SlideShare una empresa de Scribd logo
1 de 11
Descargar para leer sin conexión
Click to edit Master title style


• Click to edit Master text styles
    – Second level
       • Third level
                Securing Africa
           – Fourth level

                - get prepared for the future to come -
               » Fifth level




                Costin G. Raiu
                Chief Security Expert, Kaspersky Lab EEMEA
                craiu@kaspersky.ro
Today’s agenda
Click to edit Master title style


• Click to edit Master text styles
•   The Threat Landscape: 2009
     – Second level
•   The sidelevel
        • Third
                effects of increased bandwidth
           – Fourth level
               » Fifth level
•   2010 – prevention is better than the cure
•   simple mitigation steps for safer
    computing
Kaspersky Lab: number of signatures
   Click to edit Master title style

1600000
    • Click to edit Master text styles
1400000
                    New threats per day: 30,000
           – Second level
1200000
              • Third level
                    More than 3,500 new signatures/day
1000000                 – Fourth level
                          November 2009: +3 mil
                           » Fifth level
800000

600000

400000

200000

     0

          Year   1998      1999   2000   2001   2002   2003   2004   2005   2006   2007   2008
Internet threats – infected legitimate websites
Click to edit Master title style

   2,000

• Click to edit Master text styles
  1,800
                                                                               15,000%
   1,600
   – Second level                                                             growth vs 2006

   1,400
           • Third level
   1,200
              – Fourth level
   1,000          » Fifth level
    800

    600

    400

    200

      0
                2006                2007                   2008                 2009
                Infected legitimate websites out of a pool of 300K
                           Source: Kaspersky Lab Analytical article
                       http://www.viruslist.com/en/analysis?pubid=204792089
“En masse” infections
Click to edit Master title style

Gumblar, 9-Ball:
• Click to edit Master text styles
    – Second level
       • Third level
           – Fourth level
               » Fifth level
Click tofiber optic connections
Faster edit Master title style


• Click to edit Master text styles
  Seacom
   – Second level
ConnectsThird level
        •
          a large
part of AfricaFourth level
            – with:
    – India     »   Fifth level
    – UK, France
    – UAE, Egypt




                                     Image source: mybroadband.co.za
Seacom -
 Click to edit Master title style
                 effects

 • Click to edit Master text styles
       +
     – Second level
                                                                               -
Cheaper internet
        • Third level                                                    P2P networks
access for allFourth level
           –                                                             file sharing
Faster internet Fifth level
                »
                                                                         Pirate software
connections                                                              Internet attacks
Online commerce

                              Image source: Seacom HQ c/o Linda Carter
Click to social engineering attacks
2010 – edit Master title style


• Click to edit Master text styles
   – Second level
       • Third level
          – Fourth level
              » Fifth level
Click to social engineering attacks
2010 – edit Master title style


• Click to edit Master text styles
   – Second level
       • Third level
          – Fourth level
              » Fifth level
Mitigation steps
Click to edit Master title style


• Click to edit Master is better
      Prevention text styles          than cure!
• Install and levelan Internet Security Suite
   – Second
               run
      • Third level
• Don’t assumelevel
          – Fourth
                     a website is safe because it is high
  profile     » Fifth level

• Use an up-to-date, modern browser: IE8, FF 3.x,
  Chrome, Opera 10
• Keep Windows up-to-date
• Always run the latest versions of Adobe Reader,
  Flash Player, MS Word, etc…
• Be wary of messages from social networks
Click to edit Master title style


• Click to edit Master text styles
    – Second level
           The future is coming – be prepared!
       • Third level
           – Fourth level
               » Fifth level

                      Thank you!

Más contenido relacionado

Destacado

Sakai – what is changing
Sakai – what is changingSakai – what is changing
Sakai – what is changingBrian Moynihan
 
02 3-aprendizaje colaborativo-cooperativo
02 3-aprendizaje colaborativo-cooperativo02 3-aprendizaje colaborativo-cooperativo
02 3-aprendizaje colaborativo-cooperativoLINA SILVA
 
Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009Ohio LETC
 
Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009Ohio LETC
 
Inovatie locala, impact global
Inovatie locala, impact globalInovatie locala, impact global
Inovatie locala, impact globalCostin Raiu
 
Shakespeare’s Theatre
Shakespeare’s TheatreShakespeare’s Theatre
Shakespeare’s Theatrejohnyap11
 

Destacado (9)

Sakai – what is changing
Sakai – what is changingSakai – what is changing
Sakai – what is changing
 
02 3-aprendizaje colaborativo-cooperativo
02 3-aprendizaje colaborativo-cooperativo02 3-aprendizaje colaborativo-cooperativo
02 3-aprendizaje colaborativo-cooperativo
 
Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009
 
PC osciloskop
PC osciloskopPC osciloskop
PC osciloskop
 
Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009
 
Finge.Unit1cross
Finge.Unit1crossFinge.Unit1cross
Finge.Unit1cross
 
Inovatie locala, impact global
Inovatie locala, impact globalInovatie locala, impact global
Inovatie locala, impact global
 
Shakespeare’s Theatre
Shakespeare’s TheatreShakespeare’s Theatre
Shakespeare’s Theatre
 
Solidarnost
SolidarnostSolidarnost
Solidarnost
 

Similar a Securing Africa - 2009-2010

Automated Targeted Attacks: The New Age of Cybercrime
Automated Targeted Attacks: The New Age of CybercrimeAutomated Targeted Attacks: The New Age of Cybercrime
Automated Targeted Attacks: The New Age of CybercrimeStefan Tanase
 
Malware * punct ro
Malware * punct roMalware * punct ro
Malware * punct roCostin Raiu
 
Surviving Today's Targeted Attacks
Surviving Today's Targeted AttacksSurviving Today's Targeted Attacks
Surviving Today's Targeted AttacksStefan Tanase
 
Bypassing malware detection mechanisms in online banking
Bypassing malware detection mechanisms in online bankingBypassing malware detection mechanisms in online banking
Bypassing malware detection mechanisms in online bankingJakub Kałużny
 
Today’s hidden dangers: Social networks under attack
Today’s hidden dangers: Social networks under attackToday’s hidden dangers: Social networks under attack
Today’s hidden dangers: Social networks under attackStefan Tanase
 
DevSecOps Done Right - Strategies and Tools.pptx
DevSecOps Done Right - Strategies and Tools.pptxDevSecOps Done Right - Strategies and Tools.pptx
DevSecOps Done Right - Strategies and Tools.pptxDavide Benvegnù
 
New Developments in the BREACH attack
New Developments in the BREACH attackNew Developments in the BREACH attack
New Developments in the BREACH attackE Hacking
 
Anderson montria mobile_presentationtemplate
Anderson montria mobile_presentationtemplateAnderson montria mobile_presentationtemplate
Anderson montria mobile_presentationtemplatemontria
 
Anderson montria mobile_presentation
Anderson montria mobile_presentationAnderson montria mobile_presentation
Anderson montria mobile_presentationmontria
 
Anderson montria mobile_presentation
Anderson montria mobile_presentationAnderson montria mobile_presentation
Anderson montria mobile_presentationmontria
 
The Savage Curtain: Mobile SSL Failures
The Savage Curtain: Mobile SSL FailuresThe Savage Curtain: Mobile SSL Failures
The Savage Curtain: Mobile SSL Failures☠Tony Trummer☠
 
Using Solr to find the Right Person for the Right Job
Using Solr to find the Right Person for the Right JobUsing Solr to find the Right Person for the Right Job
Using Solr to find the Right Person for the Right JobLucidworks (Archived)
 
MongoDB and MongoMK Source Event
MongoDB and MongoMK Source EventMongoDB and MongoMK Source Event
MongoDB and MongoMK Source EventYuval Ararat
 
7 ways of reducing tpm cost
7 ways of reducing tpm cost 7 ways of reducing tpm cost
7 ways of reducing tpm cost TradeInsight
 
Cat valorezi kaspersky
Cat valorezi kasperskyCat valorezi kaspersky
Cat valorezi kasperskyAgora Group
 
Brighton SEO Talk Deck
Brighton SEO Talk DeckBrighton SEO Talk Deck
Brighton SEO Talk DeckKim Slade
 
Touch Video Academy Brighton SEO 2018 Talk
Touch Video Academy Brighton SEO 2018 TalkTouch Video Academy Brighton SEO 2018 Talk
Touch Video Academy Brighton SEO 2018 TalkKim Slade
 

Similar a Securing Africa - 2009-2010 (20)

Automated Targeted Attacks: The New Age of Cybercrime
Automated Targeted Attacks: The New Age of CybercrimeAutomated Targeted Attacks: The New Age of Cybercrime
Automated Targeted Attacks: The New Age of Cybercrime
 
Malware * punct ro
Malware * punct roMalware * punct ro
Malware * punct ro
 
Surviving Today's Targeted Attacks
Surviving Today's Targeted AttacksSurviving Today's Targeted Attacks
Surviving Today's Targeted Attacks
 
Bypassing malware detection mechanisms in online banking
Bypassing malware detection mechanisms in online bankingBypassing malware detection mechanisms in online banking
Bypassing malware detection mechanisms in online banking
 
Today’s hidden dangers: Social networks under attack
Today’s hidden dangers: Social networks under attackToday’s hidden dangers: Social networks under attack
Today’s hidden dangers: Social networks under attack
 
DevSecOps Done Right - Strategies and Tools.pptx
DevSecOps Done Right - Strategies and Tools.pptxDevSecOps Done Right - Strategies and Tools.pptx
DevSecOps Done Right - Strategies and Tools.pptx
 
New Developments in the BREACH attack
New Developments in the BREACH attackNew Developments in the BREACH attack
New Developments in the BREACH attack
 
Anderson montria mobile_presentationtemplate
Anderson montria mobile_presentationtemplateAnderson montria mobile_presentationtemplate
Anderson montria mobile_presentationtemplate
 
Microsoft Cloud Computing
Microsoft Cloud ComputingMicrosoft Cloud Computing
Microsoft Cloud Computing
 
Anderson montria mobile_presentation
Anderson montria mobile_presentationAnderson montria mobile_presentation
Anderson montria mobile_presentation
 
Anderson montria mobile_presentation
Anderson montria mobile_presentationAnderson montria mobile_presentation
Anderson montria mobile_presentation
 
The Savage Curtain: Mobile SSL Failures
The Savage Curtain: Mobile SSL FailuresThe Savage Curtain: Mobile SSL Failures
The Savage Curtain: Mobile SSL Failures
 
Using Solr to find the Right Person for the Right Job
Using Solr to find the Right Person for the Right JobUsing Solr to find the Right Person for the Right Job
Using Solr to find the Right Person for the Right Job
 
MongoDB and MongoMK Source Event
MongoDB and MongoMK Source EventMongoDB and MongoMK Source Event
MongoDB and MongoMK Source Event
 
7 ways of reducing tpm cost
7 ways of reducing tpm cost 7 ways of reducing tpm cost
7 ways of reducing tpm cost
 
Cat valorezi kaspersky
Cat valorezi kasperskyCat valorezi kaspersky
Cat valorezi kaspersky
 
Seminário de Segurança em Informática - Microsoft
Seminário de Segurança em Informática - MicrosoftSeminário de Segurança em Informática - Microsoft
Seminário de Segurança em Informática - Microsoft
 
Seminário de Segurança em Informática - Apresentação Andrew Cushman
Seminário de Segurança em Informática - Apresentação Andrew Cushman Seminário de Segurança em Informática - Apresentação Andrew Cushman
Seminário de Segurança em Informática - Apresentação Andrew Cushman
 
Brighton SEO Talk Deck
Brighton SEO Talk DeckBrighton SEO Talk Deck
Brighton SEO Talk Deck
 
Touch Video Academy Brighton SEO 2018 Talk
Touch Video Academy Brighton SEO 2018 TalkTouch Video Academy Brighton SEO 2018 Talk
Touch Video Academy Brighton SEO 2018 Talk
 

Último

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Último (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Securing Africa - 2009-2010

  • 1. Click to edit Master title style • Click to edit Master text styles – Second level • Third level Securing Africa – Fourth level - get prepared for the future to come - » Fifth level Costin G. Raiu Chief Security Expert, Kaspersky Lab EEMEA craiu@kaspersky.ro
  • 2. Today’s agenda Click to edit Master title style • Click to edit Master text styles • The Threat Landscape: 2009 – Second level • The sidelevel • Third effects of increased bandwidth – Fourth level » Fifth level • 2010 – prevention is better than the cure • simple mitigation steps for safer computing
  • 3. Kaspersky Lab: number of signatures Click to edit Master title style 1600000 • Click to edit Master text styles 1400000 New threats per day: 30,000 – Second level 1200000 • Third level More than 3,500 new signatures/day 1000000 – Fourth level November 2009: +3 mil » Fifth level 800000 600000 400000 200000 0 Year 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008
  • 4. Internet threats – infected legitimate websites Click to edit Master title style 2,000 • Click to edit Master text styles 1,800 15,000% 1,600 – Second level growth vs 2006 1,400 • Third level 1,200 – Fourth level 1,000 » Fifth level 800 600 400 200 0 2006 2007 2008 2009 Infected legitimate websites out of a pool of 300K Source: Kaspersky Lab Analytical article http://www.viruslist.com/en/analysis?pubid=204792089
  • 5. “En masse” infections Click to edit Master title style Gumblar, 9-Ball: • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level
  • 6. Click tofiber optic connections Faster edit Master title style • Click to edit Master text styles Seacom – Second level ConnectsThird level • a large part of AfricaFourth level – with: – India » Fifth level – UK, France – UAE, Egypt Image source: mybroadband.co.za
  • 7. Seacom - Click to edit Master title style effects • Click to edit Master text styles + – Second level - Cheaper internet • Third level P2P networks access for allFourth level – file sharing Faster internet Fifth level » Pirate software connections Internet attacks Online commerce Image source: Seacom HQ c/o Linda Carter
  • 8. Click to social engineering attacks 2010 – edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level
  • 9. Click to social engineering attacks 2010 – edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level
  • 10. Mitigation steps Click to edit Master title style • Click to edit Master is better Prevention text styles than cure! • Install and levelan Internet Security Suite – Second run • Third level • Don’t assumelevel – Fourth a website is safe because it is high profile » Fifth level • Use an up-to-date, modern browser: IE8, FF 3.x, Chrome, Opera 10 • Keep Windows up-to-date • Always run the latest versions of Adobe Reader, Flash Player, MS Word, etc… • Be wary of messages from social networks
  • 11. Click to edit Master title style • Click to edit Master text styles – Second level The future is coming – be prepared! • Third level – Fourth level » Fifth level Thank you!