Top 50 malicious code samples reveals secrets

Powered by SC Magazine
 

Symantec’s latest Internet Security Threat Report found an increase in threats designed to facilitate cyber crime.

Symantec’s latest Internet Security Threat Report found an increase in threats designed to facilitate cyber crime.

While past attacks were designed to destroy data, today's attacks are increasingly designed to silently steal data for profit without doing noticeable damage that would alert a user to its presence, the company said.

In its previous report, Symantec cautioned that malicious code for profit was on the rise, and this trend continued during the second half of 2005.

Malicious code threats that could reveal confidential information rose from 74 percent of the top 50 malicious code samples last period to 80 percent this period.

"Cyber crime represents today's greatest threat to consumers' digital lifestyle and to online businesses in general," said Arthur Wong, vice president at Symantec Security Response and Managed Security Services division.

The report also detailed the growing trend of attackers using bot networks, targeted attacks on Web applications and Web browsers, and modular malicious code.

Based on this and data from previous reporting periods, the company said it expected to see more diverse and sophisticated threats used for cyber crime as well as an increase in the theft of confidential, financial, and personal information for financial gain.

Top 50 malicious code samples reveals secrets
 
 
 
Top Stories
Meet FABACUS, Westpac's first computer
GE225 operators celebrate gold anniversary.
 
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  26%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 333

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  57%
 
No
  43%
TOTAL VOTES: 138

Vote