SlideShare una empresa de Scribd logo
1 de 11
Descargar para leer sin conexión
Click to edit Master title style


• Click to edit Master text styles
    – Second level
       • Third level
                Securing Africa
           – Fourth level

                - get prepared for the future to come -
               » Fifth level




                Costin G. Raiu
                Chief Security Expert, Kaspersky Lab EEMEA
                craiu@kaspersky.ro
Today’s agenda
Click to edit Master title style


• Click to edit Master text styles
•   The Threat Landscape: 2009
     – Second level
•   The sidelevel
        • Third
                effects of increased bandwidth
           – Fourth level
               » Fifth level
•   2010 – prevention is better than the cure
•   simple mitigation steps for safer
    computing
Kaspersky Lab: number of signatures
   Click to edit Master title style

1600000
    • Click to edit Master text styles
1400000
                    New threats per day: 30,000
           – Second level
1200000
              • Third level
                    More than 3,500 new signatures/day
1000000                 – Fourth level
                          November 2009: +3 mil
                           » Fifth level
800000

600000

400000

200000

     0

          Year   1998      1999   2000   2001   2002   2003   2004   2005   2006   2007   2008
Internet threats – infected legitimate websites
Click to edit Master title style

   2,000

• Click to edit Master text styles
  1,800
                                                                               15,000%
   1,600
   – Second level                                                             growth vs 2006

   1,400
           • Third level
   1,200
              – Fourth level
   1,000          » Fifth level
    800

    600

    400

    200

      0
                2006                2007                   2008                 2009
                Infected legitimate websites out of a pool of 300K
                           Source: Kaspersky Lab Analytical article
                       http://www.viruslist.com/en/analysis?pubid=204792089
“En masse” infections
Click to edit Master title style

Gumblar, 9-Ball:
• Click to edit Master text styles
    – Second level
       • Third level
           – Fourth level
               » Fifth level
Click tofiber optic connections
Faster edit Master title style


• Click to edit Master text styles
  Seacom
   – Second level
ConnectsThird level
        •
          a large
part of AfricaFourth level
            – with:
    – India     »   Fifth level
    – UK, France
    – UAE, Egypt




                                     Image source: mybroadband.co.za
Seacom -
 Click to edit Master title style
                 effects

 • Click to edit Master text styles
       +
     – Second level
                                                                               -
Cheaper internet
        • Third level                                                    P2P networks
access for allFourth level
           –                                                             file sharing
Faster internet Fifth level
                »
                                                                         Pirate software
connections                                                              Internet attacks
Online commerce

                              Image source: Seacom HQ c/o Linda Carter
Click to social engineering attacks
2010 – edit Master title style


• Click to edit Master text styles
   – Second level
       • Third level
          – Fourth level
              » Fifth level
Click to social engineering attacks
2010 – edit Master title style


• Click to edit Master text styles
   – Second level
       • Third level
          – Fourth level
              » Fifth level
Mitigation steps
Click to edit Master title style


• Click to edit Master is better
      Prevention text styles          than cure!
• Install and levelan Internet Security Suite
   – Second
               run
      • Third level
• Don’t assumelevel
          – Fourth
                     a website is safe because it is high
  profile     » Fifth level

• Use an up-to-date, modern browser: IE8, FF 3.x,
  Chrome, Opera 10
• Keep Windows up-to-date
• Always run the latest versions of Adobe Reader,
  Flash Player, MS Word, etc…
• Be wary of messages from social networks
Click to edit Master title style


• Click to edit Master text styles
    – Second level
           The future is coming – be prepared!
       • Third level
           – Fourth level
               » Fifth level

                      Thank you!

Más contenido relacionado

Destacado

Sakai – what is changing
Sakai – what is changingSakai – what is changing
Sakai – what is changingBrian Moynihan
 
02 3-aprendizaje colaborativo-cooperativo
02 3-aprendizaje colaborativo-cooperativo02 3-aprendizaje colaborativo-cooperativo
02 3-aprendizaje colaborativo-cooperativoLINA SILVA
 
Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009Ohio LETC
 
Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009Ohio LETC
 
Inovatie locala, impact global
Inovatie locala, impact globalInovatie locala, impact global
Inovatie locala, impact globalCostin Raiu
 
Shakespeare’s Theatre
Shakespeare’s TheatreShakespeare’s Theatre
Shakespeare’s Theatrejohnyap11
 

Destacado (9)

Sakai – what is changing
Sakai – what is changingSakai – what is changing
Sakai – what is changing
 
02 3-aprendizaje colaborativo-cooperativo
02 3-aprendizaje colaborativo-cooperativo02 3-aprendizaje colaborativo-cooperativo
02 3-aprendizaje colaborativo-cooperativo
 
Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009
 
PC osciloskop
PC osciloskopPC osciloskop
PC osciloskop
 
Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009Login Seminars Blackboard Directions 2009
Login Seminars Blackboard Directions 2009
 
Finge.Unit1cross
Finge.Unit1crossFinge.Unit1cross
Finge.Unit1cross
 
Inovatie locala, impact global
Inovatie locala, impact globalInovatie locala, impact global
Inovatie locala, impact global
 
Shakespeare’s Theatre
Shakespeare’s TheatreShakespeare’s Theatre
Shakespeare’s Theatre
 
Solidarnost
SolidarnostSolidarnost
Solidarnost
 

Similar a Securing Africa - 2009-2010

Automated Targeted Attacks: The New Age of Cybercrime
Automated Targeted Attacks: The New Age of CybercrimeAutomated Targeted Attacks: The New Age of Cybercrime
Automated Targeted Attacks: The New Age of CybercrimeStefan Tanase
 
Malware * punct ro
Malware * punct roMalware * punct ro
Malware * punct roCostin Raiu
 
Surviving Today's Targeted Attacks
Surviving Today's Targeted AttacksSurviving Today's Targeted Attacks
Surviving Today's Targeted AttacksStefan Tanase
 
Bypassing malware detection mechanisms in online banking
Bypassing malware detection mechanisms in online bankingBypassing malware detection mechanisms in online banking
Bypassing malware detection mechanisms in online bankingJakub Kałużny
 
Today’s hidden dangers: Social networks under attack
Today’s hidden dangers: Social networks under attackToday’s hidden dangers: Social networks under attack
Today’s hidden dangers: Social networks under attackStefan Tanase
 
DevSecOps Done Right - Strategies and Tools.pptx
DevSecOps Done Right - Strategies and Tools.pptxDevSecOps Done Right - Strategies and Tools.pptx
DevSecOps Done Right - Strategies and Tools.pptxDavide Benvegnù
 
New Developments in the BREACH attack
New Developments in the BREACH attackNew Developments in the BREACH attack
New Developments in the BREACH attackE Hacking
 
Anderson montria mobile_presentationtemplate
Anderson montria mobile_presentationtemplateAnderson montria mobile_presentationtemplate
Anderson montria mobile_presentationtemplatemontria
 
Anderson montria mobile_presentation
Anderson montria mobile_presentationAnderson montria mobile_presentation
Anderson montria mobile_presentationmontria
 
Anderson montria mobile_presentation
Anderson montria mobile_presentationAnderson montria mobile_presentation
Anderson montria mobile_presentationmontria
 
The Savage Curtain: Mobile SSL Failures
The Savage Curtain: Mobile SSL FailuresThe Savage Curtain: Mobile SSL Failures
The Savage Curtain: Mobile SSL Failures☠Tony Trummer☠
 
Using Solr to find the Right Person for the Right Job
Using Solr to find the Right Person for the Right JobUsing Solr to find the Right Person for the Right Job
Using Solr to find the Right Person for the Right JobLucidworks (Archived)
 
MongoDB and MongoMK Source Event
MongoDB and MongoMK Source EventMongoDB and MongoMK Source Event
MongoDB and MongoMK Source EventYuval Ararat
 
7 ways of reducing tpm cost
7 ways of reducing tpm cost 7 ways of reducing tpm cost
7 ways of reducing tpm cost TradeInsight
 
Cat valorezi kaspersky
Cat valorezi kasperskyCat valorezi kaspersky
Cat valorezi kasperskyAgora Group
 
Documentation of surgical procedure
Documentation of surgical procedureDocumentation of surgical procedure
Documentation of surgical procedureHieder Al-Shami
 

Similar a Securing Africa - 2009-2010 (19)

Automated Targeted Attacks: The New Age of Cybercrime
Automated Targeted Attacks: The New Age of CybercrimeAutomated Targeted Attacks: The New Age of Cybercrime
Automated Targeted Attacks: The New Age of Cybercrime
 
Malware * punct ro
Malware * punct roMalware * punct ro
Malware * punct ro
 
Surviving Today's Targeted Attacks
Surviving Today's Targeted AttacksSurviving Today's Targeted Attacks
Surviving Today's Targeted Attacks
 
Bypassing malware detection mechanisms in online banking
Bypassing malware detection mechanisms in online bankingBypassing malware detection mechanisms in online banking
Bypassing malware detection mechanisms in online banking
 
Today’s hidden dangers: Social networks under attack
Today’s hidden dangers: Social networks under attackToday’s hidden dangers: Social networks under attack
Today’s hidden dangers: Social networks under attack
 
DevSecOps Done Right - Strategies and Tools.pptx
DevSecOps Done Right - Strategies and Tools.pptxDevSecOps Done Right - Strategies and Tools.pptx
DevSecOps Done Right - Strategies and Tools.pptx
 
New Developments in the BREACH attack
New Developments in the BREACH attackNew Developments in the BREACH attack
New Developments in the BREACH attack
 
Anderson montria mobile_presentationtemplate
Anderson montria mobile_presentationtemplateAnderson montria mobile_presentationtemplate
Anderson montria mobile_presentationtemplate
 
Microsoft Cloud Computing
Microsoft Cloud ComputingMicrosoft Cloud Computing
Microsoft Cloud Computing
 
Anderson montria mobile_presentation
Anderson montria mobile_presentationAnderson montria mobile_presentation
Anderson montria mobile_presentation
 
Anderson montria mobile_presentation
Anderson montria mobile_presentationAnderson montria mobile_presentation
Anderson montria mobile_presentation
 
The Savage Curtain: Mobile SSL Failures
The Savage Curtain: Mobile SSL FailuresThe Savage Curtain: Mobile SSL Failures
The Savage Curtain: Mobile SSL Failures
 
Using Solr to find the Right Person for the Right Job
Using Solr to find the Right Person for the Right JobUsing Solr to find the Right Person for the Right Job
Using Solr to find the Right Person for the Right Job
 
MongoDB and MongoMK Source Event
MongoDB and MongoMK Source EventMongoDB and MongoMK Source Event
MongoDB and MongoMK Source Event
 
7 ways of reducing tpm cost
7 ways of reducing tpm cost 7 ways of reducing tpm cost
7 ways of reducing tpm cost
 
Cat valorezi kaspersky
Cat valorezi kasperskyCat valorezi kaspersky
Cat valorezi kaspersky
 
Seminário de Segurança em Informática - Microsoft
Seminário de Segurança em Informática - MicrosoftSeminário de Segurança em Informática - Microsoft
Seminário de Segurança em Informática - Microsoft
 
Seminário de Segurança em Informática - Apresentação Andrew Cushman
Seminário de Segurança em Informática - Apresentação Andrew Cushman Seminário de Segurança em Informática - Apresentação Andrew Cushman
Seminário de Segurança em Informática - Apresentação Andrew Cushman
 
Documentation of surgical procedure
Documentation of surgical procedureDocumentation of surgical procedure
Documentation of surgical procedure
 

Último

The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastUXDXConf
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...CzechDreamin
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxJennifer Lim
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfUK Journal
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101vincent683379
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jNeo4j
 
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptxBT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptxNeo4j
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsStefano
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 

Último (20)

The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptxBT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 

Securing Africa - 2009-2010

  • 1. Click to edit Master title style • Click to edit Master text styles – Second level • Third level Securing Africa – Fourth level - get prepared for the future to come - » Fifth level Costin G. Raiu Chief Security Expert, Kaspersky Lab EEMEA craiu@kaspersky.ro
  • 2. Today’s agenda Click to edit Master title style • Click to edit Master text styles • The Threat Landscape: 2009 – Second level • The sidelevel • Third effects of increased bandwidth – Fourth level » Fifth level • 2010 – prevention is better than the cure • simple mitigation steps for safer computing
  • 3. Kaspersky Lab: number of signatures Click to edit Master title style 1600000 • Click to edit Master text styles 1400000 New threats per day: 30,000 – Second level 1200000 • Third level More than 3,500 new signatures/day 1000000 – Fourth level November 2009: +3 mil » Fifth level 800000 600000 400000 200000 0 Year 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008
  • 4. Internet threats – infected legitimate websites Click to edit Master title style 2,000 • Click to edit Master text styles 1,800 15,000% 1,600 – Second level growth vs 2006 1,400 • Third level 1,200 – Fourth level 1,000 » Fifth level 800 600 400 200 0 2006 2007 2008 2009 Infected legitimate websites out of a pool of 300K Source: Kaspersky Lab Analytical article http://www.viruslist.com/en/analysis?pubid=204792089
  • 5. “En masse” infections Click to edit Master title style Gumblar, 9-Ball: • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level
  • 6. Click tofiber optic connections Faster edit Master title style • Click to edit Master text styles Seacom – Second level ConnectsThird level • a large part of AfricaFourth level – with: – India » Fifth level – UK, France – UAE, Egypt Image source: mybroadband.co.za
  • 7. Seacom - Click to edit Master title style effects • Click to edit Master text styles + – Second level - Cheaper internet • Third level P2P networks access for allFourth level – file sharing Faster internet Fifth level » Pirate software connections Internet attacks Online commerce Image source: Seacom HQ c/o Linda Carter
  • 8. Click to social engineering attacks 2010 – edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level
  • 9. Click to social engineering attacks 2010 – edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level
  • 10. Mitigation steps Click to edit Master title style • Click to edit Master is better Prevention text styles than cure! • Install and levelan Internet Security Suite – Second run • Third level • Don’t assumelevel – Fourth a website is safe because it is high profile » Fifth level • Use an up-to-date, modern browser: IE8, FF 3.x, Chrome, Opera 10 • Keep Windows up-to-date • Always run the latest versions of Adobe Reader, Flash Player, MS Word, etc… • Be wary of messages from social networks
  • 11. Click to edit Master title style • Click to edit Master text styles – Second level The future is coming – be prepared! • Third level – Fourth level » Fifth level Thank you!