iTnews
  • Home
  • News
  • Technology
  • Security

Protect your site from malware, warns Forrester

By Phil Muncaster on Mar 27, 2008 3:03PM
Protect your site from malware, warns Forrester

A new report by analyst firm Forrester Research has again highlighted the growing threat to firms of their web sites being infected by malware and their brands being abused in sophisticated phishing attacks.

The Threat Report: 2007 and Beyond, set for launch at this week’s Forrester Security Forum Emea event in Amsterdam, notes that where malware was once prevalent only on questionable web sites, it is to be found frequently on trusted domains today.

“There are countless examples where trusted sites have been compromised to host malware, or code that will redirect the user to a malware site,” said report author Chenxi Wang. “It’s important for operators of trusted sites to be extremely vigilant about the security of their sites so that there is no possibility they could be compromised.”

For sites with large quantities of user-generated content, Wang recommended automated scanning tools to check if any content being uploaded contains malware.

Another conclusion of the report is that firms’ brands are more at risk than ever before from phishing attacks. The new anti-phshing toolbar in IE7 will help users to a certain extent, but to “eradicate phishing completely will require a shift in user behaviour to greater vigilance” said Wang.

But Wang warned that internet service providers are unlikely to take a more proactive stance in scanning traffic for phishing sites and malware because of the risk of false positives, and the degradation of service that may result.

The report also highlights the sophistication of the criminal networks which write and disseminate malware for profit; describing various players in the chain from malware producers, through bot net operators to attack launchers.

“A question I raised in the report is ‘what can the good guys do to disrupt this underground economy and break the economic chain to turn things to our advantage?’,” said Wang.
Got a news tip for our journalists? Share it with us anonymously here.
itweek.co.uk @ 2010 Incisive Media
Tags:
forresterfrommalwareprotectsecuritysitewarnsyour

Partner Content

Why Genworth Australia embraced low-code software development
Promoted Content Why Genworth Australia embraced low-code software development
Avoiding CAPEX by making on-premise IT more cloud-like
Promoted Content Avoiding CAPEX by making on-premise IT more cloud-like
Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations
Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
Promoted Content Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product

Sponsored Whitepapers

Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership

Events

  • Micro Focus Information Management & Governance (IM&G) Forum 2022
  • CRN Channel Meets: CyberSecurity Live Event
  • IoT Insights: Secure By Design for manufacturing
  • Cyber Security for Government Summit
  • Forrester Technology & Innovation Asia Pacific 2022
By Phil Muncaster
Mar 27 2008
3:03PM
0 Comments

Related Articles

  • Global police operation takes down Flubot infrastructure
  • VMware, F5, Log4j added to EnemyBot attack targets
  • Google adds phishing protection to Workspace apps
  • FBI Cyclops Blink operation disinfected thousands of WatchGuard appliances
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Qantas calls time on IBM, Fujitsu in tech modernisation

Qantas calls time on IBM, Fujitsu in tech modernisation

Researchers hacked Oracle servers to demo serious vulnerability

Researchers hacked Oracle servers to demo serious vulnerability

PayTo rollout kicks off

PayTo rollout kicks off

Australian scientists build world's first quantum computer IC

Australian scientists build world's first quantum computer IC

Digital Nation

IBM global chief data officer on the rise of the number crunchers
IBM global chief data officer on the rise of the number crunchers
Integrity, ethics and board decisions in the digital age
Integrity, ethics and board decisions in the digital age
The security threat of quantum computing
The security threat of quantum computing
Crypto experts optimistic about future of Bitcoin: Block
Crypto experts optimistic about future of Bitcoin: Block
COVER STORY: Operationalising net zero through the power of IoT
COVER STORY: Operationalising net zero through the power of IoT
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.