Upload
scamboy
View
564
Download
0
Embed Size (px)
DESCRIPTION
Citation preview
Click to edit Master title style
• Click to edit Master text styles– Second level
• Third level– Fourth level
» Fifth level
June 10th, 2009 National ICT Month (PIKOM PC FAIR) (KLCC – MALAYSIA )
Web 2.0Web 2.0World of opportunityWorld of opportunity!!
World of danger!World of danger!COMPUTERWORLD FORUM. SECURITY 2010
Product Manager, SEA Regionwww.kaspersky-sea.com
Click to edit Master title style
• Click to edit Master text styles– Second level
• Third level– Fourth level
» Fifth level
June 10th, 2009 National ICT Month (PIKOM PC FAIR) (KLCC – MALAYSIA )
AGENDAWeb 2.0 and the world of opportunityopportunity, world of dangerdanger
Click to edit Master title style
• Click to edit Master text styles– Second level
• Third level– Fourth level
» Fifth level
June 10th, 2009 National ICT Month (PIKOM PC FAIR) (KLCC – MALAYSIA )
Web 2.0 and the world of opportunity, world of opportunity, world of dangerworld of danger
AGENDA
•Web2.0– World of opportunity
•Web2.0– World of danger
•Web2.0 – staying safe and continuing the opportunity– Technology
– Human factor
Click to edit Master title style
• Click to edit Master text styles– Second level
• Third level– Fourth level
» Fifth level
June 10th, 2009 National ICT Month (PIKOM PC FAIR) (KLCC – MALAYSIA )
W3b2Point-O – world opportunityWeb 2.0 and the world of opportunityopportunity, world of dangerdanger
Click to edit Master title style
• Click to edit Master text styles– Second level
• Third level– Fourth level
» Fifth level
June 10th, 2009 National ICT Month (PIKOM PC FAIR) (KLCC – MALAYSIA )
W3b2Point-O – world opportunityworld opportunity
What is WEB2.0– Associated with web applications which facilitates information sharing, interoperability and collaboration on the WWW–Does not refer to an update to any technical specifications but rather the ways of end user interactions and software developers
•How it works–The client-side/web browser technologies–To permit the user to continue to interact with the page, communications such as data requests going to the server are separated from data coming back to the page
Click to edit Master title style
• Click to edit Master text styles– Second level
• Third level– Fourth level
» Fifth level
June 10th, 2009 National ICT Month (PIKOM PC FAIR) (KLCC – MALAYSIA )
W3b2Point-O – world opportunity Web 2.0 and the world of opportunity, world of danger
All logos are copyrighted by their respective company.
• Examples of web2.0
Click to edit Master title style
• Click to edit Master text styles– Second level
• Third level– Fourth level
» Fifth level
June 10th, 2009 National ICT Month (PIKOM PC FAIR) (KLCC – MALAYSIA )Event details (title, place)
The WoW factor:
• Web2.0–Web base service which allows people to collaborate and share information online.
•Business Benefits–Low cost marketing strategy–Direct communication with your customer–Avoid duplication
W3b2Point-O – world opportunityworld opportunity
Click to edit Master title style
• Click to edit Master text styles– Second level
• Third level– Fourth level
» Fifth level
June 10th, 2009 National ICT Month (PIKOM PC FAIR) (KLCC – MALAYSIA )
W3b2Point-O – world opportunityworld opportunity
Click to edit Master title style
• Click to edit Master text styles– Second level
• Third level– Fourth level
» Fifth level
June 10th, 2009 National ICT Month (PIKOM PC FAIR) (KLCC – MALAYSIA )
W3b2Point-O – world opportunityworld opportunity
Click to edit Master title style
• Click to edit Master text styles– Second level
• Third level– Fourth level
» Fifth level
June 10th, 2009 National ICT Month (PIKOM PC FAIR) (KLCC – MALAYSIA )http://www.itweb.co.za/index.php?view=article&id=28994:deloitte-uses-web20-learning&option=com_content&catid=147:internet&Itemid=68
W3b2Point-O – world opportunityworld opportunity
Click to edit Master title style
• Click to edit Master text styles– Second level
• Third level– Fourth level
» Fifth level
June 10th, 2009 National ICT Month (PIKOM PC FAIR) (KLCC – MALAYSIA )
W3b2Point0 – world of world of dangerdangerWeb 2.0 and the world of opportunityopportunity, world of dangerdanger
Click to edit Master title style
• Click to edit Master text styles– Second level
• Third level– Fourth level
» Fifth level
June 10th, 2009 National ICT Month (PIKOM PC FAIR) (KLCC – MALAYSIA )
• Whole Foods Fan Page Scam on Facebook http://threatpost.com/en_us/blogs/whole-foods-fan-page-scam-facebook-040510
The scam has been spreading virally through Facebook via "fan pages" with names like "Whole Foods Market Free $500 Gift Card Limited - first 12,000 fans only" and "Whole Foods FREE $500 Gift Card! Only Available for 36 hours!" The fan page asks Facebook users to add it as a fan, thus pushing awareness of the page through those users' Facebook networks, and then asks them to fill out a credit assessment and other forms that request personal information. The scam then uses a form of malware to crash users' computers and the information they have entered is left vulnerable
• New MySpace Attack Launches Zeus Spyware http://threatpost.com/en_us/blogs/new-myspace-attack-launches-zeus-spyware-110909
The latest MySpace attack tries to lure recipients into giving up their MySpace credentials, and then attempts to trick victims into installing password-stealing malicious software.
W3b2Point0 – world of dangerworld of danger
Click to edit Master title style
• Click to edit Master text styles– Second level
• Third level– Fourth level
» Fifth level
June 10th, 2009 National ICT Month (PIKOM PC FAIR) (KLCC – MALAYSIA )
W3b2Point0 – world of dangerworld of danger
Event details (title, place)
Pre-recorded demo:
• Facebook – jacked iFrame/Clickjacking (http://news.cnet.com/8301-27080_3-10436698-245.html )
Click to edit Master title style
• Click to edit Master text styles– Second level
• Third level– Fourth level
» Fifth level
June 10th, 2009 National ICT Month (PIKOM PC FAIR) (KLCC – MALAYSIA )
W3b2Point0 – world of dangerworld of danger
http://www.kaspersky.com/news?id=207576048
• Kaspersky Lab Discovers Koobface Worm Doubles its Number of Command and Control Servers in 48 Hours
Based on this, we can conclude that the cybercriminals are constantly monitoring their infrastructure status
Click to edit Master title style
• Click to edit Master text styles– Second level
• Third level– Fourth level
» Fifth level
June 10th, 2009 National ICT Month (PIKOM PC FAIR) (KLCC – MALAYSIA )
W3b2Point0 – staying safe and continuing the wow factor?Web 2.0 and the world of opportunityopportunity, world of dangerdanger
Click to edit Master title style
• Click to edit Master text styles– Second level
• Third level– Fourth level
» Fifth level
June 10th, 2009 National ICT Month (PIKOM PC FAIR) (KLCC – MALAYSIA )
W3b2Point0 – staying safe and continuing the staying safe and continuing the wow factor?wow factor?
• Technology (KAV for Workstation MP4)
Click to edit Master title style
• Click to edit Master text styles– Second level
• Third level– Fourth level
» Fifth level
June 10th, 2009 National ICT Month (PIKOM PC FAIR) (KLCC – MALAYSIA )
W3b2Point0 – staying safe and continuing the staying safe and continuing the wow factor?wow factor?
File System
File SystemD
evice C
on
trol
Device
Co
ntro
l
Netw
ork
Netw
ork
WebWeb
E-mail,
IM
E-mail,
IM
Click to edit Master title style
• Click to edit Master text styles– Second level
• Third level– Fourth level
» Fifth level
June 10th, 2009 National ICT Month (PIKOM PC FAIR) (KLCC – MALAYSIA )
W3b2Point0 – staying safe and continuing the staying safe and continuing the wow factor? wow factor? – Awareness (Human Factor)
http://www.kaspersky.com/news?id=207575817
Kaspersky Lab’s top tips for protecting against phishing attacks:• For sites such as Facebook create a bookmark for the log-in page, or type the URL
directly into the browser address bar;
• Don’t click on links in e-mail messages;
• Only type in confidential data on a secure web site;
• Check your bank account(s) regularly and report anything suspicious to your bank;
• Look for giveaway signs of phishing e-mails:
– If it’s not addressed to you personally;
– If you’re not the only recipient;
– If there are spelling mistakes, poor grammar or syntax or other clumsy use of language.
• Install Internet security software and keep anti-virus updated;
• Install security patches;
• Be wary of unsolicited e-mail or IM messages;
• Be careful about logging in with Administrator rights;
• Backup your data.
Click to edit Master title style
• Click to edit Master text styles– Second level
• Third level– Fourth level
» Fifth level
June 10th, 2009 National ICT Month (PIKOM PC FAIR) (KLCC – MALAYSIA )
What we see on upcoming threats threats
http://www.viruslist.com/en/analysis?pubid=204791987#tendencies
ANTI-VIRUSANTI-VIRUSTrust only usTrust only us
Click to edit Master title style
• Click to edit Master text styles– Second level
• Third level– Fourth level
» Fifth level
June 10th, 2009 National ICT Month (PIKOM PC FAIR) (KLCC – MALAYSIA )
Web 2.0 and the world of opportunity, world of opportunity, world of dangerworld of danger
Web2.0, it is an opportunity if you use it wiselyWeb2.0, it is an opportunity if you use it wisely
Else, it would be a world of dangerElse, it would be a world of danger
Click to edit Master title style
• Click to edit Master text styles– Second level
• Third level– Fourth level
» Fifth level
June 10th, 2009 National ICT Month (PIKOM PC FAIR) (KLCC – MALAYSIA )
THANK YOU!
COMPUTERWORLD FORUM. SECURITY 2010
Product Manager, SEA Region