SlideShare une entreprise Scribd logo
1  sur  15
Télécharger pour lire hors ligne
Click to edit Master title style


• Click to edit Master text styles
    – Second level
       • Third level
           – Fourth level
                Inovatie locala, impact global
               » Fifth level




                Costin G. Raiu
                Chief Security Expert, Kaspersky Lab EEMEA
                craiu@kaspersky.ro
Agenda
Click to edit Master title style


• Click to edit Master text styles
• Despre Kaspersky Lab
   – Second level
• Inovatielevel
      • Third
              globala - 2010
         – Fourth level
               » Fifth level
• Proiecte locale – KLRO
    – PatroKLes
    – Krab Krawler
• Concluzii
Despre KL
Click to edit Master title style


•• Fondata 1996Master text styles
    Click to edit
    – Second level
• 1600+ de angajati
        • Third level
• 26 de birouri locale
            – Fourth level
   – Olanda, Anglia,level
               » Fifth Franta, Germania, Japonia, Romania, Africa

     de Sud, etc…
• Centre de cercetare in Rusia, Romania, Statele Unite,
  China, Japonia, Germania
• Peste 250 de milioane de utilizatori
Inovatie globala
Click to edit Master title style

• Din 1996 pana in prezent:
• Click to edit Master text styles WS/FS/AS ruland
  – solutii de securitate integrate pe
    – Linux/FreeBSD
      Second level
• Patente: level
      • Third
    – Detectia, eliminarea cailor troieni - Patent No. 7472420
           – Fourth level
      / US Patent and Trademark Office, 30 December, 2008
               » Fifth level

    – Analiza euristica - Patent No. 7530106 / US Patent and
      Trademark Office, 5 May, 2009
    – Integritatea aplicatiillor - Patent No. 7526516 / US
      Patent and Trademark Office, 28th April, 2009
    – Rospatent No. 2363047 – detectie de spam in imagini
Peste 70 de patente pentru tehnologii de
protectie si securitate informatica
Click toZoneMaster title style
 Green edit / Perimetrul Verde

• Kaspersky Internet Security 2010
 • Click to edit Master text styles
• Safe Run / Executare Sigura
    – Second level
       • Third level
           – Fourth level
               » Fifth level
Green to edit–Master title style
 Click Zone Perimetrul Verde


 • Click to edit Master text styles
    – Second level
        • Third level
           – Fourth level
               » Fifth level
Proiecte locale
Click to edit Master title style


• Click to edit Master text styles
• PatroKLes
    – Second level
    – Proiectat si lansat in 2006
       • Third level
    – Scaneaza spatiul de web
          – Fourth level
               » Fifth level
      Romanesc (*.ro)
• Krab Krawler
    – Proiectat si lansat in 2009
    – Detecteaza programe malware pe
      Twitter
PatroKLes - in Romania
Click to edit Master title style


• Click to edit Master text styles
• Aproximativ 40 de noi site-uri infectate
   – Second level
  apar Third level
      • in Romania in fiecare zi
• In momentullevel fata, scanam aproximativ
                     de
         – Fourth level
             » Fifth
  170,000 de site-uri din Romania
• Numarul site-urilor scanate creste in medie cu
  1600 de site-uri noi pe luna
• La inceputul anului, 1 in 150 de site-uri
  Romanesti erau infectate
PatroKLes - in Romania
Click to edit Master title style


• Click to edit Master text styles
    – Second level
       • Third level
           – Fourth level
               » Fifth level
Click to infectate title style
Site-uri edit Master

   2,000

• Click to edit Master text styles
  1,800
                                                                                15,000%
   1,600
   – Second level                                                              growth vs 2006

   1,400
           • Third level
   1,200
              – Fourth level
   1,000          » Fifth level
    800

    600

    400

    200

      0
                2006                 2007                   2008                 2009
                       Site-uri infectate, dintr-un total de 150k
                           Source: Kaspersky Lab Analytical article
                        http://www.viruslist.com/en/analysis?pubid=204792089
Click toin masa
Infectii edit Master title style

Gumblar, 9-Ball:
• Click to edit Master text styles
    – Second level
       • Third level
           – Fourth level
               » Fifth level
Krab Krawler
Click to edit Master title style


• Click to edit Master text styles
• Sistem de analiza a
   – Second level
  mesajelor trimise prin
      • Third level
  intermediul level
         – Fourth
                     site-ului
  Twitter (.com)
              » Fifth level


• Analizeaza
  aproximativ 500,000
  de adrese noi pe zi
• 60GB de date
  analizate pe luna
Krab Krawler
Click to edit Master title style


• Click to edit Master text styles
• Prezentare dedicata – workshop
   – Second level
  “Malicious Tweets”
      • Third level
• 14:00-15:30levelStefan Tanase, Senior
         – Fourth –
  Security Researcher, KL Romania
              » Fifth level
Concluzii
Click to edit Master title style


•   Idee to edit Master text
    Click– Prototip - Produs styles
•   Firmele delevel
     – Second securitate supravietuiesc prin inovatie
•   ExistaThird level
        •
           o lupta level
            – Fourth
                       continua intre criminalii cibernetici si
    firmele de»securitate
                  Fifth level

    – Inovatia are loc de ambele parti
• Este important ca produsele noi sa nu fie doar
  interfete mai frumoase+cutie+preturi revizuite
• In ceea ce priveste securitatea, utilizatorii tin cont de
  tehnologie, mai mult decat in alte domenii
Click to edit Master title style


• Click to edit Master text styles
    – Second level
       • Third level
           – Fourth level
               » Fifth level

                     Multumesc!

Contenu connexe

En vedette

Дигитални осцилоскоп
Дигитални осцилоскопДигитални осцилоскоп
Дигитални осцилоскопСветлана67
 
De la I.A. la calcul paralel, pentru un univers cibernetic mai sigur
De la I.A. la calcul paralel, pentru un univers cibernetic mai sigurDe la I.A. la calcul paralel, pentru un univers cibernetic mai sigur
De la I.A. la calcul paralel, pentru un univers cibernetic mai sigurCostin Raiu
 
Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009Ohio LETC
 
Sakai – what is changing
Sakai – what is changingSakai – what is changing
Sakai – what is changingBrian Moynihan
 
02 3-aprendizaje colaborativo-cooperativo
02 3-aprendizaje colaborativo-cooperativo02 3-aprendizaje colaborativo-cooperativo
02 3-aprendizaje colaborativo-cooperativoLINA SILVA
 
Securing Africa - 2009-2010
Securing Africa - 2009-2010Securing Africa - 2009-2010
Securing Africa - 2009-2010Costin Raiu
 
Xishan Standard 1
Xishan Standard 1Xishan Standard 1
Xishan Standard 1SpecialLeo
 
Shakespeare’s Theatre
Shakespeare’s TheatreShakespeare’s Theatre
Shakespeare’s Theatrejohnyap11
 

En vedette (11)

Дигитални осцилоскоп
Дигитални осцилоскопДигитални осцилоскоп
Дигитални осцилоскоп
 
De la I.A. la calcul paralel, pentru un univers cibernetic mai sigur
De la I.A. la calcul paralel, pentru un univers cibernetic mai sigurDe la I.A. la calcul paralel, pentru un univers cibernetic mai sigur
De la I.A. la calcul paralel, pentru un univers cibernetic mai sigur
 
Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009
 
Sakai – what is changing
Sakai – what is changingSakai – what is changing
Sakai – what is changing
 
02 3-aprendizaje colaborativo-cooperativo
02 3-aprendizaje colaborativo-cooperativo02 3-aprendizaje colaborativo-cooperativo
02 3-aprendizaje colaborativo-cooperativo
 
Securing Africa - 2009-2010
Securing Africa - 2009-2010Securing Africa - 2009-2010
Securing Africa - 2009-2010
 
Xishan Standard 1
Xishan Standard 1Xishan Standard 1
Xishan Standard 1
 
Finge.Unit1cross
Finge.Unit1crossFinge.Unit1cross
Finge.Unit1cross
 
Shakespeare’s Theatre
Shakespeare’s TheatreShakespeare’s Theatre
Shakespeare’s Theatre
 
Solidarnost
SolidarnostSolidarnost
Solidarnost
 
сувд
сувдсувд
сувд
 

Similaire à Inovatie locala, impact global

Malware * punct ro
Malware * punct roMalware * punct ro
Malware * punct roCostin Raiu
 
Bypassing malware detection mechanisms in online banking
Bypassing malware detection mechanisms in online bankingBypassing malware detection mechanisms in online banking
Bypassing malware detection mechanisms in online bankingJakub Kałużny
 
DevSecOps Done Right - Strategies and Tools.pptx
DevSecOps Done Right - Strategies and Tools.pptxDevSecOps Done Right - Strategies and Tools.pptx
DevSecOps Done Right - Strategies and Tools.pptxDavide Benvegnù
 
Using Solr to find the Right Person for the Right Job
Using Solr to find the Right Person for the Right JobUsing Solr to find the Right Person for the Right Job
Using Solr to find the Right Person for the Right JobLucidworks (Archived)
 
Surviving Today's Targeted Attacks
Surviving Today's Targeted AttacksSurviving Today's Targeted Attacks
Surviving Today's Targeted AttacksStefan Tanase
 
Well Planned is Half Done: Planning Projects in the Digitization World
Well Planned is Half Done: Planning Projects in the Digitization WorldWell Planned is Half Done: Planning Projects in the Digitization World
Well Planned is Half Done: Planning Projects in the Digitization WorldFlorida State University
 
New Developments in the BREACH attack
New Developments in the BREACH attackNew Developments in the BREACH attack
New Developments in the BREACH attackE Hacking
 
Automated Targeted Attacks: The New Age of Cybercrime
Automated Targeted Attacks: The New Age of CybercrimeAutomated Targeted Attacks: The New Age of Cybercrime
Automated Targeted Attacks: The New Age of CybercrimeStefan Tanase
 
Today’s hidden dangers: Social networks under attack
Today’s hidden dangers: Social networks under attackToday’s hidden dangers: Social networks under attack
Today’s hidden dangers: Social networks under attackStefan Tanase
 
Enterprise DevOps
Enterprise DevOpsEnterprise DevOps
Enterprise DevOpsVistara
 
Latin American ccTLD Distribution strategies - ICANN 53 presentation
Latin American ccTLD Distribution strategies - ICANN 53 presentationLatin American ccTLD Distribution strategies - ICANN 53 presentation
Latin American ccTLD Distribution strategies - ICANN 53 presentationLogicBoxes
 
Content Marketing and the Digital Dinosaurs
Content Marketing and the Digital DinosaursContent Marketing and the Digital Dinosaurs
Content Marketing and the Digital DinosaursFrances Deighton
 
The Savage Curtain: Mobile SSL Failures
The Savage Curtain: Mobile SSL FailuresThe Savage Curtain: Mobile SSL Failures
The Savage Curtain: Mobile SSL Failures☠Tony Trummer☠
 
MongoDB and MongoMK Source Event
MongoDB and MongoMK Source EventMongoDB and MongoMK Source Event
MongoDB and MongoMK Source EventYuval Ararat
 
CCW Conference 2021: Scott Waby, National Library of Wales
CCW Conference 2021: Scott Waby, National Library of WalesCCW Conference 2021: Scott Waby, National Library of Wales
CCW Conference 2021: Scott Waby, National Library of WalesCILIP
 
Anderson montria mobile_presentation
Anderson montria mobile_presentationAnderson montria mobile_presentation
Anderson montria mobile_presentationmontria
 
Anderson montria mobile_presentation
Anderson montria mobile_presentationAnderson montria mobile_presentation
Anderson montria mobile_presentationmontria
 
Real Time Advertising: Project Sunblock, Ensuring quality and brand protectio...
Real Time Advertising: Project Sunblock, Ensuring quality and brand protectio...Real Time Advertising: Project Sunblock, Ensuring quality and brand protectio...
Real Time Advertising: Project Sunblock, Ensuring quality and brand protectio...MediaSense
 

Similaire à Inovatie locala, impact global (20)

Malware * punct ro
Malware * punct roMalware * punct ro
Malware * punct ro
 
Bypassing malware detection mechanisms in online banking
Bypassing malware detection mechanisms in online bankingBypassing malware detection mechanisms in online banking
Bypassing malware detection mechanisms in online banking
 
DevSecOps Done Right - Strategies and Tools.pptx
DevSecOps Done Right - Strategies and Tools.pptxDevSecOps Done Right - Strategies and Tools.pptx
DevSecOps Done Right - Strategies and Tools.pptx
 
Using Solr to find the Right Person for the Right Job
Using Solr to find the Right Person for the Right JobUsing Solr to find the Right Person for the Right Job
Using Solr to find the Right Person for the Right Job
 
Surviving Today's Targeted Attacks
Surviving Today's Targeted AttacksSurviving Today's Targeted Attacks
Surviving Today's Targeted Attacks
 
Well Planned is Half Done: Planning Projects in the Digitization World
Well Planned is Half Done: Planning Projects in the Digitization WorldWell Planned is Half Done: Planning Projects in the Digitization World
Well Planned is Half Done: Planning Projects in the Digitization World
 
New Developments in the BREACH attack
New Developments in the BREACH attackNew Developments in the BREACH attack
New Developments in the BREACH attack
 
Automated Targeted Attacks: The New Age of Cybercrime
Automated Targeted Attacks: The New Age of CybercrimeAutomated Targeted Attacks: The New Age of Cybercrime
Automated Targeted Attacks: The New Age of Cybercrime
 
DiscoveringDH_ManagingDigitalProjects
DiscoveringDH_ManagingDigitalProjectsDiscoveringDH_ManagingDigitalProjects
DiscoveringDH_ManagingDigitalProjects
 
Today’s hidden dangers: Social networks under attack
Today’s hidden dangers: Social networks under attackToday’s hidden dangers: Social networks under attack
Today’s hidden dangers: Social networks under attack
 
Enterprise DevOps
Enterprise DevOpsEnterprise DevOps
Enterprise DevOps
 
Latin American ccTLD Distribution strategies - ICANN 53 presentation
Latin American ccTLD Distribution strategies - ICANN 53 presentationLatin American ccTLD Distribution strategies - ICANN 53 presentation
Latin American ccTLD Distribution strategies - ICANN 53 presentation
 
Content Marketing and the Digital Dinosaurs
Content Marketing and the Digital DinosaursContent Marketing and the Digital Dinosaurs
Content Marketing and the Digital Dinosaurs
 
The Savage Curtain: Mobile SSL Failures
The Savage Curtain: Mobile SSL FailuresThe Savage Curtain: Mobile SSL Failures
The Savage Curtain: Mobile SSL Failures
 
MongoDB and MongoMK Source Event
MongoDB and MongoMK Source EventMongoDB and MongoMK Source Event
MongoDB and MongoMK Source Event
 
CCW Conference 2021: Scott Waby, National Library of Wales
CCW Conference 2021: Scott Waby, National Library of WalesCCW Conference 2021: Scott Waby, National Library of Wales
CCW Conference 2021: Scott Waby, National Library of Wales
 
Microsoft Cloud Computing
Microsoft Cloud ComputingMicrosoft Cloud Computing
Microsoft Cloud Computing
 
Anderson montria mobile_presentation
Anderson montria mobile_presentationAnderson montria mobile_presentation
Anderson montria mobile_presentation
 
Anderson montria mobile_presentation
Anderson montria mobile_presentationAnderson montria mobile_presentation
Anderson montria mobile_presentation
 
Real Time Advertising: Project Sunblock, Ensuring quality and brand protectio...
Real Time Advertising: Project Sunblock, Ensuring quality and brand protectio...Real Time Advertising: Project Sunblock, Ensuring quality and brand protectio...
Real Time Advertising: Project Sunblock, Ensuring quality and brand protectio...
 

Dernier

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Inovatie locala, impact global

  • 1. Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level Inovatie locala, impact global » Fifth level Costin G. Raiu Chief Security Expert, Kaspersky Lab EEMEA craiu@kaspersky.ro
  • 2. Agenda Click to edit Master title style • Click to edit Master text styles • Despre Kaspersky Lab – Second level • Inovatielevel • Third globala - 2010 – Fourth level » Fifth level • Proiecte locale – KLRO – PatroKLes – Krab Krawler • Concluzii
  • 3. Despre KL Click to edit Master title style •• Fondata 1996Master text styles Click to edit – Second level • 1600+ de angajati • Third level • 26 de birouri locale – Fourth level – Olanda, Anglia,level » Fifth Franta, Germania, Japonia, Romania, Africa de Sud, etc… • Centre de cercetare in Rusia, Romania, Statele Unite, China, Japonia, Germania • Peste 250 de milioane de utilizatori
  • 4. Inovatie globala Click to edit Master title style • Din 1996 pana in prezent: • Click to edit Master text styles WS/FS/AS ruland – solutii de securitate integrate pe – Linux/FreeBSD Second level • Patente: level • Third – Detectia, eliminarea cailor troieni - Patent No. 7472420 – Fourth level / US Patent and Trademark Office, 30 December, 2008 » Fifth level – Analiza euristica - Patent No. 7530106 / US Patent and Trademark Office, 5 May, 2009 – Integritatea aplicatiillor - Patent No. 7526516 / US Patent and Trademark Office, 28th April, 2009 – Rospatent No. 2363047 – detectie de spam in imagini Peste 70 de patente pentru tehnologii de protectie si securitate informatica
  • 5. Click toZoneMaster title style Green edit / Perimetrul Verde • Kaspersky Internet Security 2010 • Click to edit Master text styles • Safe Run / Executare Sigura – Second level • Third level – Fourth level » Fifth level
  • 6. Green to edit–Master title style Click Zone Perimetrul Verde • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level
  • 7. Proiecte locale Click to edit Master title style • Click to edit Master text styles • PatroKLes – Second level – Proiectat si lansat in 2006 • Third level – Scaneaza spatiul de web – Fourth level » Fifth level Romanesc (*.ro) • Krab Krawler – Proiectat si lansat in 2009 – Detecteaza programe malware pe Twitter
  • 8. PatroKLes - in Romania Click to edit Master title style • Click to edit Master text styles • Aproximativ 40 de noi site-uri infectate – Second level apar Third level • in Romania in fiecare zi • In momentullevel fata, scanam aproximativ de – Fourth level » Fifth 170,000 de site-uri din Romania • Numarul site-urilor scanate creste in medie cu 1600 de site-uri noi pe luna • La inceputul anului, 1 in 150 de site-uri Romanesti erau infectate
  • 9. PatroKLes - in Romania Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level
  • 10. Click to infectate title style Site-uri edit Master 2,000 • Click to edit Master text styles 1,800 15,000% 1,600 – Second level growth vs 2006 1,400 • Third level 1,200 – Fourth level 1,000 » Fifth level 800 600 400 200 0 2006 2007 2008 2009 Site-uri infectate, dintr-un total de 150k Source: Kaspersky Lab Analytical article http://www.viruslist.com/en/analysis?pubid=204792089
  • 11. Click toin masa Infectii edit Master title style Gumblar, 9-Ball: • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level
  • 12. Krab Krawler Click to edit Master title style • Click to edit Master text styles • Sistem de analiza a – Second level mesajelor trimise prin • Third level intermediul level – Fourth site-ului Twitter (.com) » Fifth level • Analizeaza aproximativ 500,000 de adrese noi pe zi • 60GB de date analizate pe luna
  • 13. Krab Krawler Click to edit Master title style • Click to edit Master text styles • Prezentare dedicata – workshop – Second level “Malicious Tweets” • Third level • 14:00-15:30levelStefan Tanase, Senior – Fourth – Security Researcher, KL Romania » Fifth level
  • 14. Concluzii Click to edit Master title style • Idee to edit Master text Click– Prototip - Produs styles • Firmele delevel – Second securitate supravietuiesc prin inovatie • ExistaThird level • o lupta level – Fourth continua intre criminalii cibernetici si firmele de»securitate Fifth level – Inovatia are loc de ambele parti • Este important ca produsele noi sa nu fie doar interfete mai frumoase+cutie+preturi revizuite • In ceea ce priveste securitatea, utilizatorii tin cont de tehnologie, mai mult decat in alte domenii
  • 15. Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level Multumesc!