 Malicious or unsolicited mail sent to a mailbox without the option to unsubscribe  Often used as a catch-all of any undesired or questionable mail.

Slides:



Advertisements
Similar presentations
Challenges In The Morphing Threat Landscape Apr 2011, Arnhem Tamas Rudnai, Websense Security Labs.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Supplied on \web site. on January 10 th, 2008 Customer Security Management Reducing Internet fraud June 1 st, 2008 eSAC Walk Thru © Copyright Prevx Limited.
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
What is Spam  Any unwanted messages that are sent to many users at once.  Spam can be sent via , text message, online chat, blogs or various other.
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Threats To A Computer Network
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Version 2.0 for Office 365. Day 1 Administering Office 365 Day 2 Administering Exchange Online Office 365 Overview & InfrastructureLync Online Administration.
Security challenges Used by many 100,000s of customers Used by many 10,000,000s of users Processing Billions of s a day Using Thousands of.
What’s New in Exchange Online. Disclaimer This presentation contains preliminary information that may be changed substantially prior to final commercial.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
CensorNet Ltd An introduction to CensorNet Mailsafe Presented by: XXXXXXXX Product Manager Tel: XXXXXXXXXXXXX.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
May l Washington, DC l Omni Shoreham The ROI of Messaging Security JF Sullivan VP Marketing, Cloudmark, Inc.
Director of Research, SANS Institute
Safe Internet Use Mark Wheatley CSI Onsite
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Staying Safe Online Keep your Information Secure.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
By Mohammed kiche. Viruses A computer virus is a malware program that when executed replicates by inserting copies of itself modified into other computer.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
WEBSENSE ® SECURITY LABS™ 2006 Semi-Annual Web Security Trends Report OWASP Presentation November 9, 2006 Jim Young (301)
Norman Protection Powerful and flexible Protection Gateway.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Content Control Stewart Duncan Technical Manager.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Information Security Sharon Welna Information Security Officer.
Detecting Phishing in s Srikanth Palla Ram Dantu University of North Texas, Denton.
“SaaS secure web and gateways frequently provide efficiency and cost advantages, and a growing number of offerings are delivering an improved.
© 2009 WatchGuard Technologies WatchGuard ReputationAuthority Rejecting Unwanted & Web Traffic at the Perimeter.
Advanced Persistent Threats (APT) Sasha Browning.
Sky Advanced Threat Prevention
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Understand Malware LESSON Security Fundamentals.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
Information explosion 1.4X 44X Protect communications.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Karsten Chearis Sales Engineer.
BUILD SECURE PRODUCTS AND SERVICES
Exchange Online Advanced Threat Protection
TMG Client Protection 6NPS – Session 7.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Burke.
CYBER SECURITY...
Microsoft Ignite /20/2018 8:09 AM BRK3023
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them David Hood Director of Technology Marketing.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Bird Team Lead, Account Executive.
Phishing is a form of social engineering that attempts to steal sensitive information.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Vanderhoff.
Jon Peppler, Menlo Security Channels
Exchange Online Advanced Threat Protection
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
Demo Advanced Threat Protection
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Andrew Cotton.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
Real World Advanced Threat Protection
Introduction to Symantec Security Service
Microsoft Üzleti Megoldások Konferencia 2005
Cybersecurity Simplified: Phishing
Presentation transcript:

 Malicious or unsolicited mail sent to a mailbox without the option to unsubscribe  Often used as a catch-all of any undesired or questionable mail

 Malicious or unsolicited mail sent to a mailbox without the option to unsubscribe  Often used as a catch-all of any undesired or questionable mail  Best defense is to disrupt economics of spam Millions of s received. Almost all of them blocked.

BEFORE  Content Filters

BEFORE  Content Filters TODAY  Content Filters  Connection Filters  Fingerprint Based Filters

An sent to a large list of recipients for promotional purposes. Typically the Sender has Reputation with us.

We hope you found the information in this useful. However, if you'd rather not receive future s of this nature from bespoke offers, it's easy to unsubscribe.unsubscribe

 A targeted attack on a group of mailboxes with the intention of garnering personal information or credentials Evolution of Phish  Target: Individual Motive: Financial  Target: Organization Motive: Network compromise

 Malicious code often distributed in to a recipient  E.g. Spyware / Keyloggers, RAM scrapers, …  Payload can be delivered via attachment, or URL  Unique requirements for protection

“All your credentials belong to us” Known malware (e.g. Trojan Downloaders) gets flagged by AV running in EOP (& also Windows)

Spear-phishing Focused phishing attacks Tailored, low volume tactics Social Engineering Whaling High value targets

********.gov DataCenter EOP Denial of Service

IPv4 vs. IPv6

Short-span attacks can be just minutes to hours T=0T=5T=10T=15T=100 Phisher creates malicious domain First phishing message sent Phishing message lands in user inbox User clicks on link in message Serial variant attacks generally repeat pattern every few hours Attacker can easily change the links in the message after mail is delivered

Protection against unknow n malware/virus Behavioral analysis with machine learning Admin alerts Time of click protection Real time protection against Malicious URLs Growing URL coverage Rich reporting and tracing Built-in URL and message trace Reports for advanced threats

Safe Multiple filters + 3 antivirus engines with Exchange Online protection Links Recipient Unsafe Attachment Supported file type Clean by AV/AS filters Not in Reputation list Detonation chamber (sandbox) Executable? Registry call? Elevation? ……? Sender

EOP user without ATP EOP user with ATP

EOP user without ATP Rewriting URLs to redirect to a web server EOP user with ATP