Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

Preferred Choice of Cyber Crooks Assured Threats to PDF and Flash

McAfee, a security vendor has reputedly acclaimed Adobe PDF Reader and Flash plug-ins as a well-liked target for cyber crooks in its recently released 'Q4 Threat Report'.

Though it sounds arrogance, claims in the 2009 report by McAfee Labs attributed Adobe products as the ultimate choice of cyber crooks in malware distribution. This expected analysis has eventually turned into a reality as reported by a statement in thinq.co.uk on February 9, 2011.

The developers of malware have full fledged taken illegitimate advantages of the inadequacies in both Flash and particularly the PDF technologies. Revelation from McAfee Labs' databases shows that malevolent PDFs hitting Adobe Acrobat have led the number of unusual instances by a distinctive margin.

According to the Director of Security Research and Communications at McAfee Labs, Dave Marcus, Adobe malware is surpassing the vulnerabilities against Microsoft by 100 to 1. Cyber crooks are actually concerned on using the technologies by Adobe for spreading malware, reports infosecurity on February 8, 2011. Such violations are causing Adobe's popularity at stake.

McAfee even claimed PDF and Flash maker Adobe to remain preferable for the cybercriminals during the present year 2011 as well.

The updated report by McAfee also acclaimed phishing of URLs in the form of social networking accounts, rewards accounts, IRS, and gift cards as some of the well-accepted cons. Attack on the search results and poisoning them still continues to be a setback. Researchers claimed that out of top 100 results for search items, 51% led to malicious sites. On an average, each of these compromised results pages comprised of more than five malicious links.

The "Anonymous" activist group obtained the position of a lead activist actor in hacking on Q4-2010. In the first quarter of 2010, the members of this group were engaged in several cyber demonstrations opposing WikiLeaks censors and against detractors in the later quarter of the same year. However, the limit between hacktivism and cyberwarfare goes on to be indistinctive.

Related article: Property Lawyers Warned about E-mail Scam

» SPAMfighter News - 2/17/2011

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next