digital attacks! - securitycoverage · securitycoverage presents...digital attacks! the invasion...

1
SecurityCoverage Presents... Digital Attacks! The Invasion Begins... The Digital Battlefield Turning the Tide... Desktop Security Still A Battleground. Q1 2013 16k 11 669 Mobile Malware discoveries, by year: Simple attacks growing, becoming more sophisticated. The Situation Seems Hopeless... What is the Enemy Looking For? Hope is not lost... Fight back with preparation! How the advent of mobile smart devices and Mobile Malware invasion has changed conventional thinking about mobile device security. The last three years have seen staggering growth in mobile malware discoveries. 2013 is poised to be the highest year yet! 1 Social engineering uses common information you post on social networks to create more personalized phishing email to increase click through rates. Attacks have become commonplace. Using data gathered through social media makes victims more susceptible to falling victim to an attack! Attacks on social media and personal data are relentless. Check out just some of the examples below to see what has happened in Q1 2013 alone! Even though smart devices are being attacked in record numbers, Desktop computers are still being attacked at astounding rates! 3 16,047 attacks per day 669 attacks per hour 11 attacks per minute Digital invaders are looking to steal your personal information. Finances, contacts, SMS text messages, passwords and anything else they can get their slimy appendages on. Taking simple preventative measures including OS updates can stop up to 96% of cyberattacks. 4 Open rate on “spearfishing attack emails, targeted at users based on social media activity. 2 Scribd accounts hacked! Wordpress accounts hacked! Living Social accounts breached! Vudu requires customers to reset passwords after breach! increase in the amount of e-mail attacks. 2 70% 1,000,000 90,000 50,000,000 56% Anti-virus & Malware Protection is now just as important for smartphones as it is for desktop computers! Coupling it with powerful anti-theft features to lock, locate, message or wipe a stolen device protects you from electronic and physical threats. They want your data... so protecting your files, photos and contacts is crucial. Use secure cloud tech to keep your information and mobile lifestyle away from the front line of this battle. Keeping your password secret is important. Using complex and unique passwords shields your identity from nasty invader probes. 1: AV-Test Android Malware Statistics: Android samples stats with avg growth rate projections. June 2011 - Jan 2013 *Projected growth over the first half of 2013. www.av-test.org 2: FireEye, Inc. Whitepaper: (http://www2.fireeye.com/wp_spearphishing.html?x=FE_WEB_IC) 3: Desktop Quarterly Malware Report: SecurityCoverage, January 2013-March 2013 4. 2011 Data Breach Investigations Report: (http://www.verizonenterprise.com/resources/reports/rp_data-breach-investigations-report-2011_en_xg.pdf) Brought to you by: www.securitycoverage.com (319) 298-4700 Sources 2013 869,474* 1st Half 2012 87,103 2nd Half 2012 38,415 1st Half Trojans - 1,001,712 Java Exploit - 179,896 Malware - 77,316 Adware - 19,077 Worm/Other - 5,735 Twitter accounts hacked! 250,000 ® JBP

Upload: others

Post on 31-Aug-2019

6 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Digital Attacks! - SecurityCoverage · SecurityCoverage Presents...Digital Attacks! The Invasion Begins... The Digital Battlefield Turning the Tide... Desktop Security Still A Battleground

SecurityCoverage Presents...

Digital Attacks!

The Invasion Begins...

The Digital Battlefield

Turning the Tide...

Desktop SecurityStill A Battleground.

Q1 2013

16k

11

669

Mobile Malware discoveries, by year:

Simple attacks growing, becoming more sophisticated.

The Situation Seems Hopeless...

What is the Enemy Looking For?

Hope is not lost... Fight back with preparation!

How the advent of mobile smart devices and Mobile Malware invasion has changed conventional thinking about mobile device security.

The last three years have seen

staggering growth in mobile

malware discoveries. 2013

is poised to be the highest

year yet!1

Social engineering uses common

information you post on social

networks to create more

personalized phishing email to

increase click through rates.

Attacks have become

commonplace. Using data

gathered through social media

makes victims more susceptible

to falling victim to an attack!

Attacks on social media and

personal data are relentless.

Check out just some of the

examples below to see what has

happened in Q1 2013 alone!

Even though smart devices are being attacked in record numbers, Desktop computers are still being attacked at astounding rates!3

16,047 attacks per day

669 attacks per hour

11 attacks per minute

Digital invaders are looking to

steal your personal information.

Finances, contacts, SMS text

messages, passwords and

anything else they can get their

slimy appendages on.

Taking simple preventative

measures including OS updates

can stop up to 96% of

cyberattacks.4

Open rate on “spearfishing attack emails, targeted at users based

on social media activity.2

Scribd accounts hacked!

Wordpress accounts hacked!

Living Social accounts breached!

Vudu requires customers to reset passwords after breach!

increase in the amount of e-mail attacks.2

70%

1,000,000

90,000

50,000,000

56%

Anti-virus & Malware Protection is now just as important for smartphones as it is for desktop computers! Coupling it with powerful anti-theft features to lock, locate, message or wipe a stolen device protects you from electronic and physical threats.

They want your data... so protecting your files, photos and contacts is crucial. Use secure cloud tech to keep your information and mobile

lifestyle away from the front line of this battle.

Keeping your password secret is important. Using complex and unique passwords shields your identity from nasty invader probes.

1: AV-Test Android Malware Statistics: Android samples stats with avg growth rate projections. June 2011 - Jan 2013 *Projected growth over the first half of 2013. www.av-test.org

2: FireEye, Inc. Whitepaper: (http://www2.fireeye.com/wp_spearphishing.html?x=FE_WEB_IC)

3: Desktop Quarterly Malware Report: SecurityCoverage, January 2013-March 2013

4. 2011 Data Breach Investigations Report: (http://www.verizonenterprise.com/resources/reports/rp_data-breach-investigations-report-2011_en_xg.pdf)

Brought to you by:

www.securitycoverage.com (319) 298-4700

Sources

2013869,474*

1st Half

201287,103

2nd Half

201238,415

1st Half

Trojans - 1,001,712

Java Exploit - 179,896

Malware - 77,316

Adware - 19,077

Worm/Other - 5,735

Twitter accounts hacked!250,000

®

JBP