Verizon Lists Most Prevalent E-Threats of 2009
Verizon, in 2009, carried out an elaborate research about the security scenario, while focusing to determine the most prevalent or destructive infiltrations faced by organizations. The research showed spyware and keylogger software as the top threats.
Describing spyware, the security specialists stated that it's particularly created to log, monitor and gather the actions that the user of a computer performs. Conversely, keylogger software, which functions surreptitiously, intercepts all of a user's keystrokes.
The research finds that spyware and keyloggers infected just some hundreds of pieces of information, a majority of them being authentication credentials. However, they had an enormous role within the wider landscape of security breaches wherein innumerable pieces of information were intercepted.
Reports Verizon, 19% of the entire number of investigated cases reflected the use of spyware and keyloggers. These malicious programs contributed to 82% of the total number of intercepted records. Consequently, they were the most destructive e-threat in 2009.
Notably, spyware and keyloggers were the threats that prevailed most widely during 2008 too. In that year, these contributed to 82% of all compromised records. The kind of malware which most successfully harvested huge volumes of confidential information during 2008 was the 'seize-and-save' type.
Attackers characteristically go after this methodology to breach data related to payment cards along with Personally Identifiable Information so as too often transmit massive records isn't the tactic which's most stealthy.
Additionally, Verizon discloses viz. command/control and backdoor malware. They contributed to 18% of the total infringement cases detected and were behind 79% of the total credentials intercepted.
Moreover, according to security specialists, command/control and backdoor malware are tools which enable attackers to gain remote access to infected computers and/or complete control over the same. These are normally downloaded through an SQL-Injection attack or when the attacker acquires admission into a targeted system, remotely.
Besides all these threats, malware, hacking, mixed together with fraud comprised the others which caused the commotion during 2009. Notably, in 2008, malware was the greatest e-threat found in around one-third of the instances detected, while it was behind the breach of nine out of every ten records.
» SPAMfighter News - 18-05-2010
We are happy to see you are reading our IT Security News.
To reward your interest, we would like to offer you all our award-winning products
at the price $19.95. Pick your own favorites.