SlideShare une entreprise Scribd logo
1  sur  19
Security Threat Report 2008: What you need to know Christopher Vernon Senior Sales Engineer, Sophos
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Malware – The Size and Shape ,[object Object],[object Object],[object Object],[object Object],[object Object]
Shift in Delivery ,[object Object],[object Object],[object Object],[object Object],[object Object]
Spam – China and Beyond ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Pump and Dump Done? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Phishing - Socializing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Social Targets ,[object Object],[object Object],[object Object],[object Object]
Spear Phishing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Remember Phishing  works on  all  platforms!
Web – The Threat to Your Reputation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SQL Injection Attacks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Not Just a Microsoft Problem ,[object Object],[object Object]
What about Apple? ,[object Object],[object Object],[object Object],[object Object],[object Object]
What about Mobile? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What About Linux? ,[object Object],[object Object],[object Object]
SophosLabs global network of experts SophosLabs™ Knows Threats Better  Than Anyone
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Staying ahead of the curve ,[object Object],[object Object]
Thank you ,[object Object],[object Object]

Contenu connexe

Tendances

Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
sharing notes123
 
Ibm risk management-30min
Ibm risk management-30minIbm risk management-30min
Ibm risk management-30min
Kim Aarenstrup
 
Computer worm
Computer wormComputer worm
Computer worm
zelkan19
 
Code Red Virus
Code Red VirusCode Red Virus
Code Red Virus
smithz
 
Code Red Worm
Code Red WormCode Red Worm
Code Red Worm
RaDe0N
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
adni_shadah
 

Tendances (20)

Report on Rogue Security Software: a summary
Report on Rogue Security Software: a summaryReport on Rogue Security Software: a summary
Report on Rogue Security Software: a summary
 
Today's malware aint what you think
Today's malware aint what you thinkToday's malware aint what you think
Today's malware aint what you think
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
 
Malicious malware breaches - eScan
Malicious malware breaches - eScanMalicious malware breaches - eScan
Malicious malware breaches - eScan
 
PC Maker's Support Page Succumbs To Compromise
PC Maker's Support Page Succumbs To CompromisePC Maker's Support Page Succumbs To Compromise
PC Maker's Support Page Succumbs To Compromise
 
Ibm risk management-30min
Ibm risk management-30minIbm risk management-30min
Ibm risk management-30min
 
Malware
MalwareMalware
Malware
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
 
Computer worm
Computer wormComputer worm
Computer worm
 
Malware
MalwareMalware
Malware
 
Code Red Virus
Code Red VirusCode Red Virus
Code Red Virus
 
M
MM
M
 
Code Red Worm
Code Red WormCode Red Worm
Code Red Worm
 
Presentación - Protecting your Employess, Customers, and Investments in the A...
Presentación - Protecting your Employess, Customers, and Investments in the A...Presentación - Protecting your Employess, Customers, and Investments in the A...
Presentación - Protecting your Employess, Customers, and Investments in the A...
 
Iranian Hackers Have Hit Hundreds of Companies in Past Two Years
Iranian Hackers Have Hit Hundreds of Companies in Past Two YearsIranian Hackers Have Hit Hundreds of Companies in Past Two Years
Iranian Hackers Have Hit Hundreds of Companies in Past Two Years
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 

En vedette (7)

Beneath the veil
Beneath the veilBeneath the veil
Beneath the veil
 
Beck Azar Portfolio
Beck Azar Portfolio Beck Azar Portfolio
Beck Azar Portfolio
 
Centre Sustainability Reporting Demo
Centre Sustainability Reporting DemoCentre Sustainability Reporting Demo
Centre Sustainability Reporting Demo
 
Anypoint mule main 3.7
Anypoint mule main 3.7Anypoint mule main 3.7
Anypoint mule main 3.7
 
Presentatie Na4all Informatie Aan Zee 11092009 V0.01
Presentatie Na4all Informatie Aan Zee 11092009 V0.01Presentatie Na4all Informatie Aan Zee 11092009 V0.01
Presentatie Na4all Informatie Aan Zee 11092009 V0.01
 
Workshop Erfgoedhuis Zh
Workshop Erfgoedhuis ZhWorkshop Erfgoedhuis Zh
Workshop Erfgoedhuis Zh
 
Nationaal Archief & Flickr- the Commons
Nationaal Archief & Flickr- the CommonsNationaal Archief & Flickr- the Commons
Nationaal Archief & Flickr- the Commons
 

Similaire à 0926182320 Sophos[1]

Objectives- Research and analyze malware- Post must be at least 200 wo.pdf
Objectives- Research and analyze malware- Post must be at least 200 wo.pdfObjectives- Research and analyze malware- Post must be at least 200 wo.pdf
Objectives- Research and analyze malware- Post must be at least 200 wo.pdf
Augstore
 
Arrott Htcia St Johns 101020
Arrott Htcia St Johns 101020Arrott Htcia St Johns 101020
Arrott Htcia St Johns 101020
Anthony Arrott
 
2009 X Force Treath And Risk Wwiscop
2009 X Force Treath And Risk  Wwiscop2009 X Force Treath And Risk  Wwiscop
2009 X Force Treath And Risk Wwiscop
Juan Carlos Carrillo
 
Mod2 wfbs new starter
Mod2 wfbs new starterMod2 wfbs new starter
Mod2 wfbs new starter
Ian Thiele
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
MArshad35
 

Similaire à 0926182320 Sophos[1] (20)

Objectives- Research and analyze malware- Post must be at least 200 wo.pdf
Objectives- Research and analyze malware- Post must be at least 200 wo.pdfObjectives- Research and analyze malware- Post must be at least 200 wo.pdf
Objectives- Research and analyze malware- Post must be at least 200 wo.pdf
 
Arrott Htcia St Johns 101020
Arrott Htcia St Johns 101020Arrott Htcia St Johns 101020
Arrott Htcia St Johns 101020
 
C3
C3C3
C3
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
External threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimesExternal threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimes
 
Hacking 10 2010
Hacking 10 2010Hacking 10 2010
Hacking 10 2010
 
File000145
File000145File000145
File000145
 
Symantec intelligence report august 2015
Symantec intelligence report august 2015Symantec intelligence report august 2015
Symantec intelligence report august 2015
 
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About RansomwareWhat Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
 
Network Threats
Network ThreatsNetwork Threats
Network Threats
 
2009 X Force Treath And Risk Wwiscop
2009 X Force Treath And Risk  Wwiscop2009 X Force Treath And Risk  Wwiscop
2009 X Force Treath And Risk Wwiscop
 
Mod2 wfbs new starter
Mod2 wfbs new starterMod2 wfbs new starter
Mod2 wfbs new starter
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
2013 Threat Report
2013 Threat Report2013 Threat Report
2013 Threat Report
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
The rise of malware(ransomware)
The rise of malware(ransomware)The rise of malware(ransomware)
The rise of malware(ransomware)
 
When web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sickWhen web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sick
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat Report
 
Presentatie Kaspersky over Malware trends en statistieken, 26062015
Presentatie Kaspersky over Malware trends en statistieken, 26062015Presentatie Kaspersky over Malware trends en statistieken, 26062015
Presentatie Kaspersky over Malware trends en statistieken, 26062015
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

0926182320 Sophos[1]

  • 1. Security Threat Report 2008: What you need to know Christopher Vernon Senior Sales Engineer, Sophos
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. SophosLabs global network of experts SophosLabs™ Knows Threats Better Than Anyone
  • 17.
  • 18.
  • 19.