1. McAfee 2010 Q1 Release Marc Vos Sr. Manager, Worldwide Product Marketing
2. The Consumer Security Landscape In 2009, consumers were exposed to 12.3M unique threats, up 146% from 20081 An average of 148,000 new zombie PCs created every day in the year 20091 Email (74 %) and Web pages (28.9%) were the two primary mechanisms used for fraudulent contact2 Predictions for 2010 indicate Facebook and Adobe as new targets for delivering malware1 2 Source: 1McAfee Labs 3rd QTR Threat Report, 2 2009 Internet Crime Report (IC3)
3. The Consumer Security Landscape- Malware Malware doubled over past few years Growth in Password Stealing Trojans Source: McAfee Labs Threat Report
4. The Consumer Security Landscape- Malware AutoRun Malware Portable storage devices continue to drive AutoRun Malware “the number-one piece of malware detected globally.” McAfee Labs Source: McAfee Labs Threat Report
5. The Consumer Security Landscape- Malware Email attachments have delivered malware for years, yet the increasing number of attacks still fools users into downloading Trojans and other malware. Cybercriminals have long picked on Microsoft products due to their popularity. In 2010 Adobe software, especially Acrobat Reader and Flash, will likely take the top spot. Source: McAfee Labs Threat Report
6. The Consumer Security Landscape- Social Media Phishing using URL services like Bit.ly and Tinyurl.com Hijacking legitimate accounts Social Media usage can lead to ID theft Email messages with dangerous attachments that appear to be sent from a social networking site Source: McAfee Labs Threat Report
7. 2009- A Record Year for Web-based Threats 7 Koobface, an anagram of Facebook, is a computer worm that targets the users of the social networking websites Facebook, MySpace, hi5, Bebo, Friendster and Twitter. Koobfaceultimately attempts, upon successful infection, to gather sensitive information from the victims such as credit card numbers. It was first detected in December 2008 Source: McAfee Labs Threat Report
8. The Consumer Security Landscape- Spam and Zombies In 2009 zombies and phishing grew to record levels Zombie PCs sending spam, by month Phishing email volume changes in the last 18 months Source: McAfee Labs
9. 9 Effective Consumers’ Needs in Security Software Least Important Most Important Effective Fast Easy to use Informative Comprehensive Silent Fast Adaptable Easy to use Educational 1 McAfee Market Research survey in July 2009, N=350
10. 10 The McAfee Experience: True Versionless Software Q1 McAfee customers get automatic upgrades 2009 2010 Customer receives automatic update Customer restarts computer Customer gets the latest protection
12. 12 McAfee 2010, Q1 Release- Delivering What Consumers are Looking For Effective Award winning security that offers best of breed protection ¹AV-Test.org malware detection results published in ComputerBild magazine (Issue 26: 12/05/09) Improved Performance Completely re-engineered for the faster PC performance ¹Network Testing Labs Analysis, McAfee Total Protection 2010 versus McAfee Total Protection 2009 Ease of Use Totally redesigned user interface and interaction offers a simple and intuitive PC security experience ¹Major Independent Research Agency, Study Conducted October 2009 versus Competition, N=1000
14. 14 t1 t2 t3 t4 t0 Malware in the wild Malware discovered Protection is available Protection is downloaded Protection is deployed Q1 The Protection Gap Protection gap with traditional solutions From the time malware is in the wild to the time protection is deployed is the protection gap
15. 15 McAfee is the Fastest in Protection! t4 t2 t3 t1 t0 Malware in the wild Malware discovered Protection is available Protection is downloaded Protection is deployed Q1 Protection deliveredin real-time
21. Effective Protection SiteAdvisor Database 1 Web Download Protection (New & Unique) Searching the Internet with McAfee is even safer. McAfee SiteAdvisor now adds cloud-based malware protection, allowing it to scan downloads and warn about threats before they are downloaded Media Player Website “Get Latest Media Player” (link) (Hijacked) Q1 Shareware Site mplayer2.exe 1 2 Active Protection Reputation ratings Global Threat Intelligence Virus is stopped before being downloaded 18
22. 19 Effective Protection SiteAdvisor Database Global Threat Intelligence Active Protection URL Reputation Ratings and Protection (New) Now McAfee also provides green/yellow/red ratings based upon reputation data gathered from Global Threat Intelligence Media Player Website “Get Latest Media Player” (link) Shareware Site (Hijacked) mplayer2.exe Using reputation based ratings, consumers are stopped from accessing malware on unknown sites & IP addresses Reputation ratings
25. Faster Scans (Improved) Scans, particularly subsequent scans, are faster thanks to improvements made in scan caching Q1 Tests completed on “Average Desktop” Intel Dual Core, 2 GB RAM, 320 GB hard drive, Windows 7; Test lab: Network Testing Labs Individual test results may vary 22 Key Performance Improvements in 2010
26. Instant User Interface Load & Response Time (Improved) Now the home screen loads under a second as well as instant navigation within the product Q1 Key Performance Improvements in 2010 Tests completed on “Average Desktop” Intel Dual Core, 2 GB RAM, 320 GB hard drive, Windows 7: Test lab: Network Testing Labs Individual test results may vary 23 23
29. New User Interface User Interface Q1 User Interface and Navigation Evolution 26
30. Q1 27 Key Ease of Use Improvements in 2010 One Click Installation(Improved) Scrolling Real-Time Security Brief (New) On Demand Security Report(Improved) Contextual Help (New) 27
67. BONUS DOWNLOAD: Includes free McAfee Anti-Theft (UK Only)Operating Systems: Windows 2000, XP, Vista, Windows 7 Suggested Retail Price: Euro 79.95 39
68. 40 More Information is Available For more information, please visit the McAfee 2010, Know Better Protection microsite Site includes a virtual product tour, product videos and additional press information www.knowbetterprotection.com/press
Although the distribution pattern is changing a bit, the overall growth of malware continues its unabated upward trend. 2009 surpassed 2008 in total malware growth! Trojans that steal passwords continue to be one of the favorite tools of cybercriminals. The tools to create these Trojans are commonly available on the Internet and there are many sites devoted to selling them as a service. Their function is simple: They steal passwords.
McAfee Labs predicts that Adobe will overtake Microsoft as the No. 1 target for cybercriminals in 2010. Adobe products—in particular Acrobat Reader and Flash—have become two of the most widely used apps in the world, and cybercriminals go where the masses go. Cybercriminals will have a field day preying on people using Adobe software.
This has been a record year for web-based threats and the fourth quarter finished with a bang. Startingin November we saw dangers on the web greatly increase, with phishing, continuous activity fromKoobface, many other Trojans and PUPs, and a sudden spike in suspicious domains registering duringthe week of December 20.Koobface activity has picked up considerably during the last half of the year. We have counted 41,582new unique variations in this quarter. And the increase in URLs that distribute Koobface shows no signof stopping. The methods have been so effective that we now see copycats making use of Koobfacetactics for distribution. We expect those attacks will increase as well.Koobfacespreads by delivering Facebook messages to people who are 'friends' of a Facebook user whose computer has already been infected. Upon receipt, the message directs the recipients to a third-party website, where they are prompted to download what is purported to be an update of the Adobe Flash player. If they download and execute the file, Koobface is able to infect their system. It can then commandeer the computer's search engine use and direct it to contaminated websites.Among the components downloaded by Koobface are a DNS filter program that blocks access to well known security websites and a proxy tool that enables the attackers to abuse the infected PC.Now let’s take a look at the geographic distribution of web threats—either on compromised machinesor on malicious servers and hosts. We found that North America continues to be the leader in hostingmalicious content, with Europe/Middle East/Africa in second place, surpassing Asia/Pacific. NorthAmerica finished first primarily due to the United States. In Europe, Germany leads, followed by theNetherlands and Italy. In Asia it’s no surprise that China is the chief host, followed by Russia and SouthKorea. Brazil is the top hosting country in Latin and South America, followed by Argentina.In North America spam URLs make up 41 percent of the total, followed by malicious sites and suspectedmalicious sites. Within Europe/Middle East/Africa, spam and phishing URLs each make up 31 percent ofthe total, with malicious sites filling out another 29 percent. This balance is similar in Latin and SouthAmerica, where we find 36 percent of the URLs associated with spam hosting, while 30 percent hostphishing sites, and 25 percent host other sorts of malicious websites. In Asia/Pacific, on the other hand,31 percent of the total is made up of questionable sites—those servers registered in such a way that thesite should be closely monitored. (We expect that figure to diminish due to the changes underway withtop-level domain registration in that region.) Spam URLs make up the next largest group at 29 percent,followed by malicious sites at 24 percent.