03/10/2017
10:27

"Ransomware... WannaCry and Petya/NotPetya but not only... how they attack and how to defend myself!"... The seminary by TG Soft's CRAM  for CNA partners but not only.


We will attend you at Cyber Security Seminary on Thursday, October 19 at 6.30 p.m. at CNA of Padua.

The C.R.A.M. (Centro Ricerche Anti-Malware di TG Soft), was invited to CNA of Padua with a seminary on Cyber Security, that will take place in:

CNA Padua  - Via Croce Rossa 56 - on Thursday 19 October
 

The main topics of the informative Seminary will be Ransomware / Crypto-Malware:
 
"Ransomware... WannaCry and Petya/NotPetya but not only... how they attack and how I defend myself!"

Anti-Ransomware technologies to defend our most precious data from Crypto-Malware attacks also by the new generation variants.


The Seminary promoted by CNA of Padua, will take place on Thursday 19 October from 6:30 till 8:00 p.m. and will be included between DIGITALmeet events from 19 to 22 October 2017.
Besides it will be included among ECSM  (European Cyber Security Month) that CLUSIT coordinates italian events.
 
Click here to go to registration page for the Seminary of TG Soft

INDEX

 

With
 
Clicca per ingrandire l'immagine
the cooperation of:

Clicca per ingrandire l'immagine..

Promoted by

Seminario Sicurezza Informatica del CRAM di TG Soft presso CNA Padova

Under the auspices

Clicca per ingrandire l'immagine..

Included among ECSM (European Cyber Security Month) initiatives and it will be part of the events of DIGITALmeet from 19 to 22 October 2017 

Clicca per ingrandire l'immagine.. Clicca per consultare gli eventi in programma al DIGITALmeet...                Clicca per ingrandire l'immagine..


Abstract

The conference technical and popular nature and aims to present to the public the state of the Crypto-Malware / Ransomware encrypting the SERVER PC and data files to request a ransom generally in BitCoin.

It will be made an overview of the main groups / types of Crypto-Malware that between 2012, the time of their appearance, and the third quarter of 2017, have spread most in Italy, included the most known WannaCry and Petya/NotPetya......by analyzing the method of spread and the damage they have caused.

Completed
the overview of the main infection methods used, with real examples and, for each of these methods we will be presented behaviors suitable to avoid infection and / or to combat it effectively.


It will then proceed to show a real attack by Crypto-Malware and what happens if:

  • the PC / SERVER does not have a protection system capable of signaling the attack
  • the PC / SERVER was present a heuristic behavioral protection system that is able, then, to report and mitigate the effects of the attack also by new generation variants not yet identifiable by the method of identification signatures.

back to top

 

The main topics in the informative seminary

The main points of the presentation will be:

  1. What are the Crypto-Malware:
    • What goals they pursue.
    • How they spread.
  2. Overview of the main types / families of Crypto-Malware spread in Italy:
    • WannaCry, CryptoLocker; CTB-Locker; TeslaCrypt; CrySis; Petya; Locky (Zepto, Odin, Osiris etc. etc.); Cerber
    • Etc. etc
  3. Statistics dissemination of Crypto-Malware in Italy.
  4. How to defend our most precious data from Crypto-Malware attacks also and above all by the new generation variants:
    • Why my antivirus is not able to advance intercept these attacks?
    • Why the traditional BackUp systems on many cases are not enough?
  5. Simulation of a Crypto Malware attack in the absence of adequate protection systems
  6. Simulation of new generation Crypto Malware attack on PC / SERVER where there is a heuristic behavioral protection system.
  7. What to do in case of data they were encrypted and does not possess backups for recovery. NOT pay or pay ... that is the question!
  8. Questions and answers.
 


 
WannaCry nuovo attacco ransomware che sfrutta una vulnerabilità dei S.O. Windows per la sua diffusione
Clicca per ingrandire l'immagine

CryptoLocker alias Crypt0L0cker...
Clicca per ingrandire l'immagine

Nuova variante di CryptoLocky che cifra i file in .ODIN...
Clicca per ingrandire l'immagine

Clicca per ingrandire l'immagine dell'Alert su CryptoCerber 3...Clicca per ingrandire l'immagine

Back to top

The seminary "Ransomware... WannaCry and Petya/NotPetya but not only...how they attack and how I defend myself!" will have as speakers


Eng. Enrico Tonello
=> co-author of software Vir.IT eXplorer PRO. He Graduated in engineering in Padua, antivirus researcher for 20 years.

=> He published several articles on cyber virus and malware and technologies to prevent it in a technical magazine, as Security Evangelist  and many other.

Federico Girotto
=> responsible for technical support of TG Soft.

Clicca per ingrandire l'immagine...Clicca per ingrandire l'immagine

To whom the Seminaryis addressed

After considering the issues addressed which are widespread and dangerous it turns to:
  1. Technicians of computer companies and systems analysts.
  2. End users and SMEs in particular.

How to take part to Seminary "Ransomware... WannaCry and Petya/NotPetya but not only... how they attack and how I defend myself!"

Clicca sull'immagine per accedere alla pagina di iscrizione al Seminario...

Partecipation to Seminary is free, you'll need just to register accessing the page CNA Padova

Back to top

Studies of C.R.A.M. Research Centre Anti-Malware of TG Soft

During seminary "Ransomware... WannaCry and Petya/NotPetya but not only... how they attack and how I defend myself!" it will be presented in a popular form some of the studies carried out by C.R.A.M. Research Centre Anti-Malware:


CRAM App Analyser
  Back to top
C.R.A.M.
Research Centre Anti-Malware of TG Soft S.a.s.
Any information published on our site may be used and published on other websites, blogs, forums, facebook and/or in any other form both in paper and electronic form as long as the source is always and in any case cited explicitly “Source: CRAM by TG Soft www.tgsoft.it” with a clickable link to the original information and / or web page from which textual content, ideas and / or images have been extrapolated.
It will be appreciated in case of use of the information of C.R.A.M. by TG Soft www.tgsoft.it in the report of summary articles the following acknowledgment/thanks “Thanks to Anti-Malware Research Center C.R.A.M. by TG Soft of which we point out the direct link to the original information: [direct clickable link]”

Vir.IT eXplorer PRO is certified by the biggest international organisation: