|By Marketwired .||
|February 5, 2013 10:04 AM EST||
SAN JOSE, CA -- (Marketwire) -- 02/05/13 -- Business is booming for exploits, mobile malware is still dominated by Android and Symbian, and botnets are back and retooled, according to the new Threat Report H2 2012 from F-Secure Labs. Released in conjunction with Safer Internet Day, the report also provides tips for managing the cumbersome yet necessary problem of passwords.
"The world of malware today is commoditized and professionalized," said Mikko Hypponen, Chief Research Officer at F-Secure. "We saw this especially in the second half of last year in the form of more standardization of vulnerability exploitation and the increased use of automated exploit kits."
Exploit kits and old software vulnerabilities
2012 saw the exploitation of software vulnerabilities become the most popular way to gain access to a user's machine. In the second half of the year, exploit-related detections accounted for 28 percent of all detections, with 68 percent of those related to vulnerabilities in Java.
The majority of exploits detected were related to four vulnerabilities (two Windows and two Java), most likely a result of the fact that today's popular exploit kits, BlackHole and Cool Exploit, include exploits for these vulnerabilities. All of these vulnerabilities were reported in the last two years and have already had security patches released by their vendors -- a reminder of the importance of keeping software updated.
"Criminals in the malware system each handle their own little niches, their own little links in the chain," said Sean Sullivan, Security Advisor at F-Secure. "And exploits are the first link. They're how the criminals get in the door."
Mobile malware in numbers: Samples, or families and variants?
Android malware accounted for 79 percent (238) of all new, unique mobile malware variants in 2012, a number that speaks to the platform's domination of the mobile market. Symbian took up the next largest share, with 19 percent of detected variants.
2012 witnessed security vendors exclaiming about the growth of Android malware samples, from tens to hundreds of thousands, depending on the report. While sample count has increased, F-Secure Labs resists focusing merely on them, "as samples just represent the outer layer of the malware package," stated Sullivan.
"On the inside it's still the same malware family, but there can be a myriad of different ways to dress it up to try to disguise it. We instead prefer to focus on the number of families and variants." Sullivan points out that growth in malware samples is evidence of commoditization and automation on the production side, not necessarily of more malware families in the wild.
"At F-Secure, we have a more holistic understanding of the security landscape, that it cannot be dependent on merely one data point," commented Sullivan. "To base a security analysis on a single data point is either foolish, or marketing hype."
Botnets, banking trojans and the problem of passwords
Botnets, which had been handicapped in recent years by efforts from players in various affected fields, resurfaced in 2012 with new packaging and different methods. New business models like "rent-a-botnet" schemes are flourishing, where cybercriminals rent a whole network of infected computers and use it to perform their attacks. ZeroAccess, the fastest growing botnet, infected millions of computers globally in 2012, with up to 140,000 unique IPs in the US and Europe. Botnet Zeus, which is also a banking trojan, continues to reign, with the United States, Italy and Germany as the most affected countries.
The password, as the report says "is dead and we all know it." Strong enough passwords are often too cumbersome to remember, and complicating matters, a separate password should be used for each account. Even strong passwords can be reset with the right social engineering tactics. But until a better solution comes along, the report offers tips for safe password management.
For more details on the latest trends in threats, see F-Secure's Threat Report H2 2012.
More information: http://www.f-secure.com/en/web/home_us/
How do I remember strong passwords?
Safe Banking - Part 1: Strong Passwords
F-Secure - Protecting the irreplaceable
While you concentrate on what is important to you, we make sure you are protected and safe online whether you are using a computer or a smartphone. We also backup and enable you to share your important files. Our services are available through over 200 operators around the world and trusted in millions of homes and businesses. Founded in 1988, F-Secure is listed on NASDAQ OMX Helsinki Ltd.
f-secure.com | twitter.com/fsecure | facebook.com/f-secure
LEWIS PR for F-Secure
+ 1 (415) 432-2400
Containers are revolutionizing the way we deploy and maintain our infrastructures, but monitoring and troubleshooting in a containerized environment can still be painful and impractical. Understanding even basic resource usage is difficult - let alone tracking network connections or malicious activity. In his session at DevOps Summit, Gianluca Borello, Sr. Software Engineer at Sysdig, will cover the current state of the art for container monitoring and visibility, including pros / cons and li...
Oct. 9, 2015 08:00 AM EDT Reads: 219
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome,” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.
Oct. 9, 2015 08:00 AM EDT
The web app is agile. The REST API is agile. The testing and planning are agile. But alas, data infrastructures certainly are not. Once an application matures, changing the shape or indexing scheme of data often forces at best a top down planning exercise and at worst includes schema changes that force downtime. The time has come for a new approach that fundamentally advances the agility of distributed data infrastructures. Come learn about a new solution to the problems faced by software organ...
Oct. 9, 2015 08:00 AM EDT Reads: 882
The buzz continues for cloud, data analytics and the Internet of Things (IoT) and their collective impact across all industries. But a new conversation is emerging - how do companies use industry disruption and technology enablers to lead in markets undergoing change, uncertainty and ambiguity? Organizations of all sizes need to evolve and transform, often under massive pressure, as industry lines blur and merge and traditional business models are assaulted and turned upside down. In this new da...
Oct. 9, 2015 08:00 AM EDT Reads: 285
Achim Weiss is Chief Executive Officer and co-founder of ProfitBricks. In 1995, he broke off his studies to co-found the web hosting company "Schlund+Partner." The company "Schlund+Partner" later became the 1&1 web hosting product line. From 1995 to 2008, he was the technical director for several important projects: the largest web hosting platform in the world, the second largest DSL platform, a video on-demand delivery network, the largest eMail backend in Europe, and a universal billing syste...
Oct. 9, 2015 07:45 AM EDT Reads: 134
There are many considerations when moving applications from on-premise to cloud. It is critical to understand the benefits and also challenges of this migration. A successful migration will result in lower Total Cost of Ownership, yet offer the same or higher level of robustness. Migration to cloud shifts computing resources from your data center, which can yield significant advantages provided that the cloud vendor an offer enterprise-grade quality for your application.
Oct. 9, 2015 07:30 AM EDT Reads: 248
Today air travel is a minefield of delays, hassles and customer disappointment. Airlines struggle to revitalize the experience. GE and M2Mi will demonstrate practical examples of how IoT solutions are helping airlines bring back personalization, reduce trip time and improve reliability. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Dr. Sarah Cooper, M2Mi's VP Business Development and Engineering, will explore the IoT cloud-based platform technologies driv...
Oct. 9, 2015 07:30 AM EDT
Docker is hot. However, as Docker container use spreads into more mature production pipelines, there can be issues about control of Docker images to ensure they are production-ready. Is a promotion-based model appropriate to control and track the flow of Docker images from development to production? In his session at DevOps Summit, Fred Simon, Co-founder and Chief Architect of JFrog, will demonstrate how to implement a promotion model for Docker images using a binary repository, and then show h...
Oct. 9, 2015 07:15 AM EDT
In his session at DevOps Summit, Bryan Cantrill, CTO at Joyent, will demonstrate a third path: containers on multi-tenant bare metal that maximizes performance, security, and networking connectivity.
Oct. 9, 2015 07:00 AM EDT Reads: 137
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Oct. 9, 2015 07:00 AM EDT Reads: 5,880
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and Containers together help companies to achieve their business goals faster and more effectively.
Oct. 9, 2015 06:15 AM EDT Reads: 120
WebRTC converts the entire network into a ubiquitous communications cloud thereby connecting anytime, anywhere through any point. In his session at WebRTC Summit,, Mark Castleman, EIR at Bell Labs and Head of Future X Labs, will discuss how the transformational nature of communications is achieved through the democratizing force of WebRTC. WebRTC is doing for voice what HTML did for web content.
Oct. 9, 2015 06:00 AM EDT Reads: 1,411
The IoT is upon us, but today’s databases, built on 30-year-old math, require multiple platforms to create a single solution. Data demands of the IoT require Big Data systems that can handle ingest, transactions and analytics concurrently adapting to varied situations as they occur, with speed at scale. In his session at @ThingsExpo, Chad Jones, chief strategy officer at Deep Information Sciences, will look differently at IoT data so enterprises can fully leverage their IoT potential. He’ll sha...
Oct. 9, 2015 05:15 AM EDT Reads: 512
The modern software development landscape consists of best practices and tools that allow teams to deliver software in a near-continuous manner. By adopting a culture of automation, measurement and sharing, the time to ship code has been greatly reduced, allowing for shorter release cycles and quicker feedback from customers and users. Still, with all of these tools and methods, how can teams stay on top of what is taking place across their infrastructure and codebase? Hopping between services a...
Oct. 9, 2015 05:00 AM EDT Reads: 493
In today's digital world, change is the one constant. Disruptive innovations like cloud, mobility, social media, and the Internet of Things have reshaped the market and set new standards in customer expectations. To remain competitive, businesses must tap the potential of emerging technologies and markets through the rapid release of new products and services. However, the rigid and siloed structures of traditional IT platforms and processes are slowing them down – resulting in lengthy delivery ...
Oct. 9, 2015 05:00 AM EDT Reads: 1,010