Cyber-relapse: Porn, PUS and ransomware

|October 29, 2015 0
A report shows that cloud-based, mobile versions of enterprise applications are opening up another avenue for attackers

PUNE, INDIA: Pornography has possibly returned as the number one threat vector after dropping to number two last year while other top types of malware like Ransomware, Potentially Unwanted Software (PUS), and Information Leakage garner attention too. The mobile threat landscape is also becoming more active.

As mobile devices become more deeply woven into the fabric of our personal and work lives, cyber criminals are taking increasingly vicious and disturbingly personal shots at us, according to the 2015 State of Mobile Malware Report from Blue Coat Systems, Inc.

Turns out that Cyber blackmail (mobile ransomware attacks) leads the way as a top malware type in 2015, along with the stealthy insertion of spyware on devices that allows attackers to profile behavior and online habits. The new Blue Coat report, describes some of the latest trends and vulnerabilities in mobile malware, provides advice for strengthening corporate defenses and educating mobile device users, and offers predictions about the future of mobile threats.

                                 

___________________________________________________________________________________________________________

“As we sleep, exercise, work and shop with our mobile devices, cyber criminals are waiting to take advantage of the data these devices collect, as evidenced by the types of malware and attacks we’re seeing,” said Dr. Hugh Thompson, CTO and senior vice president, Blue Coat. “The implications of this nefarious activity certainly carry over to corporate IT as organizations rapidly adopt cloud-based, mobile versions of enterprise applications, opening up another avenue for attackers. A holistic and strategic approach to managing risk must extend the perimeter to mobile and cloud environments—based on a realistic, accurate look at the problem—and deploy advanced protections that can prioritize and remediate sophisticated, emerging and unknown threats.”

No Comments so fars

Jump into a conversation

No Comments Yet!

You can be the one to start a conversation.