Linsanity, Whitneys Death, And New Android Threats Dominate This Quarters Cybercrime Scene

  /     /     /  
Publicated : 22/11/2024   Category : security


Linsanity, Whitneys Death, And New Android Threats Dominate This Quarters Cybercrime Scene


Trend Micro issues new security roundup report for Q1 2012



CUPERTINO, Calif., April 17, 2012 /PRNewswire/ --This quarter saw a significant shift in the way the security industry approaches targeted attacks and advanced persistent threats, which are now viewed more as a long-term, ongoing campaign versus the typical smash-and-grab incidents favored by cybercriminals in the past, according to the Trend Micro (TYO: 4704; TSE: 4704) Q1 2012 Security Roundup Report.
According to the report, Q1s visible events - Linsanity, Whitney Houstons death, and sociopolitical upheavals around the world - gave cybercriminals new social-engineering campaign material, equipping them to penetrate and infect users and networks in order to access victims data.
The report also noted that cybercriminals who launch APTs will often keep track of the different attacks within a campaign in order to determine which individual attack compromised a specific victims network. The Luckycat campaign, in particular, attacked a diverse set of targets using a variety of malware, some of which have been linked to other cyber-espionage campaigns.
Notable trends in Q1 2012:
-- Cybercriminals are capitalizing on the growth of Android users who use their smartphones to gain Internet access. In fact, Trend Micro identified approximately 5000 new malicious Android apps in the first quarter. -- Apple surpassed Oracle, Google and Microsoft in reported vulnerabilities, with a total of 91. Oracle came in second, with 78; Google, 73; Microsoft, 43. Apart from posting the highest number of reported vulnerabilities, Apple also issued a record-breaking number of patches last March. -- New social networking site, Pinterest, gained not just popularity but also notoriety. Site users were drawn into re-pinning a Starbucks logo to get supposed gift cards but instead got malware. -- This quarters top spam-sending countries included: India (20 percent), Indonesia (13 percent), South Korea (12 percent), and Russia (10 percent). -- During this quarter, the Trend Micro(TM) Smart Protection Network(TM), a cloud computing infrastructure, protected Trend Micro customers against a total of: 15.3 billion spam, 338.4 thousand malware, and 1.3 billion malicious URLs. Supporting assets:
-- The full round-up report can be found here. -- Download the Trend Micro Whitepaper: Luckycat Redux. -- Download the Trend Micro Whitepaper: Trends in Targeted Attacks. -- Download the Trend Micro Whitepaper: Enterprise Readiness of Consumer Mobile Platforms. -- Visit the award-winning TrendLabs Malware Blog for the latest threat research news. About Trend Micro Trend Micro Incorporated (TYO: 4704;TSE: 4704), a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over 20 years experience, we deliver top-ranked client, server and cloud-based security that fits our customers and partners needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro(TM) Smart Protection Network(TM) cloud computing security infrastructure, our products and services stop threats where they emerge - from the Internet. They are supported by 1,000+ threat intelligence experts around the globe.
Additional information about Trend Micro Incorporated and the products and services are available at Trend Micro.com. This Trend Micro news release and other announcements are available at http://newsroom.trendmicro.com/ and as part of an RSS feed at www.trendmicro.com/rss. Or follow our news on Twitter at @TrendMicro.

Last News

▸ Scan suggests Heartbleed patches may not have been successful. ◂
Discovered: 23/12/2024
Category: security

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Linsanity, Whitneys Death, And New Android Threats Dominate This Quarters Cybercrime Scene