Select language:    Bookmark and Share  
Home   Buy now   Screenshots   Compare   Download   Support   Partners   Contact
Product Info
Overview
Live video demos
Report & Management Live Demo
Screenshots
Editions Comparison
Why MyUSBOnly
Report & Management New!
Version History
Download free trial
See our clients
 
Ordering
Pricing
Buy now
Locate a local reseller
Purchase orders
Volume discounts
 
Support
Lost registration key
Online manual
Translations
Security news
Contact us
 


Security Trends 2008 review and 2009 forecast

By Bernard Kwok

To better appreciate the challenges all companies will face in 2009, its probably best that we look at what we had to face up in 2008. So here is my roundup of the worst security offenders of 2008:

The best of the worst in 2008

1. New Malware Variants or Families of Threats – Attackers have shifted away from mass distribution of a small number of threats to micro distribution of large families of threats. These new strains of malware consist of millions of distinct threats that mutate as they spread rapidly. The Trojan.Farfli, which was first discovered in July 2007 is one such family of threats that has exhibited these characteristics.

2. Fake and Misleading Applications – Fake security and utility programs, also known as “scareware” promise to secure or clean up a user’s computer. These programs are installed along with a Trojan horse program, produce false or misleading results, and hold the affected PC hostage until the user pays to remedy the pretend threats.

3. Web-based Attacks – Trusted Web sites are the focus of a large portion of malicious activity. In 2008, Symantec has observed that the Web is now the primary conduit for attack activity.

4. Underground Economy – The Underground Economy has matured into an efficient, global marketplace in which stolen goods and fraud-related services worth billions of dollars are regularly bought and sold. From July 2007 to June 2008, Symantec researchers found the value of total advertised goods on underground economy servers observed was more than $276 million.

5. Data Breaches – The continued high volume of data breaches underscored the importance of data loss prevention technologies and strategies. With mergers, acquisitions and layoffs more common in today’s economic climate, data loss prevention becomes increasingly important in protecting the sensitive information, including intellectual property, of a company.

6. SPAM – “Two years from now, spam will be solved,” said Bill Gates in 2004. In 2008, we were seeing spam levels at 76 percent until the McColo incident in November 2008, at which time spam levels dropped 65 percent. While antispam filters have become more sophisticated in the last year, and spam threats have emerged and dissipated, it is clear that spammers are not giving up the spam fight.

7. Phishing - Phishing continued to be active in 2008. Attackers are using current events such as the 2008 U.S. presidential election to make their “bait” more convincing and employing more efficient attacking techniques and automations. Phishing tookits also continue to contribute to the problem.

8. Browser or Plug-in Vulnerabilities – Site-specific vulnerabilities are often used in association with browser plug-in vulnerabilities, which are useful for conducting sophisticated Web-based attacks.

And now for a look at what's in store for us in 2009. Below are what I predict will be the winners in the category of bad security trends:

2009 Security Predictions

1. Explosion of Malware Variants – Recent attacks include new strains of malware which consist of millions of distinct threats that propagate as a single, core piece of malware. This creates an unlimited number of unique malware instances. The sensor data obtained via the Symantec Global Intelligence Network also shows we have reached an inflection point. There are now more malicious programs created than legitimate programs. These new and emerging threats have given rise to the need for new, complementary detection methods such as reputation-based security approaches.

2. Advanced Web Threats – As the number of available Web services increases and as browsers continue to converge on a uniform interpretation standard for scripting languages, Symantec expects the number of new Web-based threats to continue to increase.

3. Economic Crisis – The global economic crisis will be the basis of many new attacks. This will include phishing attacks (e.g. whose fictitious premise might surround the closing of a given bank). Similarly, attacks may also exploit other types of fraudulent activity such as around economic issues including e-mails that promise the ability to easily get a mortgage or refinance. Expect to see an increase in scams that prey on people who have had homes foreclosed, an increase in work from home scams targeting the unemployed, and an increase in spam that mimics job sites.

4. Social Networks – In 2008, we’ve noticed an uptick in activity in threats related to social networking sites. These threats have involved phishing for username accounts and/or using social context as a way to increase the “success rate” of an online threat. Spammers in select EMEA regions have been heavily promoting social networking sites – one instance reached more than 2 million Symantec customers. These threats will become increasingly important for enterprise IT organizations since the new entering workforce often accesses these tools using corporate resources.

5. Spam Levels Will Rise – Symantec saw a 65 percent drop in spam between the 24 hours prior to the McColo shutdown and 24 hours after. We expect to see spam levels rise back to approximately 75 to 80 percent. Command-and-control systems will be re-established and more importantly, this event may drive spammers toward the continued use of peer-to-peer botnets, which are generally more resilient. In this turbulent economic climate there may be other hosting companies around the world who might be willing to facilitate this sort of spam activity.

6. Virtual Machine Security – Virtualization technology will be incorporated into security solutions to provide an environment isolated and protected from the chaos of a general purpose operating system environment. This technology will provide a safe environment for sensitive transactions such as banking and protect critical infrastructure such as the security components that protect the general purpose operating environment.


 

SATISFACTION
GUARANTEED!

 

We offer you a 30-day unconditional money back guarantee! 100% satisfaction or your money back.

 

SYSTEM
REQUIREMENTS

 

Microsoft Windows XP, Server 2003, Vista, 7, 8, 10, Server 2008 - MyUSBOnly is not a resource-consuming utility.

 

Home | Pricing | Buy now | Screenshots | Download | Support | Resellers | Affiliates | Pressroom | Contact | About | Sitemap

Copyright © Atombaby Limited. 2002-2018. All Rights Reserved. EULA | Privacy Statement