SlideShare una empresa de Scribd logo
1 de 36
Descargar para leer sin conexión
Cybercrime & Business
How do we fight this war?




Pirkka Palomäki
Chief Technology Officer
F-Secure Corporation
Operating system
Floppy                             Browsers
Lan                                Java
Email                              Adobe Flash
Web                                Adobe PDF reader
                                   Quicktime




     facebook, myspace, twitter, linkedin?
Acrobat
Flash
Case Darkmarket
Featuring
                                Mr. Adewale Taiwo



Featuring Mr. Cagatay Evyapan
          aka "Cha0"
Case Mebroot
Case Mebroot – short introduction
   The first complex MBR rootkit with malicious payload
      Kernel-mode downloader and backdoor
      Downloads PWS and banking Trojan components


   Strengths of Mebroot:
      No executable files on file system
      No registry keys or standard launch points
      No driver module in module list
      Minimal memory footprint
      Early execution during system startup
      Stealth read/write disk operations
      Stealth Anti-Removal protection
      Totally generic, open malware platform (MAOS)
How do we work?
F-Secure Dashboard
Myth To Forget
Obsolete for
Hundreds of Thousands
 of samples every day
Security Research Flow; The Critical Chain




    Malware                   Detection Malware
                 Automatic                          Real-time
   Samples /                   Engine Researchers &
                  Analysis                           delivery
   Acquisition               Technology Analysts
SMA Decisions – daily
thank you

Más contenido relacionado

Destacado

Managerial economics summary
Managerial economics summaryManagerial economics summary
Managerial economics summaryJohn Cousins
 
Economic survey
Economic surveyEconomic survey
Economic surveybudgetana
 
detyrë kursi Inspektimi byirenakotobelli
detyrë kursi Inspektimi byirenakotobellidetyrë kursi Inspektimi byirenakotobelli
detyrë kursi Inspektimi byirenakotobelliirena kotobelli
 
Analysing Business Markets
Analysing Business MarketsAnalysing Business Markets
Analysing Business MarketsKrishna M N
 
Raiff Bancassurance
Raiff BancassuranceRaiff Bancassurance
Raiff BancassuranceAleksei79
 
Problemet e menaxhimit dhe te rritjes se bizneseve - Nehar islami dhe Dafina ...
Problemet e menaxhimit dhe te rritjes se bizneseve - Nehar islami dhe Dafina ...Problemet e menaxhimit dhe te rritjes se bizneseve - Nehar islami dhe Dafina ...
Problemet e menaxhimit dhe te rritjes se bizneseve - Nehar islami dhe Dafina ...Target
 
Rast studimore "ProCreditBank"
Rast studimore "ProCreditBank"Rast studimore "ProCreditBank"
Rast studimore "ProCreditBank"Fitore ZEQIRI
 
Ekonomi "Probleme te konkurrences ne tregun tone."
Ekonomi "Probleme te konkurrences ne tregun tone."Ekonomi "Probleme te konkurrences ne tregun tone."
Ekonomi "Probleme te konkurrences ne tregun tone."Maja
 
Letters Requesting Payment
Letters Requesting PaymentLetters Requesting Payment
Letters Requesting PaymentLeite Bayukaka
 
Plani i biznesit.docxfilename= utf-8''plani i biznesit
Plani i biznesit.docxfilename= utf-8''plani i biznesitPlani i biznesit.docxfilename= utf-8''plani i biznesit
Plani i biznesit.docxfilename= utf-8''plani i biznesitLandmark Communications Tirana
 
Nehar islami dhe Arben Dedaj-Krahasimi i bankes Teb dhe i bankes Raiffeisen
Nehar islami dhe Arben Dedaj-Krahasimi i bankes Teb dhe i bankes RaiffeisenNehar islami dhe Arben Dedaj-Krahasimi i bankes Teb dhe i bankes Raiffeisen
Nehar islami dhe Arben Dedaj-Krahasimi i bankes Teb dhe i bankes RaiffeisenTarget
 

Destacado (16)

Managerial economics summary
Managerial economics summaryManagerial economics summary
Managerial economics summary
 
Economic survey
Economic surveyEconomic survey
Economic survey
 
Deka company
Deka companyDeka company
Deka company
 
detyrë kursi Inspektimi byirenakotobelli
detyrë kursi Inspektimi byirenakotobellidetyrë kursi Inspektimi byirenakotobelli
detyrë kursi Inspektimi byirenakotobelli
 
Analysing Business Markets
Analysing Business MarketsAnalysing Business Markets
Analysing Business Markets
 
Raiff Bancassurance
Raiff BancassuranceRaiff Bancassurance
Raiff Bancassurance
 
Economics
EconomicsEconomics
Economics
 
Problemet e menaxhimit dhe te rritjes se bizneseve - Nehar islami dhe Dafina ...
Problemet e menaxhimit dhe te rritjes se bizneseve - Nehar islami dhe Dafina ...Problemet e menaxhimit dhe te rritjes se bizneseve - Nehar islami dhe Dafina ...
Problemet e menaxhimit dhe te rritjes se bizneseve - Nehar islami dhe Dafina ...
 
Rast studimore "ProCreditBank"
Rast studimore "ProCreditBank"Rast studimore "ProCreditBank"
Rast studimore "ProCreditBank"
 
Kompania DEKA
Kompania DEKAKompania DEKA
Kompania DEKA
 
Ekonomi "Probleme te konkurrences ne tregun tone."
Ekonomi "Probleme te konkurrences ne tregun tone."Ekonomi "Probleme te konkurrences ne tregun tone."
Ekonomi "Probleme te konkurrences ne tregun tone."
 
Letters Requesting Payment
Letters Requesting PaymentLetters Requesting Payment
Letters Requesting Payment
 
Plani i biznesit.docxfilename= utf-8''plani i biznesit
Plani i biznesit.docxfilename= utf-8''plani i biznesitPlani i biznesit.docxfilename= utf-8''plani i biznesit
Plani i biznesit.docxfilename= utf-8''plani i biznesit
 
Presentation1
Presentation1Presentation1
Presentation1
 
Nehar islami dhe Arben Dedaj-Krahasimi i bankes Teb dhe i bankes Raiffeisen
Nehar islami dhe Arben Dedaj-Krahasimi i bankes Teb dhe i bankes RaiffeisenNehar islami dhe Arben Dedaj-Krahasimi i bankes Teb dhe i bankes Raiffeisen
Nehar islami dhe Arben Dedaj-Krahasimi i bankes Teb dhe i bankes Raiffeisen
 
SAP FI-BANK
SAP  FI-BANKSAP  FI-BANK
SAP FI-BANK
 

Similar a Cybercrime & Business. Jak wygrać tę wojnę?

Keynote fx try harder 2 be yourself
Keynote fx   try harder 2 be yourselfKeynote fx   try harder 2 be yourself
Keynote fx try harder 2 be yourselfDefconRussia
 
Modern malware and threats
Modern malware and threatsModern malware and threats
Modern malware and threatsMartin Holovský
 
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...AgileNetwork
 
The A and the P of the T
The A and the P of the TThe A and the P of the T
The A and the P of the TCyphort
 
The A and the P of the T
The A and the P of the TThe A and the P of the T
The A and the P of the Tpinkflawd
 
Thinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and PreventionThinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and PreventionDavid Perkins
 
Hacking ATM machines for fun and profit!
Hacking ATM machines for fun and profit!Hacking ATM machines for fun and profit!
Hacking ATM machines for fun and profit!Zigoo0
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious CodeSatria Ady Pradana
 
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...Felipe Prado
 
Malware's most wanted-zberp-the_financial_trojan
Malware's most wanted-zberp-the_financial_trojanMalware's most wanted-zberp-the_financial_trojan
Malware's most wanted-zberp-the_financial_trojanCyphort
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Cansec West 2009
Cansec West 2009Cansec West 2009
Cansec West 2009abhicc285
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII studentsAkiumi Hasegawa
 
Cyber Defense Automation
Cyber Defense AutomationCyber Defense Automation
Cyber Defense Automation♟Sergej Epp
 
Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015SLBdiensten
 
Securing Underprotected APIs - Deja vu Security
Securing Underprotected APIs - Deja vu SecuritySecuring Underprotected APIs - Deja vu Security
Securing Underprotected APIs - Deja vu SecurityDeja vu Security
 
GDP Product Presentation
GDP Product PresentationGDP Product Presentation
GDP Product Presentationtswong
 
Automated Penetration Testing With Core Impact
Automated Penetration Testing With Core ImpactAutomated Penetration Testing With Core Impact
Automated Penetration Testing With Core ImpactTom Eston
 

Similar a Cybercrime & Business. Jak wygrać tę wojnę? (20)

Keynote fx try harder 2 be yourself
Keynote fx   try harder 2 be yourselfKeynote fx   try harder 2 be yourself
Keynote fx try harder 2 be yourself
 
Modern malware and threats
Modern malware and threatsModern malware and threats
Modern malware and threats
 
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
Agile Chennai 2022 - Shyam Sundar | Everything there is to know about Cyber s...
 
The A and the P of the T
The A and the P of the TThe A and the P of the T
The A and the P of the T
 
The A and the P of the T
The A and the P of the TThe A and the P of the T
The A and the P of the T
 
Thinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and PreventionThinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and Prevention
 
Hacking ATM machines for fun and profit!
Hacking ATM machines for fun and profit!Hacking ATM machines for fun and profit!
Hacking ATM machines for fun and profit!
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
 
How websites are attacked
How websites are attackedHow websites are attacked
How websites are attacked
 
Malware's most wanted-zberp-the_financial_trojan
Malware's most wanted-zberp-the_financial_trojanMalware's most wanted-zberp-the_financial_trojan
Malware's most wanted-zberp-the_financial_trojan
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Cansec West 2009
Cansec West 2009Cansec West 2009
Cansec West 2009
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
 
Cyber Defense Automation
Cyber Defense AutomationCyber Defense Automation
Cyber Defense Automation
 
Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015
 
Securing Underprotected APIs - Deja vu Security
Securing Underprotected APIs - Deja vu SecuritySecuring Underprotected APIs - Deja vu Security
Securing Underprotected APIs - Deja vu Security
 
Malware Analysis
Malware AnalysisMalware Analysis
Malware Analysis
 
GDP Product Presentation
GDP Product PresentationGDP Product Presentation
GDP Product Presentation
 
Automated Penetration Testing With Core Impact
Automated Penetration Testing With Core ImpactAutomated Penetration Testing With Core Impact
Automated Penetration Testing With Core Impact
 

Más de Biznes to Rozmowy

Bezpłatne WIFI rozkręca biznes - Łukasz Antoniewicz
Bezpłatne WIFI rozkręca biznes - Łukasz AntoniewiczBezpłatne WIFI rozkręca biznes - Łukasz Antoniewicz
Bezpłatne WIFI rozkręca biznes - Łukasz AntoniewiczBiznes to Rozmowy
 
Jak wypromować swoją firmę w internecie. Przykłady kampanii, m.in Google Adwo...
Jak wypromować swoją firmę w internecie. Przykłady kampanii, m.in Google Adwo...Jak wypromować swoją firmę w internecie. Przykłady kampanii, m.in Google Adwo...
Jak wypromować swoją firmę w internecie. Przykłady kampanii, m.in Google Adwo...Biznes to Rozmowy
 
Warto być widocznym w Social Mediach. Facebook, Linkedin. - Bartek Brzoskowski
Warto być widocznym w Social Mediach. Facebook, Linkedin. - Bartek BrzoskowskiWarto być widocznym w Social Mediach. Facebook, Linkedin. - Bartek Brzoskowski
Warto być widocznym w Social Mediach. Facebook, Linkedin. - Bartek BrzoskowskiBiznes to Rozmowy
 
Kurs malowania Mona Lisy... Czyli jak stworzyć markę, którą Klienci będą koch...
Kurs malowania Mona Lisy... Czyli jak stworzyć markę, którą Klienci będą koch...Kurs malowania Mona Lisy... Czyli jak stworzyć markę, którą Klienci będą koch...
Kurs malowania Mona Lisy... Czyli jak stworzyć markę, którą Klienci będą koch...Biznes to Rozmowy
 
Driving at 200 km/ into a wall of security issues in personal cloud?
Driving at 200 km/ into a wall of security issues in personal cloud?Driving at 200 km/ into a wall of security issues in personal cloud?
Driving at 200 km/ into a wall of security issues in personal cloud?Biznes to Rozmowy
 
The future of human: brand interface
The future of human: brand interfaceThe future of human: brand interface
The future of human: brand interfaceBiznes to Rozmowy
 
Od internetu rzeczy do biohackingu: o trendach i mikrotrendach, które były, s...
Od internetu rzeczy do biohackingu: o trendach i mikrotrendach, które były, s...Od internetu rzeczy do biohackingu: o trendach i mikrotrendach, które były, s...
Od internetu rzeczy do biohackingu: o trendach i mikrotrendach, które były, s...Biznes to Rozmowy
 
Przedsiębiorstwo 2.0 Jak korzystać z elastycznych, bezpiecznych rozwiązań a n...
Przedsiębiorstwo 2.0 Jak korzystać z elastycznych, bezpiecznych rozwiązań a n...Przedsiębiorstwo 2.0 Jak korzystać z elastycznych, bezpiecznych rozwiązań a n...
Przedsiębiorstwo 2.0 Jak korzystać z elastycznych, bezpiecznych rozwiązań a n...Biznes to Rozmowy
 
Kreator czy technokrata? Kogo bardziej potrzebuje innowacyjność
Kreator czy technokrata? Kogo bardziej potrzebuje innowacyjnośćKreator czy technokrata? Kogo bardziej potrzebuje innowacyjność
Kreator czy technokrata? Kogo bardziej potrzebuje innowacyjnośćBiznes to Rozmowy
 
Kim są Early Adopters i dlaczego była nią Twoja Babcia?
Kim są Early Adopters i dlaczego była nią Twoja Babcia?Kim są Early Adopters i dlaczego była nią Twoja Babcia?
Kim są Early Adopters i dlaczego była nią Twoja Babcia?Biznes to Rozmowy
 
1 + 1 > 2. Jak zamieniać rozmowy w biznes.
1 + 1 > 2. Jak zamieniać rozmowy w biznes.1 + 1 > 2. Jak zamieniać rozmowy w biznes.
1 + 1 > 2. Jak zamieniać rozmowy w biznes.Biznes to Rozmowy
 
Highly-Effective Relationships in a Technology-Driven World: An Impossible Po...
Highly-Effective Relationships in a Technology-Driven World: An Impossible Po...Highly-Effective Relationships in a Technology-Driven World: An Impossible Po...
Highly-Effective Relationships in a Technology-Driven World: An Impossible Po...Biznes to Rozmowy
 
Golden Eye. I wiesz więcej.
Golden Eye. I wiesz więcej.Golden Eye. I wiesz więcej.
Golden Eye. I wiesz więcej.Biznes to Rozmowy
 
Jak żeglować na oceanie informacji. Nowoczesny pracownik w erze komunikacji g...
Jak żeglować na oceanie informacji. Nowoczesny pracownik w erze komunikacji g...Jak żeglować na oceanie informacji. Nowoczesny pracownik w erze komunikacji g...
Jak żeglować na oceanie informacji. Nowoczesny pracownik w erze komunikacji g...Biznes to Rozmowy
 

Más de Biznes to Rozmowy (20)

Bezpłatne WIFI rozkręca biznes - Łukasz Antoniewicz
Bezpłatne WIFI rozkręca biznes - Łukasz AntoniewiczBezpłatne WIFI rozkręca biznes - Łukasz Antoniewicz
Bezpłatne WIFI rozkręca biznes - Łukasz Antoniewicz
 
Jak wypromować swoją firmę w internecie. Przykłady kampanii, m.in Google Adwo...
Jak wypromować swoją firmę w internecie. Przykłady kampanii, m.in Google Adwo...Jak wypromować swoją firmę w internecie. Przykłady kampanii, m.in Google Adwo...
Jak wypromować swoją firmę w internecie. Przykłady kampanii, m.in Google Adwo...
 
Warto być widocznym w Social Mediach. Facebook, Linkedin. - Bartek Brzoskowski
Warto być widocznym w Social Mediach. Facebook, Linkedin. - Bartek BrzoskowskiWarto być widocznym w Social Mediach. Facebook, Linkedin. - Bartek Brzoskowski
Warto być widocznym w Social Mediach. Facebook, Linkedin. - Bartek Brzoskowski
 
Kurs malowania Mona Lisy... Czyli jak stworzyć markę, którą Klienci będą koch...
Kurs malowania Mona Lisy... Czyli jak stworzyć markę, którą Klienci będą koch...Kurs malowania Mona Lisy... Czyli jak stworzyć markę, którą Klienci będą koch...
Kurs malowania Mona Lisy... Czyli jak stworzyć markę, którą Klienci będą koch...
 
Driving at 200 km/ into a wall of security issues in personal cloud?
Driving at 200 km/ into a wall of security issues in personal cloud?Driving at 200 km/ into a wall of security issues in personal cloud?
Driving at 200 km/ into a wall of security issues in personal cloud?
 
Nas nie zaatakują!
Nas nie zaatakują!Nas nie zaatakują!
Nas nie zaatakują!
 
The future of human: brand interface
The future of human: brand interfaceThe future of human: brand interface
The future of human: brand interface
 
Brand video
Brand videoBrand video
Brand video
 
Od internetu rzeczy do biohackingu: o trendach i mikrotrendach, które były, s...
Od internetu rzeczy do biohackingu: o trendach i mikrotrendach, które były, s...Od internetu rzeczy do biohackingu: o trendach i mikrotrendach, które były, s...
Od internetu rzeczy do biohackingu: o trendach i mikrotrendach, które były, s...
 
Przedsiębiorstwo 2.0 Jak korzystać z elastycznych, bezpiecznych rozwiązań a n...
Przedsiębiorstwo 2.0 Jak korzystać z elastycznych, bezpiecznych rozwiązań a n...Przedsiębiorstwo 2.0 Jak korzystać z elastycznych, bezpiecznych rozwiązań a n...
Przedsiębiorstwo 2.0 Jak korzystać z elastycznych, bezpiecznych rozwiązań a n...
 
Komunikacja po prostu.
Komunikacja po prostu.Komunikacja po prostu.
Komunikacja po prostu.
 
Kreator czy technokrata? Kogo bardziej potrzebuje innowacyjność
Kreator czy technokrata? Kogo bardziej potrzebuje innowacyjnośćKreator czy technokrata? Kogo bardziej potrzebuje innowacyjność
Kreator czy technokrata? Kogo bardziej potrzebuje innowacyjność
 
Kim są Early Adopters i dlaczego była nią Twoja Babcia?
Kim są Early Adopters i dlaczego była nią Twoja Babcia?Kim są Early Adopters i dlaczego była nią Twoja Babcia?
Kim są Early Adopters i dlaczego była nią Twoja Babcia?
 
1 + 1 > 2. Jak zamieniać rozmowy w biznes.
1 + 1 > 2. Jak zamieniać rozmowy w biznes.1 + 1 > 2. Jak zamieniać rozmowy w biznes.
1 + 1 > 2. Jak zamieniać rozmowy w biznes.
 
Highly-Effective Relationships in a Technology-Driven World: An Impossible Po...
Highly-Effective Relationships in a Technology-Driven World: An Impossible Po...Highly-Effective Relationships in a Technology-Driven World: An Impossible Po...
Highly-Effective Relationships in a Technology-Driven World: An Impossible Po...
 
Video will touch us all.
Video will touch us all.Video will touch us all.
Video will touch us all.
 
WiFi - jakiego nie znacie.
WiFi - jakiego nie znacie.WiFi - jakiego nie znacie.
WiFi - jakiego nie znacie.
 
Golden Eye. I wiesz więcej.
Golden Eye. I wiesz więcej.Golden Eye. I wiesz więcej.
Golden Eye. I wiesz więcej.
 
What's Next
What's NextWhat's Next
What's Next
 
Jak żeglować na oceanie informacji. Nowoczesny pracownik w erze komunikacji g...
Jak żeglować na oceanie informacji. Nowoczesny pracownik w erze komunikacji g...Jak żeglować na oceanie informacji. Nowoczesny pracownik w erze komunikacji g...
Jak żeglować na oceanie informacji. Nowoczesny pracownik w erze komunikacji g...
 

Último

Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxRakhi Bazaar
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...Hector Del Castillo, CPM, CPMM
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifeBhavana Pujan Kendra
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsKnowledgeSeed
 
Supercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsSupercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsGOKUL JS
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsIndiaMART InterMESH Limited
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfJamesConcepcion7
 
Send Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSendBig4
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxappkodes
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers referencessuser2c065e
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersPeter Horsten
 

Último (20)

Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
WAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdfWAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdf
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in Life
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applications
 
Supercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsSupercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebs
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors Data
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan Dynamics
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdf
 
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptxThe Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
 
Send Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.com
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptx
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers reference
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exporters
 

Cybercrime & Business. Jak wygrać tę wojnę?

  • 1.
  • 2. Cybercrime & Business How do we fight this war? Pirkka Palomäki Chief Technology Officer F-Secure Corporation
  • 3.
  • 4.
  • 5. Operating system Floppy Browsers Lan Java Email Adobe Flash Web Adobe PDF reader Quicktime facebook, myspace, twitter, linkedin?
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. Featuring Mr. Adewale Taiwo Featuring Mr. Cagatay Evyapan aka "Cha0"
  • 14.
  • 16. Case Mebroot – short introduction The first complex MBR rootkit with malicious payload Kernel-mode downloader and backdoor Downloads PWS and banking Trojan components Strengths of Mebroot: No executable files on file system No registry keys or standard launch points No driver module in module list Minimal memory footprint Early execution during system startup Stealth read/write disk operations Stealth Anti-Removal protection Totally generic, open malware platform (MAOS)
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. How do we work?
  • 24. Obsolete for Hundreds of Thousands of samples every day
  • 25. Security Research Flow; The Critical Chain Malware Detection Malware Automatic Real-time Samples / Engine Researchers & Analysis delivery Acquisition Technology Analysts
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.