The Month: Threat Stats

Share this article:

Decoding the data on strategic threats and concerns hovering over the CIO's radar.

TOP 20 ONLINE SCANNER
Position Change in Name %
position
1 New Trojan-Proxy.Win32.Dlena.cb 3,23
2 New Packed.Win32.PolyCrypt.b 2,87
3 New Trojan-Spy.Win32.ProAgent.21 1,88
4 -1 Email-Worm.Win32.Brontok.q 1,52
5 New not-a-virus:AdWare.Win32.Virtumonde.if 1,43
6 +5 Trojan.Win32.Agent.qt 1,26
7 New Trojan-Downloader.Win32.INService.bl 1,17
8 New Virus.VBS.Small.a 1,17
9 Re-entry Trojan-Clicker.Win32.Small.kj 1,08
10 New Trojan-Downloader.Win32.Small.dge 1,08
11 New Packed.Win32.Tibs.r 1,08
12 New IM-Worm.Win32.Sohanad.t 0,99
13 New Trojan-Downloader.Win32.Small.edb 0,99
14 -8 Email-Worm.Win32.Rays 0,90
15 -14 not-a-virus:Monitor.Win32.Perflogger.163 0,90
16 New not-a-virus:Porn-Dialer.Win32.GBDialer.i 0,81
17 New Trojan-Downloader.Win32.Small.ddx 0,81
18 New Email-Worm.Win32.Zhelatin.ch 0,72
19 New Trojan-PSW.Win32.OnLineGames.bs 0,63
20 Re-entry Trojan.Win32.Obfuscated.ev 0,63

UPS AND DOWNS

- Organisations vulnerable to hackers 32%

A third of UK organisations have critical vulnerabilities that could be exploited by hackers. This has dropped from 61% in 2006

- Risks in financial sector 16%

Organisations in the financial sector face a growing number of threats

Source: NTA Monitor Annual Security Report 2007

- Phishing Field is evening out at the top

The number of phishing emails has dropped by almost two thirds, while the number of sites continues to increase. In marked contrast to previous months, attacks have focused on two targets in almost equal measure rather than focusing on one prime target. For the first time, customers of The Cooperative Bank were aggressively targeted by a phishing campaign, while Barclays clients had a relatively peaceful month after topping the chart in May.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

NIST finalizes cloud computing roadmap

NIST finalizes cloud computing roadmap

The NIST architecture is designed to accelerate the adoption of cloud computing.

Chinese MitM attack targets iCloud users

Chinese MitM attack targets iCloud users

The attack used a false certificate to trick iCloud users into handing over personal data and login credentials. With an attack of this size, some experts and researchers believe the ...

EPIC: driver data shared via V2V technology needs protection

The groups shared comments on V2V communications with the National Highway Traffic Safety Administration.