. Medical and Hospital News .




.
CYBER WARS
Cyber crooks step up weapons production: report
by Staff Writers
San Francisco (AFP) May 22, 2012


Cyber criminals are cranking out new weapons at a brisk pace, tailoring malicious software for a spectrum of gadgets including smartphones, tablets, and Macintosh computers, a security firm said.

A "threats report" released late Monday by McAfee showed that the number of new pieces of malicious code, or "malware," targeting Windows machines in the first three months of this year was the highest in four years.

There was also a rise in malware aimed at mobile gadgets running on Google-backed Android software and at Macintosh computers based on Apple operating systems, according to the report.

"In the first quarter of 2012, we have already detected eight million new malware samples, showing that malware authors are continuing their unrelenting development," said McAfee Labs senior vice president Vincent Weafer.

"The same skills and techniques that were sharpened on the PC platform are increasingly being extended to other platforms, such as mobile and Mac."

For a long time cyber criminals concentrated their attention on getting into Windows-powered personal computers (PCs) because the popularity of the operating system meant a wealth of potential victims.

But as Apple and Android devices have caught on around the world, they have emerged as a new target.

"As more homes and businesses use these platforms, the attacks will spread," Weafer said.

While Mac malware has been steadily proliferating, it is still a small fraction of what has been developed for PCs, according to McAfee.

The amount of spam in the quarter dropped to slightly more than a trillion trash messages monthly, with significant decreases in Brazil, Russia, and Indonesia and increases in China, Britain, Germany, Poland, and Spain.

The number of networks of virus-infected computers, referred to as "botnets," rose to nearly five million, with Colombia, Japan, Poland, Spain and the United States seeing the biggest increases.

Hackers use ploys such as booby-trapped emails or links to secretly infect machines with malware that can let them not only steal data or track keystrokes but use the infected machines to launch further attacks.

The United States was the primary address for botnets and cyber attacks in the quarter, McAfee reported.

Cyber crooks sell malware software kits and rent out use of botnets, according to Internet security specialists and law enforcement.

Related Links
Cyberwar - Internet Security News - Systems and Policy Issues




.
.
Get Our Free Newsletters Via Email
...
Buy Advertising Editorial Enquiries




.

. Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle



CYBER WARS
Armenia jails Russian computer virus 'mastermind'
Yerevan (AFP) May 22, 2012
A court in Armenia on Tuesday gave a four-year jail sentence to the alleged Russian mastermind behind a computer virus crime group which infected some 30 million computers worldwide. Hacker Georgiy Avanesov was convicted of computer sabotage, Armenian prosecutor's office spokeswoman Sonia Truzian told AFP. "According to the evidence presented to the court, Avanesov, using a Botnet comput ... read more


CYBER WARS
Fukushima radiation mostly within accepted levels: WHO

Britain funds priority programs

Spain cuts aid to Caribbean, S. America

Research Opens Doors To UV Disinfection Using LED Technology

CYBER WARS
Scientists design indoor navigation system for blind

Chinese navigation system to cover Asia-Pacific this year

Northrop Grumman Successfully Demonstrates New Target Location Module

Thousands of Young Adventurers Kept Safe with M2M Connectivity from Eseye

CYBER WARS
Chimpanzees have human-like personalities

Urban landscape's power to hurt or heal

Anthropologists discover earliest form of wall art

Evolution's gift may also be at the root of a form of autism

CYBER WARS
Fighting bacteria's strength in numbers

We can learn a lot from other species

China at heart of ivory plunder surge, US Senate told

Taiwan uses DNA mapping to save endangered sharks

CYBER WARS
New discoveries about severe malaria

Flu shots during pregnancy could benefit babies: study

Biologists produce potential malarial vaccine from algae

Health experts narrow the hunt for Ebola

CYBER WARS
US says rights in China deteriorating

China police interrogate party members over letter

Group condemns China's para-police force of 'X-Men'

Chen revives debate on US influence in China

CYBER WARS
Iran navy saves US freighter from pirates: report

Jailing of marines hitting anti-piracy efforts: Italy

Armed N.Koreans kidnap Chinese sailors: reports

EU navies launch first land strike on Somali pirate assets

CYBER WARS
Hewlett-Packard to slash 27,000 jobs by 2014

China manufacturing slows: HSBC

Outside View: A fiscal tsunami

China must act to prevent hard landing: World Bank


Memory Foam Mattress Review

Newsletters :: SpaceDaily Express :: SpaceWar Express :: TerraDaily Express :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News

.

The content herein, unless otherwise known to be public domain, are Copyright 1995-2012 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement