digital lifestyle trends and threats
DESCRIPTION
Digital Lifestyle Trends and ThreatsTRANSCRIPT
![Page 1: Digital Lifestyle Trends and Threats](https://reader033.vdocuments.net/reader033/viewer/2022061205/5472bdb8b4af9fbe0a8b513d/html5/thumbnails/1.jpg)
Copyright 2011 Trend Micro Inc.
Digital Lifestyle Trends and Threats
![Page 2: Digital Lifestyle Trends and Threats](https://reader033.vdocuments.net/reader033/viewer/2022061205/5472bdb8b4af9fbe0a8b513d/html5/thumbnails/2.jpg)
Copyright 2011 Trend Micro Inc.Classification 04/08/23 2
Sources:ADMA Digital Marketing Yearbook 2011Pando Network's Global Internet Speed Study (Aug 2011)
![Page 3: Digital Lifestyle Trends and Threats](https://reader033.vdocuments.net/reader033/viewer/2022061205/5472bdb8b4af9fbe0a8b513d/html5/thumbnails/3.jpg)
Copyright 2011 Trend Micro Inc.Classification 04/08/23 3
The fact that we are wired is the very reason we have threats
Source: Trend Micro
![Page 4: Digital Lifestyle Trends and Threats](https://reader033.vdocuments.net/reader033/viewer/2022061205/5472bdb8b4af9fbe0a8b513d/html5/thumbnails/4.jpg)
Copyright 2011 Trend Micro Inc.Classification 04/08/23 4
The technological landscape of Asia can influence the types of threats
![Page 5: Digital Lifestyle Trends and Threats](https://reader033.vdocuments.net/reader033/viewer/2022061205/5472bdb8b4af9fbe0a8b513d/html5/thumbnails/5.jpg)
Copyright 2011 Trend Micro Inc.
What about Hong Kong?
• 4th country in Asia that has the most number blocked attempts to access bad URLs hosted in that country
– Bad sites in Hong Kong are usually classified as disease vectors (malware-related)
• 14th country that has the most bad URL victims in Asia
• Top 5 malware threats:– WORM_DOWNAD.AD
• aka Conficker, this 3-year old worm exploits unpatched Windows systems to spread
– CRCK_KEYGEN and HKTL_KEYGEN• KEYGEN or serial key generators are typically used to crack
licensed software
– ADW_TENCENT• This is usually related to ads related to a popular IM application
– WORM_AUTORUN.SMW• Autorun worms spread via removable drives
Classification 04/08/23 5
![Page 6: Digital Lifestyle Trends and Threats](https://reader033.vdocuments.net/reader033/viewer/2022061205/5472bdb8b4af9fbe0a8b513d/html5/thumbnails/6.jpg)
Copyright 2011 Trend Micro Inc.
Human interests and emotions are still ripe for picking when it comes to
cybercrime
Classification 04/08/23 6
![Page 7: Digital Lifestyle Trends and Threats](https://reader033.vdocuments.net/reader033/viewer/2022061205/5472bdb8b4af9fbe0a8b513d/html5/thumbnails/7.jpg)
Copyright 2011 Trend Micro Inc.
Steve Jobs is dead! Now who wants a free iPad?
Classification 04/08/23 7
![Page 8: Digital Lifestyle Trends and Threats](https://reader033.vdocuments.net/reader033/viewer/2022061205/5472bdb8b4af9fbe0a8b513d/html5/thumbnails/8.jpg)
Copyright 2011 Trend Micro Inc.
Data breaches are simpler than one thinks
Classification 04/08/23 8
![Page 9: Digital Lifestyle Trends and Threats](https://reader033.vdocuments.net/reader033/viewer/2022061205/5472bdb8b4af9fbe0a8b513d/html5/thumbnails/9.jpg)
Copyright 2011 Trend Micro Inc.Classification 04/08/23 9
![Page 10: Digital Lifestyle Trends and Threats](https://reader033.vdocuments.net/reader033/viewer/2022061205/5472bdb8b4af9fbe0a8b513d/html5/thumbnails/10.jpg)
Copyright 2011 Trend Micro Inc.
Data Breaches on the Rise: Epsilon
• Data breaches are not new
• Data breaches can affect any industry
• Hacking is the most common cause of data breaches
10
![Page 11: Digital Lifestyle Trends and Threats](https://reader033.vdocuments.net/reader033/viewer/2022061205/5472bdb8b4af9fbe0a8b513d/html5/thumbnails/11.jpg)
Copyright 2011 Trend Micro Inc.
Anatomy of a Malicious Data Breach Diagram
Classification 04/08/23 11
Source: Trend Micro
![Page 12: Digital Lifestyle Trends and Threats](https://reader033.vdocuments.net/reader033/viewer/2022061205/5472bdb8b4af9fbe0a8b513d/html5/thumbnails/12.jpg)
Copyright 2011 Trend Micro Inc.
Everyone is going mobile.
So are the bad guys.
Classification 04/08/23 12
![Page 13: Digital Lifestyle Trends and Threats](https://reader033.vdocuments.net/reader033/viewer/2022061205/5472bdb8b4af9fbe0a8b513d/html5/thumbnails/13.jpg)
Copyright 2011 Trend Micro Inc.
Android Landscape
• 1st android phone (October 2008)
• 51.9 million Android-based smartphones
• 250,000 apps and still growing
• 6 billion downloaded apps
• 43% market share
Classification 04/08/23 13
![Page 14: Digital Lifestyle Trends and Threats](https://reader033.vdocuments.net/reader033/viewer/2022061205/5472bdb8b4af9fbe0a8b513d/html5/thumbnails/14.jpg)
Copyright 2011 Trend Micro Inc.
Android Malware Growth
Classification 04/08/23 14
![Page 15: Digital Lifestyle Trends and Threats](https://reader033.vdocuments.net/reader033/viewer/2022061205/5472bdb8b4af9fbe0a8b513d/html5/thumbnails/15.jpg)
Copyright 2011 Trend Micro Inc.
DroidDreamLight
• Discovered in May 2011
• Steals and sends info from user’s phone to cybercriminals
• Displays fake notifications
Classification 04/08/23 15
![Page 16: Digital Lifestyle Trends and Threats](https://reader033.vdocuments.net/reader033/viewer/2022061205/5472bdb8b4af9fbe0a8b513d/html5/thumbnails/16.jpg)
Copyright 2011 Trend Micro Inc.Classification 04/08/23 16
DroidDreamLight in Action
Device modelDevice language settingCountryIMEI numberIMSI numberList of installed apps
![Page 17: Digital Lifestyle Trends and Threats](https://reader033.vdocuments.net/reader033/viewer/2022061205/5472bdb8b4af9fbe0a8b513d/html5/thumbnails/17.jpg)
Copyright 2011 Trend Micro Inc.Classification 04/08/23 17
USERS CANNOT BE PASSIVE ABOUT TECHNOLOGY
EMBRACING THE DIGITAL LIFESTYLE MEANS CHANGING THE WAY TECHNOLOGY AND SECURITY IS VIEWED
LOOK FOR SECURITY SOLUTIONS THAT ADDRESS THE CONSTANT EVOLUTIONS IN THE THREAT LANDSCAPE
![Page 18: Digital Lifestyle Trends and Threats](https://reader033.vdocuments.net/reader033/viewer/2022061205/5472bdb8b4af9fbe0a8b513d/html5/thumbnails/18.jpg)
Copyright 2011 Trend Micro Inc.Classification 04/08/23 18
THANK YOU!
![Page 19: Digital Lifestyle Trends and Threats](https://reader033.vdocuments.net/reader033/viewer/2022061205/5472bdb8b4af9fbe0a8b513d/html5/thumbnails/19.jpg)
Copyright 2011 Trend Micro Inc.Classification 04/08/23 19