Securing Africa - 2009-2010

Post on 14-Sep-2014

1.273 views 0 download

description

Presentation for the opening of Kaspersky's Office in South Africa.

Transcript of Securing Africa - 2009-2010

Click to edit Master title style

• Click to edit Master text styles– Second level

• Third level– Fourth level

» Fifth levelSecuring Africa- get prepared for the future to come -

Costin G. RaiuChief Security Expert, Kaspersky Lab EEMEA

craiu@kaspersky.ro

Click to edit Master title style

• Click to edit Master text styles– Second level

• Third level– Fourth level

» Fifth level

Today’s agenda

• The Threat Landscape: 2009

• The side effects of increased bandwidth

• 2010 – prevention is better than the cure

• simple mitigation steps for safer computing

Click to edit Master title style

• Click to edit Master text styles– Second level

• Third level– Fourth level

» Fifth level

Kaspersky Lab: number of signatures

Year 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008

0

200000

400000

600000

800000

1000000

1200000

1400000

1600000

New threats per day: 30,000More than 3,500 new signatures/day

November 2009: +3 mil

Click to edit Master title style

• Click to edit Master text styles– Second level

• Third level– Fourth level

» Fifth level

Internet threats – infected legitimate websites

0

200

400

600

800

1,000

1,200

1,400

1,600

1,800

2,000

2006 2007 2008 2009

15,000% growth vs 2006

Infected legitimate websites out of a pool of 300KSource: Kaspersky Lab Analytical article

http://www.viruslist.com/en/analysis?pubid=204792089

Click to edit Master title style

• Click to edit Master text styles– Second level

• Third level– Fourth level

» Fifth level

“En masse” infections

Gumblar, 9-Ball:

Click to edit Master title style

• Click to edit Master text styles– Second level

• Third level– Fourth level

» Fifth level

Faster fiber optic connections

Connects a largepart of Africa with:

– India– UK, France– UAE, Egypt

Seacom

Image source: mybroadband.co.za

Click to edit Master title style

• Click to edit Master text styles– Second level

• Third level– Fourth level

» Fifth level

Seacom - effects

Cheaper internetaccess for allFaster internetconnectionsOnline commerce

P2P networksfile sharingPirate softwareInternet attacks

+ -

Image source: Seacom HQ c/o Linda Carter

Click to edit Master title style

• Click to edit Master text styles– Second level

• Third level– Fourth level

» Fifth level

2010 – social engineering attacks

Click to edit Master title style

• Click to edit Master text styles– Second level

• Third level– Fourth level

» Fifth level

2010 – social engineering attacks

Click to edit Master title style

• Click to edit Master text styles– Second level

• Third level– Fourth level

» Fifth level

Mitigation steps

• Install and run an Internet Security Suite• Don’t assume a website is safe because it is high

profile• Use an up-to-date, modern browser: IE8, FF 3.x,

Chrome, Opera 10• Keep Windows up-to-date• Always run the latest versions of Adobe Reader,

Flash Player, MS Word, etc…• Be wary of messages from social networks

Prevention is better than cure!

Click to edit Master title style

• Click to edit Master text styles– Second level

• Third level– Fourth level

» Fifth levelThank you!

The future is coming – be prepared!