IBM Security Report: More complex, more mobile and more targeted attacks
"For
years, the industry is waiting for that malware is a real issue for the
mobile space," said Tom Cross, manager of Threat Intelligence and
Strategy at IBM X-Force. Now it seems so far. His
assessment of the expert concerns from the results of the recently
published IBM X-Force report, which is fully available only on
registration.
According
to this mainly plays a role that mobile phone manufacturers are too
slow with their security updates, but at the same time more and more
frolic and private devices in corporate networks - key word "Bring your
own device". This in turn means that the market for malicious code developers will be more interesting. The majority of malware today come primarily through third-party app stores into the circulation. The
malicious programs are mainly targeted at SMS premium services, whose
fees are then pushed under the attacked, as well as the collection of
personal information that an attacker can abuse as a result of phishing
attacks and identity thefts. The IBM researchers predict based on current numbers, a doubling of mobile attacks until the end of the year.
Further reported that X-Force team a tripling of the percentage of critical vulnerabilities. Increasingly complex attacks can be observed, particularly with objective information on strategic. Using sophisticated methods to try and camouflage attacker to gain access to critical networks. This threat refers to the X-Force team as "Advanced Persistent Threats" (short APTs). The
so-called "whaling", the attackers set their methods, especially
against the "big fish" one from the management level of enterprises that
have access to important data. Careful spying followed by targeted phishing campaigns should lead us to success.
The
experts also were able to observe attacks with political backgrounds,
done by so-called "hacktivists", and a quadrupling of the number of
anonymous proxies. This
trend should be monitored closely because, as the X-Force team, these
servers are often used to hide potentially offensive content.
However, some positive results, the report has noted. For
example, the number of Webschwachstellen fell in the first half of 49
to 37 percent and went back for the first time in five years. Web browsers also reported significantly less vulnerabilities than in past years. And finally, through the destruction of some of botnets, the amount of spam and phishing attacks declined sharply. The
results of IBM's reports are based on studies of publicly known
security incidents and the analysis of an average of 12 billion security
events every day since the beginning of this year.
"For
years, the industry is waiting for that malware is a real issue for the
mobile space," said Tom Cross, manager of Threat Intelligence and
Strategy at IBM X-Force. Now it seems so far. His
assessment of the expert concerns from the results of the recently
published IBM X-Force report, which is fully available only on
registration.
According
to this mainly plays a role that mobile phone manufacturers are too
slow with their security updates, but at the same time more and more
frolic and private devices in corporate networks - key word "Bring your
own device". This in turn means that the market for malicious code developers will be more interesting. The majority of malware today come primarily through third-party app stores into the circulation. The
malicious programs are mainly targeted at SMS premium services, whose
fees are then pushed under the attacked, as well as the collection of
personal information that an attacker can abuse as a result of phishing
attacks and identity thefts. The IBM researchers predict based on current numbers, a doubling of mobile attacks until the end of the year.
Further reported that X-Force team a tripling of the percentage of critical vulnerabilities. Increasingly complex attacks can be observed, particularly with objective information on strategic. Using sophisticated methods to try and camouflage attacker to gain access to critical networks. This threat refers to the X-Force team as "Advanced Persistent Threats" (short APTs). The
so-called "whaling", the attackers set their methods, especially
against the "big fish" one from the management level of enterprises that
have access to important data. Careful spying followed by targeted phishing campaigns should lead us to success.
The
experts also were able to observe attacks with political backgrounds,
done by so-called "hacktivists", and a quadrupling of the number of
anonymous proxies. This
trend should be monitored closely because, as the X-Force team, these
servers are often used to hide potentially offensive content.
However, some positive results, the report has noted. For
example, the number of Webschwachstellen fell in the first half of 49
to 37 percent and went back for the first time in five years. Web browsers also reported significantly less vulnerabilities than in past years. And finally, through the destruction of some of botnets, the amount of spam and phishing attacks declined sharply. The
results of IBM's reports are based on studies of publicly known
security incidents and the analysis of an average of 12 billion security
events every day since the beginning of this year.
No comments:
Post a Comment