Breaking News

DJI Breaks Through the Limits of Fixed Aperture with Osmo Action 6 PlayStation’s Black Friday Deals 2025 TerraMaster Black Friday & Cyber Monday 2025 Mega Sale Is Here HighPoint and ASK Corp Redefine 8K Post-Production with Verified 50.5GB/s Gen5 NVMe Storage at Inter BEE 2025 EDIFICE Launches the New ECB-S10 Series

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

F-Secure Releases Its IT Security Wrap-Up for the Second Quarter of 2009

F-Secure Releases Its IT Security Wrap-Up for the Second Quarter of 2009

Enterprise & IT Jun 26,2009 0

Highlights from the quarter include president Barack Obama’s major speech on cybersecurity, the huge interest in the Conficker worm and social networking Sites, as Well as growth in PDF exploits, according to F-Secure. Security service provides F-Secure today released its IT Security Wrap-Up Report for the second quarter of 2009. Key highlights include:

President Obama puts spotlight on cybersecurity
"So cyberspace is real. And so are the risks that come with it." These were the words of President Barack Obama on May 29, 2009 as he announced a new strategy to secure America's information and communications networks. F-Secure welcomes the fact that the Obama Administration is taking cybersecurity seriously on the national level and welcomes the new Cybersecurity Coordinator as a partner in the fight against eCrime. A strong advocate of establishing 'Internetpol,' F-Secure is committed to international cooperation and also encourages an increased focus on developing an offensive capability against online criminals.

Conficker worm
The threat landscape in the first half of 2009 was dominated by the Conficker worm, which has proved to be the most significant malware outbreak in recent years. The Conficker Working Group’s successful collaboration is an example of effective international cooperation within the Internet security industry. Conficker created a great deal of media interest, especially around April 1, 2009, when the Conficker C variant was due to activate. In fact, the Conficker B variant spread most widely and infected millions of computers worldwide. The Conficker case once again demonstrated the emotional interest in virus outbreaks. While media interest has waned, the Conficker worm is still out there and there are still no answers as to what it was designed to do.

News, tweets and malware
Social networking websites have continued to grow in the first half of 2009, which makes them increasingly attractive targets. The first Twitter worm and spam outbreak occurred in April, created by a hobbyist calling himself Mikeyy. Then, with online criminals quickly seizing the opportunity, Google searches for "Twitter worm" or "Mikeyy" soon led people to malware sites. Malicious search results about popular news stories are very common. More than ever, social networking sites are both making the news and breaking the news – and, in the process, they’re creating fast-spreading security problems that need to be addressed.

PDF files used for targeted attacks
F-Secure’s research shows that PDF files have become the most popular file type in targeted attacks during the first half of 2009. Last year the most commonly used file type for targeted attacks was Microsoft Word’s DOC. Adobe has responded with a quarterly response cycle due to the growth in PDF exploits.

For the full F-Secure IT security threat summary for the second quarter of 2009, visit www.f-secure.com/2009/.

Tags: F-SecureVirus
Previous Post
Zip.ca to Provide Access to Digital Hollywood Hits on PCs and Connected Devices
Next Post
Asus Brings New G51 and G60 Gaming Notebooks

Related Posts

  • Samsung Laptop Full of Notorious Malware Is On Sale For $1.2M

  • Cisco Identifies Virus That Kills Off PCs

  • Researchers Identify iOS Espionage App

  • Researchers Identify New iOS Vulnerability

  • Dropbox, WordPress Used To Spread Malware

  • Microsoft Says Viruses Are Back On The Rise

  • First Targeted Attack Utilising Malware for Android Devices Reported

  • Cyber Attack Targets Nato, Government Websites

Latest News

DJI Breaks Through the Limits of Fixed Aperture with Osmo Action 6
Cameras

DJI Breaks Through the Limits of Fixed Aperture with Osmo Action 6

PlayStation’s Black Friday Deals 2025
Gaming

PlayStation’s Black Friday Deals 2025

TerraMaster Black Friday & Cyber Monday 2025 Mega Sale Is Here
Enterprise & IT

TerraMaster Black Friday & Cyber Monday 2025 Mega Sale Is Here

HighPoint and ASK Corp Redefine 8K Post-Production with Verified 50.5GB/s Gen5 NVMe Storage at Inter BEE 2025
Enterprise & IT

HighPoint and ASK Corp Redefine 8K Post-Production with Verified 50.5GB/s Gen5 NVMe Storage at Inter BEE 2025

EDIFICE Launches the New ECB-S10 Series
Consumer Electronics

EDIFICE Launches the New ECB-S10 Series

Popular Reviews

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

Terramaster F8-SSD

Terramaster F8-SSD

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

Soundpeats Pop Clip

Soundpeats Pop Clip

Akaso 360 Action camera

Akaso 360 Action camera

Dragon Touch Digital Calendar

Dragon Touch Digital Calendar

Noctua NF-A12x25 G2 fans

Noctua NF-A12x25 G2 fans

be quiet! Pure Loop 3 280mm

be quiet! Pure Loop 3 280mm

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed