam Boileau – To use the tool, hackers must connect a Linux-based computer to a Firewire port on the target machine. The machine is then tricked into allowing the attacking computer to have read and write access to its memory. Source: http://www.theage.com.au/news/security/hack-into-a-windows-pc-no-password- needed/2008/03/04/1204402423638.html
  • 11. The conclusion • Innovation and allocating resources to develop a solution for a future threat (i.e. cisco anti-rootkit) is risky. • Awareness is still low and surprisingly, getting lower. 10/10 random people asked, will not bother with security for “exotic” threats. • Leaks from the underground have been plugged. We haven't heard about anything tasty in some years. This silence is a bad sign
  • 12. The conclusion (cont)‫‏‬ Because of the above, it's difficult to predict and develop the security solution for tomorrow and it's increasingly easy for attackers to predict where and how to strike next.
  • 13. What can YOU do • Share information ! • Demand more from the industry. No matter how crazy it might sound today it might just be something we won't be able to live without tomorrow • Don't be afraid to “waste resources” with innovation. • Let us know. Send your requests and thoughts toabalan@bitdefender.com . My spam filters as well as our research teams will be happy to take note of them
  • 14. Q&A