opening-skew

Go back

masking

Sophos Security Threat Report Available

IT security and data protection company Sophos today unveiled its latest Security Threat Report2012, a detailed assessment of the threat landscape—from Hacktivism and online threats to mobile malware, cloud computing and social network security, as well as IT security trends for this coming year. The full, ungated report is available for download from the Sophos website.

A Sophos poll, conducted online at the end of 2011, surveyed more than 4,300 global respondents about today’s biggest threats on the Internet. Key findings from the research include:

  • 61 percent feel that users not doing enough to protect themselves is the biggest threat on the Internet
  • Nearly 20 percent believe social networking scams are the top threat
  • 67 percent think that malware is on the rise compared to in 2010

Year in Review: Under Attack

2011 was characterized by a rise in cybercrime. The availability of commercial tools designed by cybercriminals for cybercriminals made mass generation of new malicious code campaigns and exploits trivial and scalable; the net result was significant growth in the volume of malware and infections. Cybercriminals diversified their targets to include new platforms, as business use of mobile devices accelerated. Politically motivated “hacktivist” groups took the media spotlight, even as the more common threats to cyber security grew.

Hype over Hacktivism

In 2011, the emergence of LulzSec and Anonymous marked a shift from hacking for financial gain to hacking as a form of protest. Hacktivists sowed chaos by leaking documents and attacking websites of high-profile organizations and even defense contractors. LulzSec dominated headlines in the first half of the year with attacks on Sony, PBS, the U.S. Senate, the CIA, FBI affiliate InfraGard and others, and then disbanded after 50 days.

Risky Business

Increasingly, corporate users weren’t just at home or at work, but somewhere else on the “everywhere network.” And the consumerization of IT, sometimes called “bring your own device” or BYOD, became one of the newer causes of data vulnerability. Employees accessed sensitive corporate information from their home computers, smartphones and tablets. Moreover, corporate-issued mobile devices increased risk, as did the rise of cloud services and the use of social media.

According to the Sophos online poll, which asked users if their company allows personal laptops, desktops or phones for work, nearly 50 percent of respondents said yes. Another 10 percent who said no preferred otherwise.

Changing Web Threats and Drive-by Downloads

Cybercriminals constantly launched attacks designed to penetrate digital defenses and steal sensitive data. And almost no online portal proved immune from threat or harm. SophosLabs identifies an average of 30,000 newly-infected web pages each day. More than 80 percent of these web pages are on innocent web servers, which have been hacked by cybercriminals to make them part of the problem.

Additionally, 85 percent of all malware, including viruses, worms, spyware, adware and Trojans, comes from the web, according to the Ponemon Institute. Today, drive-by downloads have become the top web threat, and in 2011, one crimeware kit, known as “Blackhole,” rose to the number one on that list.

In the Sophos online poll, users were asked about the prevalence of malware compared to 2010; 67 percent of respondents felt it was on the rise.

OS Oh My! And the Emergence of Mac Malware

Windows may be the most attacked OS, but the primary vectors for hacking Windows have been through PDF or Flash.13 Despite Microsoft’s regular updates to patch Windows OS vulnerabilities, the content delivery systems remained the largest vulnerability on any OS. In 2011, the emergence of malware for the Mac upstaged Windows malware. There’s no doubt that the Windows malware problem is much larger than the Mac threat, but the events of 2011 show Mac users that the malware threat is genuine.

Top Trends

There are many factors that will impact the IT security landscape this year and into the future. These include new attacks using social media platforms and integrated apps, more targeted attacks on non-Windows platforms, and mobile payment technologies under threat, among others, which are highlighted within the report.

“As cybercriminals expand their focus, organizations are challenged to keep their security capabilities from backsliding as they adopt new technologies,” said Mark Harris, vice president of SophosLabs, Sophos. “And as we continue to access information in different ways, from different devices in different locations, security tools must be able to ‘protect everywhere’—from desktops to mobile and smart devices and the cloud. But more importantly and oft-disregarded, cybercriminals will continue to stalk the easiest prey— security basics like patching and password management will remain a significant challenge.”

The full Security Threat Report 2012 contains much more information and statistics on cybercrime in 2011, as well as top tips and predictions for emerging trends. The report can be downloaded free of charge from the Sophos website.

Share it:

closing-skew

Leave a Reply

Your email address will not be published. Required fields are marked *

Skewed-grey-square

NEW BUSINESS INQUIRIES

JOIN OUR TEAM?

MEDIA INQUIRIES?

Do you want to increase the effect of your communications and the impact on your business?

Do not wait. Contact us now.

By opting in (I agree) I acknowledge the Sound PR Privacy Policy (provided below) subject to the terms of the article 13 of the EU Regulation n° 2016/679 laying down provisions for the protection of my personal data from Sound Public Relations Srl and, knowingly:


to the processing of my personal data for the purposes indicated thereof.

Privacy Policy

Are you resourceful, proactive, results oriented and looking for a position in which to grow and develop your talent?

Join our team. Look at our open positions or directly send us your resume.

Upload your CV (Max 1MB)


By opting in (I agree) I acknowledge the Sound PR Privacy Policy (provided below) subject to the terms of the article 13 of the EU Regulation n° 2016/679 laying down provisions for the protection of my personal data from Sound Public Relations Srl and, knowingly:


to the processing of my personal data for the purposes indicated thereof.

Privacy policy

Want to learn more about Sound PR and / or our customers?

Do not wait. Contact us now.

By opting in (I agree) I acknowledge the Sound PR Privacy Policy (provided below) subject to the terms of the article 13 of the EU Regulation n° 2016/679 laying down provisions for the protection of my personal data from Sound Public Relations Srl and, knowingly:


to the processing of my personal data for the purposes indicated thereof.

Privacy Policy