Before we stepped into a new year, be worthwhile to look back for a moment. Our friends at Symantec trying to summarize a few things about the threat of what happened in the year 2009.
- Spam Carrier Malware: Between September and October 2009 there were more than 2% of spam emails containing malware. The threat is considered dangerous, because all this spam is usually not too distracting. However, the existence of these pengingkatan, you must be more alert of incoming email.
- Increased Attack Through Social Networking Website: Year 2009 as a year can be pretty much a social networking website. Almost all people who access the virtual world certainly has one of the accounts in social networking websites available. 2009 is the year in which the attack on social networking sites and users of the site became the standard practice of criminals. In the second half of 2009, criminals increasingly use social networking websites to launch the action. In addition to the number, they also enhance their attacks send.
- Software Security Fraud: Have you received a message like this, "Found a dangerous virus on your computer. Immediately download from our anti-virus. Free! '. Be careful, Symantec has identified 250 applications that are clearly cheating by pretending to be real security software. From July 1, 2008 until June 30, 2009, Symantec received reports of 43 million experiment fake security software installation.
- Malware Serving Ready: Similar to fast food, easily made, many fast-food malware circulating in cyberspace. Only capitalize a toolkit with an easy to use, most amateur hackers can make malware and botnet. Many threats are ready to use it is the result of the combination of components of other malware that already exists. For example, Dozer, which contains the components of the Mydoom and Mytob. This trend has also been made malware becomes more easily lost, with threats come and gone in just over 24 hours.
- Bot Networks Experiencing surge: Symantec observed that the majority of new malware contains a command and control channel bot. In 2009, we even see the botnet designers to expand their ability to use social networking websites as a channel of communication.
- Cooperation in Addressing Industry Fellow Internet Threat: An example of a severe threat in the virtual world is Conficker. Conficker began to realize the security vendors, law enforcement, and Internet service providers to quickly unite. Examples are seen in the year 2009 included the Conficker Working Group (CWG), the movement "Operation Phish Phry" which launched the FBI and the Digital Crimes Consortium, which held the inaugural in October.
- Genesis Used More Events: News the death of Michael Jackson, flu H1N1, Serena Williams, and the word "hot" other, widely used by spammers to attract their victims so they will download malware, buy products, and trapped in the fraud.
- Drive-by-Download The Many: cyber criminals to attack the victim computer to secretly slipped in a legal status. The popularity of this method continues to grow. In the year 2008, Symantec observed as many as 18 million test drive-by attack download; but, from August to October 2009 alone, Symantec noted occurred as many as 17.4 million attacks.
- Return to the Prior Spam McColo: Symantec saw a decrease of 65 percent of the total number of spam messages within 24 hours after the closure McColo at the end of 2008 and 24 hours later, the amount of spam reaching levels fell 69.8 per cent of all emails. However, in 2009, the volume of spam back to the overall average rate of 87.4 percent of all emails, achieve a maximum 95 percent of all messages in late May.
- Keep Rising Threat Polimorfis: Polymorfisme have the ability to bermutas. In other words, many victims who face the threat of malware is slightly different from the previous malware. Automatic conversion of code built into the malware does not affect functionality, but make the detection technology's traditional antivirus can not handle it. Symantec has observed polimorfis threats like Waladac, Virut, and Sality, became increasingly common criminals along with the virtual world looking for ways to expand the way they circumvent conventional anti-virus technology.
- Increasing Piracy Reputation - Geocities is the most common brands hijacked by spammers in an attempt to defraud computer users, but with the closure of the web hosting services by Yahoo in late October, Symantec saw that the rapid increase of the number of free web services small scale, as pemendek service URL, the name and reputation abused by spammers. This is because the progress in penetrating the CAPTCHA technology, which allows dangerous characters create multiple accounts and profiles are used for spamming. Symantec even has observed that some of the company's small-scale web services that have closed their own sites as the only way to stop spam.
- To be Held Data Theft - According to the Identity Theft Resource Center, until October 13, 2009, 403 cases of data breach have been reported throughout the year and exposing more than 220 million documents. According to the Ponemon Institute, in which people mean no harm continue to represent the bulk of the data loss incidents by 88% of all incidents of data loss caused by such person in the employee and partner. However, there is increasing attention to the danger of data loss. According to the Ponemon study, 59% of former employees admitted that they took the company's data when they leave work. At the time the organization to further improve the focus to avoid loss of data, it seems clear that many things that need to be done to prevent sensitive information being taken out of the company.
- Spam Carrier Malware: Between September and October 2009 there were more than 2% of spam emails containing malware. The threat is considered dangerous, because all this spam is usually not too distracting. However, the existence of these pengingkatan, you must be more alert of incoming email.
- Increased Attack Through Social Networking Website: Year 2009 as a year can be pretty much a social networking website. Almost all people who access the virtual world certainly has one of the accounts in social networking websites available. 2009 is the year in which the attack on social networking sites and users of the site became the standard practice of criminals. In the second half of 2009, criminals increasingly use social networking websites to launch the action. In addition to the number, they also enhance their attacks send.
- Software Security Fraud: Have you received a message like this, "Found a dangerous virus on your computer. Immediately download from our anti-virus. Free! '. Be careful, Symantec has identified 250 applications that are clearly cheating by pretending to be real security software. From July 1, 2008 until June 30, 2009, Symantec received reports of 43 million experiment fake security software installation.
- Malware Serving Ready: Similar to fast food, easily made, many fast-food malware circulating in cyberspace. Only capitalize a toolkit with an easy to use, most amateur hackers can make malware and botnet. Many threats are ready to use it is the result of the combination of components of other malware that already exists. For example, Dozer, which contains the components of the Mydoom and Mytob. This trend has also been made malware becomes more easily lost, with threats come and gone in just over 24 hours.
- Bot Networks Experiencing surge: Symantec observed that the majority of new malware contains a command and control channel bot. In 2009, we even see the botnet designers to expand their ability to use social networking websites as a channel of communication.
- Cooperation in Addressing Industry Fellow Internet Threat: An example of a severe threat in the virtual world is Conficker. Conficker began to realize the security vendors, law enforcement, and Internet service providers to quickly unite. Examples are seen in the year 2009 included the Conficker Working Group (CWG), the movement "Operation Phish Phry" which launched the FBI and the Digital Crimes Consortium, which held the inaugural in October.
- Genesis Used More Events: News the death of Michael Jackson, flu H1N1, Serena Williams, and the word "hot" other, widely used by spammers to attract their victims so they will download malware, buy products, and trapped in the fraud.
- Drive-by-Download The Many: cyber criminals to attack the victim computer to secretly slipped in a legal status. The popularity of this method continues to grow. In the year 2008, Symantec observed as many as 18 million test drive-by attack download; but, from August to October 2009 alone, Symantec noted occurred as many as 17.4 million attacks.
- Return to the Prior Spam McColo: Symantec saw a decrease of 65 percent of the total number of spam messages within 24 hours after the closure McColo at the end of 2008 and 24 hours later, the amount of spam reaching levels fell 69.8 per cent of all emails. However, in 2009, the volume of spam back to the overall average rate of 87.4 percent of all emails, achieve a maximum 95 percent of all messages in late May.
- Keep Rising Threat Polimorfis: Polymorfisme have the ability to bermutas. In other words, many victims who face the threat of malware is slightly different from the previous malware. Automatic conversion of code built into the malware does not affect functionality, but make the detection technology's traditional antivirus can not handle it. Symantec has observed polimorfis threats like Waladac, Virut, and Sality, became increasingly common criminals along with the virtual world looking for ways to expand the way they circumvent conventional anti-virus technology.
- Increasing Piracy Reputation - Geocities is the most common brands hijacked by spammers in an attempt to defraud computer users, but with the closure of the web hosting services by Yahoo in late October, Symantec saw that the rapid increase of the number of free web services small scale, as pemendek service URL, the name and reputation abused by spammers. This is because the progress in penetrating the CAPTCHA technology, which allows dangerous characters create multiple accounts and profiles are used for spamming. Symantec even has observed that some of the company's small-scale web services that have closed their own sites as the only way to stop spam.
- To be Held Data Theft - According to the Identity Theft Resource Center, until October 13, 2009, 403 cases of data breach have been reported throughout the year and exposing more than 220 million documents. According to the Ponemon Institute, in which people mean no harm continue to represent the bulk of the data loss incidents by 88% of all incidents of data loss caused by such person in the employee and partner. However, there is increasing attention to the danger of data loss. According to the Ponemon study, 59% of former employees admitted that they took the company's data when they leave work. At the time the organization to further improve the focus to avoid loss of data, it seems clear that many things that need to be done to prevent sensitive information being taken out of the company.
0 comments
Post a Comment