№ | Слайд | Текст |
1 |
 |
Why does the disaster always strike in your cityEvolution of social networking threats ?tefan T?nase Senior Regional Researcher, EEMEA Global Research and Analysis Team Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010 |
2 |
 |
Intro Evolution of social networks Evolution of social networkingthreats The web as the main infection vector What to expect from 2010? Targeted attacks Questions and answers You Ryan Naraine Overview |
3 |
 |
“White”, “black”, “pink”… “not wearing any” Intro – let’s stand up! |
4 |
 |
Have you seen AvatarIn 3D? Twice? With both of your girlfriends? At the same time? ? What was the vulnerability presented in Avatar? Trusting technology to win against humans. Avatar |
5 |
 |
In terms of traffic:Evolution of social networks |
6 |
 |
In terms of money:Evolution of social networks |
7 |
 |
Total number of malicious software samples that are targeting socialnetworks: +100.000 Evolution of social networks |
8 |
 |
As social networks continue to grow, the threats associated with themwill obviously escalate. Old threats in old applications - it’s sooo 2009! Old threats in new applications - predictable New threats in old applications - more/less predictable New threats in new applications - totally unpredictable What to expect from 2010? |
9 |
 |
What’s out there right nowInfected websites out of a pool of 300K Source: Kaspersky Lab Analytical article - http://www.viruslist.com/en/analysis?pubid=204792089 |
10 |
 |
1 in 150 websites is infectedWhat’s out there right now |
11 |
 |
1 in 150 websites is currently spreading infections Legitimatewebsites, with legitimate traffic Breaches caused by compromised FTP accounts Injected with iframes or javascripts that deliver exploits Visitors not running the latest versions of plug-ins and browsers get infected FTP passwords are extracted from the infected computers Everything that’s out there… is out there anyway. So let’s talk about the future. What’s out there right now |
12 |
 |
What to expect from 2010 |
13 |
 |
Old threats, new applications Vulnerabilities in the applicationsthemselves Google Wave XSS is a very good example Unwanted content: spam, phishing Malicious programs: more space to spread them Koobface: development of new modules to target the new applications once they become popular What to expect from 2010? |
14 |
 |
What to expect from 2010 |
15 |
 |
New threats, old applications Exploiting the new features as they arebeing added Evolution of Koobface: Start attacking more experienced users AV detection rates will really start to matter Encrypted config files (plain text at the moment) P2P architecture (server – client at the moment) Use of drive-by downloads, not just social engineering What to expect from 2010? |
16 |
 |
?New threats, new applications What to expect from 2010? |
17 |
 |
So much personal information becomes public on social networks rightnow Advertisers are already doing it: targeted ads Age, gender, location, interests, work field, browsing habits, relationships Targeted ads? Targeted attacks are already out there But social networks are enabling the cybercriminals to start delivering automated targeted attacks The personal data is there. Next step? Automation. Geographical IP location has been around for a while Automatic language translation services are becoming better Personal interests & tastes are public (ie: trending topics) Targeted attacks become mainstream |
18 |
 |
Geo targeting example |
19 |
 |
Language targeting example |
20 |
 |
Interests targeting example |
21 |
 |
You are targetedThis is why the bomb always explodes in your city. Targeted attacks become mainstream |
22 |
 |
The number and complexity of threats that exploit web 2.0 platformswill continue to grow Social networks are opening up new ways for automated targeted attacks against individuals Localized, contextualized, personalized It will be very hard for social networks to do better: unfortunately, their business means usability, not security Attacks will also shift towards other platforms (Mac) What’s next? |
23 |
 |
Thank youQuestions? stefant@kaspersky.ro twitter.com/stefant Stefan Tanase Senior Regional Researcher, EEMEA Global Research and Analysis Team Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010 |
«Why does the disaster always strike in your city» |
http://900igr.net/prezentacija/anglijskij-jazyk/why-does-the-disaster-always-strike-in-your-city-246511.html