ICT in Education 2014 RightSide Banner WIITF 2014 Web Banner brandbook coming soon
 

AN ISO 9001:2008 CERTIFIED COMPANY

Trend Micro Security Roundup
Bookmark and Share   print  Print this   rss  RSS  
Posted on -Monday, April 23, 2012    By VARINDIA Correspondent
  Trend Micro Security Roundup 

This quarter saw a significant shift in the way the security industry approaches targeted attacks and advanced persistent threats, which are now viewed more as a long-term, ongoing campaign versus the typical "smash-and-grab incidents" favoured by cybercriminals in the past, according to the Trend Micro Q1 2012 Security Roundup Report. 

The report also noted that cybercriminals who launch APTs will often keep track of the different attacks within a campaign in order to determine which individual attack compromised a specific victim's network. The Lucky cat campaign, in particular, attacked a diverse set of targets using a variety of malware, some of which have been linked to other cyber-espionage campaigns. New social networking site, Pinterest, gained not just popularity but also notoriety. Site users were drawn into "re-pinning" a Starbucks logo to get supposed gift cards but instead got malware. This quarter's top spam-sending countries included: India (20 per cent), Indonesia (13 per cent), South Korea (12 per cent), and Russia (10 per cent).  

Apple surpassed Oracle, Google and Microsoft in reported vulnerabilities, with a total of 91.  Oracle came in second, with 78; Google, 73; Microsoft, 43. Apart from posting the highest number of reported vulnerabilities, Apple also issued a record-breaking number of patches last March. In addition, Trend Micro reported that Apple issued a record number of patches to its Safari browser in March during the period. 

Amit Nath, Country Manager India and SAARC, Trend Micro, said, "The number of targeted attacks has dramatically increased. Unlike largely indiscriminate attacks that focus on stealing credit card and banking information associated with cybercrime, targeted attacks noticeably differ and are better characterized as 'cyber espionage'. Highly targeted attacks are computer intrusions threat actors'  stage in order to aggressively pursue and compromise specific targets, often leveraging social engineering, in order to maintain persistent presence within the victim’s network so they can move laterally and extract sensitive information."

No comment posted yet! Be the first to post a comment.
Reviews
Comments :
Name :
Company :
City :
Email :

Can’t Read? Refresh Captcha


(Please enter the security code as shown on the left image.)
 
(All fields are essential)
 
  NEC provides Trunk Microwave Systems   HP expands Enterprise Cloud Services   
 
SIITF 2012 WIITF2013_Banner 12th Star Nite Award 2013
Zicom_NewBanner
Sparsh_WebBanner

Quick Links

IT Forum 2014 Banner OITF - 2014 Banner New Channel Leadership Survey - 2013 New
Page render in 3 second.