Sydney PC & Technology User Group, Main Presenters & Prizes
Themes:

Monthly Main Meeting Highlights

At - Sydney Mechanics' School of Arts, 280 Pitt Street

The November 2017 Main Meeting

Tonight our good friends from Norton,

Norton Logo

Glen Whichello and Joanna Quintanicho came to discuss the major cyber threats of 2017 and some of the solutions Symantec uses to solve those threats.

Norton 2017 Update slide 1

The two major events in 2017 for Symantec are its acquisition of Blue Coat and LifeLock.

Norton Update slide 2

Blue Coat was a leader in enterprise based security such as securing cloud based data and protecting a company’s gateway into and out of the web. The effect is summarised in this quote from Symantec, “Today we combine the leader in endpoint, email, data loss prevention, and data center security with the #1 market share leader in Website Security and Cloud Generation Security.”

Life Lock is an identity theft company. Symantec have partnered with them to offer a subscription service to identify and fix any identity theft you may have suffered. To quote the Symantec site “Our proprietary technology alerts you to a wide range of identity threats. If you have an identity theft problem, our U.S.-based team of specialists will work to fix it.”

Here is the press release on the acquisition of Life Lock.

Glen then gave us a look at where we are placed in the security worldwide.

Norton Update slide 3 Cyber crime stats

Norton has seen an increase of 3.2 million detections per day, while in general cybercrime is up 10$%. Australia now sits ninth in the world for cyber-crime attacks

Norton Update slide 4 Threat sources

Ransomware is up 36% and Australia now sits in third place for this type of attack.

Norton Update slide 5 Ransomware stats

The statistics indicate that up to a third of Australian victims will pay the ransom. Worst still up to 64% never get their machines unlocked.

Spam attacks

E-mails are still the favourite form of attack. Of real interest was the change of method. The old style executable file attachment now ranks around third place. There is a rise in the use of html formats for presentation and that has seen the rise of code imbedded inside the html.

Norton Update slide 6 Email attacks stats

This source of attach rose from 10% to 50% in the last three months of the 2017 financial year.

We have heard about the fake bill attack, the traffic fine, or the gas bill. These are called BECs or Business e-mail compromise. What was of interest was the rest of in-house attacks. Would you ignore a request from the CEO to pay an account? The attack method is for the criminal to get access to the company through a vulnerable account. Once in they send these fake invoices to the accounts department. Naturally, they are not only after money, this access enables theft of stationary, identity theft not to mention sensitive company information.

Norton Update slide 7 BEC details

Macro attacks are back.

Norton slide 8 Macro attacks

Office allows you to create a small script in visual basic, that automates a process. One example would be a script that puts names from a database in the address area of a letter. Here’s the problem. You get a document file attached to the e-mail, what you get is a script hidden within a document, hidden within an e-mail. Glen explained that when the file is opened the malicious script usually a *.dat file would run and infect the other PCs in the company.

The three other threats Glen spoke about was the Internet of things (IoT), mobile device threats, and the growing tech support scams

Internet of things

Norton Update slide 9 Mobile threats

Speaking of the internet of things, Glen mentioned how few of the manufacturers of these “connected” devices give any thought to internet security. The most common threat is “denial of service” (DoS), an example would be where your smart lights will not turn on when you need them These DoS attacks have risen from 5 per minute in January 2016 to 9 per minute in December.

Mobile Threats

It would appear the smarter a phone gets the more its likely to be attacked. Between 2014 and 2017 the threats to mobile devices rose from five hundred thousand to twenty-five million.

Norton Update slide 10

Even this user group needs some professional help but we need to be careful - Glen told us that on average a ‘tech support request search’ results in pages of fake sites.

Norton Update slide 11 Tech scams

Glen even mentioned those “helpful” phone calls from “Microsoft” or “Telstra” informing us we have virus.

Norton Update 11A Scam Threats

Norton has prevented 150,000 of these scams.

Norton Update slode 12 Norton Difference

The Norton Difference

Having set the scene for 2017, Glen spoke about the Norton Difference. He started by discussing the resources’ Norton uses to provide this difference, with 3000 researchers across the world including our mates in the Kent St Office in Sydney.

Norton Update slide 13 Norton Expertise

Norton has developed several layers of protections.

Ransomeware

Norton Update slide 14 Protection layers

Glen discussed some of the newer layers starting with the new Ransomware heuristics.

Norton Update Slide 15 Ransomware protection

Glen discussed how the Norton heuristics helped prevent some Norton customers from the Wannacry infection. This was achieved mainly by using behaviourally based software detection.

Norton Update slide 16  Deep protection

You may notice that the two main types of files blocked are .exe and .doc files. These document files are usually infected with a macro virus. Norton also introduced Backup file versioning to combat attempts by Ransomware to hi-jack your precious backups.

Norton Slide 17 Backup protection

This problem gets worst when you realise that virus and ransomware can spread to unprotected USB sticks and even your cloud based backups. Norton offers 25GB of free protected backup with every subscription.

Norton Update slide 18 Heuristic analysis

Using Heuristic or learning based comparison software, Norton has been able to block most known and some of the new attempts to infect your machine.

Mac Improvements

Also new is protection for IOS devices like the iPad, along with child lock protections.

Norton Update slide 19 Whats new

Backed by the Communications Alliance certification.

Norton Update slide 20 Communications Alliance certification

There are other improvements for Mac users.

Norton Update 22 Mac updates

A new learning engine was added and Norton Clean and ID Safe have made it to the Mac.

Mobile phone protections

Glen outlined the new improvements to Mobile phone protections with the introduction of Link Guard.

Norton Update slide 23 Mobile updates

It analyses links, e-mails, texts and QR codes to see if there are any problems.

Norton VPN Wi-Fi

Glen then looked at Norton’s VPN Wi-Fi protection.

Norton Updates slide 24 Norton Wi-Fi

Now extended to all platforms, Wi-Fi Access protects the user over any public Wi-Fi network from theft and intrusion. We watched a video that showed just how vulnerable one can be in those free networks.

Norton Update slide 23 Evidence of Wi-Fi intrusion

We saw just how a hacker can enter your machine and find all your private data.

Third Party Reviews

To finish Glen took us through some of the third-party reviews.

Norton Update slide 23 Test results

Norton was found to have less system recover time and less performance impact over browsing, downloading and network file coping.

The Raffle

Always great supporters of the club tonight Norton brought three Wi-Fi Privacy subscriptions and enough Norton Internet Security Premium both 5 device, and 1 Device prizes for everyone along with a Norton Bluetooth speaker and other goodies for the Raffle

The Raffle Prizes and some of our winners

Here are Raffle prizes and some of our winners.

We hope you all have a great break and we will see you on the 23rd January 2018

Go to: Previous Main Meeting's Index

Sydney PC & Technology User Group Inc. © 2017