Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.

2008 West
DIAMOND SPONSOR:
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
PLATINUM SPONSORS:
Red Hat
The Opening of Virtualization
GOLD SPONSORS:
Appsense
User Environment Management – The Third Layer of the Desktop
Cordys
Cloud Computing for Business Agility
EMC
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Intel
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Sensedia
Return on Assests: Bringing Visibility to your SOA Strategy
Symantec
Managing Hybrid Endpoint Environments
VMWare
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
PLATINUM SPONSORS:
Appcelerator
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
GOLD SPONSORS:
ICEsoft
How Can AJAX Improve Homeland Security?
Isomorphic
Beyond Widgets: What a RIA Platform Should Offer
Oracle
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
SYS-CON.TV
Today's Top SOA Links


F-Secure Deems 2012 the Year of the Exploit Kit
Strong Passwords Are Important but, as Detailed in F-Secure's Latest Threat Report, a Commoditized and Professional Malware Industry Brings Its Own Challenges

SAN JOSE, CA -- (Marketwire) -- 02/05/13 -- Business is booming for exploits, mobile malware is still dominated by Android and Symbian, and botnets are back and retooled, according to the new Threat Report H2 2012 from F-Secure Labs. Released in conjunction with Safer Internet Day, the report also provides tips for managing the cumbersome yet necessary problem of passwords.

"The world of malware today is commoditized and professionalized," said Mikko Hypponen, Chief Research Officer at F-Secure. "We saw this especially in the second half of last year in the form of more standardization of vulnerability exploitation and the increased use of automated exploit kits."

Exploit kits and old software vulnerabilities

2012 saw the exploitation of software vulnerabilities become the most popular way to gain access to a user's machine. In the second half of the year, exploit-related detections accounted for 28 percent of all detections, with 68 percent of those related to vulnerabilities in Java.

The majority of exploits detected were related to four vulnerabilities (two Windows and two Java), most likely a result of the fact that today's popular exploit kits, BlackHole and Cool Exploit, include exploits for these vulnerabilities. All of these vulnerabilities were reported in the last two years and have already had security patches released by their vendors -- a reminder of the importance of keeping software updated.

"Criminals in the malware system each handle their own little niches, their own little links in the chain," said Sean Sullivan, Security Advisor at F-Secure. "And exploits are the first link. They're how the criminals get in the door."

Mobile malware in numbers: Samples, or families and variants?

Android malware accounted for 79 percent (238) of all new, unique mobile malware variants in 2012, a number that speaks to the platform's domination of the mobile market. Symbian took up the next largest share, with 19 percent of detected variants.

2012 witnessed security vendors exclaiming about the growth of Android malware samples, from tens to hundreds of thousands, depending on the report. While sample count has increased, F-Secure Labs resists focusing merely on them, "as samples just represent the outer layer of the malware package," stated Sullivan.

"On the inside it's still the same malware family, but there can be a myriad of different ways to dress it up to try to disguise it. We instead prefer to focus on the number of families and variants." Sullivan points out that growth in malware samples is evidence of commoditization and automation on the production side, not necessarily of more malware families in the wild.

"At F-Secure, we have a more holistic understanding of the security landscape, that it cannot be dependent on merely one data point," commented Sullivan. "To base a security analysis on a single data point is either foolish, or marketing hype."

Botnets, banking trojans and the problem of passwords

Botnets, which had been handicapped in recent years by efforts from players in various affected fields, resurfaced in 2012 with new packaging and different methods. New business models like "rent-a-botnet" schemes are flourishing, where cybercriminals rent a whole network of infected computers and use it to perform their attacks. ZeroAccess, the fastest growing botnet, infected millions of computers globally in 2012, with up to 140,000 unique IPs in the US and Europe. Botnet Zeus, which is also a banking trojan, continues to reign, with the United States, Italy and Germany as the most affected countries.

The password, as the report says "is dead and we all know it." Strong enough passwords are often too cumbersome to remember, and complicating matters, a separate password should be used for each account. Even strong passwords can be reset with the right social engineering tactics. But until a better solution comes along, the report offers tips for safe password management.

For more details on the latest trends in threats, see F-Secure's Threat Report H2 2012.

More information: http://www.f-secure.com/en/web/home_us/

How do I remember strong passwords?
http://safeandsavvy.f-secure.com/2013/01/21/how-do-i-remember-strong-passwords/

Safe Banking - Part 1: Strong Passwords
http://youtu.be/FkBJOW9fnNg

F-Secure - Protecting the irreplaceable

While you concentrate on what is important to you, we make sure you are protected and safe online whether you are using a computer or a smartphone. We also backup and enable you to share your important files. Our services are available through over 200 operators around the world and trusted in millions of homes and businesses. Founded in 1988, F-Secure is listed on NASDAQ OMX Helsinki Ltd.

f-secure.com | twitter.com/fsecure | facebook.com/f-secure

Add to Digg Bookmark with del.icio.us Add to Newsvine

Press contact:

Melanie Lombardi
LEWIS PR for F-Secure
+ 1 (415) 432-2400
Email Contact

About Marketwired .
Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Web 2.0 Latest News
Earlier, I wrote a bit about traffic and the IoT. It's a big topic. The traffic problems of the developed and developing worlds seem so large, complex, and intractable to significant change in any reasonable timeframe. Consider Mexico City. There are more than 20 million people in ...
Is it just me, or has there been an explosion of buzz words lately? Don’t get me wrong, the IT industry innovates at a crazy pace normally, but it seems that things have been evolving faster than ever and that a fundamental change in the way things are done is underway. We can attribut...
My favorite writer, Gil Press, sums it up with, “It’s Official: The Internet Of Things Takes Over Big Data As The Most Hyped Technology” where he talks about how Gartner released its latest Hype Cycle for Emerging Technologies, and how big data has moved down the “trough of disillusion...
More and more Web sites and applications are being moved from Apache to nginx. While Apache is still the number one HTTP server with more than 60% on active Web sites, nginx has now taken over the 2nd place in the ranking and relegated Microsoft’s IIS to 3rd place. Among the top 10.000...
Getting one's arms around the Internet of Things is a daunting task. In addition to big IoT commitments from all of the big players in computing and telco, there are a number of smaller companies and startups working on devices and services to enable the future of enterprise IT and per...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021




SYS-CON Featured Whitepapers
ADS BY GOOGLE