Antivirus Protection & Internet Security Software
Kaspersky Lab hosted the ‘Cyberthreat Landscape 2010-2011: Outcomes, Trends and Forecasts’ International Press Tour between 10 and 13 February, 2011, in Moscow, Russia. In addition to the main malware trends and developments in the anti-malware industry in 2010, and forecasts for 2011, Kaspersky Lab’s leading experts provided insight into today’s most dangerous IT threats from two standpoints – technical and general.
Cyberthreat Landscape 2010-2011: Outcomes, Trends and Forecasts
In terms of Internet security, 2010 was a year of mediocre general trends and hugely significant events. The year 2011 will bring with it massive delayed disruption by new actors focused on connected individuals.
Last year exhibited an unusual mix of consistency amongst general trends and completely unexpected milestone events. Against the background hum of leftover Kido infections, targeted attacks on corporations and industrial enterprises reached an unexpected place in the limelight with Aurora and Stuxnet. This year will present a new class of organizers with a new aim - steal everything. Their methods will include an even “greedier” class of malware - spyware 2.0. The increased volume of data, especially from businesses, residing in the cloud will attract more of the attackers’ attention. Much as SQL injection has been automated and heavily used to attack server data, new techniques for externally evaluating cloud services and breaking their security models will be developed and automated. DDoS, banking fraud and theft and spam will continue to be steady income generators. It will be a busy year.
Are We High in the Clouds?
The words ‘Cloud’ and ‘Grid Computing’ have caused quite a stir for a number of years now. Service providers are telling everyone they can about SaaS, PaaS and other aaS and are quick to point to the benefits received by customers already using these services. IT security companies have not lagged behind in introducing new cloud-based services either. But what actually is ‘in-the-cloud’ security? What lies behind the wondrous names that these new technologies are given and how do these innovations really help users? Why do successful companies and cloud technologies go hand-in-hand and why do companies that don’t have, or don’t use, cloud technologies lose the race? All of these questions and more are revealed in Andrey Nikishin’s presentation.
Ransomware has been a threat for many years, but most threats of this type were cracked in minutes. However, there is also a special type of ransomware that has not yet been broken due to the fact that it is based on strong encryption. A few years ago, Kaspersky Lab warned of the high risk presented by such malware and stated that we expected it to become even harder to crack in the future. Now that time has arrived, and it is something that we should be very worried about. The ‘Real Ransomware’ presentation explains why.
Avoiding Your Personal WikiLeaks
While WikiLeaks managed to get mainstream media attention all around the world by publishing leaked documents which turned governments upside down and caught multi-national companies off-guard, smaller organizations and even individuals are facing a very similar threat of their own, which is as dangerous as it is overlooked.
Stolen identities, data breaches and financial crimes - they are all examples of what the average user is facing on a day-to-day basis. Even though these crimes are carried out through classic, non-sophisticated malware, they are having an even bigger relative impact on home users and small organizations compared to what the leaked cables meant for governments. Learn about the impact your own WikiLeaks might have on your life and learn how to avoid it from this presentation.
A Real Windfall - or Why Cybercriminals Like You So Much
Modern cybercrime has grown and evolved so much that it is now comparable to other organized crime such as drug and weapons trafficking in terms of illegally earned and laundered money. No matter how worthless your personal data or online accounts may seem, they are a potential target that can be highly profitable for cybercriminals.
This presentation examines how the online black market has evolved over the past two years, takes a close look at its current structure and considers the impact of the global economic crisis on the cybercrime business. It also asks how much initial capital a budding cybercriminal needs to invest to start making a profit.
Battling Botnets: Can the Good Guys Win?
Botnets (infected computers controlled by cybercriminals) are a global problem without a clear-cut solution. Despite the best efforts of security response teams, the fight against botnets is hamstrung by legal and technical issues. Taking over an international botnet in order to disinfect the drones without permission from the infected victims is a classic example of action being technically possible, but restricted by law. More recently, law enforcement agencies have pursued some avenues to help with disinfection, but there are still ethical issues to overcome. This panel discussion will examine some real-world botnet scenarios and review the limitations of countermeasures. It will also look at some of the ethical issues and propose some basic guidelines to help law enforcement agencies crack down on botnets.
Welcome Cocktail - Monday, January 10, 2011
Click here to open the photo gallery from the Welcome Cocktail
Working Day - Tuesday, January 11, 2011
Click here to open the photo gallery from the Working Day
Entertainment Day – Saturday, Wednesday 12, 2011
Click here to open the photo gallery from the Entertainment Day
© 1997 – 2016 Kaspersky Lab
All Rights Reserved. Industry-leading Antivirus Software