Story image

Your data is nearly impossible to secure says Trend Micro

18 Feb 2014

According to Trend Micro Incorporated’s 2013 annual threat round up report, “Cashing in on Digital Information," security breaches, cyber criminals and organised attacks made it nearly impossible to keep personal and financial data private.

The report found that online banking malware more than doubled in Australia from Q1 to Q4 2013, while New Zealand volume increased by 276% over the same period, compared to a global rate from Q1 to Q4 2013 of 374%.

Australia also saw the number of botnet C&C (Command and Control) servers increase by around 65% from Q1 to Q4 2013. The large scale attacks on privacy and security are detailed in the report that covers online bank hacking, mobile vulnerabilities, infrastructure attacks, and other threats.

This annual report provides insight into the vulnerabilities of today’s technology that is rapidly becoming interconnected and “smart."

Unfortunately, the new technology being embraced may give more opportunities for criminals to thrive, as they evolve their cyber attacks, endanger business, including online banks and retailers, while moving closer to homes and individuals through mobile technology.

“Last year encompassed major security breaches, increased malware and mobile threats that impacted people of all walks of life around the world," says Sanjay Mehta, managing director, Trend Micro ANZ.

“Now more than ever, consumers and corporations alike must be diligent in understanding their vulnerabilities, and what should be done from a security perspective to better protect personal data and guard against compromised privacy.

"While this report details the threat landscape of 2013, more importantly it explains how these threats will continue to evolve and what should be done to mitigate the negative impact."

Report highlights include:

Financial threats:

As online banking malware that directly targets victims’ finances intensified globally last year, prolific Ransomware such as Cryptolocker also increased and evolved throughout the year.

Mobile vulnerabilities:

There was a sizeable increase in both volume and sophistication of mobile threats, as PC-based threats transitioned to mobile platforms. More than 1.4 million malicious and high-risk apps were identified and Apple was not excluded, as researchers proved the App store is vulnerable to malware delivery.

Infrastructure attacks:

High-profile incidents of infrastructure being targeted by cyber attacks became a reality in South Korea, demonstrating how critical operations can be impacted on a broad scale.

Unsupported software:

Emerging in 2013 saw the increased awareness regarding unsupported versions of Java and Windows XP, which will present a widespread security challenges as patches and upgrades cease when support for XP ends April 2014.

Personal privacy:

Through social networking and “personal cloud" accounts, personal privacy became a recurring issue when aggressive phishing attacks emerged that compromised personal information under the guise of popular new product launches, such as PS4 and Xbox One.

Edge computing market to provide ‘lucrative opportunities’
The market is set to skyrocket in the coming years, paving the way for emerging market players.
Opinion: 3 ways cloud & colocation providers can use renewables
Schneider Electric’s John Powers discusses the renewable revolution that is underway and how providers can jump on board.
Former CBRE data centre head joins EkkoSense board
Data centre expert Mark Acton will be strengthening the board as a non-executive director.
$50b modular data centre market driven by edge computing
Findings from a new research report have been released by Global Market Insights that show a burgeoning market.
Telia Carrier launches new PoP in SUPERNAP Italia data centre
Today Telia Carrier announced a new Cloud Connect PoP in the SUPERNAP Italia data centre near Milan, Italy.
Verizon makes major step towards Multi-Access Edge Compute
In a trial environment in California, the wireless provider achieved full virtualisation of baseband functions.
Interview: Edge computing - the force powering hyperconverged infrastructure
Scale Computing CEO Jeff Ready talks offerings, plans for the future, and a look as edge computing as the next tech innovation.
Symantec, Ixia combine efforts to secure hybrid networks
Ixia’s CloudLens and Symantec Security Analytics now feature complete integration, which allows Symantec customers to gain real-time visibility into their hybrid cloud environments.