380 likes | 629 Views
Top trends driving IT security in 2014. 2014. Daniel Ayoub, CISSP, CISM, CISA Product Manager, IPS Dell | Network Security. Top 10 Security Trends: 2014. Protect Yourself. http:// www.darkreading.com/management/socially-engineered-behavior-to-blame-fo/240165591
E N D
Top trends driving IT security in 2014 2014 Daniel Ayoub, CISSP, CISM, CISAProduct Manager, IPSDell | Network Security
Protect Yourself http://www.darkreading.com/management/socially-engineered-behavior-to-blame-fo/240165591 http://www.bbc.co.uk/news/uk-scotland-25898134
Security Trends, 2014 10. Increased Usage of SSL Encryption 9. 8. 7. 6. 5. 4. 3. 2. 1.
Increased Usage of SSL Encryption http://www.networkcomputing.com/next-generation-data-center/news/networking/nsa-surveillance-revives-calls-for-an-al/240165556 http://www.thewhir.com/web-hosting-news/ssl-use-among-million-busiest-sites-48-year-year-netcraft-survey
Increased Usage of SSL Encryption http://www.webpronews.com/yahoo-search-is-now-encrypted-by-default-2014-01 http://www.zdnet.com/twitter-enforces-ssl-encryption-for-apps-connecting-to-its-api-7000025138/ http://searchenginewatch.com/article/2309689/As-Microsoft-Moves-to-Encrypted-Search-Webmasters-Could-Lose-More-Keyword-Data http://online.wsj.com/news/articles/SB10001424052702303448204579339432277705894
Security Trends, 2014 10. Increased Usage of SSL Encryption 9. Ransomware Continues 8. 7. 6. 5. 4. 3. 2. 1.
http://www.legitreviews.com/cryptolocker-ransomware-affected-estimated-250000-computers_131647http://www.legitreviews.com/cryptolocker-ransomware-affected-estimated-250000-computers_131647 http://www.tomsguide.com/us/cryptolocker-evolves-worm,news-18066.html
http://arstechnica.com/security/2014/01/researchers-warn-of-new-meaner-ransomware-with-unbreakable-crypto/http://arstechnica.com/security/2014/01/researchers-warn-of-new-meaner-ransomware-with-unbreakable-crypto/ http://www.therecord.com/news-story/4334442-ransomware-attacks-are-increasing/
Security Trends, 2014 10. Increased Usage of SSL Encryption 9. Ransomware Continues 8. Increase in Win 7 & Win 8 Attacks 7. 6. 5. 4. 3. 2. 1.
Increase in Win7 & Win8 Attacks http://www.independent.ie/business/technology/deadline-looms-for-xp-users-as-microsoft-shuts-system-support-29941733.html http://www.zdnet.com/at-years-end-xp-usage-plunges-as-windows-7-and-8-take-over-7000024699/
Increase in Win7 & Win8 Attacks http://www.independent.ie/business/technology/deadline-looms-for-xp-users-as-microsoft-shuts-system-support-29941733.html http://www.zdnet.com/at-years-end-xp-usage-plunges-as-windows-7-and-8-take-over-7000024699/
Security Trends, 2014 10. Increased Usage of SSL Encryption 9. Ransomware Continues 8. Increase in Win 7 & Win 8 Attacks 7. Gov’t Healthcare Spam / Phishing 6. 5. 4. 3. 2. 1.
Government Healthcare Spam & Phishing http://securityskeptic.typepad.com/the-security-skeptic/2013/10/is-it-spam-this-week-in-healthcare-fraud-email.html http://www.usatoday.com/story/news/nation/2013/11/11/affordable-care-act-scams/3501595/
Government Healthcare Spam & Phishing http://www.consumer.ftc.gov/articles/0394-suspect-health-care-scam https://www.coloradoattorneygeneral.gov/sites/default/files/uploads/press_office/Smart%20Tips%20-%20Healthcare%20Scams%208_5%20x%2011%20May%202013.pdf
Security Trends, 2014 10. Increased Usage of SSL Encryption 9. Ransomware Continues 8. Increase in Win 7 & Win 8 Attacks 7. Gov’t Healthcare Spam / Phishing 6. New Exploit Kits in the Wild 5. 4. 3. 2. 1.
New Exploit Kits in the Wild http://threatpost.com/blackhole-and-cool-exploit-kits-nearly-extinct/103034 http://news.softpedia.com/news/BlackHole-Exploit-Kit-Author-Reportedly-Arrested-in-Russia-388949.shtml
New Exploit Kits in the Wild http://contagiodump.blogspot.com/2010/06/overview-of-exploit-packs-update.html http://www.scmagazineuk.com/exploit-kits-for-sale-on-a-website-near-you/article/301851/
Security Trends, 2014 10. Increased Usage of SSL Encryption 9. Ransomware Continues 8. Increase in Win 7 & Win 8 Attacks 7. Gov’t Healthcare Spam / Phishing 6. New Exploit Kits in the Wild 5. Bitcoin Stealing Malware Reboot 4. 3. 2. 1.
Bitcoin Stealing Malware Reboot http://www.technewsworld.com/story/79836.html http://www.net-security.org/malware_news.php?id=2671
Bitcoin Stealing Malware Reboot http://www.coindesk.com/yahoo-infects-2-million-european-pcs-bitcoin-malware/ http://www.theguardian.com/technology/2014/jan/08/yahoo-malware-turned-europeans-computers-into-bitcoin-slaves
Security Trends, 2014 10. Increased Usage of SSL Encryption 9. Ransomware Continues 8. Increase in Win 7 & Win 8 Attacks 7. Gov’t Healthcare Spam / Phishing 6. New Exploit Kits in the Wild 5. Bitcoin Stealing Malware Reboot 4. Watering-hole Attacks on the Rise 3. 2. 1.
Watering-Hole Attacks on the Rise http://www.scmagazine.com/watering-hole-attacks-are-becoming-increasingly-popular-says-study/article/313800/ http://searchsecurity.techtarget.com/news/2240213164/Spear-phishing-still-popular-but-more-watering-hole-attacks-coming
Watering-Hole Attacks on the Rise http://www.welivesecurity.com/2013/05/07/watering-hole-attack-on-dept-of-labor-site-exploited-new-ie8-vulnerability/ https://threatpost.com/ie-zero-day-watering-hole-attack-injects-malicious-payload-into-memory/102891
Security Trends, 2014 10. Increased Usage of SSL Encryption 9. Ransomware Continues 8. Increase in Win 7 & Win 8 Attacks 7. Gov’t Healthcare Spam / Phishing 6. New Exploit Kits in the Wild 5. Bitcoin Stealing Malware Reboot 4. Watering-hole Attacks on the Rise 3. More Credit/Debit Card Data-Breaches 2. 1.
More Credit/Debit Card Data-Breaches http://www.nbcnews.com/business/fbi-retailers-expect-more-credit-card-breaches-2D11979850 http://www.huffingtonpost.com/2014/01/17/six-other-stores-are-bein_n_4618414.html
More Credit/Debit Card Data-Breaches http://www.theverge.com/2014/1/20/5326772/windows-xp-powers-95-percent-of-atms-worldwide http://www.miamiherald.com/2014/01/24/3891202/switch-from-card-swiping-to-chip.html
Security Trends, 2014 10. Increased Usage of SSL Encryption 9. Ransomware Continues 8. Increase in Win 7 & Win 8 Attacks 7. Gov’t Healthcare Spam / Phishing 6. New Exploit Kits in the Wild 5. Bitcoin Stealing Malware Reboot 4. Watering-hole Attacks on the Rise 3. More Credit/Debit Card Data-Breaches 2. Sophisticated Smartphone Attacks 1.
Sophisticated Smartphone Attacks Vulnerabilities Malware Families http://gcn.com/articles/2013/04/19/iphone-vulnerabilities-android-most-attacked.aspx
Sophisticated Smartphone Attacks http://thehackernews.com/2013/09/Android-Firefox-Zero-Day-Exploit-for-Sale.html http://www.techienews.co.uk/974908/android-vulnerability-allows-interception-vpn-data-researchers-claim/
Security Trends, 2014 10. Increased Usage of SSL Encryption 9. Ransomware Continues 8. Increase in Win 7 & Win 8 Attacks 7. Gov’t Healthcare Spam / Phishing 6. New Exploit Kits in the Wild 5. Bitcoin Stealing Malware on the Rise 4. Watering-hole Attacks on the Rise 3. More Credit/Debit Card Data-Breaches 2. Sophisticated Smartphone Attacks 1. System Hopping Malware
System Hopping Malware http://www.computerworld.com/s/article/9229596/Windows_malware_hides_in_iOS_app http://consumerist.com/2013/02/04/great-now-theres-android-malware-that-can-infect-your-pc-turn-it-into-a-listening-device/
System Hopping Malware http://arstechnica.com/security/2013/10/meet-badbios-the-mysterious-mac-and-pc-malware-that-jumps-airgaps/ http://www.pcworld.com/article/2090940/new-windows-malware-tries-to-infect-android-devices-connected-to-pcs.html
Thank You! Daniel Ayoub, CISSP, CISM, CISA, CEHProduct Manager, IPSDell | SonicWALL Follow me on Twitter: @DanielAyoub