Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

IT Security predictions from AppRiver

AppRiver : 15 January, 2010  (Technical Article)
Security-as-a-Service Provider AppRiver reviews the threats of 2009 and looks towards 2010 to predict what trends will occur then
AppRiver, a provider of e-mail messaging and Web security solutions, has released its year-end spam and virus report, State of Security 2009, along with its forward-looking Threat and Spamscape Forecast for 2010. The reports highlight spam and security trends from 2009, as well as key predictions for 2010.


AppRiver Senior Security Analyst Fred Touchette observes that 2009 was an active year for cybercrime, spam and both software and Web vulnerabilities. Highlights include:

* Phishing remained a consistent threat with several campaigns targeting social networking sites and mimicking major banks, as well as the Internal Revenue Service, to dupe consumers at tax time

* Spammers exploited major current events such as the H1N1 flu outbreak and Michael Jackson's death

* Data breaches rocked Heartland and Countrywide

* Botnets like Conficker and Waledac made frequent headlines

"2009 brought the return of Conficker, which turned out to be the biggest un-used Botnet of the year," says Touchette. "It resurged quickly and spread fast, but its threat level paled in comparison to the lesser-discussed ZeuS Trojan, often from the Pushdo bot, which goes right for victims' banking credentials. The profit potential is huge for cybercriminals as Do-it-Yourself ZeuS Trojan kits are widely available on the black market for as little at $400."

AppRiver reports that e-mail-borne virus activity peaked in October 2009. During that month, AppRiver's spam filters quarantined an average seven million virus messages per day. Europe remained top region for spam origin in 2009, though Brazil topped the list of spam-producing countries with nine billion spam messages in 2009. Also noteworthy was the rise in spam output from Korea, which doubled in 2009 over 2008.

In 2010, Touchette believes mobile, cloud and zero-day attacks will continue to increase. Highlights from AppRiver's 2010 threat forecast include:

* Personal data is very lucrative in the underground economy, and just as it was in 2009, it will continue to be a target for cybercriminals in 2010. Expect to see more custom malware designed for very specific purposes such as intercepting credit card purchase transactions and cardholder information.

* The cloud will continue to be a target. Malware authors have already begun to host malicious code on major cloud based servers (e.g. Amazon's EC2). Expect to see more of this as well as attacks against the cloud itself, namely Google Wave this year.

* Although still a niche market, anti-virus products for smart phones often offer full data back-up in case of loss or damage as a part of their service. This info is stored on the cloud. These companies may see targeted attacks against stored personal information.
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo