iTnews
  • Home
  • News
  • Technology
  • Security

Malware targeting confidential data on the rise

By Marcia Savage on Sep 19, 2005 10:02PM

The internet saw an increase in malicious code that exposed confidential information as online criminals sought to make a profit, according to Symantec.

Malware that exposed credit card or banking information represented 74 percent of the top 50 malicious code samples reported to Symantec in the first half of 2005, up from 54 percent in the previous six months.

The company, which released its semi-annual internet security threat report Monday, said the increase in confidential information threats is likely due to the rapid growth of bots - compromised systems that are hijacked by attackers to send spam or denial-of-service attacks.

In the first six months of this year, Symantec counted an average of 10,352 bots per day, up from less than 5,000 a day last December. The increase in bot activity has driven a corresponding increase in DoS attacks from 119 to 927 per day, according to the company.

"The new threat landscape will likely be dominated by emerging threats such as bot networks, customizable modular malicious code, and targeted ttacks on web applications and web browsers," researchers wrote in the report.

Online criminals today are motivited by profit, rather than curiosity or interest in showing off technical skill, they said.

In the first half of 2005, Symantec documented more than 10,866 new Win32 viruses and worms, an increase of 48 percent over the 7,360 in the second half of last year. The company said the increase signifies a shift away from broad threats such as mass-mailing worms and towards modular and customizable malware.

According to Symantec, Mozilla browsers had the most confirmed vulnerabilities of any browser in the first half of the year with 25, 18 of which were rated as high severity. During the same period, 13 vendor confirmed vulnerabilites were disclosed for Microsoft Explorer, eight of which were high severity.

www.symantec.com

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:
confidentialdatamalwareonrisesecuritytargetingthe

Partner Content

Why Genworth Australia embraced low-code software development
Promoted Content Why Genworth Australia embraced low-code software development
How to turn digital complexity into competitive advantage
Promoted Content How to turn digital complexity into competitive advantage
Avoiding CAPEX by making on-premise IT more cloud-like
Promoted Content Avoiding CAPEX by making on-premise IT more cloud-like
Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
Promoted Content Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product

Sponsored Whitepapers

Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership

Events

  • CRN Channel Meets: CyberSecurity Live Event
  • IoT Insights: Secure By Design for manufacturing
  • Cyber Security for Government Summit
By Marcia Savage
Sep 19 2005
10:02PM
0 Comments

Related Articles

  • Qld gov proposes mandatory data breach reporting for agencies
  • Law firm mulls class action over NDIS software provider data breach
  • Global police operation takes down Flubot infrastructure
  • NDIS case management system provider breached
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Qantas calls time on IBM, Fujitsu in tech modernisation

Qantas calls time on IBM, Fujitsu in tech modernisation

Service NSW hits digital services goal two years early

Service NSW hits digital services goal two years early

SA Police ignores Adelaide council plea for facial recognition ban on CCTV

SA Police ignores Adelaide council plea for facial recognition ban on CCTV

NBN Co says TPG tie-up could help Telstra sidestep spectrum limits

NBN Co says TPG tie-up could help Telstra sidestep spectrum limits

Digital Nation

IBM global chief data officer on the rise of the number crunchers
IBM global chief data officer on the rise of the number crunchers
The security threat of quantum computing
The security threat of quantum computing
Integrity, ethics and board decisions in the digital age
Integrity, ethics and board decisions in the digital age
COVER STORY: Operationalising net zero through the power of IoT
COVER STORY: Operationalising net zero through the power of IoT
Crypto experts optimistic about future of Bitcoin: Block
Crypto experts optimistic about future of Bitcoin: Block
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.