securing africa - 2009-2010
Post on 14-Sep-2014
1.274 views
DESCRIPTION
Presentation for the opening of Kaspersky's Office in South Africa.TRANSCRIPT
Click to edit Master title style
• Click to edit Master text styles– Second level
• Third level– Fourth level
» Fifth levelSecuring Africa- get prepared for the future to come -
Costin G. RaiuChief Security Expert, Kaspersky Lab EEMEA
Click to edit Master title style
• Click to edit Master text styles– Second level
• Third level– Fourth level
» Fifth level
Today’s agenda
• The Threat Landscape: 2009
• The side effects of increased bandwidth
• 2010 – prevention is better than the cure
• simple mitigation steps for safer computing
Click to edit Master title style
• Click to edit Master text styles– Second level
• Third level– Fourth level
» Fifth level
Kaspersky Lab: number of signatures
Year 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008
0
200000
400000
600000
800000
1000000
1200000
1400000
1600000
New threats per day: 30,000More than 3,500 new signatures/day
November 2009: +3 mil
Click to edit Master title style
• Click to edit Master text styles– Second level
• Third level– Fourth level
» Fifth level
Internet threats – infected legitimate websites
0
200
400
600
800
1,000
1,200
1,400
1,600
1,800
2,000
2006 2007 2008 2009
15,000% growth vs 2006
Infected legitimate websites out of a pool of 300KSource: Kaspersky Lab Analytical article
http://www.viruslist.com/en/analysis?pubid=204792089
Click to edit Master title style
• Click to edit Master text styles– Second level
• Third level– Fourth level
» Fifth level
“En masse” infections
Gumblar, 9-Ball:
Click to edit Master title style
• Click to edit Master text styles– Second level
• Third level– Fourth level
» Fifth level
Faster fiber optic connections
Connects a largepart of Africa with:
– India– UK, France– UAE, Egypt
Seacom
Image source: mybroadband.co.za
Click to edit Master title style
• Click to edit Master text styles– Second level
• Third level– Fourth level
» Fifth level
Seacom - effects
Cheaper internetaccess for allFaster internetconnectionsOnline commerce
P2P networksfile sharingPirate softwareInternet attacks
+ -
Image source: Seacom HQ c/o Linda Carter
Click to edit Master title style
• Click to edit Master text styles– Second level
• Third level– Fourth level
» Fifth level
2010 – social engineering attacks
Click to edit Master title style
• Click to edit Master text styles– Second level
• Third level– Fourth level
» Fifth level
2010 – social engineering attacks
Click to edit Master title style
• Click to edit Master text styles– Second level
• Third level– Fourth level
» Fifth level
Mitigation steps
• Install and run an Internet Security Suite• Don’t assume a website is safe because it is high
profile• Use an up-to-date, modern browser: IE8, FF 3.x,
Chrome, Opera 10• Keep Windows up-to-date• Always run the latest versions of Adobe Reader,
Flash Player, MS Word, etc…• Be wary of messages from social networks
Prevention is better than cure!
Click to edit Master title style
• Click to edit Master text styles– Second level
• Third level– Fourth level
» Fifth levelThank you!
The future is coming – be prepared!