Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,

Slides:



Advertisements
Similar presentations
INTERNET SURVEY RESULTS Class: Grade 4. Do you use the internet?
Advertisements

Click to edit Master title style. Click to edit Master subtitle style.
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
Finance Charge: Unpaid Balance Method pp SECTION.
Finance Charge: Unpaid Balance Method pp SECTION.
Phishing Scams use spoofed s and websites as lures to prompt people to voluntarily hand over sensitive information Phishing s may contain.
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
Security for Internet Every Day Use Standard Security Practices and New Threats.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
“If you build it, they will come.”. Virtual Business  There is much more that goes into a virtual business than just building the web site.  You will.
The Internet Present By Tianyi Xiao ID : C  The Internet is a global system of interconnected computer networks that use the standard Internet.
Your Trusted Partner In All Things IT. 20 Years of IT Experience University Automotive Food Service Banking Insurance Legal Medical Dental Software Development.
An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2.
Click to edit Master title style Click to edit Master text styles Second level Third level Fourth level Fifth level 1 Using LinkedIn.
Click to edit Master title style Click to edit Master text styles Second level Third level Fourth level Fifth level June 10 th, 2009Event details (title,
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
 The following slides are design templates: you can “copy and paste” them to your own PPT file.  Please read the newest version of the manual: “IRIS_Manual_.
Intro To The Internet A Guide to Getting Started.
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level LiveSense Cloud Platform.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Topic 5: Basic Security.
Online Banking pp SECTION. Click to edit Master text styles Second level Third level Fourth level Fifth level 2 SECTION Copyright © Glencoe/McGraw-Hill.
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level Click to edit Master title style.
SECURITY ISSUES. TYPES BLUE JACKING SENDING MESSAGES TO OPEN BLUETOOTH CONNECTION VIRUSES HARMFUL PROGRAMS THAT SPREAD WITHIN DIGITAL DEVICES COOKIES.
The Monthly Payment pp SECTION. Click to edit Master text styles Second level Third level Fourth level Fifth level 2 SECTION Copyright ©
The Monthly Payment pp SECTION. Click to edit Master text styles Second level Third level Fourth level Fifth level 2 SECTION Copyright ©
Biosimilar (Insulin) – Competitive Landscape and Market & Pipeline Analysis, 2016 DelveInsight’s, “Biosimilar (Insulin) – Competitive Landscape and Market. Request for sample of this research report:
Title of Presentation May Go Here Department Name Presentation for March 4, 2014 University Marketing.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
WHAT IS IDENTITY THEFT?  Identity thieves take your personal information and use it to harm you in various ways, including these:  User names, passwords,
New Media New Style New Communications Maxim Behar CEO M3 Communications Group, Inc. 19 May 2010, 19 May 2010, Moscow, Russia.
Internet in 21st Century. We all use web in our daily lives, from our mobiles or coputers. However we do not realize how fast is internet getting bigger.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Matt Jennings.  Introduction  Value Chains  Major value chains in the illegal market  Means of Communication  Conclusion.
Headline sample style Intro sample style Click to edit Master text styles –Second level Third level –Fourth level o Fifth level.
how to prevent them from being successful
Learn how to protect yourself against common attacks
ISYM 540 Current Topics in Information System Management
Click to Add Title Click to Add Subtitle.
Click to Add Title Click to Add Subtitle.
“CYBER SPACE” - THE UNDERGROUND ECONOMY
Information Security Session October 24, 2005
Click to edit Master text styles
Motivation and Background
Click to Add Title Click to Add Subtitle.
Click to Add Title Click to Add Subtitle.
Motivation and Background
Author names here Author association names here
Click to edit Master text styles
Insert Session Title of Up to Three Lines of Text and Information
Click to edit Master text styles
TITLE SLIDE GOES HERE Optional subhead.
Click to edit Master text styles
Slide Title Edit Master text styles Second level Third level
ОПШТЕСТВО ТЕМА: МЕСТОТО ВО КОЕ ЖИВЕАМ Скопје
Author names here Author associations here
Author names here Author associations here
Click to edit Master text styles
Lorem ipsum dolores Lorem ipsum dolores.
Presentation Title Presenter’s Name.
Author names here Author associations here
Click to edit Master text styles
Title Layout SUBTITLE. Title and Content Layout with List Click to edit Master text styles Second level Third level Fourth level Fifth level.
Presentation transcript:

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) How much do you cost? The black market price of your digital data Dmitry Bestuzhev Senior Regional Researcher, Latin America Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) Background Why would you be worth anything?

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) Everyone has something valuable… What does the Internet mean to you? Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010 Communication Banking Working Obtaining new information

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) Information is valuable Have a Credit Card? Have a Twitter account? Have an account on Facebook? Have an account on VKontakte? Play online games? Use Instant Messaging? Have a paid Rapidshare account? Have an online bank account? Have an account? Have a Paypal account? Have a paid Skype account? Trade on Forex? Have a Computer? Have a paid AV license? Are you a forum moderator? Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) Huge increase in data-stealing malware Source: Kaspersky Lab Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010 Signatures

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) Credit card attacks, 2009 Source: Kaspersky Lab Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) How is data stolen from you? Most popular attack techniques

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) Data theft: attacks and methods Phishing Malware infection Exploits iFrame Web 2.0 (social engineering) XSS USB sticks Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) Your credit card Price depends on the country you live in and the type of the credit card Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) Online bank accounts and payment systems Banks: price depends on the balance available Payment systems: price depends on whether the balance and the account is verified Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) Creating Trojan-Bankers: Top 10 countries Source: Kaspersky Lab Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) Phishing: Top 20 targeted brands, 2009 Source: Kaspersky Lab Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) and social networking accounts The price depends on the server domain: Any worldwide domain (Gmail, Yahoo!, Hotmail, etc.) Russian domains (Mail.ru, Yandex.ru, etc.) Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) Facebook offers Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) Cost depends on how many followers do you have and how commercial your name is Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) Social network malware: distribution 2009 Source: Kaspersky Lab Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) What else can be stolen from you? Communication and file-sharing services

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) File sharing systems Rapidshare Money laundering Hijacking by malware Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) Skype The price depends on the balance Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) Instant Internet Messaging (IM) The price depends on how short/desirable your UIN is Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) Creating Trojan-PSW: Top 10 countries, 2009 Source: Kaspersky Lab Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) What if I don’t have anything? Still don’t believe you’re worth anything for criminals?

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) “I only have a PC…” You still have value for criminals: Potential data theft Another zombie (bot) machine Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) The power of a botnet Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) Want to know how much you’re worth? Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010

Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title, place) Senior Regional Researcher, Latin America Dmitry Bestuzhev Thank you! Questions? Kaspersky Lab International Press Tour “Cyberthreat Landscape 2009: Outcomes, Trends and Forecasts”, Moscow, January 28-31, 2010