skip to main | skip to sidebar

TechsVilla

HOUSE OF TECH FOR ZEALERS

  • TECH
  • GAME
  • BLOG
  • WINDOW
  • LINUX
  • APPLE
  • SECURE
  • MSN
  • TIPS
  • Malware exploding, especially on mobile devices

    Monday, March 21, 2011

    Two reports find malware growth in the double digits. Mobile devices are the latest favorite cyber crime target says McAfee

    Mobile malware is soaring and Adobe is the main vector of attack, according to new figures from security firm McAfee that were issued Tuesday.
    Cyber criminals are adopting strategies to take advantage of more mobile device use, the report, McAfee Threats Report: Fourth Quarter 2010, claims. The number of pieces of new mobile malware in 2010 increased by 46 percent compared with 2009. The report also uncovered 20 million new pieces of malware in 2010 — nearly 55,000 new malware threats every day.
    "Our Q4 Threats Report shows that cybercriminals are keeping tabs on what's popular, and what will have the biggest impact from the smallest effort," said Vincent Weafer, senior vice president of McAfee Labs.
    As more consumers use mobile devices and tablets in their daily lives and at work, cybercriminals have taken note, say researchers. As a result, botnet attacks that target mobile devices are expected to rise. In Q4, some of the most active threats included the bots known as Zeus-Murofet, Conficker and Koobface. The number of potentially malicious domains also grew at a rapid pace, according to the report.
    "The creators of the Zeus botnet repurposed an old version of a commercial spyware package," the report claims. "Android/Geinimi, a Trojan inserted into legitimate mobile applications and games for the Android platform, was one of the most important threats of the quarter."
    The research pointed to phishing URLs in the form of the IRS, gift cards, rewards accounts, and social networking accounts as some of the most popular cons. Adobe product vulnerabilities were the top method of execution, with weaknesses in both Flash, and especially PDF, technologies exploited frequently, according to McAfee.
    Poisoning search results also continues to be a problem. Researchers found that within the top 100 results of the top daily search terms, 51 percent led to malicious sites, and on average each of these poisoned results pages contained more than five malicious links. The results fall in line with a Q4 Global Threat Report also released Tuesday by Cisco. Cisco found web malware increased by 139 percent in 2010 compared with the previous year. The rate of Web malware encounters peaked in October 2010, at 250 encounters per enterprise for the month.
    "Companies in the pharmaceutical & chemicals and the energy & oil sectors continued to be most at-risk of web malware throughout 2010," said Mary Landesman, market intelligence manager at Cisco. "Other higher risk verticals throughout the year included agriculture & mining and education."
    Posted by Rajan Chatterjee at 6:45 PM Email This BlogThis! Share to X Share to Facebook

    0 comments:

    Post a Comment

    Newer Post Older Post Home
    Subscribe to: Post Comments (Atom)
    Powered by Blogger.
    • Home
    • TWEAK PC
    • MICROSOFT NEWS
    • CYBER SECURITY
    • APPLE
    • LINUX
    • WINDOWS
    • WEB DESIGNING
    • GAMING
    • TECHVISION

    TechsVilla Corner

    Loading...

    Blog Archive

    • ▼  2011 (156)
      • ►  April (5)
      • ▼  March (151)
        • PC won't boot up? How to find out why it so....
        • Mac OS X 10.7 Lion: what you need to know
        • In Depth: Our preview of the best of the new phone...
        • Kinect For Xbox 360 Hacked To Work With Sony PlayS...
        • Next Generation Xbox Hardware To Surface By 2015?
        • Tethered Jailbreak for iOS 4.3.1 Now Available (Bu...
        • iOS 4.3.1 Jailbroken Already Using PwnageTool. Her...
        • 3DS Crashing To “Black Screen Of Death”?
        • Panasonic And Partners Announce New M-3DI Active-S...
        • MIT Scientist Claims To Have Created Practical “Ar...
        • SSDs have been on my Amazon Wishlist for over ...
        • Windows Phone 7 gets copy and paste update
        • Windows 8: everything you need to know
        • The Only Secure Password Is the One You Can’t Reme...
        • Honeywell’s Home Automation Touchscreen: Security ...
        • How to research your users
        • Bulletstorm review
        • Homefront Review
        • Forza Motorsport 4: Capitalising on GT5's missteps?
        • Crash Time 4: The Syndicate Review
        • iPad 2 review Apple's new tablet is the best of i...
        • Firefox 4 review It's the best Firefox yet. Is it...
        • How Mozilla turned the corner with Firefox 4
        • Fly or Die: The Nintendo 3DS, Rockmelt, And Mobile...
        • Robocast Sues Apple For Infringing Its ‘Automated ...
        • Drunk On Licensing Fees And Patents, Microsoft Has...
        • http://techcrunch.com/2011/03/22/googlers-buy-more...
        • This tip will explain How to open a file manager o...
        • Social Media Risks: The Basics
        • 9 Dirty Tricks: Social Engineers' Favorite Pick-Up...
        • 3 reasons trustworthy sites can no longer be trusted
        • Facebook is biggest mobile malware threat, says se...
        • Malware exploding, especially on mobile devices
        • Local ethical hackers nurtured in Kenya
        • Mobile security moving to the forefront? Extending...
        • Expert: RSA security breach compromised key federa...
        • Anonymous Exposed: Hacker Group Infiltrated, Chat ...
        • How your operating system works
        • Libre Graphics Meeting: Cutting Edge Creative Tool...
        • Red Hat Announces EMEA Partner Summit: Dublin Ireland
        • Create a social media icon
        • Nintendo 3DS released
        • SPLIT/SECOND
        • HALO REACH
        • Assassin’s Creed: Brotherhood
        • SPIDER-MAN: SHATTERED DIMENSIONS
        • Apple: Judging an app by its icon
        • Master the Windows 7 Action Center
        • Share files between Windows Vista and Windows 7
        • Download and install the best gadgets
        • CES 2011: More details about the Windows Phone 7 u...
        • Netbook ultimate guide
        • Get more from email
        • Reinstall Windows For The Last Time
        • HTC Incredible S To Come In Strawberry Red?
        • The Magic Connector Unifies The Apple Wireless Key...
        • Every Super Nintendo Game Ever – Yours For $9999!
        • Prevent E-mail Disasters: 5 Tools to Protect You f...
        • Apple Tweaks In-App Purchase To Prevent Accidental...
        • Analyst: Non-iPad Tablets Will Be Collecting Dust ...
        • PS3 To Be Re-Secured by 3.60 Firmware
        • Apples To Apples: Apple Inc. Files For Apple Corps...
        • AT&T DSL Adopts 250GB Monthly Bandwidth Cap
        • Google Maps Can Now Locate EV Charging Stations
        • M-Edge’s Case Designer Lets You Customize Your iPa...
        • MicroCenter Takes Up To $200 Off MacBook Pro
        • Bang And Olufsen Bring 16 Speakers To The New BMW ...
        • Protect your home with your webca
        • 9 Steps to get Windows Vista help from your friend...
        • The Best Flash Sites Ever
        • Web fonts: the .net top 20
        • Best web design: How to create better layouts from...
        • Best Graphics/Design Tool
        • Best Digital Photo Management Tool
        • Best IRC Client Pidgin Honorable Mention/Runner Up...
        • Best Single Office Program
        • Best Office Suite
        • Best Microblogging Client
        • Best IM Client
        • Best E-mail Client
        • Best Web Browser
        • Best Desktop Environment
        • Best Mobile OSGoogle Android Honorable Mention/Run...
        • Best Distribution for Netbooks/Limited Hardware
        • Best Linux Distribution
        • Apples To Apples: Apple Inc. Files For Apple Corps...
        • Adobe Just Made Medialets Its Mobile Ad Server
        • Apple Keeps Right On Approving Amazon And Netflix ...
        • Study: Mobile Ad-Tracking Systems Are “Blind” To 8...
        • The Ever-Elusive Mobile Wallet: Why NFC Chips Are ...
        • It’s A Good Day To Be An iPad Competitor . . . Oh ...
        • Why Payments Are Hard, Even For Apple And Google
        • Dear Apple, Please Copy This Notification System F...
        • Explor, Touch-Based App Discovery To Get Around Th...
        • Adobe’s Wallaby Can’t Jump Very High
        • As Apple Ponders Their Subscription Ruling, Readab...
        • Video: Hands-On With An Engineering Prototype 64GB...
        • On Apple TV Special Apps, Sports, And The Slow Ble...

    Popular Posts Widget

    • SPIDER-MAN: SHATTERED DIMENSIONS
      RATINGS 4/5 Action Spider-Man: Shattered Dimensions Price       Rs 3,499 (PS3) PUBLISHER          Activision DEVELOPER         Beenox PLA...
    • Web fonts: the .net top 20
      Web fonts: the .net top 20 It’s easier than ever to get creative with typefaces. Elliot Jay Stocks picks 20 web fonts that demand your vis...
    • Mac OS X 10.7 Lion: what you need to know
      Steve Jobs and other senior Apple employees provided   a glimpse   into Mac OS X 10.7 'Lion', making clear Apple's philosophy re...
    • Wireframe tools: the top 10 solutions
      Create your next prototype the easy way with our guide to the best wireframing tools out there Every website design has to ki...
    • PC won't boot up? How to find out why it so....
      You press the power button and your PC won't boot up. What do you do next? Don't write it off just yet. The first thing to do when ...

    Total Pageviews

    Subscribe To

    Posts
    Atom
    Posts
    Comments
    Atom
    Comments

    About Me

    Rajan Chatterjee
    I m Student Of computer Scince Engineering and tech-savvy person have unlimit zeal for programming and technology
    View my complete profile

    Followers

    Copyright © 2010 TechsVilla | Blogger Templates by Splashy Templates
    Css Designed by Hot Website Templates