SlideShare une entreprise Scribd logo
1  sur  11
Télécharger pour lire hors ligne
Click to edit Master title style


• Click to edit Master text styles
    – Second level
       • Third level
                Securing Africa
           – Fourth level

                - get prepared for the future to come -
               » Fifth level




                Costin G. Raiu
                Chief Security Expert, Kaspersky Lab EEMEA
                craiu@kaspersky.ro
Today’s agenda
Click to edit Master title style


• Click to edit Master text styles
•   The Threat Landscape: 2009
     – Second level
•   The sidelevel
        • Third
                effects of increased bandwidth
           – Fourth level
               » Fifth level
•   2010 – prevention is better than the cure
•   simple mitigation steps for safer
    computing
Kaspersky Lab: number of signatures
   Click to edit Master title style

1600000
    • Click to edit Master text styles
1400000
                    New threats per day: 30,000
           – Second level
1200000
              • Third level
                    More than 3,500 new signatures/day
1000000                 – Fourth level
                          November 2009: +3 mil
                           » Fifth level
800000

600000

400000

200000

     0

          Year   1998      1999   2000   2001   2002   2003   2004   2005   2006   2007   2008
Internet threats – infected legitimate websites
Click to edit Master title style

   2,000

• Click to edit Master text styles
  1,800
                                                                               15,000%
   1,600
   – Second level                                                             growth vs 2006

   1,400
           • Third level
   1,200
              – Fourth level
   1,000          » Fifth level
    800

    600

    400

    200

      0
                2006                2007                   2008                 2009
                Infected legitimate websites out of a pool of 300K
                           Source: Kaspersky Lab Analytical article
                       http://www.viruslist.com/en/analysis?pubid=204792089
“En masse” infections
Click to edit Master title style

Gumblar, 9-Ball:
• Click to edit Master text styles
    – Second level
       • Third level
           – Fourth level
               » Fifth level
Click tofiber optic connections
Faster edit Master title style


• Click to edit Master text styles
  Seacom
   – Second level
ConnectsThird level
        •
          a large
part of AfricaFourth level
            – with:
    – India     »   Fifth level
    – UK, France
    – UAE, Egypt




                                     Image source: mybroadband.co.za
Seacom -
 Click to edit Master title style
                 effects

 • Click to edit Master text styles
       +
     – Second level
                                                                               -
Cheaper internet
        • Third level                                                    P2P networks
access for allFourth level
           –                                                             file sharing
Faster internet Fifth level
                »
                                                                         Pirate software
connections                                                              Internet attacks
Online commerce

                              Image source: Seacom HQ c/o Linda Carter
Click to social engineering attacks
2010 – edit Master title style


• Click to edit Master text styles
   – Second level
       • Third level
          – Fourth level
              » Fifth level
Click to social engineering attacks
2010 – edit Master title style


• Click to edit Master text styles
   – Second level
       • Third level
          – Fourth level
              » Fifth level
Mitigation steps
Click to edit Master title style


• Click to edit Master is better
      Prevention text styles          than cure!
• Install and levelan Internet Security Suite
   – Second
               run
      • Third level
• Don’t assumelevel
          – Fourth
                     a website is safe because it is high
  profile     » Fifth level

• Use an up-to-date, modern browser: IE8, FF 3.x,
  Chrome, Opera 10
• Keep Windows up-to-date
• Always run the latest versions of Adobe Reader,
  Flash Player, MS Word, etc…
• Be wary of messages from social networks
Click to edit Master title style


• Click to edit Master text styles
    – Second level
           The future is coming – be prepared!
       • Third level
           – Fourth level
               » Fifth level

                      Thank you!

Contenu connexe

En vedette (9)

Sakai – what is changing
Sakai – what is changingSakai – what is changing
Sakai – what is changing
 
02 3-aprendizaje colaborativo-cooperativo
02 3-aprendizaje colaborativo-cooperativo02 3-aprendizaje colaborativo-cooperativo
02 3-aprendizaje colaborativo-cooperativo
 
Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009
 
PC osciloskop
PC osciloskopPC osciloskop
PC osciloskop
 
Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009
 
Finge.Unit1cross
Finge.Unit1crossFinge.Unit1cross
Finge.Unit1cross
 
Inovatie locala, impact global
Inovatie locala, impact globalInovatie locala, impact global
Inovatie locala, impact global
 
Shakespeare’s Theatre
Shakespeare’s TheatreShakespeare’s Theatre
Shakespeare’s Theatre
 
Solidarnost
SolidarnostSolidarnost
Solidarnost
 

Similaire à Securing Africa - 2009-2010

Automated Targeted Attacks: The New Age of Cybercrime
Automated Targeted Attacks: The New Age of CybercrimeAutomated Targeted Attacks: The New Age of Cybercrime
Automated Targeted Attacks: The New Age of Cybercrime
Stefan Tanase
 
Surviving Today's Targeted Attacks
Surviving Today's Targeted AttacksSurviving Today's Targeted Attacks
Surviving Today's Targeted Attacks
Stefan Tanase
 
Bypassing malware detection mechanisms in online banking
Bypassing malware detection mechanisms in online bankingBypassing malware detection mechanisms in online banking
Bypassing malware detection mechanisms in online banking
Jakub Kałużny
 
Anderson montria mobile_presentationtemplate
Anderson montria mobile_presentationtemplateAnderson montria mobile_presentationtemplate
Anderson montria mobile_presentationtemplate
montria
 
Anderson montria mobile_presentation
Anderson montria mobile_presentationAnderson montria mobile_presentation
Anderson montria mobile_presentation
montria
 
Anderson montria mobile_presentation
Anderson montria mobile_presentationAnderson montria mobile_presentation
Anderson montria mobile_presentation
montria
 
Using Solr to find the Right Person for the Right Job
Using Solr to find the Right Person for the Right JobUsing Solr to find the Right Person for the Right Job
Using Solr to find the Right Person for the Right Job
Lucidworks (Archived)
 
7 ways of reducing tpm cost
7 ways of reducing tpm cost 7 ways of reducing tpm cost
7 ways of reducing tpm cost
TradeInsight
 

Similaire à Securing Africa - 2009-2010 (20)

Automated Targeted Attacks: The New Age of Cybercrime
Automated Targeted Attacks: The New Age of CybercrimeAutomated Targeted Attacks: The New Age of Cybercrime
Automated Targeted Attacks: The New Age of Cybercrime
 
Malware * punct ro
Malware * punct roMalware * punct ro
Malware * punct ro
 
Surviving Today's Targeted Attacks
Surviving Today's Targeted AttacksSurviving Today's Targeted Attacks
Surviving Today's Targeted Attacks
 
Bypassing malware detection mechanisms in online banking
Bypassing malware detection mechanisms in online bankingBypassing malware detection mechanisms in online banking
Bypassing malware detection mechanisms in online banking
 
Today’s hidden dangers: Social networks under attack
Today’s hidden dangers: Social networks under attackToday’s hidden dangers: Social networks under attack
Today’s hidden dangers: Social networks under attack
 
DevSecOps Done Right - Strategies and Tools.pptx
DevSecOps Done Right - Strategies and Tools.pptxDevSecOps Done Right - Strategies and Tools.pptx
DevSecOps Done Right - Strategies and Tools.pptx
 
New Developments in the BREACH attack
New Developments in the BREACH attackNew Developments in the BREACH attack
New Developments in the BREACH attack
 
Anderson montria mobile_presentationtemplate
Anderson montria mobile_presentationtemplateAnderson montria mobile_presentationtemplate
Anderson montria mobile_presentationtemplate
 
Microsoft Cloud Computing
Microsoft Cloud ComputingMicrosoft Cloud Computing
Microsoft Cloud Computing
 
Anderson montria mobile_presentation
Anderson montria mobile_presentationAnderson montria mobile_presentation
Anderson montria mobile_presentation
 
Anderson montria mobile_presentation
Anderson montria mobile_presentationAnderson montria mobile_presentation
Anderson montria mobile_presentation
 
The Savage Curtain: Mobile SSL Failures
The Savage Curtain: Mobile SSL FailuresThe Savage Curtain: Mobile SSL Failures
The Savage Curtain: Mobile SSL Failures
 
Using Solr to find the Right Person for the Right Job
Using Solr to find the Right Person for the Right JobUsing Solr to find the Right Person for the Right Job
Using Solr to find the Right Person for the Right Job
 
MongoDB and MongoMK Source Event
MongoDB and MongoMK Source EventMongoDB and MongoMK Source Event
MongoDB and MongoMK Source Event
 
7 ways of reducing tpm cost
7 ways of reducing tpm cost 7 ways of reducing tpm cost
7 ways of reducing tpm cost
 
Cat valorezi kaspersky
Cat valorezi kasperskyCat valorezi kaspersky
Cat valorezi kaspersky
 
Seminário de Segurança em Informática - Microsoft
Seminário de Segurança em Informática - MicrosoftSeminário de Segurança em Informática - Microsoft
Seminário de Segurança em Informática - Microsoft
 
Seminário de Segurança em Informática - Apresentação Andrew Cushman
Seminário de Segurança em Informática - Apresentação Andrew Cushman Seminário de Segurança em Informática - Apresentação Andrew Cushman
Seminário de Segurança em Informática - Apresentação Andrew Cushman
 
Brighton SEO Talk Deck
Brighton SEO Talk DeckBrighton SEO Talk Deck
Brighton SEO Talk Deck
 
Touch Video Academy Brighton SEO 2018 Talk
Touch Video Academy Brighton SEO 2018 TalkTouch Video Academy Brighton SEO 2018 Talk
Touch Video Academy Brighton SEO 2018 Talk
 

Dernier

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Securing Africa - 2009-2010

  • 1. Click to edit Master title style • Click to edit Master text styles – Second level • Third level Securing Africa – Fourth level - get prepared for the future to come - » Fifth level Costin G. Raiu Chief Security Expert, Kaspersky Lab EEMEA craiu@kaspersky.ro
  • 2. Today’s agenda Click to edit Master title style • Click to edit Master text styles • The Threat Landscape: 2009 – Second level • The sidelevel • Third effects of increased bandwidth – Fourth level » Fifth level • 2010 – prevention is better than the cure • simple mitigation steps for safer computing
  • 3. Kaspersky Lab: number of signatures Click to edit Master title style 1600000 • Click to edit Master text styles 1400000 New threats per day: 30,000 – Second level 1200000 • Third level More than 3,500 new signatures/day 1000000 – Fourth level November 2009: +3 mil » Fifth level 800000 600000 400000 200000 0 Year 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008
  • 4. Internet threats – infected legitimate websites Click to edit Master title style 2,000 • Click to edit Master text styles 1,800 15,000% 1,600 – Second level growth vs 2006 1,400 • Third level 1,200 – Fourth level 1,000 » Fifth level 800 600 400 200 0 2006 2007 2008 2009 Infected legitimate websites out of a pool of 300K Source: Kaspersky Lab Analytical article http://www.viruslist.com/en/analysis?pubid=204792089
  • 5. “En masse” infections Click to edit Master title style Gumblar, 9-Ball: • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level
  • 6. Click tofiber optic connections Faster edit Master title style • Click to edit Master text styles Seacom – Second level ConnectsThird level • a large part of AfricaFourth level – with: – India » Fifth level – UK, France – UAE, Egypt Image source: mybroadband.co.za
  • 7. Seacom - Click to edit Master title style effects • Click to edit Master text styles + – Second level - Cheaper internet • Third level P2P networks access for allFourth level – file sharing Faster internet Fifth level » Pirate software connections Internet attacks Online commerce Image source: Seacom HQ c/o Linda Carter
  • 8. Click to social engineering attacks 2010 – edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level
  • 9. Click to social engineering attacks 2010 – edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level
  • 10. Mitigation steps Click to edit Master title style • Click to edit Master is better Prevention text styles than cure! • Install and levelan Internet Security Suite – Second run • Third level • Don’t assumelevel – Fourth a website is safe because it is high profile » Fifth level • Use an up-to-date, modern browser: IE8, FF 3.x, Chrome, Opera 10 • Keep Windows up-to-date • Always run the latest versions of Adobe Reader, Flash Player, MS Word, etc… • Be wary of messages from social networks
  • 11. Click to edit Master title style • Click to edit Master text styles – Second level The future is coming – be prepared! • Third level – Fourth level » Fifth level Thank you!