Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Securing Africa - 2009-2010
1. Click to edit Master title style
• Click to edit Master text styles
– Second level
• Third level
Securing Africa
– Fourth level
- get prepared for the future to come -
» Fifth level
Costin G. Raiu
Chief Security Expert, Kaspersky Lab EEMEA
craiu@kaspersky.ro
2. Today’s agenda
Click to edit Master title style
• Click to edit Master text styles
• The Threat Landscape: 2009
– Second level
• The sidelevel
• Third
effects of increased bandwidth
– Fourth level
» Fifth level
• 2010 – prevention is better than the cure
• simple mitigation steps for safer
computing
3. Kaspersky Lab: number of signatures
Click to edit Master title style
1600000
• Click to edit Master text styles
1400000
New threats per day: 30,000
– Second level
1200000
• Third level
More than 3,500 new signatures/day
1000000 – Fourth level
November 2009: +3 mil
» Fifth level
800000
600000
400000
200000
0
Year 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008
4. Internet threats – infected legitimate websites
Click to edit Master title style
2,000
• Click to edit Master text styles
1,800
15,000%
1,600
– Second level growth vs 2006
1,400
• Third level
1,200
– Fourth level
1,000 » Fifth level
800
600
400
200
0
2006 2007 2008 2009
Infected legitimate websites out of a pool of 300K
Source: Kaspersky Lab Analytical article
http://www.viruslist.com/en/analysis?pubid=204792089
5. “En masse” infections
Click to edit Master title style
Gumblar, 9-Ball:
• Click to edit Master text styles
– Second level
• Third level
– Fourth level
» Fifth level
6. Click tofiber optic connections
Faster edit Master title style
• Click to edit Master text styles
Seacom
– Second level
ConnectsThird level
•
a large
part of AfricaFourth level
– with:
– India » Fifth level
– UK, France
– UAE, Egypt
Image source: mybroadband.co.za
7. Seacom -
Click to edit Master title style
effects
• Click to edit Master text styles
+
– Second level
-
Cheaper internet
• Third level P2P networks
access for allFourth level
– file sharing
Faster internet Fifth level
»
Pirate software
connections Internet attacks
Online commerce
Image source: Seacom HQ c/o Linda Carter
8. Click to social engineering attacks
2010 – edit Master title style
• Click to edit Master text styles
– Second level
• Third level
– Fourth level
» Fifth level
9. Click to social engineering attacks
2010 – edit Master title style
• Click to edit Master text styles
– Second level
• Third level
– Fourth level
» Fifth level
10. Mitigation steps
Click to edit Master title style
• Click to edit Master is better
Prevention text styles than cure!
• Install and levelan Internet Security Suite
– Second
run
• Third level
• Don’t assumelevel
– Fourth
a website is safe because it is high
profile » Fifth level
• Use an up-to-date, modern browser: IE8, FF 3.x,
Chrome, Opera 10
• Keep Windows up-to-date
• Always run the latest versions of Adobe Reader,
Flash Player, MS Word, etc…
• Be wary of messages from social networks
11. Click to edit Master title style
• Click to edit Master text styles
– Second level
The future is coming – be prepared!
• Third level
– Fourth level
» Fifth level
Thank you!