The Month: ThreatStats

Share this article:

Decoding the data on strategic threats and concerns hovering over the CIO's radar.

Top 20 Online Scanner Position Change in Name Percentage position 1 New Backdoor.Win32.Padodor.gen 11.29 2 +2 not-a-virus:Monitor.Win32.Perflogger.163 1.23 3 +2 Email-Worm.Win32.Brontok.q 1.01 4 +4 not-a-virus:PSWTool.Win32.RAS.a 0.86 5 +4 Trojan-Downloader.Win32.Small.ddp 0.72 6 -3 Email-Worm.Win32.Rays 0.72 7 New Worm.Win32.AutoIt.d 0.66 8 New Trojan-Dropper.Win32.Agent.bdy 0.61 9 +4 not-a-virus:Monitor.Win32.Perflogger.ad 0.61 10 New not-a-virus:AdWare.Win32.Virtumonde.bq 0.51 11 -9 Trojan.Win32.Agent.qt 0.50 12 New Trojan-Spy.VBS.Marang.a 0.50 13 New Trojan.Win32.Obfuscated.ev 0.50 14 New Email-Worm.Win32.Warezov.jx 0.46 15 New Email-Worm.Win32.Zhelatin.bq 0.45 16 New Email-Worm.Win32.Warezov.mi 0.44 17 -5 not-a-virus:AdWare.Win32.Virtumonde.ha 0.43 18 -2 Trojan-Spy.Win32.Bancos.zm 0.39 19 Re-entry Virus.Win32.Hidrag.a 0.38 20 New not-a-virus:AdWare.Win32.Dm.y 0.38

UPS AND DOWNS

Concern about viruses 27%

The percentage of infosec professionals who listed viruses as their primary concern. This contrasts with 55 per cent last year, reflecting the changing patterns of hacker activity.

Fear of insider threats 43%

At the same time, concern about internal threats has increased from 33 per cent last year. As many external threats are locked down, attention turns to errant employee behaviour.

Source: Cisco

TOP TEN BY SITES

Total number of sites: 844

The publicity surrounding the theft of the Nationwide laptop continues to have an effect. The rise in bogus Nationwide sites and emails is undoubtedly the result of opportunistic phishing gangs looking to capitalise on the fears of the hapless building society's customers. Overall, the total number of sites has more than doubled in a month.

Share this article:
close

Next Article in News

Sign up to our newsletters

More in News

Report: SQL injection a pervasive threat, behavioral analysis needed

Report: SQL injection a pervasive threat, behavioral analysis ...

Long lag times between detection and resolution and reliance on traditional methods impair an organization's ability to combat SQL injection attacks.

WhatsApp bug allows for interception of shared locations

Researchers identified a vulnerability in WhatsApp that could enable an attacker to intercept shared locations using a man-in-the-middle attack, or a rogue access point.

Google tweaks its terms of service for clarity on Gmail scanning

The company is currently dealing with a lawsuit that challenges its email scanning practices.