Featured Articles

Apple iPad Air 2 costs $275 to build

Apple iPad Air 2 costs $275 to build

IHS has told Recode that the Apple iPad Air 2 16GB Wifi costs only $275 to build -- not bad…

More...
LG sells 16.8 million smartphones in Q3 14

LG sells 16.8 million smartphones in Q3 14

As Samsung is losing market share, another Korean company, which many had written off, is gaining.

More...
LG G Watch R EU price set at €299

LG G Watch R EU price set at €299

LG G Watch R is probably the best looking Android Wear device on the market and many have been waiting for…

More...
Nvidia GTX 970 SLI tested

Nvidia GTX 970 SLI tested

Nvidia recently released two new graphics cards based on its latest Maxwell GPU architecture, with exceptional performance-per-watt. The Geforce GTX 970…

More...
Gainward GTX 970 Phantom previewed

Gainward GTX 970 Phantom previewed

Nvidia has released two new graphics cards based on its latest Maxwell GPU architecture. The Geforce GTX 970 and Geforce GTX…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Tuesday, 11 March 2014 14:05

Dell comes up with some scary malware news

Written by Nick Farrell



78 billion instances of remote accessed malware hacks

Dell has found 78 billion instances where remotely accessed malware opened the door to a risk that can cause significant damage. The Dell SonicWALL Threat Research Team has released its annual threat report for 2013. The report is based on data collected by the Dell SonicWALL Global Response Intelligent Defense (GRID) Network, from over 1 million sensors that monitor traffic for emerging threats.

Compared to their 2012 data, Microsoft attracted a significantly larger proportion of attacks in 2013. In 2012, they attracted fewer than 12 per cent of the total attacks reported. In 2013, this rose to almost 22 per cent of the total attacks reported. In contracts, Apple's share dropped from almost 15 per cent to just over 3 per cent. Dell reported 14 zero-day vulnerabilities in 2013. Browser-based attacks lead the list with Java being the most targeted application, followed closely by Internet Explorer, and Adobe Flash Player.

SCADA systems were not immune from attack with systems from Siemens responsible from just over a third of all the reported vulnerabilities. The next most vulnerable systems came from Cisco with just 12 per centof the reported vulnerabilities. Over a quarter of these vulnerabilities left system operators vulnerable to DDoS attacks improper input validation, buffer overflow and privilege escalation the next most popular categories of CADA vulnerability.

The most popular types of targeted attacks in 2013 were targeted spam against corporate employees leveraging services like fax, voicemail, printers and scanners; sophisticated ransomware like CryptoLocker; SSL-based malware download and communication and; and web-based exploit kits with zero-day exploit payloads resulting in drive-by malware download and install on the targeted machine.

Nick Farrell

E-mail: This e-mail address is being protected from spambots. You need JavaScript enabled to view it
blog comments powered by Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments