Saturday, August 29, 2015
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Alienware Brings Liquid Cooling and Dynamic Overclocking to Holiday Lineup
Razer Launches Wildcat Xbox One Controller And Upgraded Nabu Smartband
Workstation Market Shippments Rebound In Q2
Google Will Help You Find Your Plumber
IFA 2015: What We Know So Far
Acer Liquid Z410 And Liquid Jade Z Phones Released
Huawei Honor Phones Coming To Europe
AMD Radeon R9 370X Graphics Card Launched In Asia
Active Discussions
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
How to burn a backup copy of The Frozen Throne
Help make DVDInfoPro better with dvdinfomantis!!!
Copied dvd's say blank in computer only
menu making
Optiarc AD-7260S review
 Home > News > General Computing > F-Secur...
Last 7 Days News : SU MO TU WE TH FR SA All News

Friday, June 26, 2009
F-Secure Releases Its IT Security Wrap-Up for the Second Quarter of 2009


Highlights from the quarter include president Barack Obama?s major speech on cybersecurity, the huge interest in the Conficker worm and social networking Sites, as Well as growth in PDF exploits, according to F-Secure.

Security service provides F-Secure today released its IT Security Wrap-Up Report for the second quarter of 2009. Key highlights include:

President Obama puts spotlight on cybersecurity
"So cyberspace is real. And so are the risks that come with it." These were the words of President Barack Obama on May 29, 2009 as he announced a new strategy to secure America's information and communications networks. F-Secure welcomes the fact that the Obama Administration is taking cybersecurity seriously on the national level and welcomes the new Cybersecurity Coordinator as a partner in the fight against eCrime. A strong advocate of establishing 'Internetpol,' F-Secure is committed to international cooperation and also encourages an increased focus on developing an offensive capability against online criminals.

Conficker worm
The threat landscape in the first half of 2009 was dominated by the Conficker worm, which has proved to be the most significant malware outbreak in recent years. The Conficker Working Group?s successful collaboration is an example of effective international cooperation within the Internet security industry. Conficker created a great deal of media interest, especially around April 1, 2009, when the Conficker C variant was due to activate. In fact, the Conficker B variant spread most widely and infected millions of computers worldwide. The Conficker case once again demonstrated the emotional interest in virus outbreaks. While media interest has waned, the Conficker worm is still out there and there are still no answers as to what it was designed to do.

News, tweets and malware
Social networking websites have continued to grow in the first half of 2009, which makes them increasingly attractive targets. The first Twitter worm and spam outbreak occurred in April, created by a hobbyist calling himself Mikeyy. Then, with online criminals quickly seizing the opportunity, Google searches for "Twitter worm" or "Mikeyy" soon led people to malware sites. Malicious search results about popular news stories are very common. More than ever, social networking sites are both making the news and breaking the news ? and, in the process, they?re creating fast-spreading security problems that need to be addressed.

PDF files used for targeted attacks
F-Secure?s research shows that PDF files have become the most popular file type in targeted attacks during the first half of 2009. Last year the most commonly used file type for targeted attacks was Microsoft Word?s DOC. Adobe has responded with a quarterly response cycle due to the growth in PDF exploits.

For the full F-Secure IT security threat summary for the second quarter of 2009, visit www.f-secure.com/2009/.


Previous
Next
Zip.ca to Provide Access to Digital Hollywood Hits on PCs and Connected Devices        All News        Asus Brings New G51 and G60 Gaming Notebooks
Zip.ca to Provide Access to Digital Hollywood Hits on PCs and Connected Devices     General Computing News      IBM Researcher Discovers Method to Fully Process Encrypted Data Without Knowing its Content

Get RSS feed Easy Print E-Mail this Message

Related News
Cisco Identifies Virus That Kills Off PCs
Researchers Identify iOS Espionage App
Researchers Identify New iOS Vulnerability
Dropbox, WordPress Used To Spread Malware
Microsoft Says Viruses Are Back On The Rise
First Targeted Attack Utilising Malware for Android Devices Reported
Cyber Attack Targets Nato, Government Websites
Stuxnet Roots Found Back in 2005
Java Exploit Behind "Red October" Cyber Attacks
FTC Warns Small Businesses Of Spam Email
Kaspersky Says 'Red October' Virus Has Been Targeting Diplomatic and Government Agencies
Kaspersky Discovers New version Of Flams Virus

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2015 - All rights reserved -
Privacy policy - Contact Us .