McAfee Releases its New Threat Report for Third Quarter

The McAfee Threats Report: Third Quarter 2012 by McAfee while studying different cyber-crime techniques along with cyber exploits from the perspective of their worldwide development unveils its new "Operation High Roller." The project reportedly asserts that mobile malicious software nearly became two-fold over that of Q2-2012. Thereafter, the report shows that database breaches reached their peak in the July-September quarter i.e. Q3-2012.

Moreover, stealth malware i.e. rootkits namely TDSS, ZeroAccess and Koutodoor, which were used in cyber-attacks continued to be worrisome. Rootkits, it's said are used for bypassing detection that enables them to remain on target computers over lengthy time-periods.

Furthermore, the July-September 2012 quarter featured a 43% rise in total ransomware items that always are disseminated via web-links within social-networking messages as well as e-mail; pay-per-install schemes; and drive-by downloads. Ransomware assaults involve malware, which makes sure that the victim accesses an illegitimate Internet site, stops the PC's functioning followed with demanding a fee for restoring the system back again.

Additionally, malware for Mac computers continued to increase and that too robustly when more than 300 fresh samples were spotted during Q3-2012, states McAfee. The observation is largely astonishing since there had been relatively too little discussion about it compared to any other computer malware just as any mobile malware, asserts McAfee Labs.

In the meantime, there was a 20% rise in web-threats. Notably, of all threats through the Web or messaging service, McAfee noticed that dubious URLs grew 20% during Q3-2012 with most of these websites harboring malicious software. Nearly 64% of such URLs were situated within North America, reports McAfee.

Finally, according to Senior Vice President Vincent Weafer from McAfee Labs, there is little indication of cyber-crime abating. Internet attacks grow in sophistication even as their numbers are noticeable. Evolution keeps occurring in these, particularly in cyber-warfare and hacktivism. As a result, digital threats are widely affecting all - government organizations, corporations, SMBs as well as households. These follow from obtaining vast actionable intelligence about victimized Internauts as also exploitation of the latest environments along with exploit kits for attack, the official enumerates. Timesofindia.indiatimes.com reported this on November 16, 2012.

Related article: McAfee Slams Microsoft over Vista Security

» SPAMfighter News - 21-11-2012

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Exchange Anti Spam Filter
Go back to previous page
Next