|By PR Newswire||
|January 29, 2014 03:00 AM EST||
PARIS, Jan. 29, 2014 /PRNewswire/ -- Alcatel-Lucent (Euronext Paris and NYSE: ALU) today released new data showing that security threats to mobile devices continues its rapid rise, infecting at any time more than 11.6 million devices and putting their owners at increased risk for stolen personal and financial information; bill shock resulting from pirated data usage; and extortion in exchange for device control. Meanwhile, the security threat to home networks remained constant with traditional "fixed" malware types starting to make the jump to mobile devices.
Figures for the 2013 fourth quarter and year from Alcatel-Lucent's Kindsight Security Labs reveals that malicious software or "malware" used by hackers to gain access to devices continues to rise with consumer ultra-broadband usage. In addition to the posed risks to consumers, the malware is used to commit espionage and launch denial of service attacks on businesses and governments.
Due to the unique position of Alcatel-Lucent's network security and analytic products within networks, it can measure the impact of traffic types traversing the network, including malicious and cyber-security threats.
The report found that mobile malware infections increased 20 percent in 2013, with 4G LTE devices being the most likely to be infected. Android devices accounted for 60% percent of total mobile network infections, which frequently took the form of trojanized applications downloaded from third party app stores, Google Play™ Store or by phishing scams. Forty percent of mobile malware originated from Windows™ laptops tethered to a phone or connected directly through a mobile USB stick or MIFI hub. Infections on iPhone® devices and BlackBerry® devices made up less than 1 percent.
Other report highlights include:
- The mobile infection rate was 0.55 percent in the fourth quarter. Based on this, it is estimated that at any time over 11.6 million mobile devices - mostly Android - are infected by malware.
- The number of mobile malware samples grew 20 times in 2013.
- The residential infection rate in fixed networks dropped from 9.6 percent in October to 8.7 percent in December. For the year, it remained relatively flat at 10 percent.
- Six percent broadband residential customers were infected with high-level threats such as a bots, root-kits, and banking Trojans.
- Although ZeroAccess malware topped all infections in the fourth quarter, its infection rate dropped from 0.8 percent to 0.4 percent due to Microsoft's and Symantec's efforts to disrupt its operations.
"Criminals traditionally go after low hanging fruit," said Kevin McNamee, security architect and director of Alcatel-Lucent's Kindsight Security Labs. "Not only is Android the largest smartphone market, unlike iPhone and Blackberry, it allows apps to be loaded from third party sites. This provides cybercriminals with an un-policed mechanism to distribute their malware which can easily evade detection by device-based anti-virus. Thus, in 2013 we saw an increased trend towards operators offering network based anti-virus security to subscribers as a service."
2013 was also a year that saw mobile spyware turn infected smartphones and tablets into a cyber-espionage devices that allowed hackers to remotely track location, download contact lists and personal information, intercept and send messages, record conversation and take pictures.
The report also includes the top 20 home and Internet malware threats in 2013, as well as analysis of malware developments, including ZeroAccess, Alureon, the Zeus banking Trojan, Uapush, Coogos, NotCompatible, QDPlugin, and others.
Alcatel-Lucent with be exhibiting its cloud-based Kindsight Security Solution at Mobile World Congress in Barcelona, Spain, February 24-27, 2014, Hall #3, Booth #3K10 at at the Fira Gran Via.
- Kindsight Security Labs Malware Report – Q4 2013
- NotCompatible malware: Making the jump from Windows PC to Android phone
- Is Googost malware secretly web browsing on your data plan?
- Don't Look Now But You've Been Phonejacked!
ABOUT ALCATEL-LUCENT (EURONEXT PARIS AND NYSE: ALU)
Alcatel-Lucent is at the forefront of global communications, providing products and innovations in IP and cloud networking, as well as ultra-broadband fixed and wireless access to service providers and their customers, enterprises and institutions throughout the world.
Underpinning Alcatel-Lucent in driving the industrial transformation from voice telephony to high-speed digital delivery of data, video and information is Bell Labs, an integral part of Alcatel-Lucent and one of the world's foremost technology research institutes, responsible for countless breakthroughs that have shaped the networking and communications industry. Alcatel-Lucent innovations have resulted in the company being recognized by Thomson Reuters as a Top 100 Global Innovator, as well as being named by MIT Technology Review as amongst 2012's Top 50 "World's Most Innovative Companies". Alcatel-Lucent has also been recognized for innovation in sustainability, being named Industry Group Leader for Technology Hardware & Equipment sector in the 2013 Dow Jones Sustainability Indices review for making global communications more sustainable, affordable and accessible, all in pursuit of the company's mission to realize the potential of a connected world.
With revenues of Euro 14.4 billion in 2012, Alcatel-Lucent is listed on the Paris and New York stock exchanges (Euronext and NYSE: ALU). The company is incorporated in France and headquartered in Paris.
For more information, visit Alcatel-Lucent on: http://www.alcatel-lucent.com, read the latest posts on the Alcatel-Lucent blog http://www.alcatel-lucent.com/blog and follow the Company on Twitter: http://twitter.com/Alcatel_Lucent.
ALCATEL-LUCENT PRESS CONTACTS
T : +33 (0)1 40 76 50 84
T : +1 405-844-6827
ALCATEL-LUCENT INVESTOR RELATIONS
T : + 33 (0) 1 4076 1120
T : + 1 908-582-7998
T : +33 (0)1 40 76 49 08
As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...
Dec. 3, 2016 06:15 PM EST Reads: 1,500
"IoT is going to be a huge industry with a lot of value for end users, for industries, for consumers, for manufacturers. How can we use cloud to effectively manage IoT applications," stated Ian Khan, Innovation & Marketing Manager at Solgeniakhela, in this SYS-CON.tv interview at @ThingsExpo, held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 3, 2016 05:30 PM EST Reads: 4,027
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
Dec. 3, 2016 05:15 PM EST Reads: 2,129
@GonzalezCarmen has been ranked the Number One Influencer and @ThingsExpo has been named the Number One Brand in the “M2M 2016: Top 100 Influencers and Brands” by Onalytica. Onalytica analyzed tweets over the last 6 months mentioning the keywords M2M OR “Machine to Machine.” They then identified the top 100 most influential brands and individuals leading the discussion on Twitter.
Dec. 3, 2016 05:15 PM EST Reads: 1,991
In IT, we sometimes coin terms for things before we know exactly what they are and how they’ll be used. The resulting terms may capture a common set of aspirations and goals – as “cloud” did broadly for on-demand, self-service, and flexible computing. But such a term can also lump together diverse and even competing practices, technologies, and priorities to the point where important distinctions are glossed over and lost.
Dec. 3, 2016 04:30 PM EST Reads: 1,460
Predictive analytics tools monitor, report, and troubleshoot in order to make proactive decisions about the health, performance, and utilization of storage. Most enterprises combine cloud and on-premise storage, resulting in blended environments of physical, virtual, cloud, and other platforms, which justifies more sophisticated storage analytics. In his session at 18th Cloud Expo, Peter McCallum, Vice President of Datacenter Solutions at FalconStor, discussed using predictive analytics to mon...
Dec. 3, 2016 04:00 PM EST Reads: 4,852
All clouds are not equal. To succeed in a DevOps context, organizations should plan to develop/deploy apps across a choice of on-premise and public clouds simultaneously depending on the business needs. This is where the concept of the Lean Cloud comes in - resting on the idea that you often need to relocate your app modules over their life cycles for both innovation and operational efficiency in the cloud. In his session at @DevOpsSummit at19th Cloud Expo, Valentin (Val) Bercovici, CTO of Soli...
Dec. 3, 2016 03:30 PM EST Reads: 1,578
Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and...
Dec. 3, 2016 03:15 PM EST Reads: 3,215
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
Dec. 3, 2016 03:00 PM EST Reads: 462
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
Dec. 3, 2016 02:45 PM EST Reads: 509
Regulatory requirements exist to promote the controlled sharing of information, while protecting the privacy and/or security of the information. Regulations for each type of information have their own set of rules, policies, and guidelines. Cloud Service Providers (CSP) are faced with increasing demand for services at decreasing prices. Demonstrating and maintaining compliance with regulations is a nontrivial task and doing so against numerous sets of regulatory requirements can be daunting task...
Dec. 3, 2016 02:45 PM EST Reads: 707
Fact: storage performance problems have only gotten more complicated, as applications not only have become largely virtualized, but also have moved to cloud-based infrastructures. Storage performance in virtualized environments isn’t just about IOPS anymore. Instead, you need to guarantee performance for individual VMs, helping applications maintain performance as the number of VMs continues to go up in real time. In his session at Cloud Expo, Dhiraj Sehgal, Product and Marketing at Tintri, sha...
Dec. 3, 2016 02:45 PM EST Reads: 779
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...
Dec. 3, 2016 02:45 PM EST Reads: 670
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to impr...
Dec. 3, 2016 02:15 PM EST Reads: 6,949
Join Impiger for their featured webinar: ‘Cloud Computing: A Roadmap to Modern Software Delivery’ on November 10, 2016, at 12:00 pm CST. Very few companies have not experienced some impact to their IT delivery due to the evolution of cloud computing. This webinar is not about deciding whether you should entertain moving some or all of your IT to the cloud, but rather, a detailed look under the hood to help IT professionals understand how cloud adoption has evolved and what trends will impact th...
Dec. 3, 2016 02:00 PM EST Reads: 2,477