Explore the latest news and trends  

Keep yourself up to date with one of the following options:

  • Explore more news around Spam/Phishing, Malware/Cyber-attacks and Antivirus
  • Receive news and special offers from SPAMfighter directly in your inbox.
  • Get free tips and tricks from our blog and improve your security when surfing the net.
Go
-->

Verizon Lists Most Prevalent E-Threats of 2009

Verizon, in 2009, carried out an elaborate research about the security scenario, while focusing to determine the most prevalent or destructive infiltrations faced by organizations. The research showed spyware and keylogger software as the top threats.

Describing spyware, the security specialists stated that it's particularly created to log, monitor and gather the actions that the user of a computer performs. Conversely, keylogger software, which functions surreptitiously, intercepts all of a user's keystrokes.

The research finds that spyware and keyloggers infected just some hundreds of pieces of information, a majority of them being authentication credentials. However, they had an enormous role within the wider landscape of security breaches wherein innumerable pieces of information were intercepted.

Reports Verizon, 19% of the entire number of investigated cases reflected the use of spyware and keyloggers. These malicious programs contributed to 82% of the total number of intercepted records. Consequently, they were the most destructive e-threat in 2009.

Notably, spyware and keyloggers were the threats that prevailed most widely during 2008 too. In that year, these contributed to 82% of all compromised records. The kind of malware which most successfully harvested huge volumes of confidential information during 2008 was the 'seize-and-save' type.

Attackers characteristically go after this methodology to breach data related to payment cards along with Personally Identifiable Information so as too often transmit massive records isn't the tactic which's most stealthy.

Additionally, Verizon discloses viz. command/control and backdoor malware. They contributed to 18% of the total infringement cases detected and were behind 79% of the total credentials intercepted.

Moreover, according to security specialists, command/control and backdoor malware are tools which enable attackers to gain remote access to infected computers and/or complete control over the same. These are normally downloaded through an SQL-Injection attack or when the attacker acquires admission into a targeted system, remotely.

Besides all these threats, malware, hacking, mixed together with fraud comprised the others which caused the commotion during 2009. Notably, in 2008, malware was the greatest e-threat found in around one-third of the instances detected, while it was behind the breach of nine out of every ten records.

Related article: Virginia - Top Spammer Challenges the anti-spam Law

ยป SPAMfighter News - 18-05-2010

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Exchange Anti Spam Filter
Go back to previous page
Next