Wednesday, December 07, 2016
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
U.S. Supreme Court Rules in Favor of Samsung in Smartphone Patent Suit
TSMC And IBM Detail Their 7nm Progress At 2016 IEDM
Oculus Touch Now Available
European Commission Approves Acquisition of LinkedIn by Microsoft, Subject to Conditions
Google To Go Completely Green Using Renewable Energy Only
Yahoo's 2016 Top Searched Celebrities, News Stories, Fashion Trends, and More
Western Digital Introduces Enterprise-Class HDDs and SSDs, 14TB SMR HDDs On The Way
HARMAN Invests in Navdy and Partners to Offer Aftermarket Augmented Reality Driving Device
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
Help make DVDInfoPro better with dvdinfomantis!!!
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > General Computing > Microso...
Last 7 Days News : SU MO TU WE TH FR SA All News

Wednesday, April 08, 2009
Microsoft Security Intelligence Report Shows Rogue Security Software a Top Threat to Internet Users


Microsoft today released the sixth volume of its Microsoft Security Intelligence Report, which showed a significant increase in rogue security software and evidence that threats are predominantly targeting common third-party desktop applications.

This version of the report also showed that the No. 1 reason for data breaches remains lost and stolen computer equipment.

Released twice a year, the Microsoft Security Intelligence Report uses data gathered from hundreds of millions of computers worldwide to provide a snapshot of the threat landscape. With this volume, which covers the second half of 2008, Microsoft provides more information and insight about threats than ever before by offering new data on document file format attacks, the differences in malware affecting home and business computers, and phishing.

Rogue security software, also known as "scareware," takes advantage of users? desire to keep their computers protected. The rogue software lures them into paying for protection that, unknown to them, is actually malware offering little or no real protection, and is often designed to steal personal information. The Microsoft Security Intelligence Report shows that such programs are now among the top threats around the world. For example, two rogue families, Win32/FakeXPA and Win32/FakeSecSen, were detected on more than 1.5 million computers by Microsoft software, catapulting them into the top 10 threats in the second half of the year. In addition, Win32/Renos, a threat that is used to deliver rogue security software, was detected on 4.4 million unique computers, an increase of 66.6 percent over the first half of 2008.

Rogue security software and other social engineering attacks such as these compromise people?s privacy and are costly; some take personal information and drain bank accounts, while others infect computers and rob businesses of productivity.

"We continue to see an increase in the number of threats and complexity of those threats designed to implement crime at a variety of levels online," said Vinny Gullotto, general manager of the Microsoft Malware Protection Center. "But as Microsoft and the industry continue to improve the security of our products and people become more concerned about their online safety and privacy, we see cybercriminals increasingly going after vulnerabilities in human nature rather than software. By working with others across the industry, Microsoft is helping combat the next generation of online threats through a community-based defense resulting from broad industry cooperation with law enforcement and the public."

The Security Intelligence Report also showed that as software companies have improved the security of their operating systems, attackers have shifted their focus to the application layer, where the majority of vulnerabilities are now being reported; nearly 90 percent of vulnerabilities disclosed in the second half of 2008 affected applications. The report also showed that Microsoft continues to make significant progress in secure software development and that newer versions of Microsoft software are more secure than previous versions.

Finally, the Security Intelligence Report showed that lost and stolen equipment, not computer hacking, continues to be the most common cause of security breaches resulting in data loss publicly reported in the second half of 2008 ? totaling 50 percent of reported incidents. To mitigate this threat, organizations must implement strong data governance practices to help protect data from criminal access.

Microsoft recommends that customers and organizations use the data and prescriptive guidance outlined in the Microsoft Security Intelligence Report to assess and improve their security practices. The proactive steps Microsoft recommends for individuals and businesses include the configuration of computers to use Microsoft Update instead of Windows Update; this will ensure the receipt of security updates for Microsoft Office and other Microsoft applications, as well as security updates for Microsoft Windows operating systems. In addition, these updates should also be enabled when possible for third-party applications. The use of an anti-malware product from a known, trusted source, is also required. But users should be cautious not to follow advertisements for unknown software that appears to provide protection (rogue security software).Users should also avoid opening attachments or clicking on links to documents in e-mail or instant messages that are received unexpectedly or from an unknown source.

On the other hand, enterprise users should ensure that policies are in place to help secure all file shares and regulate the use of removable media, and help control the use of remote management software.

A full list of Microsoft?s guidance, a downloadable version of the Security Intelligence Report, volume 6, and other related information is available at http://www.microsoft.com/sir.


Previous
Next
G.Skill Announces New Trident Series Memory kits for Intel Core i7 Processors        All News        Super Talent Announces 512GB 2.5-Inch SSD
CyberLink PowerDVD 9's TrueTheater Technology Promises HD-like Quality for Standard-Definition DVDs     General Computing News      Samsung to Pay Spansion $70 Million in Cash

Get RSS feed Easy Print E-Mail this Message

Related News
European Commission Approves Acquisition of LinkedIn by Microsoft, Subject to Conditions
Microsoft Is Careful With New Chatbot Zo, Now Available For Testing
Microsoft Offers Grants to Organizations Working to Improve Affordable Internet Access
Microsoft Wants To Bring Something Different in The Smartphone Market
Microsoft's Solitaire Game Now Available On iOS And Android
Microsoft Joins The Linux Foundation, Google Embraces The .NET community
Microsoft Buys 237 Additional Megawatts of Wind Energy
Microsoft Introduces Chat-based Workspace in Office 365
Microsoft Identifies Russia-linked Hackers Exploiting Windows Flaw
Microsoft Researchers Reach Human Parity in Conversational Speech Recognition
Microsoft Cloud Strength Highlights First Quarter Results
Microsoft's Cloud Investments In Europe Hits $3 billion

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2016 - All rights reserved -
Privacy policy - Contact Us .