Trending this month

Showing posts with label malware. Show all posts
Showing posts with label malware. Show all posts

July 18, 2015

the biggest data breaches for world governments

Top Ten Largest Government Data Breaches | SoftwareInsider

March 7, 2013

Why Android is the Most Unsecure Mobile Platform, makes 79% Mobile Malware, compared to iOS 0.7%

AndroidAccounted For 79% Of All Mobile Malware In 2012, 96% In Q4 Alone, Says F-Secure| TechCrunch: Google’s mobile OS Android continues to be the world’s biggest magnet for mobile malware. According to a report out today from security specialists F-Secure, Android accounted for 79% of all malware in 2012, up from 66.7% in 2011 and 11.25% in 2010.

Android’s rival Apples  iOS,  platform ,the world’s second-most popular platform for smartphones in terms of new purchases, remains one of the least compromised, with 0.7% of malware on its platform.

Symbian, whose market share is in rapid decline and is being left for dead by its former parent Nokia, is down to 19% of all malware, compared to 62.5% two years ago. F-Secure predicts that it will go the way of the dodo bird and become extinct in 2013, as users replace their Nokia handsets with Android devices. Meanwhile, Windows Mobile, BlackBerry and J2ME each accounted for less than 1% of threat families in circulation in the year.

Enhanced by Zemanta

August 12, 2011

State of Mobile Malware: 5 Ways To Deal with it

Malware specific to Android devices in particular has been making headlines as of late. In March, Google removed 21 apps from the Android Market after the blog Android Police alerted the company that the apps contained malware and were being used to collect user data. Google also invoked a kill switch, which automatically deleted the malicious apps from users’ phones, without any action necessary from the users.

  Source Bullguard
According to InformationWeek  A new Trojan horse app has emerged to target Android devices, and this one's particularly creepy. The app records a user's phone calls and then uploads them to a remote server. The app was revealed on the Security Advisor Research Blog, published by CA Technologies, now known as Total Defense.

Android users are now 2 1/2 times more likely to encounter malware than a mere six months ago and that Web-based threats affect 30% of them each year. Furthermore, the survey shows the number of malware-infected apps increasing fivefold, to 400, in the first half of this year.

Some of the of the social engineering and obfuscation techniques used to distribute mobile malware is even more sobering. Since iOS has a strictly curated distribution model, i.e. unless you jailbreak the device you can't install an app on the iPhone or iPad without going through the App Store, Apple devices aren't susceptible to malware-infected apps (although, as the JailbreakMe exploit proved, hackers can still do a lot via the Safari browser). Thus, the scary stuff is happening in the Android ecosystem, where the freewheeling, community-policed Android Market is easily booby trapped.

Notable mobile viruses

  • Cabir: Infects mobile phones running on Symbian OS. When a phone is infected, the message 'Caribe' is displayed on the phone's display and is displayed every time the phone is turned on. The worm then attempts to spread to other phones in the area using wireless Bluetooth signals.

  • Duts: A parasitic file infector virus and is the first known virus for the PocketPC platform. It attempts to infect all EXE files in the current directory (infects files that are bigger than 4096 bytes).

  • Skulls: A trojan horse piece of code. Once downloaded, the virus, called Skulls, replaces all phone desktop icons with images of a skull. It also will render all phone applications, including SMSes and MMSes useless.

  • Commwarrior: First worm to use MMS messages in order to spread to other devices. Can spread through Bluetooth as well. It infects devices running under OS Symbian Series 60. The executable worm file, once launched, hunts for accessible Bluetooth devices and sends the infected files under a random name to various devices.

June 8, 2011

Online Security Software Grows 12% to $16.5 billion

      Source : Mosaicsecurity

Worldwide security software revenue witnessed a growth of 12 per cent in 2010 to $16.5 billion, driven by a rebound in demand for such solutions, according to research firm Gartner.

According to Gartner, global security software revenue grew from $14.7 billion in 2009 to $16.5 billion in 2010, a growth of about 12 per cent.

"Key vendors continued to expand their product portfolios, buying companies where appropriate and expanding their reach into emerging markets," Gartner Principal Research Analyst Ruggero Contu said in a statement.

While mature areas like endpoint security and web access management showed single-digit growth, security information and event management (SIEM) and secure web gateway products experienced double-digit growth, Gartner said.

Symantec retained its market share lead and accounted for 18.9 per cent of total security software revenue in 2010, while McAfee had a 10.4 per cent share.

Trend Micro, IBM and EMC followed with 6.3 per cent, 4.9 per cent and 3.8 per cent shares of the market, respectively.

June 2, 2011

Gmail Confirms " Email Accounts in US, Asia Hacked

Hackers around the world are gaining more attention than usual in the last few months. Now Google has added another announcement to the pile that hundreds of Gmail accounts have been hacked recently.

According to reports ,Google affirms that the problem doesn’t rest with Gmail security but rather this scheme was a result of phishing and malware.The world's largest Internet company said on its official blog that the hackers, who appeared to originate from Jinan, China, recently tried to crack and monitor email accounts by stealing passwords, but Google detected and "disrupted" the campaign.

The attacks were the latest computer-based invasions directed at western companies and come a year after Internet giant Google and numerous companies were targeted by hackers traced to China.

That previous incident triggered a highly-charged debate over the country's censorship and rigid control of the Internet. Google eventually all but pulled out of China, despite the market's massive growth opportunity.

While Google said last year's attack was aimed at its "corporate infrastructure," the latest incident appears to have relied on tricking email users into revealing passwords, based on Google's description in its blog post.

Google spilled the details on Wednesday via its official blog:
Through the strength of our cloud-based security and abuse detection systems*, we recently uncovered a campaign to collect user passwords, likely through phishing. This campaign, which appears to originate from Jinan, China, affected what seem to be the personal Gmail accounts of hundreds of users including, among others, senior U.S. government officials, Chinese political activists, officials in several Asian countries (predominantly South Korea), military personnel and journalists.

The goal of this effort seems to have been to monitor the contents of these users’ emails, with the perpetrators apparently using stolen passwords to change peoples’ forwarding and delegation settings.
Google recommended the following:
  • Use two-factor authentication;
  • Choose a strong password;
  • Watch for suspicious activity warnings in your Gmail account;
  • Check your settings for odd forwarding.
Google gave a hat tip to the blog Contagio, which highlighted the risks in February.
You might also like: