february review of cyren security blog

6
1 1 ©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission. ©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission. Always Ahead of the Threat ... with CYREN Security Blog

Upload: cyren

Post on 17-Jul-2015

76 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: February review of CYREN Security Blog

11©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission.©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission.

Always Ahead of the Threat

... with CYREN Security Blog

Page 2: February review of CYREN Security Blog

2222

February Highlights

• Destroying the ROI of cybercrime

• Security-as-a-Service – moving cybersecurity to the cloud

• Cybercriminals spread malware via fake YouTube and Vimeo pages

Page 3: February review of CYREN Security Blog

33

Destroying the ROI of Cybercrime

“Now, practically any worker can unwittingly bring malware back inside the company network. This is why it’s vitally important to protect end-user devices of all types—whether company or end-user owned—to stop infection by malware.[...]Cybercriminals have now further raised the stakes by developing malware that incorporates evasion techniques to ‘sense’ when it is being inspected by security tools and turn off malicious operations until the inspection ends. These combine to create a security “gap”.”

Page 4: February review of CYREN Security Blog

44

Security-as-a-Service – moving cybersecurity to the cloud

“When your network is secured via Security-as-a-Service, end user traffic is routed through a robust and scalable cloud security platform, where it is screened and analyzed for viruses, malware, and other threats. Even data from roaming devices, such as notebooks, tablets and smartphones can be protected.“

Page 5: February review of CYREN Security Blog

55

Cybercriminals spread malware via fake YouTube and Vimeo pages

“The YouTube link that opens a Vimeo page should be a giveaway that all is not well but we assume enough users proceed to the next step. Once the page opens it suggests download of a “Missing Adobe Flash Plugin” which is actually a Rovnix BankingTrojan.“

Page 6: February review of CYREN Security Blog

66

Visit the CYREN Security Blog for more details and watch out for upcoming articles on the latest trends in malware, spam and phishing

http://blog.CYREN.com