Explore the latest news and trends  

Sign up for our weekly security newsletter

Be the first to receive important updates on security


F-Secure Claims 2012 “Year of the Exploit”

According to F-Secure, an Internet security software producer, 2012 is termed as the "Year of the Exploit." That's the way by which F-Secure describes the security landscape based on cyber crimes in H2-2012 in a recent report released of recent.

F-Secure also denoted that the Internet has turn into the most important source for digital desperadoes and the prime attack vector for the exploit kit. At present, the most widespread means of getting targeted by malware is via browsing the Web, as published by csoonline.com on February 5, 2013.

The ever-increasing reputation of exploit kits makes the web so attractive and popular among cyber criminals. However, of the total malware detections during H2-2012 that had been detected by F-Secure, only 28% were associated to the exploits.

The application of exploits has established a continuous trend during the earlier part of the year regardless of the yeoman efforts of the malware fighters and loads of thriving efforts to crib down the prominent botnets according to F-secure.

F-Secure also asserted that the activity of ZeroAccess increased extensively during H2-2012. According to F-Secure claims, the ZeroAccess achievement was methodical of its capability in generating income that uses a variety of extremely lucrative territories.

ZeroAccess is the greatest growing botnets that had been observed in 2012 that racked millions of viruses throughout the globe in 2012 with upto 140,000 exclusive IPs in the US and Europe according to the report by v3.co.uk on February 5, 2013.

Click Fraud and Bitcoin mining is highlighted as the most important means of income as highlighted by the report.

Everyday, the ZeroAccess botnet clicks 140 Million advertisements. As this is basically a click fraud, it has been anticipated that the botnet is worth $900,000 of the daily revenue loss to lawful online advertisers.

While explaining the same in the report, F-Secure reported that Bitcoin miners strap up computation power through various complex calculations and hit upon a missing block for verifying Bitcoin transactions that would recompense them with more Bitcoin currency. Thus, it is agreed for the identical peer to peer network that can be transformed to cash.

Related article: FIA Catches Hackers For Demanding Ransom

» SPAMfighter News - 2/11/2013

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page