Back to Old News

Internet Security Threat Report Mobile Attacks on the Rise

Every day cybercriminals and hackers are launching increasingly sophisticated, targeted attacks. In its Internet Security Threat Report, Volume 16, Symantec Corp. finds that, in addition to an increase in targeted enterprise attacks, mobile attacks are on the rise and hackers are increasingly using Java as a way into your network. Symantec identified more than 286 million new threats in its report, chronicling incidents between Jan. 1, 2010 and Dec. 31, 2010.

“While we didn’t see the number of attacks this year really grow, what we did see was a 93% increase in the number of web-based attacks. People tend to think of attachments in email, and if you click on that attachment, you’re going to get infected, but the real growth area, where they’re moving, is into Web sites,” says Kevin Haley, director at Symantec Security Response.

From CIO Insight

Every day cybercriminals and hackers are launching increasingly sophisticated, targeted attacks. In its Internet Security Threat Report, Volume 16, Symantec Corp. finds that, in addition to an increase in targeted enterprise attacks, mobile attacks are on the rise and hackers are increasingly using Java as a way into your network. Symantec identified more than 286 million new threats in its report, chronicling incidents between Jan. 1, 2010 and Dec. 31, 2010.

“While we didn’t see the number of attacks this year really grow, what we did see was a 93% increase in the number of web-based attacks. People tend to think of attachments in email, and if you click on that attachment, you’re going to get infected, but the real growth area, where they’re moving, is into Web sites,” says Kevin Haley, director at Symantec Security Response. “It requires a shift in thinking for protecting yourself. It makes the need for protection really important beyond just an anti-virus product.”

Smart CIOs, he says, need to keep their eyes on the network, and have policies in place to try and mitigate risk. USB keys in particular need to be monitored. “When you talk about USB keys, you should have a policy about it. You need to explain to your end users why you have this policy, because people are very good at getting around things that they feel slow them down. If you talk to [your employees] about why you’re doing something, then they get it and they’re going to help you out and follow these policies,” Haley says.

http://www.cioinsight.com/c/a/Security/Internet-Security-Threat-Report-Mobile-Attacks-on-the-Rise-564284/

Unless otherwise noted this site and its contents are licensed under a Creative Commons Attribution 2.5 Canada license.

Munk School of Global Affairs & Public Policy | University of Toronto