Top Tech News

CIO Today Network Sites:   Top Tech News  |   CIO Today   |   Mobile Tech Today   |   Data Storage Today
News & Product Reviews for Tech Leaders
Wednesday, April 23rd 
24/7/365 Network Uptime!
Trending Topics:   Security Heartbleed Big Data Cloud Computing Windows XP Data Centers OS X Mavericks
Home
Network Security
Tech Trends
Cloud Computing
Hardware
Applications
Microsoft/Windows
Apple/Mac
Mobile Tech
World Wide Web
Big Data
Communications
Hackers
Chips & Processors
Linux/Open Source
Personal Tech
Press Releases
 
Free Newsletters
Top CIO News
 
Mobile Tech Today
 

Network Security

Security Threats Diversify, Modernize, Sophos Report Warns

Security Threats Diversify, Modernize, Sophos Report Warns
December 5, 2012 9:44AM

Bookmark and Share
What was once a homogeneous world of Windows systems is now a landscape of diverse platforms, and modern malware is taking advantage of that, according to Sophos. Malware authors now attack Android devices more often than PCs. Nearly 10 percent of Android devices in the U.S. have seen a malware attack, compared with 6 percent of PCs.

Neustar, Inc. (NYSE: NSR) is a trusted, neutral provider of real-time information and analysis to the Internet, telecommunications, information services, financial services, retail, media and advertising sectors. Neustar applies its advanced, secure technologies in location, identification, and evaluation to help its customers promote and protect their businesses. More information is available at www.neustar.biz.

Security threats are coming from all sides. Now Sophos is outlining some of them in its Security Threat Report 2013, which details IT security trends in 2012 and what to expect in 2013.

As Sophos describes it, 2012 was a year of new platforms and modern malware. What was once a homogeneous world of Windows systems is now a landscape of diverse platforms. Modern malware is taking advantage of these trends, the security firm said, creating new challenges for IT security professionals.

"Two of the defining terms of 2012 are 'empower' and 'evolve.' Attacks and threats -- on PCs, Macs and mobile devices -- continue to evolve as does the technology to combat them," said Gerhard Eschelbeck, CTO at Sophos.

"As users demand more and better ways to do their jobs, IT continues to evolve, bringing forth a new set of operating systems and other advancements, replete with different security models and attack vectors, making it crucial for security technology to evolve, ensuring that end users are protected and empowered -- no matter what platform, device, or operating system they choose."

Android Targeted

Sophos also reports that malware authors now attack Android devices more often than PCs. Nearly 10 percent of Android devices in the U.S. have seen a malware attack, compared with only about 6 percent of PCs. We asked Michael Disabato, managing vice president of Network and Telecom at Gartner, for his take on the revelation.

"Google Play is not curated as well as iOS. Android is designed to be a very flexible operating system so it's easy to root. Why do people rob banks? That's where the money is. Why are people going after Android? Because they can, because there's money in it, and because you can't get to iOS without a lot of work," Disabato told us.

"Why aren't malware authors going after Windows? Windows gets defended just as quickly as possible. But very few people are installing malware detection and mitigation software on their smartphones."

Beware Legitimate Websites

Beyond smartphones, more than 80 percent of attacks were redirects, the majority of which were from legitimate Websites that were hacked, according to Sophos. Most of the exposure is still coming from clicking links in e-mails and browsing Web pages that are carrying malicious code.

Sophos concluded that the riskiest countries for malware attacks are Hong Kong, Taiwan, UAE, Mexico and India, while the safest countries are Norway, Sweden, Japan, United Kingdom and Switzerland. (continued...)

1  |  2  |  Next Page >

 

Tell Us What You Think
Comment:

Name:



 Network Security
1. Verizon Report Exposes Cyberthreats
2. How Are Web Sites Post-Heartbleed?
3. White House Updating Privacy Policy
4. Target Hackers May Be Tough To Find
5. Heartbleed Exploit Could Cost Millions




 Most Popular Articles
1. Resetting All Passwords Now May Be Worst Heartbleed Fix
2. Silverpop: IBM Marketing Portfolio Gets Personal
3. Is Heartbleed the Biggest Web Security Threat Ever?
4. Analyst: Samsung Galaxy S5 Won't Sway iPhone Lovers
5. VMware Leverages AirWatch's MDM Tech in Horizon 6

Have an informed opinion on this story?
Send a Letter to the Editor.
We want to know what you think.
Send us your Feedback.

 Related Topics  Latest News & Special Reports

  Hortonworks, Concurrent To Partner
  Microsoft, BMC Targeting VMware
  Verizon Report Exposes Cyberthreats
  Samsung: $2.2B Too Much for Apple
  APX Labs Aims To Put Glass in Business

 Technology Marketplace
Business Intelligence
Get real-time, cloud-based information services with Neustar.
 
Cloud Computing
Next Generation Data Center Is Here! Vblock™ Systems from VCE
 
Contact Centers
HP delivers the future of the contact center with HP Qfiniti 10.
 
Data Storage
Next Generation Data Center Is Here! Vblock™ Systems from VCE
Barium Ferrite (BaFe) is the future of tape.
2.5" Enterprise-class SATA & SAS SSDs for server & storage applications
 
Enterprise Hardware
Barium Ferrite (BaFe) is the future of tape.
2.5" Enterprise-class SATA & SAS SSDs for server & storage applications
 
Hardware
Protect your network with APC Smart-UPS battery backup
 
Network Security
Protect your network with APC Smart-UPS battery backup
 

Network Security Spotlight
Verizon Data Breach Report Exposes Top Threats
Beyond Heartbleed, there are cyberthreats vying to take down enterprise networks, corrupt smartphones, and wreak havoc on businesses. Verizon is exposing these threats in a new report.
 
Where Do Web Sites Stand, Post-Heartbleed?
A security firm says the vast majority of Web sites have patched themselves to protect against the Heartbleed bug, but now there are questions raised on the reliability of open-source programs.
 
White House Updating Online Privacy Policy
A new Obama administration privacy policy explains how the government will gather the user data of online visitors to WhiteHouse.gov, mobile apps and social media sites, saying much is in the public domain.
 
Navigation
Top Tech News
Home/Top News | Network Security | Tech Trends | Cloud Computing | Hardware | Applications | Microsoft/Windows
Apple/Mac | Mobile Tech | World Wide Web | Big Data | Communications | Hackers | Chips & Processors
Linux/Open Source | Personal Tech | Press Releases
Also visit these Enterprise Technology Sites
Top Tech News | CIO Today | Mobile Tech Today | Data Storage Today

Services:
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About CIO Today Network | How To Contact Us | Article Reprints | Services for PR Pros (In partnership with NewsFactor) | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 Top Tech News. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.