
BitDefender®is the creator of one of the industry's fastest and most effective lines of internationally certified security software.
Since its inception in 2001, BitDefender® has continued to raise the bar to set new standards in proactive threat prevention.
BitDefender® made its entrance on the international market when opening its own offices in Germany, Spain, USA and the UK. The company’s global expansion plans are still underway as BitDefender® is strengthening its position based on a series of strategic partnerships. Moreover, BitDefender is also setting sail for Asia.
The BitDefender® proprietary technologies, based on innovative ideas and trends in the information security industry, have been internationally avowed by authorized organizations, which rewarded their outstanding results by numerous prizes and certifications (Av-
Every year, BitDefender® launches a new generation of its desktop product line and its issues patches for its corporate suites, adding new functionalities based on innovative technologies. In 2006, BitDefender® introduced B-
Every day, BitDefender® protects tens of millions of home and corporate users across the globe — giving them the peace of mind of knowing that their digital experiences will be secure. The BitDefender® solutions are distributed by a global network of value-
BitDefender E-
The purpose of this report is to provide a comprehensive investigation of the threats’ landscape. BitDefender®’s security experts thoroughly analyze and examine the menaces of the each semester, focusing on software vulnerabilities and exploits, different types of malware, as well as countermeasures, cyber crime prevention and law enforcement. The E-
Download now H1 2009 Malware and Spam Review Executive Summary.pdf
First Half’s Spotlight E-
During the first half of 2009, the most important security incident was triggered by the emergence and expansion of the Downadup / Conficker / Kido internet worm exploiting a vulnerability in Microsoft operating systems prior to Windows Vista.
The MS08-
Other significant malware vectors were leaked, unofficial distributions of Microsoft’s upcoming technologies: Windows 7, Microsoft Office 2010 and Microsoft Visual Studio 2010. Malware writers relied on kits infected with Trojans in order to infect unwary users leeching these novelties via Bit-
* ATM malware spotted in the wild: Trojan.Skimer.A targets automated teller machines from US manufacturer Diebold. The malicious application creates a virtual 'skimmer' which is capable of recording card details and personal identification numbers without the user's knowledge.
* Fake disinfection tools for the Downadup Internet worm: building on the pandemics triggered by the Downadup worm (about 11 million infections to date), malware authors released fake disinfection tools for the worm that actually would drop miscellaneous malicious files, especially rogue security software.
* Spam has grown to new heights with Canadian Pharmacy ranking as number one spam source.
o Medicine Spam – 519
o Product Spam (replica products) – 6%
o Hardcore pornography – 3%
o Phishing attempts – 7%
o Bundled malware – 6%
* Phishing and identity theft affect about 55,000 computer users per month. The most targeted financial institutions are Bank of America, Paypal and Abbey Bank.
* The first proof-
* MAC OS X scareware also witnessed a dramatic boost, indicating that it’s time of Apple users to adopt a platform-
* Social networking and microblogging have also contributed to leveraging social engineering attacks. Apparently harmless games posted on Twitter exposed sensitive credentials allowing attackers to recover victims’ passwords for miscellaneous web services.
Future Outlook
Malware development is a rapidly evolving business, both because this specific niche of software programmers are driven by illicit financial gains and because of technology’s rapid evolution.
Most software companies run an extremely tight schedule from envisioning their products to actually delivering them to their users, in order to maximize sales. However, many times, such applications are not fully tested and proofed against various types of attacks or critical coding flaws. Malware authors rely on these flaws to envision novel approaches for penetrating users’ systems in both home and corporate environments.
Malware distribution via Warez website and torrent downloads will keep an ascending pace as the number of Internet users increase. The so-
Other vulnerable factors in malware distribution schemes are the very end-
Voluntary disclosure of trivial information via Web 2.0 websites or blogging platforms can also help malicious third parties build personal profiles or gather additional data to be used in phishing attempts.
No comments:
Post a Comment