Breaking News

Noctua introduces NF-A12x25 G2 next-generation 120mm fan INNO3D DELIVERS HIGH PERFORMANCE FOR LESS WITH THE NEW GEFORCE RTX 5050 CORSAIR Unveils RS-R Fans with Reverse Rotors for Unobstructed RGB Lighting ATP Electronics 11K Cycles PCIe Gen 4x4 Industrial SSDs TerraMaster Launches F4 SSD

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

F-Secure Releases Its IT Security Wrap-Up for the Second Quarter of 2009

F-Secure Releases Its IT Security Wrap-Up for the Second Quarter of 2009

Enterprise & IT Jun 26,2009 0

Highlights from the quarter include president Barack Obama’s major speech on cybersecurity, the huge interest in the Conficker worm and social networking Sites, as Well as growth in PDF exploits, according to F-Secure. Security service provides F-Secure today released its IT Security Wrap-Up Report for the second quarter of 2009. Key highlights include:

President Obama puts spotlight on cybersecurity
"So cyberspace is real. And so are the risks that come with it." These were the words of President Barack Obama on May 29, 2009 as he announced a new strategy to secure America's information and communications networks. F-Secure welcomes the fact that the Obama Administration is taking cybersecurity seriously on the national level and welcomes the new Cybersecurity Coordinator as a partner in the fight against eCrime. A strong advocate of establishing 'Internetpol,' F-Secure is committed to international cooperation and also encourages an increased focus on developing an offensive capability against online criminals.

Conficker worm
The threat landscape in the first half of 2009 was dominated by the Conficker worm, which has proved to be the most significant malware outbreak in recent years. The Conficker Working Group’s successful collaboration is an example of effective international cooperation within the Internet security industry. Conficker created a great deal of media interest, especially around April 1, 2009, when the Conficker C variant was due to activate. In fact, the Conficker B variant spread most widely and infected millions of computers worldwide. The Conficker case once again demonstrated the emotional interest in virus outbreaks. While media interest has waned, the Conficker worm is still out there and there are still no answers as to what it was designed to do.

News, tweets and malware
Social networking websites have continued to grow in the first half of 2009, which makes them increasingly attractive targets. The first Twitter worm and spam outbreak occurred in April, created by a hobbyist calling himself Mikeyy. Then, with online criminals quickly seizing the opportunity, Google searches for "Twitter worm" or "Mikeyy" soon led people to malware sites. Malicious search results about popular news stories are very common. More than ever, social networking sites are both making the news and breaking the news – and, in the process, they’re creating fast-spreading security problems that need to be addressed.

PDF files used for targeted attacks
F-Secure’s research shows that PDF files have become the most popular file type in targeted attacks during the first half of 2009. Last year the most commonly used file type for targeted attacks was Microsoft Word’s DOC. Adobe has responded with a quarterly response cycle due to the growth in PDF exploits.

For the full F-Secure IT security threat summary for the second quarter of 2009, visit www.f-secure.com/2009/.

Tags: F-SecureVirus
Previous Post
Zip.ca to Provide Access to Digital Hollywood Hits on PCs and Connected Devices
Next Post
Asus Brings New G51 and G60 Gaming Notebooks

Related Posts

  • Samsung Laptop Full of Notorious Malware Is On Sale For $1.2M

  • Cisco Identifies Virus That Kills Off PCs

  • Researchers Identify iOS Espionage App

  • Researchers Identify New iOS Vulnerability

  • Dropbox, WordPress Used To Spread Malware

  • Microsoft Says Viruses Are Back On The Rise

  • First Targeted Attack Utilising Malware for Android Devices Reported

  • Cyber Attack Targets Nato, Government Websites

Latest News

Noctua introduces NF-A12x25 G2 next-generation 120mm fan
Cooling Systems

Noctua introduces NF-A12x25 G2 next-generation 120mm fan

INNO3D DELIVERS HIGH PERFORMANCE FOR LESS  WITH THE NEW GEFORCE RTX 5050
GPUs

INNO3D DELIVERS HIGH PERFORMANCE FOR LESS WITH THE NEW GEFORCE RTX 5050

CORSAIR Unveils RS-R Fans with Reverse Rotors for Unobstructed RGB Lighting
Cooling Systems

CORSAIR Unveils RS-R Fans with Reverse Rotors for Unobstructed RGB Lighting

ATP Electronics 11K Cycles PCIe Gen 4x4 Industrial SSDs
Enterprise & IT

ATP Electronics 11K Cycles PCIe Gen 4x4 Industrial SSDs

TerraMaster Launches F4 SSD
Enterprise & IT

TerraMaster Launches F4 SSD

Popular Reviews

be quiet! Light Loop 360mm

be quiet! Light Loop 360mm

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

Arctic Liquid Freezer III 420 - 360

Arctic Liquid Freezer III 420 - 360

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

Soundpeats Pop Clip

Soundpeats Pop Clip

Crucial T705 2TB NVME White

Crucial T705 2TB NVME White

be quiet! Light Base 600 LX

be quiet! Light Base 600 LX

Noctua NH-D15 G2

Noctua NH-D15 G2

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed