SlideShare une entreprise Scribd logo
1  sur  11
Télécharger pour lire hors ligne
Click to edit Master title style


• Click to edit Master text styles
    – Second level
       • Third level
                Securing Africa
           – Fourth level

                - get prepared for the future to come -
               » Fifth level




                Costin G. Raiu
                Chief Security Expert, Kaspersky Lab EEMEA
                craiu@kaspersky.ro
Today’s agenda
Click to edit Master title style


• Click to edit Master text styles
•   The Threat Landscape: 2009
     – Second level
•   The sidelevel
        • Third
                effects of increased bandwidth
           – Fourth level
               » Fifth level
•   2010 – prevention is better than the cure
•   simple mitigation steps for safer
    computing
Kaspersky Lab: number of signatures
   Click to edit Master title style

1600000
    • Click to edit Master text styles
1400000
                    New threats per day: 30,000
           – Second level
1200000
              • Third level
                    More than 3,500 new signatures/day
1000000                 – Fourth level
                          November 2009: +3 mil
                           » Fifth level
800000

600000

400000

200000

     0

          Year   1998      1999   2000   2001   2002   2003   2004   2005   2006   2007   2008
Internet threats – infected legitimate websites
Click to edit Master title style

   2,000

• Click to edit Master text styles
  1,800
                                                                               15,000%
   1,600
   – Second level                                                             growth vs 2006

   1,400
           • Third level
   1,200
              – Fourth level
   1,000          » Fifth level
    800

    600

    400

    200

      0
                2006                2007                   2008                 2009
                Infected legitimate websites out of a pool of 300K
                           Source: Kaspersky Lab Analytical article
                       http://www.viruslist.com/en/analysis?pubid=204792089
“En masse” infections
Click to edit Master title style

Gumblar, 9-Ball:
• Click to edit Master text styles
    – Second level
       • Third level
           – Fourth level
               » Fifth level
Click tofiber optic connections
Faster edit Master title style


• Click to edit Master text styles
  Seacom
   – Second level
ConnectsThird level
        •
          a large
part of AfricaFourth level
            – with:
    – India     »   Fifth level
    – UK, France
    – UAE, Egypt




                                     Image source: mybroadband.co.za
Seacom -
 Click to edit Master title style
                 effects

 • Click to edit Master text styles
       +
     – Second level
                                                                               -
Cheaper internet
        • Third level                                                    P2P networks
access for allFourth level
           –                                                             file sharing
Faster internet Fifth level
                »
                                                                         Pirate software
connections                                                              Internet attacks
Online commerce

                              Image source: Seacom HQ c/o Linda Carter
Click to social engineering attacks
2010 – edit Master title style


• Click to edit Master text styles
   – Second level
       • Third level
          – Fourth level
              » Fifth level
Click to social engineering attacks
2010 – edit Master title style


• Click to edit Master text styles
   – Second level
       • Third level
          – Fourth level
              » Fifth level
Mitigation steps
Click to edit Master title style


• Click to edit Master is better
      Prevention text styles          than cure!
• Install and levelan Internet Security Suite
   – Second
               run
      • Third level
• Don’t assumelevel
          – Fourth
                     a website is safe because it is high
  profile     » Fifth level

• Use an up-to-date, modern browser: IE8, FF 3.x,
  Chrome, Opera 10
• Keep Windows up-to-date
• Always run the latest versions of Adobe Reader,
  Flash Player, MS Word, etc…
• Be wary of messages from social networks
Click to edit Master title style


• Click to edit Master text styles
    – Second level
           The future is coming – be prepared!
       • Third level
           – Fourth level
               » Fifth level

                      Thank you!

Contenu connexe

En vedette

Sakai – what is changing
Sakai – what is changingSakai – what is changing
Sakai – what is changingBrian Moynihan
 
02 3-aprendizaje colaborativo-cooperativo
02 3-aprendizaje colaborativo-cooperativo02 3-aprendizaje colaborativo-cooperativo
02 3-aprendizaje colaborativo-cooperativoLINA SILVA
 
Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009Ohio LETC
 
Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009Ohio LETC
 
Inovatie locala, impact global
Inovatie locala, impact globalInovatie locala, impact global
Inovatie locala, impact globalCostin Raiu
 
Shakespeare’s Theatre
Shakespeare’s TheatreShakespeare’s Theatre
Shakespeare’s Theatrejohnyap11
 

En vedette (9)

Sakai – what is changing
Sakai – what is changingSakai – what is changing
Sakai – what is changing
 
02 3-aprendizaje colaborativo-cooperativo
02 3-aprendizaje colaborativo-cooperativo02 3-aprendizaje colaborativo-cooperativo
02 3-aprendizaje colaborativo-cooperativo
 
Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009
 
PC osciloskop
PC osciloskopPC osciloskop
PC osciloskop
 
Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009
 
Finge.Unit1cross
Finge.Unit1crossFinge.Unit1cross
Finge.Unit1cross
 
Inovatie locala, impact global
Inovatie locala, impact globalInovatie locala, impact global
Inovatie locala, impact global
 
Shakespeare’s Theatre
Shakespeare’s TheatreShakespeare’s Theatre
Shakespeare’s Theatre
 
Solidarnost
SolidarnostSolidarnost
Solidarnost
 

Similaire à Securing Africa - 2009-2010

Automated Targeted Attacks: The New Age of Cybercrime
Automated Targeted Attacks: The New Age of CybercrimeAutomated Targeted Attacks: The New Age of Cybercrime
Automated Targeted Attacks: The New Age of CybercrimeStefan Tanase
 
Malware * punct ro
Malware * punct roMalware * punct ro
Malware * punct roCostin Raiu
 
Surviving Today's Targeted Attacks
Surviving Today's Targeted AttacksSurviving Today's Targeted Attacks
Surviving Today's Targeted AttacksStefan Tanase
 
Bypassing malware detection mechanisms in online banking
Bypassing malware detection mechanisms in online bankingBypassing malware detection mechanisms in online banking
Bypassing malware detection mechanisms in online bankingJakub Kałużny
 
Today’s hidden dangers: Social networks under attack
Today’s hidden dangers: Social networks under attackToday’s hidden dangers: Social networks under attack
Today’s hidden dangers: Social networks under attackStefan Tanase
 
DevSecOps Done Right - Strategies and Tools.pptx
DevSecOps Done Right - Strategies and Tools.pptxDevSecOps Done Right - Strategies and Tools.pptx
DevSecOps Done Right - Strategies and Tools.pptxDavide Benvegnù
 
New Developments in the BREACH attack
New Developments in the BREACH attackNew Developments in the BREACH attack
New Developments in the BREACH attackE Hacking
 
Anderson montria mobile_presentationtemplate
Anderson montria mobile_presentationtemplateAnderson montria mobile_presentationtemplate
Anderson montria mobile_presentationtemplatemontria
 
Anderson montria mobile_presentation
Anderson montria mobile_presentationAnderson montria mobile_presentation
Anderson montria mobile_presentationmontria
 
Anderson montria mobile_presentation
Anderson montria mobile_presentationAnderson montria mobile_presentation
Anderson montria mobile_presentationmontria
 
The Savage Curtain: Mobile SSL Failures
The Savage Curtain: Mobile SSL FailuresThe Savage Curtain: Mobile SSL Failures
The Savage Curtain: Mobile SSL Failures☠Tony Trummer☠
 
Using Solr to find the Right Person for the Right Job
Using Solr to find the Right Person for the Right JobUsing Solr to find the Right Person for the Right Job
Using Solr to find the Right Person for the Right JobLucidworks (Archived)
 
MongoDB and MongoMK Source Event
MongoDB and MongoMK Source EventMongoDB and MongoMK Source Event
MongoDB and MongoMK Source EventYuval Ararat
 
7 ways of reducing tpm cost
7 ways of reducing tpm cost 7 ways of reducing tpm cost
7 ways of reducing tpm cost TradeInsight
 
Cat valorezi kaspersky
Cat valorezi kasperskyCat valorezi kaspersky
Cat valorezi kasperskyAgora Group
 
Documentation of surgical procedure
Documentation of surgical procedureDocumentation of surgical procedure
Documentation of surgical procedureHieder Al-Shami
 

Similaire à Securing Africa - 2009-2010 (19)

Automated Targeted Attacks: The New Age of Cybercrime
Automated Targeted Attacks: The New Age of CybercrimeAutomated Targeted Attacks: The New Age of Cybercrime
Automated Targeted Attacks: The New Age of Cybercrime
 
Malware * punct ro
Malware * punct roMalware * punct ro
Malware * punct ro
 
Surviving Today's Targeted Attacks
Surviving Today's Targeted AttacksSurviving Today's Targeted Attacks
Surviving Today's Targeted Attacks
 
Bypassing malware detection mechanisms in online banking
Bypassing malware detection mechanisms in online bankingBypassing malware detection mechanisms in online banking
Bypassing malware detection mechanisms in online banking
 
Today’s hidden dangers: Social networks under attack
Today’s hidden dangers: Social networks under attackToday’s hidden dangers: Social networks under attack
Today’s hidden dangers: Social networks under attack
 
DevSecOps Done Right - Strategies and Tools.pptx
DevSecOps Done Right - Strategies and Tools.pptxDevSecOps Done Right - Strategies and Tools.pptx
DevSecOps Done Right - Strategies and Tools.pptx
 
New Developments in the BREACH attack
New Developments in the BREACH attackNew Developments in the BREACH attack
New Developments in the BREACH attack
 
Anderson montria mobile_presentationtemplate
Anderson montria mobile_presentationtemplateAnderson montria mobile_presentationtemplate
Anderson montria mobile_presentationtemplate
 
Microsoft Cloud Computing
Microsoft Cloud ComputingMicrosoft Cloud Computing
Microsoft Cloud Computing
 
Anderson montria mobile_presentation
Anderson montria mobile_presentationAnderson montria mobile_presentation
Anderson montria mobile_presentation
 
Anderson montria mobile_presentation
Anderson montria mobile_presentationAnderson montria mobile_presentation
Anderson montria mobile_presentation
 
The Savage Curtain: Mobile SSL Failures
The Savage Curtain: Mobile SSL FailuresThe Savage Curtain: Mobile SSL Failures
The Savage Curtain: Mobile SSL Failures
 
Using Solr to find the Right Person for the Right Job
Using Solr to find the Right Person for the Right JobUsing Solr to find the Right Person for the Right Job
Using Solr to find the Right Person for the Right Job
 
MongoDB and MongoMK Source Event
MongoDB and MongoMK Source EventMongoDB and MongoMK Source Event
MongoDB and MongoMK Source Event
 
7 ways of reducing tpm cost
7 ways of reducing tpm cost 7 ways of reducing tpm cost
7 ways of reducing tpm cost
 
Cat valorezi kaspersky
Cat valorezi kasperskyCat valorezi kaspersky
Cat valorezi kaspersky
 
Seminário de Segurança em Informática - Microsoft
Seminário de Segurança em Informática - MicrosoftSeminário de Segurança em Informática - Microsoft
Seminário de Segurança em Informática - Microsoft
 
Seminário de Segurança em Informática - Apresentação Andrew Cushman
Seminário de Segurança em Informática - Apresentação Andrew Cushman Seminário de Segurança em Informática - Apresentação Andrew Cushman
Seminário de Segurança em Informática - Apresentação Andrew Cushman
 
Documentation of surgical procedure
Documentation of surgical procedureDocumentation of surgical procedure
Documentation of surgical procedure
 

Dernier

TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...CzechDreamin
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfUK Journal
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPTiSEO AI
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastUXDXConf
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaCzechDreamin
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 

Dernier (20)

TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 

Securing Africa - 2009-2010

  • 1. Click to edit Master title style • Click to edit Master text styles – Second level • Third level Securing Africa – Fourth level - get prepared for the future to come - » Fifth level Costin G. Raiu Chief Security Expert, Kaspersky Lab EEMEA craiu@kaspersky.ro
  • 2. Today’s agenda Click to edit Master title style • Click to edit Master text styles • The Threat Landscape: 2009 – Second level • The sidelevel • Third effects of increased bandwidth – Fourth level » Fifth level • 2010 – prevention is better than the cure • simple mitigation steps for safer computing
  • 3. Kaspersky Lab: number of signatures Click to edit Master title style 1600000 • Click to edit Master text styles 1400000 New threats per day: 30,000 – Second level 1200000 • Third level More than 3,500 new signatures/day 1000000 – Fourth level November 2009: +3 mil » Fifth level 800000 600000 400000 200000 0 Year 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008
  • 4. Internet threats – infected legitimate websites Click to edit Master title style 2,000 • Click to edit Master text styles 1,800 15,000% 1,600 – Second level growth vs 2006 1,400 • Third level 1,200 – Fourth level 1,000 » Fifth level 800 600 400 200 0 2006 2007 2008 2009 Infected legitimate websites out of a pool of 300K Source: Kaspersky Lab Analytical article http://www.viruslist.com/en/analysis?pubid=204792089
  • 5. “En masse” infections Click to edit Master title style Gumblar, 9-Ball: • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level
  • 6. Click tofiber optic connections Faster edit Master title style • Click to edit Master text styles Seacom – Second level ConnectsThird level • a large part of AfricaFourth level – with: – India » Fifth level – UK, France – UAE, Egypt Image source: mybroadband.co.za
  • 7. Seacom - Click to edit Master title style effects • Click to edit Master text styles + – Second level - Cheaper internet • Third level P2P networks access for allFourth level – file sharing Faster internet Fifth level » Pirate software connections Internet attacks Online commerce Image source: Seacom HQ c/o Linda Carter
  • 8. Click to social engineering attacks 2010 – edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level
  • 9. Click to social engineering attacks 2010 – edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level
  • 10. Mitigation steps Click to edit Master title style • Click to edit Master is better Prevention text styles than cure! • Install and levelan Internet Security Suite – Second run • Third level • Don’t assumelevel – Fourth a website is safe because it is high profile » Fifth level • Use an up-to-date, modern browser: IE8, FF 3.x, Chrome, Opera 10 • Keep Windows up-to-date • Always run the latest versions of Adobe Reader, Flash Player, MS Word, etc… • Be wary of messages from social networks
  • 11. Click to edit Master title style • Click to edit Master text styles – Second level The future is coming – be prepared! • Third level – Fourth level » Fifth level Thank you!