SHARE
Facebook X Pinterest WhatsApp

Report: Malware, Mobile Malware Seen as Primary Threats

Top Five Vulnerabilities Attackers Use Against Browsers Cybersecurity has never been more of a mainstream concern than right now. Consider the breaches at major retail outlets, Apple’s vulnerability in its iOS platform, Yahoo’s recent malvertising attack, or how a breach at the University of Maryland gets a mention on NPR’s game show, Wait, Wait Don’t […]

Written By
SP
Sue Poremba
Feb 24, 2014
Slide Show

Top Five Vulnerabilities Attackers Use Against Browsers

Cybersecurity has never been more of a mainstream concern than right now. Consider the breaches at major retail outlets, Apple’s vulnerability in its iOS platform, Yahoo’s recent malvertising attack, or how a breach at the University of Maryland gets a mention on NPR’s game show, Wait, Wait Don’t Tell Me.

Fortinet just released its 2014 Threat Landscape report, and I don’t think it could have come out at a better time. As we are inundated with news stories that tend to focus on sensationalism, the report provides a more realistic picture of what the threat landscape actually looks like right now.

The worst IT security problems probably aren’t too surprising: mobile malware, advanced persistent threats keeping up a steady attack on government and businesses, once dormant botnets that have returned to life, and the continuing rise of malware. But a surprising issue that the report identified was the startling amount of information theft. According to the report:

Information Security has trailed behind IT – often seen as an afterthought. Recent breaches of tens of millions of customers’ sensitive financial information has shed a new spotlight on security and the need for companies to build a comprehensive security posture to defend against the inevitable attacks on their systems.

The United States is a top target for malware infections, accounting for nearly 56 percent of total incidents in the top 10 countries most hit. Malware developers continue to take advantage of either our laziness or our gullibility with targeted attacks and phishing emails. There have been some changes in tactics to spread malware, though. According to the report:

2013 saw a year of cyclical change in the number of attempted attacks; as new exploits and tools were made available to the cyber underground, FortiGuard Labs saw a spike of incidents. Once these spikes were abated, we saw a brief lull in new infections, only to have another round of fresh attacks leveraging recently patched exploits and vulnerabilities.

Mobile malware, the report found, continues to target the Android platform, and it has picked up some serious steam over the last year. In early 2013, Fortinet saw 50,000 samples of Android-targeted malware per day. By the end of the year, that number jumped to 450,000 per day.

This is just a sample of what the threat landscape looks like today. It goes far deeper than the mainstream stories. Now the big question is: How prepared is your company to face these types of attacks?

SP

Sue Poremba is freelance writer based on Central PA. She's been writing about cybersecurity and technology trends since 2008.

Recommended for you...

5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Understanding the Relationship Between 5G and Edge Computing
Collins Ayuya
Apr 19, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.