Friday, June 22, 2018
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Chatting With Google Assistant Gets More Natural
Intel CEO Brian Krzanich Resigns After Found to Have Relationship With Employee
Xbox Won't Support VR
AT&T to Launch Wireless Plans Bundled With Video
NVIDIA CEO Springs Special Titan V GPUs on Elite AI Researchers
Samsung Details its 7nm EUV Technology
HDR10+ Technologies Unveil Licensing and Logo Certification Program
Samsung SDI Unveils New Residential ESS Module
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
Help make DVDInfoPro better with dvdinfomantis!!!
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > General Computing > F-Secur...
Last 7 Days News : SU MO TU WE TH FR SA All News

Friday, June 26, 2009
F-Secure Releases Its IT Security Wrap-Up for the Second Quarter of 2009

Highlights from the quarter include president Barack Obama?s major speech on cybersecurity, the huge interest in the Conficker worm and social networking Sites, as Well as growth in PDF exploits, according to F-Secure.

Security service provides F-Secure today released its IT Security Wrap-Up Report for the second quarter of 2009. Key highlights include:

President Obama puts spotlight on cybersecurity
"So cyberspace is real. And so are the risks that come with it." These were the words of President Barack Obama on May 29, 2009 as he announced a new strategy to secure America's information and communications networks. F-Secure welcomes the fact that the Obama Administration is taking cybersecurity seriously on the national level and welcomes the new Cybersecurity Coordinator as a partner in the fight against eCrime. A strong advocate of establishing 'Internetpol,' F-Secure is committed to international cooperation and also encourages an increased focus on developing an offensive capability against online criminals.

Conficker worm
The threat landscape in the first half of 2009 was dominated by the Conficker worm, which has proved to be the most significant malware outbreak in recent years. The Conficker Working Group?s successful collaboration is an example of effective international cooperation within the Internet security industry. Conficker created a great deal of media interest, especially around April 1, 2009, when the Conficker C variant was due to activate. In fact, the Conficker B variant spread most widely and infected millions of computers worldwide. The Conficker case once again demonstrated the emotional interest in virus outbreaks. While media interest has waned, the Conficker worm is still out there and there are still no answers as to what it was designed to do.

News, tweets and malware
Social networking websites have continued to grow in the first half of 2009, which makes them increasingly attractive targets. The first Twitter worm and spam outbreak occurred in April, created by a hobbyist calling himself Mikeyy. Then, with online criminals quickly seizing the opportunity, Google searches for "Twitter worm" or "Mikeyy" soon led people to malware sites. Malicious search results about popular news stories are very common. More than ever, social networking sites are both making the news and breaking the news ? and, in the process, they?re creating fast-spreading security problems that need to be addressed.

PDF files used for targeted attacks
F-Secure?s research shows that PDF files have become the most popular file type in targeted attacks during the first half of 2009. Last year the most commonly used file type for targeted attacks was Microsoft Word?s DOC. Adobe has responded with a quarterly response cycle due to the growth in PDF exploits.

For the full F-Secure IT security threat summary for the second quarter of 2009, visit

Next to Provide Access to Digital Hollywood Hits on PCs and Connected Devices        All News        Asus Brings New G51 and G60 Gaming Notebooks to Provide Access to Digital Hollywood Hits on PCs and Connected Devices     General Computing News      IBM Researcher Discovers Method to Fully Process Encrypted Data Without Knowing its Content

Get RSS feed Easy Print E-Mail this Message

Related News
Cisco Identifies Virus That Kills Off PCs
Researchers Identify iOS Espionage App
Researchers Identify New iOS Vulnerability
Dropbox, WordPress Used To Spread Malware
Microsoft Says Viruses Are Back On The Rise
First Targeted Attack Utilising Malware for Android Devices Reported
Cyber Attack Targets Nato, Government Websites
Stuxnet Roots Found Back in 2005
Java Exploit Behind "Red October" Cyber Attacks
FTC Warns Small Businesses Of Spam Email
Kaspersky Says 'Red October' Virus Has Been Targeting Diplomatic and Government Agencies
Kaspersky Discovers New version Of Flams Virus

Most Popular News
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2018 - All rights reserved -
Privacy policy - Contact Us .