skip to main |
skip to sidebar
A significant increase of electronic crimes to the third quarter of 2012
Confirmed
the company "McAfee" America specializing in the field of the
protection and security of information that the proliferation of cyber
crime attacks is growing in the world during the third quarter of the
year 2012.
She
doubled malicious attacks on mobile devices compared to the second
quarter of the year, and increased rates of fraud global financial-mail
and according to a recent report results for the third quarter threats
issued by the company today.
Said
Hamed Diab, Regional Director, "McAfee" in the Middle East and North
Africa, the world has seen during the third quarter of this year, a
significant increase in the prevalence of gangs financial fraud at the
world level.
And
laboratory research revealed "McAfee" and the "Guardian Onalitk" for
the spread of piracy specializing in financial fraud outside Europe to
include the United States and Colombia.
Diab
added that cyber criminals have set up automatic transfer systems have
been used to attack the European financial institutions, and directed to
target financial institution large multinational in the United States. As noted the continued prevalence of pirated software and malware with Mac, in addition to the growing theft of passwords.
The
Diab that the techniques used in cyber crime has evolved and update
continuously from cyber criminals, who seek always to exploit and
discover gaps electronic global systems, pointing to bypass the
penetration rate security for databases in 2012 the figures recorded in
2011, where he developers databases disclosure and correction secret for nearly 100 Vulnerability in databases this year.
A
report published a web sites Information International that
laboratories "McAfee" spotted currently 100 thousand model for malicious
software new, which represents the average number of models new malware
per day, doubling the number of malware expected since January, thus
affecting the infrastructure of the credit Universal.
While
male Vincent Weaver First Deputy Prime laboratories "McAfee", it is
still noticeable the growing sophistication level of cyber attacks
worldwide, it confirmed what a customer numbers that both cyber crime
and penetration active electronic warfare in the case of constant
evolution, and continue pedaling for all beginning governments and large
enterprises and
ending for small businesses and home users, and the ability of large
Internet criminals to analyze the behavior of the victims and exploit
the latest attacks platforms and tools detect gaps in campaigning.
A
report threats for the third quarter for continued increase in the
prevalence of software piracy and malware with "Mac", and the presence
of transitions fast in some categories of malicious software, including
programs ransom and binary files signed, where the report pointed to
discover several models of programs ransom extorting money from victims additional increase of 43 percent, making it one of the areas of e-crime rapidly growing.
The
report showed an increase in the number of "group" Malware 100 million
program, thus recording a slight decline in the quarter, while still the
total number of "group" malware over 100 million model, as expected.
The
report also pointed to the number of malicious programs that target
mobile devices almost compared to last quarter, with continued exposure
of the operating system "Android" to the greatest number of attacks.
The
results of the report constant rate of growth of malware disguised
which is one of the most serious categories of malware, and increase the
rate of threats across the web by 20 percent and the resulting increase
web addresses suspicious, where the proportion of $ almost 64 percent
of web addresses suspicious that have been discovered recently in North America mainly.
The
company "McAfee" based on a quarterly basis to issue an integrated
report on new threats, through the work of a dedicated team of experts
research component than 500 researchers in 30 countries around the world
on an ongoing basis to identify areas full of threats in real time, and
to identify vulnerabilities of the application and risk analysis and linked together, to enable prompt treatment and the protection of institutions and users of malicious programs and threats.
Post a Comment