Teknologi antivirus vs malware 2015 expanded

59

Transcript of Teknologi antivirus vs malware 2015 expanded

A. Alfons Tanujaya

A. Alfons Tanujaya Antivirus Specialist

A. Alfons Tanujaya Antivirus Specialist

A. Alfons Tanujaya Antivirus Specialist

A. Alfons Tanujaya Antivirus Specialist

Antivirus TechnologyVS

Malware 2015

Malware 2015

Sinkronisasi Token

Malware 2015

Sinkronisasi Token

Ransomware

Malware 2015

Sinkronisasi Token

Eksploitasi pengamanan T-FA

Sinkronisasi Token

Eksploitasi pengamanan T-FA

Load Inject Script

Sinkronisasi Token

Eksploitasi pengamanan T-FA

Load Inject Script

Sinkronisasi Token

Memanfaatkan Trojan Network

Kelemahan Antivirus

Kelemahan Antivirus

Tergantung pada Update

Pertama Kali Muncul

Pertama Kali Muncul

2 minggu

2 minggu

Kelemahan Antivirus

Kelemahan Antivirus Tergantung pada Update

Kelemahan Antivirus Tergantung pada Update

GoZ Gameover Zeus

GoZ Gameover Zeus

GoZ Gameover Zeus

Man in The Browser

Man in The Browser

Man in The Browser

Man in The Browser

Celah Keamanan Favorit

Celah Keamanan FavoritCVE-2010-2568 LNK.Shorcut.Exploit Windows XP SP3, Server 2003 SP2, Vista SP1 dan SP2, Server 2008 SP2 dan R2, Windows 7

Celah Keamanan FavoritCVE-2010-2568 LNK.Shorcut.Exploit Windows XP SP3, Server 2003 SP2, Vista SP1 dan SP2, Server 2008 SP2 dan R2, Windows 7

CVE-2011-0979 Exploit Microsoft Excel 2002 SP3, 2003 SP3, 2007 SP2, 2010. Office 2004, 2008 dan 2011 for Mac

Celah Keamanan FavoritCVE-2010-2568 LNK.Shorcut.Exploit Windows XP SP3, Server 2003 SP2, Vista SP1 dan SP2, Server 2008 SP2 dan R2, Windows 7

CVE-2011-0979 Exploit Microsoft Excel 2002 SP3, 2003 SP3, 2007 SP2, 2010. Office 2004, 2008 dan 2011 for Mac

CVE-2015-0336Adobe Flash Player Vulnerability pada Windows, Linux dan Macintosh

Vulnerability Trend

Vulnerability Trend

Vulnerability by Product Type

Vulnerability by Product Type

Vulnerability by Product Type

By Application

By Application

Solusi

Solusi

Solusi

IT IS NOT SAFE UNTIL IT’S SICHER | BOCHUM | April 2014

27% of infected PCs infected by exploits.*

Closes one of the biggest security gaps.

Easy to use, not impacting PC speed.

Easy maintenance by "signature updates”.

Major programs / plug-ins are supported:− Microsoft Office, Adobe Reader, Oracle Java,

Adobe Flash Player.

− Browser: IE, Firefox, Chrome, Opera.

− Several multimedia players.

58

FOR HOME / WINDOWS: EXPLOIT PROTECTION NEW

* Source: Statista, Germany

A. Alfons Tanujaya

PT. VaksincomJl. R.P. Soeroso 7AACikiniJakarta 10330Ph : 021 3190 3800

Email : [email protected]://facebook.com/alfons