|By PR Newswire||
|February 28, 2014 11:14 AM EST||
ABINGDON, England, February 28, 2014 /PRNewswire/ --
Kaspersky Lab has today published the results of the company's spam monitoring for January 2014.
Top 3 stories in January:
- Detection of emails claiming to be from the popular WhatsApp messenger for smartphones. The messages stated that an attached archive contained a photo from a "friend". The attachment actually contained a malicious program detected by Kaspersky Lab as Backdoor.Win32.Androm.bjkd - a notorious backdoor whose main functionality is to download other malware on the victim's computer and steal personal data.
- Another popular theme in January was that of video surveillance systems to help secure private and commercial premises. This English-language spam focused on personal safety and the possibility of keeping an eye on husbands and wives, as well as health visitors and workmen in private homes.
- In the run-up to Valentine's Day, English-language spam also included the traditional 'flower' partner mailings and suggestions for a romantic meal or trip, as well as adverts offering some very unusual gifts such as a real star in the sky.
In January, scammers also continued to send out 'Nigerian' letters exploiting the deaths of former Israeli prime minister, Ariel Sharon, and South Africa's ex-president, Nelson Mandela. One 'Nigerian' letter was supposedly written by the lawyer of the late president's second wife. It stated that his ex-wife and her lawyer needed help to obtain a huge amount of money, gold bars and assistance to invest it. They claimed they were searching for a respectable person who had to be a foreign citizen. Another similar letter claimed to come from Mandela's third wife Graca Marshal. The scammers tried to win the recipient's sympathy with a sad tale about the struggle for his millions within the Mandela family. The fraudsters asked for help in transferring money and keeping it safe in an account belonging to the recipient.
Tatyana Shcherbakova, Senior Spam Analyst at Kaspersky Lab, commented: "Trojan-Spy.html.Fraud.gen remained the most widespread malicious program. It belongs to a family of Trojan programs that use spoofing technology to imitate HTML pages, and are distributed via email in fake notifications from major commercial banks, software developers and e-stores. After opening one of these pages, users enter their login details, which is then passed on to cybercriminals who gain full access to the victims' confidential information."
- The share of spam in global email traffic decreased by 7.6 percentage points and averaged 65.7 per cent in January. The drop in the proportion of spam was due to a traditional lull in activity at the beginning of the year.
Leader of the month - USA
- The USA (+3.5 percentage points, 16 per cent) topped the rating of countries with the highest number of mail antivirus, pushing the UK down to second (-3.41 percentage points, 10 per cent). Germany remained third (-0.39 percentage points, 10 per cent).
- The USA replaced China as the biggest source of spam (21.9 per cent). China's contribution (16 per cent) fell by 7 percentage points, leaving it in second place. South Korea was third once again (12.5 per cent).
The full report is available at securelist.com.
About Kaspersky Lab
Kaspersky Lab is the world's largest privately held vendor of endpoint protection solutions. The company is ranked among the world's top four vendors of security solutions for endpoint users*. Throughout its more than 16-year history Kaspersky Lab has remained an innovator in IT security and provides effective digital security solutions for large enterprises, SMBs and consumers. Kaspersky Lab, with its holding company registered in the United Kingdom, currently operates in almost 200 countries and territories across the globe, providing protection for over 300 million users worldwide. Learn more at http://www.kaspersky.co.uk.
* The company was rated fourth in the IDC rating Worldwide Endpoint Security Revenue by Vendor, 2012. The rating was published in the IDC report "Worldwide Endpoint Security 2013-2017 Forecast and 2012 Vendor Shares (IDC #242618, August 2013). The report ranked software vendors according to earnings from sales of endpoint security solutions in 2012.
Follow us on Twitter
Like us on Facebook
1650 Arlington Business Park
RG7 4SA, Reading
Kaspersky Lab UK
Milton Business Park
OX14 4RY, Oxford
SOURCE Kaspersky Lab
Today’s connected world is moving from devices towards things, what this means is that by using increasingly low cost sensors embedded in devices we can create many new use cases. These span across use cases in cities, vehicles, home, offices, factories, retail environments, worksites, health, logistics, and health. These use cases rely on ubiquitous connectivity and generate massive amounts of data at scale. These technologies enable new business opportunities, ways to optimize and automate, al...
Oct. 8, 2015 08:15 PM EDT Reads: 137
Manufacturing has widely adopted standardized and automated processes to create designs, build them, and maintain them through their life cycle. However, many modern manufacturing systems go beyond mechanized workflows to introduce empowered workers, flexible collaboration, and rapid iteration. Such behaviors also characterize open source software development and are at the heart of DevOps culture, processes, and tooling.
Oct. 8, 2015 08:00 PM EDT Reads: 1,080
Chris Van Tuin, Chief Technologist for the Western US at Red Hat, has over 20 years of experience in IT and Software. Since joining Red Hat in 2005, he has been architecting solutions for strategic customers and partners with a focus on emerging technologies including IaaS, PaaS, and DevOps. He started his career at Intel in IT and Managed Hosting followed by leadership roles in services and sales engineering at Loudcloud and Linux startups.
Oct. 8, 2015 08:00 PM EDT Reads: 164
The IoT market is on track to hit $7.1 trillion in 2020. The reality is that only a handful of companies are ready for this massive demand. There are a lot of barriers, paint points, traps, and hidden roadblocks. How can we deal with these issues and challenges? The paradigm has changed. Old-style ad-hoc trial-and-error ways will certainly lead you to the dead end. What is mandatory is an overarching and adaptive approach to effectively handle the rapid changes and exponential growth.
Oct. 8, 2015 08:00 PM EDT
There are many considerations when moving applications from on-premise to cloud. It is critical to understand the benefits and also challenges of this migration. A successful migration will result in lower Total Cost of Ownership, yet offer the same or higher level of robustness. Migration to cloud shifts computing resources from your data center, which can yield significant advantages provided that the cloud vendor an offer enterprise-grade quality for your application.
Oct. 8, 2015 08:00 PM EDT Reads: 229
The APN DevOps Competency highlights APN Partners who demonstrate deep capabilities delivering continuous integration, continuous delivery, and configuration management. They help customers transform their business to be more efficient and agile by leveraging the AWS platform and DevOps principles.
Oct. 8, 2015 07:30 PM EDT Reads: 216
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data...
Oct. 8, 2015 07:30 PM EDT Reads: 172
The buzz continues for cloud, data analytics and the Internet of Things (IoT) and their collective impact across all industries. But a new conversation is emerging - how do companies use industry disruption and technology enablers to lead in markets undergoing change, uncertainty and ambiguity? Organizations of all sizes need to evolve and transform, often under massive pressure, as industry lines blur and merge and traditional business models are assaulted and turned upside down. In this new da...
Oct. 8, 2015 07:30 PM EDT Reads: 252
As-a-service models offer huge opportunities, but also complicate security. It may seem that the easiest way to migrate to a new architectural model is to let others, experts in their field, do the work. This has given rise to many as-a-service models throughout the industry and across the entire technology stack, from software to infrastructure. While this has unlocked huge opportunities to accelerate the deployment of new capabilities or increase economic efficiencies within an organization, i...
Oct. 8, 2015 07:15 PM EDT Reads: 233
There are so many tools and techniques for data analytics that even for a data scientist the choices, possible systems, and even the types of data can be daunting. In his session at @ThingsExpo, Chris Harrold, Global CTO for Big Data Solutions for EMC Corporation, will show how to perform a simple, but meaningful analysis of social sentiment data using freely available tools that take only minutes to download and install. Participants will get the download information, scripts, and complete en...
Oct. 8, 2015 07:15 PM EDT Reads: 256
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at @DevOpsSummit, Kevin Gilpin, CTO and Co-Founder of Conjur, will discuss various security considerations for container-based infrastructure and related DevOps workflows.
Oct. 8, 2015 07:15 PM EDT Reads: 195
Containers are revolutionizing the way we deploy and maintain our infrastructures, but monitoring and troubleshooting in a containerized environment can still be painful and impractical. Understanding even basic resource usage is difficult - let alone tracking network connections or malicious activity. In his session at DevOps Summit, Gianluca Borello, Sr. Software Engineer at Sysdig, will cover the current state of the art for container monitoring and visibility, including pros / cons and li...
Oct. 8, 2015 07:00 PM EDT Reads: 184
IT data is typically silo'd by the various tools in place. Unifying all the log, metric and event data in one analytics platform stops finger pointing and provides the end-to-end correlation. Logs, metrics and custom event data can be joined to tell the holistic story of your software and operations. For example, users can correlate code deploys to system performance to application error codes.
Oct. 8, 2015 06:45 PM EDT Reads: 203
Between the compelling mockups and specs produced by analysts, and resulting applications built by developers, there exists a gulf where projects fail, costs spiral, and applications disappoint. Methodologies like Agile attempt to address this with intensified communication, with partial success but many limitations. In his session at DevOps Summit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, will present a revolutionary model enabled by new technologies. Learn how busine...
Oct. 8, 2015 06:45 PM EDT Reads: 258