Explore the latest news and trends  

Sign up for our weekly security newsletter

Be the first to receive important updates on security


Verizon Lists Most Prevalent E-Threats of 2009

Verizon, in 2009, carried out an elaborate research about the security scenario, while focusing to determine the most prevalent or destructive infiltrations faced by organizations. The research showed spyware and keylogger software as the top threats.

Describing spyware, the security specialists stated that it's particularly created to log, monitor and gather the actions that the user of a computer performs. Conversely, keylogger software, which functions surreptitiously, intercepts all of a user's keystrokes.

The research finds that spyware and keyloggers infected just some hundreds of pieces of information, a majority of them being authentication credentials. However, they had an enormous role within the wider landscape of security breaches wherein innumerable pieces of information were intercepted.

Reports Verizon, 19% of the entire number of investigated cases reflected the use of spyware and keyloggers. These malicious programs contributed to 82% of the total number of intercepted records. Consequently, they were the most destructive e-threat in 2009.

Notably, spyware and keyloggers were the threats that prevailed most widely during 2008 too. In that year, these contributed to 82% of all compromised records. The kind of malware which most successfully harvested huge volumes of confidential information during 2008 was the 'seize-and-save' type.

Attackers characteristically go after this methodology to breach data related to payment cards along with Personally Identifiable Information so as too often transmit massive records isn't the tactic which's most stealthy.

Additionally, Verizon discloses viz. command/control and backdoor malware. They contributed to 18% of the total infringement cases detected and were behind 79% of the total credentials intercepted.

Moreover, according to security specialists, command/control and backdoor malware are tools which enable attackers to gain remote access to infected computers and/or complete control over the same. These are normally downloaded through an SQL-Injection attack or when the attacker acquires admission into a targeted system, remotely.

Besides all these threats, malware, hacking, mixed together with fraud comprised the others which caused the commotion during 2009. Notably, in 2008, malware was the greatest e-threat found in around one-third of the instances detected, while it was behind the breach of nine out of every ten records.

Related article: Virginia - Top Spammer Challenges the anti-spam Law

ยป SPAMfighter News - 5/18/2010

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page