november review of cyren security blog
TRANSCRIPT
11©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission.©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission.
Always Ahead of the Threat
... with CYREN Security Blog
2222
November Highlights
• Significant malware attacks and botnet expansion noted by CYREN
• Results from Q3 Internet Threats Trend Report released
• Growing threat of phishing attacks
• State of corporate security
33
Analyzing a significant malware attack
“The malware is a Trojan downloader, capable of retrieving and installing a range of other malware once it has been activated by users who open the .doc file. While MSWord usually warns users who try to open files with macros, most users will likely accept the warning and proceed to allow the macros to run.”
44
Q3 Trend Report released“From celebrity hacking to major corporate data breaches, the third quarter of 2014 demonstrated the lengths cybercriminals will go in order to obtain sensitive and private information. In early September, the world learned of a major breach to celebrity Apple iCloud accounts, likely achieved either through highly targeted phishing or using research techniques similar to those honed by “Hollywood Hacker” Chris Chaney.
55
Growing threat of phishing attacks
“Email is a critical vector of phishing scams. By faking messages from well-known services, social networks or financial organizations, phishers are able to significantly improve the chances of their phishing being successful..“
66
Increase in malware distribution corresponds with decrease in spam
“Periodically throughout the year, CYREN analysts see these types of fluctuations. Reasons vary, although CYREN analysts suspect that botnet owners are “repurposing”, with the primary objective to expand the botnet; malware is increasing and the reduction in spam volume comes from the cybercriminal’s desire to expand and “groom” the botnet. "
77
The state of corporate security
“When you consider that an estimated 60% of all companies experiencing a cybersecurity breach go out of business within six months of the attack, it is a wonder that all corporations aren’t making cybersecurity a higher priority. Yet, the level of corporate complacency with regard to cybersecurity remains high. “
88
Visit the CYREN Security Blog for more details and watch out for upcoming articles on the latest trends in malware, spam and phishing
www.blog.CYREN.com