Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

M86 Security on Cyber-threat Trends of H1-2011

According to security company M86 Security, it has lately noticed a rise in combined and targeted attacks based on e-mail, one fresh maneuver within phishing assaults, as also a growth in frauds based on social engineering via widely visited social-networking websites. Help Net Security reported this on July 21, 2011.

M86, which studied the trends of cyber attacks for January-June 2011, observed that whereas the total amount of spam dropped, cyber-criminals kept on improving their attack methods with greater innovation such as employing joint, implanted HTML attachments or files, which conventional anti-phishing tools couldn't detect, while simultaneously luring probable victims and attaining high success rates.

States Vice-President of Technical Strategy Bradley Anstis at M86 Security, no matter if the assaults take place through the Web or e-mail, it's always true that there's more stress on personalized, elusive malware which often remain ahead of the majority of mechanisms for security detection. Help Net Security published this.

Moreover, Anstis says that by comprehending current assault techniques, businesses along with their security admins will be better able to block malware from intruding computers and networks.

And albeit Web-oriented assaults have gained greater prominence recently, assaults on RSA, EMC's security division as also against Oak Ridge National Labs demonstrate that personalized assaults through e-mail having combined e-threats and malevolent attachments continue to be large. Cases of malevolent e-mail attachments declined during July-December 2010 which, however, rose to 3% from below 1% during H1-2011.

Furthermore, cyber-criminals have discovered fresh methods for evading detection so their rates of success may escalate for phishing assaults. The M86 Security Labs study paper noted one such method from the several indicated as involving banking websites of HTML version attached to e-mails instead of providing spoofed banking URLs within the same.

Additionally, M86 further studied that e-mail junk had declined one-third the amount earlier reported in the company's H2-2010 research paper.

Finally, personalized phishing grew which utilized Microsoft Excel files as also implanted Flash files for abusing security flaws. In this technique, since it's necessary to separate both components for examination, AV solutions or other security software can little detect the related threats.

Related article: MU Students Received phishing E-mail

» SPAMfighter News - 7/29/2011

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next