2010 In a Data Security Retrospective

The most exploited methods in 2010 were:

• Compromised legitimate websites
• Infected websites disguised as legitimate
Social networking sites like Facebook and Twitter
• Popular software applications such as from Adobe and Microsoft

Noteworthy pieces of malware:

Conficker – is a network worm that has the ability to update itself by downloads from
the Internet. This worm can trigger downloads of itself to the remote computer without the user’s knowledge.
Koobface – spreads itself through social networks like Facebook. Using the information gathered from the cookies, the worm connects to these sites and starts sending messages with malicious links to friends and contacts.
Fake antivirus programs – malware is spread using social engineering techniques to trick users into downloading malicious software and/or visiting web sites with malicious content.

Credit: Norman Security
Technorati Tags: ,,,,
Enhanced by Zemanta

Rogaine for Men Hair Regrowth Treatment, Easy-to-Use Foam, 2.11 Ounce (Pack of 3)

International Research Labs Rapidlash Eyelash Enhancing Serum (3ml), 0.1-fluid ounces Bottle

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.