Evolution of Security
Evolution of IT Security
Evolution of IT Security
The explosive growth of mobile apps has attracted a criminal element looking for new ways to distribute malware that can be used to commit fraud, identity theft and steal confidential data. Malicious apps are an effective way to infect users, since they often exploit the trust people have in brands and companies they do business with.
Biggest Cyber Takedown in History
On November 8, a long-living botnet of more than 4,000,000 bots was taken down by the FBI and Estonian police in cooperation with Trend Micro a leader in the field of IT Security. This operation was known as Operation Ghost Click. As part of Operation Ghost Click two data centres located in New York and Chicago were raided and a command & control (C&C) infrastructure consisting of more than 100 servers was taken offline. At the same time the Estonian police arrested several members.
This e botnet consisted of infected computers whose Domain Name Server (DNS) settings were changed to point to foreign IP addresses. DNS servers resolve human readable domain names to IP addresses that are assigned to computer servers on the Internet. Most Internet users automatically use the DNS servers of their Internet Service Provider.
DNS-changing Trojans silently modify computer settings to use foreign DNS servers. These DNS servers are set up by malicious third parties and translate certain domains to malicious IP addresses. As a result, victims are redirected to possibly malicious websites without detection.
A variety of methods of monetizing the DNS Changer botnet is being used by criminals, including replacing advertisements on websites that are loaded by victims, hijacking of search results and pushing additional malware
NEW Titanium Internet Security 2012
Advanced protection for your family – All the features of Titanium Antivirus Plus, plus:
|DATA THEFT PREVENTION
Safely bank and shop online
Easily protect your children online
|2 GB Online Storage
Protect, access and share your photo's, documents and more with a 2 GB SafeSync account
NEW Titanium Maximum Security 2012
All in One Security – All the features of Titanium Internet Security, plus:
|SOCIAL NETWORK SECURITY
Protects you from malicious link on social networking sites like Facebook, MySpace and Twitter
|WORKS WITH ANDROID
Extend your protection to your Android devices
|10 GB ONLINE STORAGE
Protect, access and share your photo's, documents and more with a 10 GB SafeSync account
Deep Security By Trend Micro
Trend Micro Deep Security provides advanced protection for systems in the cloud. Deep Security combines intrusion detection and prevention, firewall, integrity monitoring, log inspection, and agentless anti-malware capabilities to helps prevent data breaches and ensure business continuity. This dynamic, centrally managed solution also supports compliance with important standards and regulations such as PCI, FISMA, and HIPAA.
More and more people own internet-ready mobile devices, which without you realising it can increasing your exposure to cyber and real-life criminals.
Did you know that the GPS functions on many smart phones that allow you to tell your friends where you are via website like Facebook can also tell criminals where you are so that they know when you are out it they are planning to burgle you home.
The Stuxnet Worm was first discovered in July 2010 by a security firm in Belarus, but did not make global headlines until months later when Iranian state media announced the Middle East nation had been the target of a coordinated attack.
The Stuxnet worm was "the first of its kind. It was written to specifically target mission critical control systems running a specific combination of software and hardware.
There are a lot of concerns that the Stuxnet worm could be altered to attack key components of any nation's infrastructure, from electricity grids to oil rigs.
Many experts believe that the Stuxnet worm was only the beginning of a new kind of cyber attacks against critical infrastructure.
It’s quite possible the in 2011 or 2012 that we will see copycat versions of Stuxnet been used by terrorists to try and cripple the infrastructure of some of the major powers.
According to a study from McAfee, cyber thieves are increasingly targeting intellectual property. Some attackers are specializing in stealing data from corporate computer systems. In particular, information thieves seem to be looking for trade secrets, research and development reports, marketing plans and source code. The report also noted that many companies are not taking adequate measures to protect information and are not going public with news of data security breaches. Of the companies that reported experiencing a data security breach, just half said they had taken steps to improve cyber security.
NSS Labs, Inc., a leading independent security testing organization, announced the release of two test reports of Endpoint Protection Products (EPP). The reports reveal new shortcomings in these widely deployed products. They cover multi-vector attacks (malware delivered from the web, email, network file sharing and USB flash drives), memory-only attacks, and anti-evasion techniques.
Key findings from the reports show:
All of the products tested had been certified by multiple organizations. However, traditional antivirus test and certification labs are simply not performing this level of gloves-off testing. Enterprises basing purchasing decisions off such vendor-funded reports are therefore blind to the holes in their endpoint security defences.
“IT organizations worldwide have a false sense of security in part due to tests that have been too easy,” said Vik Phatak, CTO, NSS Labs. “Our test results point towards the need for more realistic testing based on what cybercriminals are actually doing to breach corporate defences.”
Attackers have infected over 1 million cell phones in China with a malware virus. The virus sends out text messages automatically. When the malware infects the phones, it sends out information about the infected device SIM cards to the attackers. With the SIM information, the hacker can remotely send messages from the infected mobile phones.
The criminal behind this virus appear to be using this as way to make money because the phones are texting premium-rate numbers.
The virus spreads by texting everyone in the user’s phone book. So far it has been estimates that this virus has cost users over €220,000 Euro