SlideShare a Scribd company logo
1 of 12
Andrew Horbury
Product Marketing Manager
andy_horbury@symantec.com
Andrew Shepherd
EMEA Marketing Manager
andrew_shepherd@symantec.com
WEBSITE SECURITY THREATS:
MARCH 2014 UPDATE
Thursday 13th March 2014
Website Security Threats: March 2014 Update
Agenda
Website Security Threats: March 2014 Update
1
2
3
4
5
6
Month in Numbers
Tech Support Scam
A Bad Risk
Vulnerable States
Grayware/Greyware
Stranger than Fiction
7 Good news
The month in numbers
• 360 million stolen credentials found on black market
• "Pony" botnet steals US$200k worth of virtual
currencies
• 60,000 security alerts were set off by Neiman
Marcus attackers
• 5 new malware families and 272 new variants
targeting Android devices each month
• The overall rate of encountering mobile malware in
Russia is 63 percent
• Over 300k user credentials leaked on Pastebin
• With over 800 million records lost 2013 was a big
big year for data breaches
Website Security Threats: March 2014 Update
The month in numbers cont.
• 400Gbps DoS attack hits the net, largest the world has seen...so
far
• Hackers steal 12 million customer records from South Korean
telco
• 1 in 30 have been hit by CryptoLocker and 40% pay the ransom
• 4 out of 5 pressured to roll out IT projects despite security
worries
Website Security Threats: March 2014 Update
Tech Support Scam
• Fake Netflix accounts “frozen”
• New tactic featuring real-time
response when you call
• Stealing data, installing
malware and charging for
non-required health check
and bogus AV
• Not a new tactic but a ‘classic’
that has morphed into a new
and effective one
• http://vimeo.com/88296385
Website Security Threats: March 2014 Update
Energy companies refused insurance due to doubts
over cybersecurity
• Power companies are being
refused insurance for cyber-
attack cover
• Underwriters at Lloyd's of London
have seen a ‘huge increase’ in
demand for cover from energy
firms
• Insurers have been hit hard by
data breach clean up costs from
the growth in cybercrime attacks.
Website Security Threats: March 2014 Update
Vulnerable States
• Parliament.uk website
vulnerabilities highlighted
– XSS vulnerability
• 5000 NHS sites had over 2000
security bugs
– Older WordPress version
– Older web server OS
– Vulnerable to XSS
• Abandoned sites are a major
issue
• shkspr.mobi/blog/
Website Security Threats: March 2014 Update
Mobile Grayware/Greyware…..
• Apps from unofficial marketplaces can be risky….
• Grayware is not new but is taking advantage of the growth of
mobile smartphones and our hunger for apps.
• Malware as a Service: A new RAT toolkit is available for Android
• Malicious apps such a ‘fake’ Flappy Bird is a prime example and
is being used to send premium SMS messages from
unsuspecting users phones
Website Security Threats: March 2014 Update
Stranger than fiction
• Northern Ireland Department of
Justice fined £185,000 for selling filing
cabinet
– ….what was in it?
• Dehli police ignored more than 600
complaints passed onto them from
anticorruption agency over 8 years
– …why?
• Ransonware with a conscience?
• Pay up in 30 days or your money back (or maybe
not)
Website Security Threats: March 2014 Update
Good News
• US woman wins $500K in
revenge-porn suit against ex-
boyfriend
• Six out of ten US firms boost
security spending after
Target breach
• @N Twitter handle returned
to rightful owner
• Man found guilty of
tampering with three
women's computers so he
could spy on them through
their webcams.
Website Security Threats: March 2014 Update
Link Glossary
• Netflix Tech support scam
– http://bit.ly/1erYBHb
– The Future of Mobile Malware
– http://bit.ly/1kinSs4
• 4 out of 5 pros pressured to roll out
IT projects
– http://bit.ly/1g901pJ
• Security in the energy sector
– http://bit.ly/PtcWhd
• Parliament/NHS Vulnerabilities
– shkspr.mobi/blog/ or
http://bit.ly/1i63NEH
• Norton Spot
– http://bit.ly/1cT9x00
• Grayware/Greyware
– http://bit.ly/1iAFUbF
• Android RATS
– http://bit.ly/1lWcu8i
• @N Twitter handle stolen
– http://bit.ly/1cxJtwz
• Download this months slides
– http://slidesha.re/1lWdEAC
Website Security Threats: March 2014 Update
Thank you!
Copyright © 2013 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
Andrew Shepherd
andrew_shepherd@symantec.com / +44 7912 552 896
Andrew Horbury
andy_horbury@symantec.com / +44 7703 468 966
@andyhorbury
Website Security Threats: March 2014 Update
Next webinar: Thursday 17th April 2014
9.30am UK / 10.30am CET

More Related Content

What's hot

Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
Ben Graybar
 
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Symantec
 
Symantec Cyber Security Intelligence Report
Symantec Cyber Security Intelligence ReportSymantec Cyber Security Intelligence Report
Symantec Cyber Security Intelligence Report
Symantec
 
Symantec Intelligence Report September 2014
Symantec Intelligence Report September 2014Symantec Intelligence Report September 2014
Symantec Intelligence Report September 2014
Symantec
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android application
IAEME Publication
 
Symantec Intelligence Report - July 2014
Symantec Intelligence Report - July 2014Symantec Intelligence Report - July 2014
Symantec Intelligence Report - July 2014
Symantec
 

What's hot (20)

Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
 
Symantec Cyber Security Intelligence Report
Symantec Cyber Security Intelligence ReportSymantec Cyber Security Intelligence Report
Symantec Cyber Security Intelligence Report
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threats
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
Cyber Crime Challenges in the Middle East
Cyber Crime Challenges in the Middle EastCyber Crime Challenges in the Middle East
Cyber Crime Challenges in the Middle East
 
Symantec Intelligence Report September 2014
Symantec Intelligence Report September 2014Symantec Intelligence Report September 2014
Symantec Intelligence Report September 2014
 
Cyber Rangers S1 E1
Cyber Rangers S1 E1Cyber Rangers S1 E1
Cyber Rangers S1 E1
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat Report
 
Website Security Threats: September 2013 Update
Website Security Threats: September 2013 UpdateWebsite Security Threats: September 2013 Update
Website Security Threats: September 2013 Update
 
2013 Threat Report
2013 Threat Report2013 Threat Report
2013 Threat Report
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android application
 
Symantec Intelligence Report - July 2014
Symantec Intelligence Report - July 2014Symantec Intelligence Report - July 2014
Symantec Intelligence Report - July 2014
 
State of Internet 1H 2008
State of Internet 1H 2008State of Internet 1H 2008
State of Internet 1H 2008
 
Security troubles in e commerce website
Security troubles in e commerce websiteSecurity troubles in e commerce website
Security troubles in e commerce website
 
Palo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity PredictionsPalo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity Predictions
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Android stats v6 for threat report - Sophos
Android stats v6 for threat report - SophosAndroid stats v6 for threat report - Sophos
Android stats v6 for threat report - Sophos
 

Similar to Symantec Website Security Threats: March 2014 update.

Beza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza belayneh information_warfare_brief
Beza belayneh information_warfare_brief
Beza Belayneh
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
Symantec
 

Similar to Symantec Website Security Threats: March 2014 update. (20)

Symantec Website Security Threats: February 2014 Update.
Symantec Website Security Threats: February 2014 Update.Symantec Website Security Threats: February 2014 Update.
Symantec Website Security Threats: February 2014 Update.
 
Most notable apt_ attacks_of_2015_and_2016 predictions
Most notable apt_ attacks_of_2015_and_2016 predictionsMost notable apt_ attacks_of_2015_and_2016 predictions
Most notable apt_ attacks_of_2015_and_2016 predictions
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Business under cyberassault
Business under cyberassaultBusiness under cyberassault
Business under cyberassault
 
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnline
 
Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five years
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trends
 
Symantec Website Threat Report Part-1 2015
Symantec Website Threat Report Part-1 2015Symantec Website Threat Report Part-1 2015
Symantec Website Threat Report Part-1 2015
 
Cyber security mis
Cyber security  misCyber security  mis
Cyber security mis
 
TECHNICAL WHITE PAPER▶ Symantec Website Security Threat Report
TECHNICAL WHITE PAPER▶ Symantec Website Security Threat ReportTECHNICAL WHITE PAPER▶ Symantec Website Security Threat Report
TECHNICAL WHITE PAPER▶ Symantec Website Security Threat Report
 
Beza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza belayneh information_warfare_brief
Beza belayneh information_warfare_brief
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
Cyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptxCyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptx
 
IT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide DeckIT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide Deck
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...
 
Rise of cyber security v0.1
Rise of cyber security v0.1Rise of cyber security v0.1
Rise of cyber security v0.1
 

More from Symantec Website Security

More from Symantec Website Security (20)

Symantec Code Sign (NAM)
Symantec Code Sign (NAM)Symantec Code Sign (NAM)
Symantec Code Sign (NAM)
 
Symantec Code Signing (SE)
Symantec Code Signing (SE)Symantec Code Signing (SE)
Symantec Code Signing (SE)
 
Сертификаты подписания кода Symantec
Сертификаты подписания кода SymantecСертификаты подписания кода Symantec
Сертификаты подписания кода Symantec
 
Symantec Code Signing (IT)
Symantec Code Signing (IT)Symantec Code Signing (IT)
Symantec Code Signing (IT)
 
Symantec Code Signing (FR)
Symantec Code Signing (FR)Symantec Code Signing (FR)
Symantec Code Signing (FR)
 
Code signing de Symantec (ES)
Code signing de Symantec (ES)Code signing de Symantec (ES)
Code signing de Symantec (ES)
 
Symantec Code Signing (DE)
Symantec Code Signing (DE)Symantec Code Signing (DE)
Symantec Code Signing (DE)
 
Symantec Code Signing (CH)
Symantec Code Signing (CH)Symantec Code Signing (CH)
Symantec Code Signing (CH)
 
Symantec Code Signing (UK)
Symantec Code Signing (UK)Symantec Code Signing (UK)
Symantec Code Signing (UK)
 
Um guia de e-commerce para a aquisição e manutenção de novos clientes da Syma...
Um guia de e-commerce para a aquisição e manutenção de novos clientes da Syma...Um guia de e-commerce para a aquisição e manutenção de novos clientes da Syma...
Um guia de e-commerce para a aquisição e manutenção de novos clientes da Syma...
 
Guide Symantec de conquête et de fidélisation de nouveaux clients sur vos sit...
Guide Symantec de conquête et de fidélisation de nouveaux clients sur vos sit...Guide Symantec de conquête et de fidélisation de nouveaux clients sur vos sit...
Guide Symantec de conquête et de fidélisation de nouveaux clients sur vos sit...
 
Guida per l'e-commerce Symantec - Come acquisire nuovi clienti e conservarli
Guida per l'e-commerce Symantec - Come acquisire nuovi clienti e conservarliGuida per l'e-commerce Symantec - Come acquisire nuovi clienti e conservarli
Guida per l'e-commerce Symantec - Come acquisire nuovi clienti e conservarli
 
Guía de comercio electrónico de Symantec: Cómo atraer y retener a nuevos clients
Guía de comercio electrónico de Symantec: Cómo atraer y retener a nuevos clientsGuía de comercio electrónico de Symantec: Cómo atraer y retener a nuevos clients
Guía de comercio electrónico de Symantec: Cómo atraer y retener a nuevos clients
 
Guía de comercio electrónico de Symantec: Cómo atraer y retener a nuevos clients
Guía de comercio electrónico de Symantec: Cómo atraer y retener a nuevos clientsGuía de comercio electrónico de Symantec: Cómo atraer y retener a nuevos clients
Guía de comercio electrónico de Symantec: Cómo atraer y retener a nuevos clients
 
Guide Symantec de conquête et de fidélisation de nouveaux clients sur vos sit...
Guide Symantec de conquête et de fidélisation de nouveaux clients sur vos sit...Guide Symantec de conquête et de fidélisation de nouveaux clients sur vos sit...
Guide Symantec de conquête et de fidélisation de nouveaux clients sur vos sit...
 
Leitfaden von Symantec: „Das 1×1 der Kundengewinnung und -bindung im E-Commerce“
Leitfaden von Symantec: „Das 1×1 der Kundengewinnung und -bindung im E-Commerce“Leitfaden von Symantec: „Das 1×1 der Kundengewinnung und -bindung im E-Commerce“
Leitfaden von Symantec: „Das 1×1 der Kundengewinnung und -bindung im E-Commerce“
 
Symantec: The rise of hacktivism and insider threats
Symantec: The rise of hacktivism and insider threatsSymantec: The rise of hacktivism and insider threats
Symantec: The rise of hacktivism and insider threats
 
Symantec SSL Explained
Symantec SSL ExplainedSymantec SSL Explained
Symantec SSL Explained
 
Cybercrime - Attack of the Cyber Spies
Cybercrime - Attack of the Cyber SpiesCybercrime - Attack of the Cyber Spies
Cybercrime - Attack of the Cyber Spies
 
Maine, turvallisuus, luotettavuus... verkkokaupan valuutta
Maine, turvallisuus, luotettavuus... verkkokaupan valuuttaMaine, turvallisuus, luotettavuus... verkkokaupan valuutta
Maine, turvallisuus, luotettavuus... verkkokaupan valuutta
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

Symantec Website Security Threats: March 2014 update.

  • 1. Andrew Horbury Product Marketing Manager andy_horbury@symantec.com Andrew Shepherd EMEA Marketing Manager andrew_shepherd@symantec.com WEBSITE SECURITY THREATS: MARCH 2014 UPDATE Thursday 13th March 2014 Website Security Threats: March 2014 Update
  • 2. Agenda Website Security Threats: March 2014 Update 1 2 3 4 5 6 Month in Numbers Tech Support Scam A Bad Risk Vulnerable States Grayware/Greyware Stranger than Fiction 7 Good news
  • 3. The month in numbers • 360 million stolen credentials found on black market • "Pony" botnet steals US$200k worth of virtual currencies • 60,000 security alerts were set off by Neiman Marcus attackers • 5 new malware families and 272 new variants targeting Android devices each month • The overall rate of encountering mobile malware in Russia is 63 percent • Over 300k user credentials leaked on Pastebin • With over 800 million records lost 2013 was a big big year for data breaches Website Security Threats: March 2014 Update
  • 4. The month in numbers cont. • 400Gbps DoS attack hits the net, largest the world has seen...so far • Hackers steal 12 million customer records from South Korean telco • 1 in 30 have been hit by CryptoLocker and 40% pay the ransom • 4 out of 5 pressured to roll out IT projects despite security worries Website Security Threats: March 2014 Update
  • 5. Tech Support Scam • Fake Netflix accounts “frozen” • New tactic featuring real-time response when you call • Stealing data, installing malware and charging for non-required health check and bogus AV • Not a new tactic but a ‘classic’ that has morphed into a new and effective one • http://vimeo.com/88296385 Website Security Threats: March 2014 Update
  • 6. Energy companies refused insurance due to doubts over cybersecurity • Power companies are being refused insurance for cyber- attack cover • Underwriters at Lloyd's of London have seen a ‘huge increase’ in demand for cover from energy firms • Insurers have been hit hard by data breach clean up costs from the growth in cybercrime attacks. Website Security Threats: March 2014 Update
  • 7. Vulnerable States • Parliament.uk website vulnerabilities highlighted – XSS vulnerability • 5000 NHS sites had over 2000 security bugs – Older WordPress version – Older web server OS – Vulnerable to XSS • Abandoned sites are a major issue • shkspr.mobi/blog/ Website Security Threats: March 2014 Update
  • 8. Mobile Grayware/Greyware….. • Apps from unofficial marketplaces can be risky…. • Grayware is not new but is taking advantage of the growth of mobile smartphones and our hunger for apps. • Malware as a Service: A new RAT toolkit is available for Android • Malicious apps such a ‘fake’ Flappy Bird is a prime example and is being used to send premium SMS messages from unsuspecting users phones Website Security Threats: March 2014 Update
  • 9. Stranger than fiction • Northern Ireland Department of Justice fined £185,000 for selling filing cabinet – ….what was in it? • Dehli police ignored more than 600 complaints passed onto them from anticorruption agency over 8 years – …why? • Ransonware with a conscience? • Pay up in 30 days or your money back (or maybe not) Website Security Threats: March 2014 Update
  • 10. Good News • US woman wins $500K in revenge-porn suit against ex- boyfriend • Six out of ten US firms boost security spending after Target breach • @N Twitter handle returned to rightful owner • Man found guilty of tampering with three women's computers so he could spy on them through their webcams. Website Security Threats: March 2014 Update
  • 11. Link Glossary • Netflix Tech support scam – http://bit.ly/1erYBHb – The Future of Mobile Malware – http://bit.ly/1kinSs4 • 4 out of 5 pros pressured to roll out IT projects – http://bit.ly/1g901pJ • Security in the energy sector – http://bit.ly/PtcWhd • Parliament/NHS Vulnerabilities – shkspr.mobi/blog/ or http://bit.ly/1i63NEH • Norton Spot – http://bit.ly/1cT9x00 • Grayware/Greyware – http://bit.ly/1iAFUbF • Android RATS – http://bit.ly/1lWcu8i • @N Twitter handle stolen – http://bit.ly/1cxJtwz • Download this months slides – http://slidesha.re/1lWdEAC Website Security Threats: March 2014 Update
  • 12. Thank you! Copyright © 2013 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Andrew Shepherd andrew_shepherd@symantec.com / +44 7912 552 896 Andrew Horbury andy_horbury@symantec.com / +44 7703 468 966 @andyhorbury Website Security Threats: March 2014 Update Next webinar: Thursday 17th April 2014 9.30am UK / 10.30am CET