Christmas Shopping Guide

IT security roundup: PH in top 10 list

In a country with a strong mobile internet penetration and where 95 million Filipinos own at least a mobile phone, and with unlimited number of free applications abound, thinking before downloading any application is tantamount to data protection. Trend Micro’s Q1 2013 Security Roundup Report prominently featured the Philippines in the top 10 list for the following: Top 10 Risk of privacy exposure due to app use, Top 10 Malicious android app download volumes and Top 10 with the highest battery-draining app downloads volumes. “Mobile internet continues to be strong in the Philippines. With the internet becoming more and more accessible, and with unlimited number of free apps available, Trend Micro recommends that users practice a stronger sense of discernment in downloading. This is the first step in ensuring their data privacy protection,” says Myla Pilao, director for Core technology, Trend Micro. Trend Micro’s Q1 2013 Security Roundup also highlighted multiple zero-day exploits found targeting popular applications like Java, Adobe Flash Player, Acrobat and Reader. Other Prominent Q1 threats, includes: Zero-Day Attacks New attacks against Oracle’s Java and Adobe’s Flash Player, Acrobat and Reader reveal that vulnerabilities are emerging faster than they can be patched and are quickly being incorporated into professional attack kits such as the “Black Hole Exploit Kit.” “Of course Java is cross-platform and that is somewhat attractive to criminals, but what is really attractive is it’s vulnerabilities and it’s ubiquity,” said Rik Ferguson, Trend Micro’s VP, Security Research. “This definitely won’t be the last zero-day vulnerability in Java and it won’t be the end of the vast attack surface that it currently offers to criminals.” Attacks on South Korea The high-profile attacks executed in South Korea this March reinforce that theft is no longer the sole focus of hacking efforts, but rather these breaches are also designed to cripple critical networks via innovative techniques including: (i) multiplatform focus such as UNIX and LINUX, (ii) specific countermeasures for installed security software, (iii) hijacking of patch management systems. “Given the capability of what took place in South Korea, it is likely that increasingly destructive attacks will continue to be a threat,” said Tom Kellermann, VP, Cyber Security. “With each quarter, attacks are becoming bolder and more targeted, pointing to concerns far beyond the compromise of personal data.”
COMMENT DISCLAIMER: Reader comments posted on this Web site are not in any way endorsed by The Standard. Comments are views by readers who exercise their right to free expression and they do not necessarily represent or reflect the position or viewpoint of While reserving this publication’s right to delete comments that are deemed offensive, indecent or inconsistent with The Standard editorial standards, The Standard may not be held liable for any false information posted by readers in this comments section.