Malware Keeps on Surging During Q2-2011, Reports AVG
Internet and mobile security provider AVG Technologies recently issued its "Community Powered Threat Report, Q2-2011," that gives the background, evaluation and insight into the developments and tendencies of the threat environment across the world. Specifically, the study indicates that "trusted malware," in a unique way, is continuously rising in what AVG elucidates a frightening pace.
During Q2-2011 i.e. April-June 2011, AVG's Threat Labs witnessed that digital certificates that had been stolen for signing malware had grown in number prior to hackers distributing them. A rise of more than 300% was witnessed when 2011 began in comparison with the entire number during 2010. The study's findings observe that there's a rapid alleviation in the reliance on signed files.
Furthermore, the report discloses that as Macs keep on increasing in popularity, cyber-attacks increasingly victimize them. Also, as the market share of the platform attains critical levels, cyber-criminals are beginning to hook them.
States the report, while Macs maybe one newer platform for attack, online crooks are employing trusted social engineering tactics for waging assaults on Mac OS users. Eweek.com reported this on June 22, 2011.
Additionally the report discloses that there's been an increase in attacks by SpyEye, the highly widespread malicious program, which targets Internet banking transactions, implying that consumers performing online banking require being watchful.
Unfortunately, AVG's report identifies how the Web has been changing in character, reflecting another impending danger.
States Yuval Ben-Itzhak, Chief Technology Officer at AVG Technologies, it's clear that cyber-criminals are moving their attention towards fresh markets, essentially aiming to raise the earnings from their malicious acts. Startupsmart.com.au published this on June 22, 2011.
Ben-Itzhak further states that it mayn't be incorrect to rename the World Wide Web as World Wild Web, adding that his company has discovered numerous active servers operating globally uninterrupted, for capturing consumers' credentials for personal assets, more importantly for Internet banking transactions.
According to him, as hackers keep on making their attack methods more sophisticated, end-users require adopting precautionary measures. Thus, they must deploy security products that have many layers of safeguards as defense against the impending harmful dangers which lurk online, Ben-Itzhak concludes.
Related article: Malware Authors Turn More Insidious
» SPAMfighter News - 30-06-2011