We cannot afford to wait for the adversary to make their move first, nor can we hide from them. To better understand, we will spotlight the popular attack techniques of 2014 – including vulnerable attack avenues, darknets and botnets. The most active and proven attack techniques of 2014 will be examined, derived from Fortinet threat research. Hackers do not just use one tool to infiltrate networks.
Two significant attacks will be discussed that outline a growing problem of destructive threats that, in an instant, can cause tens, or hundreds of millions of dollars in damages. South Korea was hit with an attack that wiped out over 50,000 systems using trusted channels, and destructive malware on both PC and critical backend (Linux) systems. In 2014, more embedded attacks have been discovered such as Havex – this will be touched on.
October 21, 2014 | Theatre (Hall G) | 10:15 – 11:15