Saturday, November 01, 2014
Advertisement

IT security roundup: PH in top 10 list

By MST News | May. 07, 2013 at 07:02pm
In a country with a strong mobile internet penetration and where 95 million Filipinos own at least a mobile phone, and with unlimited number of free applications abound, thinking before downloading any application is tantamount to data protection.

Trend Micro’s Q1 2013 Security Roundup Report prominently featured the Philippines in the top 10 list for the following: Top 10 Risk of privacy exposure due to app use, Top 10 Malicious android app download volumes and Top 10 with the highest battery-draining app downloads volumes.

“Mobile internet continues to be strong in the Philippines. With the internet becoming more and more accessible, and with unlimited number of free apps available, Trend Micro recommends that users practice a stronger sense of discernment in downloading. This is the first step in ensuring their data privacy protection,” says Myla Pilao, director for Core technology, Trend Micro.

Trend Micro’s Q1 2013 Security Roundup also highlighted multiple zero-day exploits found targeting popular applications like Java, Adobe Flash Player, Acrobat and Reader.

Other Prominent Q1 threats, includes:

Zero-Day Attacks

New attacks against Oracle’s Java and Adobe’s Flash Player, Acrobat and Reader reveal that vulnerabilities are emerging faster than they can be patched and are quickly being incorporated into professional attack kits such as the “Black Hole Exploit Kit.”

“Of course Java is cross-platform and that is somewhat attractive to criminals, but what is really attractive is it’s vulnerabilities and it’s ubiquity,” said Rik Ferguson, Trend Micro’s VP, Security Research. “This definitely won’t be the last zero-day vulnerability in Java and it won’t be the end of the vast attack surface that it currently offers to criminals.”

Attacks on South Korea

The high-profile attacks executed in South Korea this March reinforce that theft is no longer the sole focus of hacking efforts, but rather these breaches are also designed to cripple critical networks via innovative techniques including: (i) multiplatform focus such as UNIX and LINUX, (ii) specific countermeasures for installed security software, (iii) hijacking of patch management systems.

“Given the capability of what took place in South Korea, it is likely that increasingly destructive attacks will continue to be a threat,” said Tom Kellermann, VP, Cyber Security. “With each quarter, attacks are becoming bolder and more targeted, pointing to concerns far beyond the compromise of personal data.”
COMMENT DISCLAIMER: Reader comments posted on this Web site are not in any way endorsed by MST.ph. Comments are views by manilastandardtoday.com readers who exercise their right to free expression and they do not necessarily represent or reflect the position or viewpoint of manilastandardtoday.com. While reserving this publication’s right to delete comments that are deemed offensive, indecent or inconsistent with MST.ph editorial standards, MST.ph may not be held liable for any false information posted by readers in this comments section
comments powered by Disqus