SlideShare una empresa de Scribd logo
1 de 4
8
  threats
  that even
   antivirus
cannot catch
Malware attacks and data thefts are on the rise as evident from the recent news
headlines. The mere use of antivirus software wouldn’t serve the purpose. The reason
being, antivirus programs block attacks by using patterns or signatures to identify
malicious software code. This signature-based detection was successful when the
threats were lesser and spread over a good time frame. Relying entirely on antivirus
solutions will not serve the purpose now because your system is exposed to threats in
routine situations.
The whitepaper published by John Metzger, Senior Product Marketing Manager, and
Jonathan Shaw, Product Manager at Sophos highlights eight everyday threats in which
we need to update the protection of our PC beyond traditional antivirus program. Let us
look at them and understand their implications:


1.       The zero-day threat

Zero-day threats are those malware threats that are not recognizable as they didn’t
match up with earlier threats. As per the research report, “Zero-day threats can also
exploit zero-day vulnerabilities, or previously unknown security deficiencies that
software vendors have not yet patched.” In March 2011, unknown attackers unleashed
the zero-day attack on RSA Company by infiltrating its servers and stealing sensitive
information.
Preventive measure:
Run security scan on a regular basis to detect and remove the latest threats.


2.       Working outside the firewall

Workplace has become mobile now and has provided opportunity to employees to
access their mails from outside – be it airports, hotels, cafes, or home. This access has
created an unsecured network. Cyber criminals can exploit such vulnerable networks to
push malicious software and spam through Conficker worm.
Preventive measure:
Keep your operating system up-to-date by installing the latest patches.
3.       The unpatched PC

As per the whitepaper, “One small unpatched vulnerability in an application, browser or
operating system can lead to huge problems.” Hackers invade such unpatched
computers with Conficker worms and instruct infected PCs to transmit valuable
information like financial account credentials.
Preventive measure:
Download and install all the latest patches on your computer. According to a Gartner
report, “90% of successful attacks against software vulnerabilities could have been
prevented with an existing patch or configuration setting.”


4.       The uncontrolled application

Many of our favorite personal applications like instant messaging (IM), social networking
sites, peer-to-peer (P2P) clients, voice over IP (VoIP) and games, brings unacceptable
risk or performance issues. As per the research, in 2010, the U.S. Federal Trade
Commission sent letters to almost 100 organizations whose personal information,
including sensitive data about customers and employees, had leaked onto P2P
networks.
Preventive measure:
You can disallow the permission to install unwanted applications.


5.       Web insecurity

One may visit some inappropriate sites, knowingly or unknowingly. These sites often
redirects to sites hosting fake antivirus programs also known as scareware. Infection
can even be spread from a compromised reputable site through browser plug-ins.
Preventive measure:
Use URL filtering mechanism to block all those sites know to host malware like porn,
hate, and gaming sites.
6.       The lost laptop

The difficult thing in a lost laptop is to recover exposed information. In a study
conducted for Intel in 2009, it was found that a single lost or stolen laptop could cost
approximately $50,000 to its owner.
Preventive measure:
Data encryption is the remedy to be used on all laptops and removable storage devices.


7.       Misdirected e-mail

One typo error can send your important documents and confidential data to a wrong e-
mail id. This information can be exploited by criminals for organizing identity thefts.
Preventive measure:
You can ensure that files are encrypted before transferring through e-mails so as to
prevent any damage. You can also use data loss prevention software to warn the
recipient user or block the file transfer.


8.       The infected USB device

USB device bypass your computer’s firewall protection and could be a source of
malicious software.
Preventive measure:
Verify the authenticity of thumb drives and CD before using them. Such removable
media may be contaminated with malware. You can also use software that allows read-
only access to such devices.
Conclusion
The best defense is use an endpoint protection solution that provides multiple layers of
protection, including live antivirus, behavior-based detection, web protection, application
control, patch assessment, network access control, data encryption, data loss
prevention, and device control.

Más contenido relacionado

La actualidad más candente

Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
Arifa Ali
 

La actualidad más candente (20)

Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
It
ItIt
It
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat Landscape
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Hacking
HackingHacking
Hacking
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
Malicious malware breaches - eScan
Malicious malware breaches - eScanMalicious malware breaches - eScan
Malicious malware breaches - eScan
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Computer security
Computer securityComputer security
Computer security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cyber Security Terms
Cyber Security TermsCyber Security Terms
Cyber Security Terms
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Malware in penetration testing 1
Malware in penetration testing 1Malware in penetration testing 1
Malware in penetration testing 1
 
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hackerDan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 

Destacado (12)

8.začleňˆování signálu pcm 4
8.začleňˆování signálu pcm 48.začleňˆování signálu pcm 4
8.začleňˆování signálu pcm 4
 
8 tips for gas safety in your home
8 tips for gas safety in your home8 tips for gas safety in your home
8 tips for gas safety in your home
 
8 x 10 Frame Tent Installation Instructions
8 x 10 Frame Tent Installation Instructions8 x 10 Frame Tent Installation Instructions
8 x 10 Frame Tent Installation Instructions
 
8 tips 8minutes
8 tips 8minutes8 tips 8minutes
8 tips 8minutes
 
8. uso de you tube
8. uso de you tube8. uso de you tube
8. uso de you tube
 
8 ways to change the world ( English)
8 ways to change the world ( English)8 ways to change the world ( English)
8 ways to change the world ( English)
 
8 w souffriau - automatische beslissingsondersteuning in toerisme
8   w souffriau - automatische beslissingsondersteuning in toerisme8   w souffriau - automatische beslissingsondersteuning in toerisme
8 w souffriau - automatische beslissingsondersteuning in toerisme
 
8 Tarot Card Readings for 2016
8 Tarot Card Readings for 20168 Tarot Card Readings for 2016
8 Tarot Card Readings for 2016
 
Web осень 2012 лекция 8
Web осень 2012 лекция 8Web осень 2012 лекция 8
Web осень 2012 лекция 8
 
8vo curso
8vo curso8vo curso
8vo curso
 
8) what is survey research
8) what is survey research8) what is survey research
8) what is survey research
 
8 weight loos tips
8 weight loos tips8 weight loos tips
8 weight loos tips
 

Similar a 8 threats that even antivirus cannot catch

Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Connecting Up
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
galaxy201
 

Similar a 8 threats that even antivirus cannot catch (20)

Information security
Information securityInformation security
Information security
 
Network monitoring white paper
Network monitoring white paperNetwork monitoring white paper
Network monitoring white paper
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
C3
C3C3
C3
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Ethical hacking.docx
Ethical hacking.docxEthical hacking.docx
Ethical hacking.docx
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 
Cn35499502
Cn35499502Cn35499502
Cn35499502
 
Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
M
MM
M
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 
Internet security
Internet securityInternet security
Internet security
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
 
Data security
 Data security  Data security
Data security
 
Hamza
HamzaHamza
Hamza
 

Más de iYogi

6 steps to being a top influencer on linked in
6 steps to being a top influencer on linked in6 steps to being a top influencer on linked in
6 steps to being a top influencer on linked in
iYogi
 
Worm
WormWorm
Worm
iYogi
 
Fathers of Technology
Fathers of TechnologyFathers of Technology
Fathers of Technology
iYogi
 

Más de iYogi (20)

Commoditization of technology
Commoditization of technologyCommoditization of technology
Commoditization of technology
 
Benjamin Franklin Effect – The Ultimate Way to Get Customers to Like You
Benjamin Franklin Effect – The Ultimate Way to Get Customers to Like YouBenjamin Franklin Effect – The Ultimate Way to Get Customers to Like You
Benjamin Franklin Effect – The Ultimate Way to Get Customers to Like You
 
Jimmy wales ppt
Jimmy wales pptJimmy wales ppt
Jimmy wales ppt
 
8 steps to smartphone security for android
8 steps to smartphone security for android8 steps to smartphone security for android
8 steps to smartphone security for android
 
6 steps to being a top influencer on linked in
6 steps to being a top influencer on linked in6 steps to being a top influencer on linked in
6 steps to being a top influencer on linked in
 
iYogi reviews via art elaine
iYogi reviews via art  elaineiYogi reviews via art  elaine
iYogi reviews via art elaine
 
Worldwideweb
WorldwidewebWorldwideweb
Worldwideweb
 
iYogi Wow Tech Facts: TYPEWRITER
iYogi Wow Tech Facts: TYPEWRITERiYogi Wow Tech Facts: TYPEWRITER
iYogi Wow Tech Facts: TYPEWRITER
 
Worm
WormWorm
Worm
 
iYogi review by lynn c
iYogi review by lynn ciYogi review by lynn c
iYogi review by lynn c
 
iYogi reviews via art by marilyn b
iYogi reviews via art by marilyn biYogi reviews via art by marilyn b
iYogi reviews via art by marilyn b
 
Electronic brains
Electronic brainsElectronic brains
Electronic brains
 
iYogi reviews via art: Leslie c
iYogi reviews via art: Leslie ciYogi reviews via art: Leslie c
iYogi reviews via art: Leslie c
 
iYogi review by peggy l
iYogi review by peggy liYogi review by peggy l
iYogi review by peggy l
 
iYogi review by Sandy w
iYogi review by Sandy wiYogi review by Sandy w
iYogi review by Sandy w
 
Dianna l
Dianna lDianna l
Dianna l
 
iYogi customer review
iYogi customer reviewiYogi customer review
iYogi customer review
 
Customer feedback 1
Customer feedback 1Customer feedback 1
Customer feedback 1
 
Fathers of Technology
Fathers of TechnologyFathers of Technology
Fathers of Technology
 
Consumer Adoption Of Freemium Products And Services - iYogi
Consumer Adoption Of Freemium Products And Services - iYogiConsumer Adoption Of Freemium Products And Services - iYogi
Consumer Adoption Of Freemium Products And Services - iYogi
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

8 threats that even antivirus cannot catch

  • 1. 8 threats that even antivirus cannot catch
  • 2. Malware attacks and data thefts are on the rise as evident from the recent news headlines. The mere use of antivirus software wouldn’t serve the purpose. The reason being, antivirus programs block attacks by using patterns or signatures to identify malicious software code. This signature-based detection was successful when the threats were lesser and spread over a good time frame. Relying entirely on antivirus solutions will not serve the purpose now because your system is exposed to threats in routine situations. The whitepaper published by John Metzger, Senior Product Marketing Manager, and Jonathan Shaw, Product Manager at Sophos highlights eight everyday threats in which we need to update the protection of our PC beyond traditional antivirus program. Let us look at them and understand their implications: 1. The zero-day threat Zero-day threats are those malware threats that are not recognizable as they didn’t match up with earlier threats. As per the research report, “Zero-day threats can also exploit zero-day vulnerabilities, or previously unknown security deficiencies that software vendors have not yet patched.” In March 2011, unknown attackers unleashed the zero-day attack on RSA Company by infiltrating its servers and stealing sensitive information. Preventive measure: Run security scan on a regular basis to detect and remove the latest threats. 2. Working outside the firewall Workplace has become mobile now and has provided opportunity to employees to access their mails from outside – be it airports, hotels, cafes, or home. This access has created an unsecured network. Cyber criminals can exploit such vulnerable networks to push malicious software and spam through Conficker worm. Preventive measure: Keep your operating system up-to-date by installing the latest patches.
  • 3. 3. The unpatched PC As per the whitepaper, “One small unpatched vulnerability in an application, browser or operating system can lead to huge problems.” Hackers invade such unpatched computers with Conficker worms and instruct infected PCs to transmit valuable information like financial account credentials. Preventive measure: Download and install all the latest patches on your computer. According to a Gartner report, “90% of successful attacks against software vulnerabilities could have been prevented with an existing patch or configuration setting.” 4. The uncontrolled application Many of our favorite personal applications like instant messaging (IM), social networking sites, peer-to-peer (P2P) clients, voice over IP (VoIP) and games, brings unacceptable risk or performance issues. As per the research, in 2010, the U.S. Federal Trade Commission sent letters to almost 100 organizations whose personal information, including sensitive data about customers and employees, had leaked onto P2P networks. Preventive measure: You can disallow the permission to install unwanted applications. 5. Web insecurity One may visit some inappropriate sites, knowingly or unknowingly. These sites often redirects to sites hosting fake antivirus programs also known as scareware. Infection can even be spread from a compromised reputable site through browser plug-ins. Preventive measure: Use URL filtering mechanism to block all those sites know to host malware like porn, hate, and gaming sites.
  • 4. 6. The lost laptop The difficult thing in a lost laptop is to recover exposed information. In a study conducted for Intel in 2009, it was found that a single lost or stolen laptop could cost approximately $50,000 to its owner. Preventive measure: Data encryption is the remedy to be used on all laptops and removable storage devices. 7. Misdirected e-mail One typo error can send your important documents and confidential data to a wrong e- mail id. This information can be exploited by criminals for organizing identity thefts. Preventive measure: You can ensure that files are encrypted before transferring through e-mails so as to prevent any damage. You can also use data loss prevention software to warn the recipient user or block the file transfer. 8. The infected USB device USB device bypass your computer’s firewall protection and could be a source of malicious software. Preventive measure: Verify the authenticity of thumb drives and CD before using them. Such removable media may be contaminated with malware. You can also use software that allows read- only access to such devices. Conclusion The best defense is use an endpoint protection solution that provides multiple layers of protection, including live antivirus, behavior-based detection, web protection, application control, patch assessment, network access control, data encryption, data loss prevention, and device control.