Welcome!

AJAX & REA Authors: Pat Romanski, Elizabeth White, Liz McMillan, Plutora Blog, Ram Sonagara

News Feed Item

Confidential Business Information Prime Target for Cyber-Thieves, According to PandaLabs Q3 Report

Report shows that theft of confidential business information is on the rise; three out of every four malware infections are caused by Trojans

ORLANDO, Fla., Dec. 3, 2012 /PRNewswire/ -- PandaLabs, Panda Security's anti-malware laboratory, today published its Quarterly Report for Q3, analyzing the IT security events and incidents from July through September 2012. The third quarter of the year has seen an increase in the number of hacking attacks on major companies aimed to gain access to confidential and personal information. The quarterly report can be downloaded from: http://press.pandasecurity.com/press-room/reports/.

There are many instances of cybercriminal activity from the past quarter. Dropbox suffered a huge security breach that led to theft of usernames and passwords from thousands of users. American video game developer Blizzard confirmed in August that it had suffered a security breach where hackers were able to obtain users' email addresses and encrypted passwords. The company urged users to change the login credentials to its online gaming service Battle.net. In September, it was revealed that Adobe had also been attacked by hackers. In this case, the attackers accessed one of Adobe's internal servers to be able to sign their malware with a valid digital certificate from the company.

Three Out of Every Four Malware Infections Are Caused by Trojans
Trojans continued to account for most of the new threats created this quarter, by far. Trojans constituted 72.58 percent of all new malware, while viruses constituted 14.47 percent and worms 10.53 percent. When it comes to the number of infections caused by each malware category, the ranking supports the hierarchy of new samples in circulation, with Trojans accounting for three out of every four infections, followed by worms and viruses. Here are visuals depicting these trends: http://press.pandasecurity.com/wp-content/uploads/2012/11/NEWMALWARE.jpg and http://press.pandasecurity.com/wp-content/uploads/2012/11/MALWARE-INFECTIONS.jpg.

"It is obvious that malware writers have standardized their infection techniques, since what we have seen in Q3 is a continuation of the trends we saw over the first half of the year," said Luis Corrons, technical director of PandaLabs. "Trojans once again have accounted for almost 80 percent of infections, and continue to be the preferred category for cyber-criminals to carry out information theft. All this confirms cyber-crooks' first objective: to make money from their creations."

China Tops List of Infections per Country
The average number of infected PCs across the globe stands at 30.68 percent. China once again takes the top spot of most infections per country (53.17 percent of infected PCs), followed by South Korea (52.77 percent), comprising the only nations with more than 50 percent of computers infected. The list of top ten most infected countries is made up of nations from almost every part of the world: Asia, Europe, South America, and Africa. Here's a graph representing the countries with most malware-infected computers:
http://press.pandasecurity.com/wp-content/uploads/2012/11/COUNTRIESINFECTED.jpg.

Eight of the ten least infected countries are in Europe with the only exceptions being Canada and Australia. The country with the fewest infections is Ireland (20 percent of infected PCs), followed by Norway (20.16 percent), and Sweden (22.46).Here's a graph representing the countries with the fewest infections: http://press.pandasecurity.com/wp-content/uploads/2012/11/COUNTRIESLESSINFECTED.jpg.

"The list of least infected countries is dominated by some of the world's most technologically advanced nations," said Corrons. "This is due to the fact that these countries are more aware of the importance of the fight against cyber-crime and are more willing to take the measures necessary to stop infections."

The Quarter at-a-Glance
In the report, PandaLabs highlights several top security incidents that occurred during Q3, including a number of cyber-espionage attacks aimed at journalists in different parts of the world. The report also covers the latest hacker attacks on mobile platforms. Android has become a prime target as Google announced that users have activated half a billion Android devices. It is obvious that profit-motivated hackers will increasingly turn their attention to this platform due to its growing installed base.

PandaLabs advises all users to keep their computers adequately protected with a solution like Panda Security's free Panda Cloud Antivirus.

About PandaLabs
Since 1990, PandaLabs, Panda Security's malware research laboratory, has been working to detect and classify malware in order to protect consumers and companies against new Internet threats. To do so, PandaLabs uses Collective Intelligence, a cloud-based proprietary system that leverages the knowledge gathered from Panda's user community to automatically detect, analyze and classify the more than 73,000 new malware strains that appear every day. This automated malware classification is complemented through the work of an international team with researchers specialized each in a specific type of malware (viruses, worms, Trojans, spyware and other attacks) to provide global coverage. Get more information about PandaLabs and subscribe to its blog news feed at http://www.pandalabs.com/. Follow Panda on Twitter at http://twitter.com/Panda_Security and on Facebook at http://www.facebook.com/PandaSecurity.

SOURCE Panda Security

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@CloudExpo Stories
The Industrial Internet revolution is now underway, enabled by connected machines and billions of devices that communicate and collaborate. The massive amounts of Big Data requiring real-time analysis is flooding legacy IT systems and giving way to cloud environments that can handle the unpredictable workloads. Yet many barriers remain until we can fully realize the opportunities and benefits from the convergence of machines and devices with Big Data and the cloud, including interoperability, ...
Building low-cost wearable devices can enhance the quality of our lives. In his session at Internet of @ThingsExpo, Sai Yamanoor, Embedded Software Engineer at Altschool, provided an example of putting together a small keychain within a $50 budget that educates the user about the air quality in their surroundings. He also provided examples such as building a wearable device that provides transit or recreational information. He then reviewed the resources available to build wearable devices at ...
The move in recent years to cloud computing services and architectures has added significant pace to the application development and deployment environment. When enterprise IT can spin up large computing instances in just minutes, developers can also design and deploy in small time frames that were unimaginable a few years ago. The consequent move toward lean, agile, and fast development leads to the need for the development and operations sides to work very closely together. Thus, DevOps become...
An entirely new security model is needed for the Internet of Things, or is it? Can we save some old and tested controls for this new and different environment? In his session at @ThingsExpo, New York's at the Javits Center, Davi Ottenheimer, EMC Senior Director of Trust, reviewed hands-on lessons with IoT devices and reveal a new risk balance you might not expect. Davi Ottenheimer, EMC Senior Director of Trust, has more than nineteen years' experience managing global security operations and asse...
DevOps is all about agility. However, you don't want to be on a high-speed bus to nowhere. The right DevOps approach controls velocity with a tight feedback loop that not only consists of operational data but also incorporates business context. With a business context in the decision making, the right business priorities are incorporated, which results in a higher value creation. In his session at DevOps Summit, Todd Rader, Solutions Architect at AppDynamics, discussed key monitoring techniques...
The Internet of Things is not new. Historically, smart businesses have used its basic concept of leveraging data to drive better decision making and have capitalized on those insights to realize additional revenue opportunities. So, what has changed to make the Internet of Things one of the hottest topics in tech? In his session at @ThingsExpo, Chris Gray, Director, Embedded and Internet of Things, discussed the underlying factors that are driving the economics of intelligent systems. Discover ...
High-performing enterprise Software Quality Assurance (SQA) teams validate systems that are ready for use - getting most actively involved as components integrate and form complete systems. These teams catch and report on defects, making sure the customer gets the best software possible. SQA teams have leveraged automation and virtualization to execute more thorough testing in less time - bringing Dev and Ops together, ensuring production readiness. Does the emergence of DevOps mean the end of E...
Mobile commerce traffic is surpassing desktop, yet less than 20% of sales in the U.S. are mobile commerce sales. In his session at 15th Cloud Expo, Dan Franklin, Segment Manager, Commerce, at Verizon Digital Media Services, defined mobile devices and discussed how next generation means simplification. It means taking your digital content and turning it into instantly gratifying experiences.
The Domain Name Service (DNS) is one of the most important components in networking infrastructure, enabling users and services to access applications by translating URLs (names) into IP addresses (numbers). Because every icon and URL and all embedded content on a website requires a DNS lookup loading complex sites necessitates hundreds of DNS queries. In addition, as more internet-enabled ‘Things' get connected, people will rely on DNS to name and find their fridges, toasters and toilets. Acco...
We certainly live in interesting technological times. And no more interesting than the current competing IoT standards for connectivity. Various standards bodies, approaches, and ecosystems are vying for mindshare and positioning for a competitive edge. It is clear that when the dust settles, we will have new protocols, evolved protocols, that will change the way we interact with devices and infrastructure. We will also have evolved web protocols, like HTTP/2, that will be changing the very core...
Enthusiasm for the Internet of Things has reached an all-time high. In 2013 alone, venture capitalists spent more than $1 billion dollars investing in the IoT space. With "smart" appliances and devices, IoT covers wearable smart devices, cloud services to hardware companies. Nest, a Google company, detects temperatures inside homes and automatically adjusts it by tracking its user's habit. These technologies are quickly developing and with it come challenges such as bridging infrastructure gaps,...
Between the compelling mockups and specs produced by your analysts and designers, and the resulting application built by your developers, there is a gulf where projects fail, costs spiral out of control, and applications fall short of requirements. In his session at DevOps Summit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, will present a new approach where business and development users collaborate – each using tools appropriate to their goals and expertise – to build mo...
NuoDB just introduced the Swifts 2.1 Release. In this demo at 15th Cloud Expo, Seth Proctor, CTO of NuoDB, Inc., discussed why scaling databases in the cloud is challenging, why building your application on top of the infrastructure that is designed with this in mind makes a difference, and what you can do with NuoDB that simplifies your programming model, your operations model.
"For the past 4 years we have been working mainly to export. For the last 3 or 4 years the main market was Russia. In the past year we have been working to expand our footprint in Europe and the United States," explained Andris Gailitis, CEO of DEAC, in this SYS-CON.tv interview at Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
“We are a managed services company. We have taken the key aspects of the cloud and the purposed data center and merged the two together and launched the Purposed Cloud about 18–24 months ago," explained Chetan Patwardhan, CEO of Stratogent, in this SYS-CON.tv interview at 15th Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
The 4th International DevOps Summit, co-located with16th International Cloud Expo – being held June 9-11, 2015, at the Javits Center in New York City, NY – announces that its Call for Papers is now open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's large...
“The year of the cloud – we have no idea when it's really happening but we think it's happening now. For those technology providers like Zentera that are helping enterprises move to the cloud - it's been fun to watch," noted Mike Loftus, VP Product Management and Marketing at Zentera Systems, in this SYS-CON.tv interview at Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Today’s enterprise is being driven by disruptive competitive and human capital requirements to provide enterprise application access through not only desktops, but also mobile devices. To retrofit existing programs across all these devices using traditional programming methods is very costly and time consuming – often prohibitively so. In his session at @ThingsExpo, Jesse Shiah, CEO, President, and Co-Founder of AgilePoint Inc., discussed how you can create applications that run on all mobile ...
"SOASTA built the concept of cloud testing in 2008. It's grown from rather meager beginnings to where now we are provisioning hundreds of thousands of servers on a daily basis on behalf of customers around the world to test their applications," explained Tom Lounibos, CEO of SOASTA, in this SYS-CON.tv interview at DevOps Summit, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
"Verizon Digital Media Services is responsible for the broadcast, video and content delivery network that accelerates, scales and helps our customers reach end users with all kinds of video and web content," stated James Segil, CMO of Verizon Digital Media Services, in this SYS-CON.tv interview at 15th Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.