Recommended Product
Network Security Audit Software
Network Security Audit Software and Computer Security Tools
  Learn More
 
 
  Network Security Software
Network Bandwidth Monitor

Network Bandwidth Monitor
NBMonitor displays real-time details about your network connections & bandwidth usage.

   
Network Access Monitoring

Network Access Monitoring
ShareAlarmPro monitors network access to shared folders and resources.

   
Product Key Finder
Product Key Finder

Product Key Explorer retrieves over 800 software product keys from network computers.
   
Network Shares Monitoring

Network Share Watcher
Monitors network folders permissions and identify shares which are violating company data access policy.

 
 

Network Security News 2009, 2010

Majority Of New Malware/ Banker Trojans

Thursday, April 1, 2010

Unfortunately for the rest of the world, PandaLabs has determined that malware makers are still hard at work. And unfortunately for everybody's finances, malware makers aren't content to churn out little "gotcha" tricks, instead focusing more than anything on banker Trojans.

Here are all of the unpleasant details in one bite: PandaLabs declared in a statement, "The amount of new malware in circulation has continued to increase at a record pace. In this first quarter, the most prevalent category was once again banker Trojans, accounting for 61 percent of all new malware."

Sean-Paul Correll, a threat researcher at PandaLabs, then followed up these observations by saying, "The growing prevalence of banker Trojans signals to us that online accounts for both consumers and businesses continue to be increasingly attractive financial targets for cybercriminals."

Correll also remarked, "In addition, the widespread availability of DIY kits online has spurred new, less technical individuals into the cybercrime business as evidenced by the Mariposa case."

So it looks like we're in for a rough year if some way isn't found to put a halt to the proliferation of this stuff.

Of course, it's possible to hope that the dismantling of Mariposa might be the start of a trend, but even the arrest of Mariposa's authors could prove to be a problem, considering that they may avoid serving jail time. Other cybercriminals will then have less of an incentive to switch career paths.

PandaLabs recommended that people try to stay safe by being especially cautious when searching for popular topics like the iPad and Facebook applications. Be careful on social networks, too, since malware authors are increasingly using those to distribute their creations.

View more news

 
  Most Popular
. Computer Security

. Ethical Hacking

. Windows 7: the untold story of how the enterprise gets snubbed

. Open source identity: Linux founder Linus Torvalds

. FAQ: How to protect your PC against the Downadup worm

. Brocade's new CTO takes aim at Cisco

. Heartland tries to rally industry in wake of data breach

. IBM confirms layoffs

. Apple puts iPhone Nano and Netbook rumors to rest

. Microsoft 'can't imagine' PS3 catching up to Xbox 360
 
 
  Popular Searches
 
 
 

 

Sponsored Links
Network Security Auditor
Nsauditor is a complete networking utilities package that includes more than 45 network tools and utilities for network auditing, scanning,network connections monitoring and more. For more information, please visit:
www.nsauditor.com


Password Recovery Software
SpotAuditor is All-in-one password recovery program that offers administrators and users a comprehensive solution for recovering passwords and other critical business information saved in users' computers. For more information, please visit:
www.password-recovery-software.com

BlueAuditor - Monitor YourBluetooth Network
BlueAuditor detects and monitors Bluetooth devices in a wireless network and allows network administrators to audit wireless networks against security vulnerabilities associated with the use of Bluetooth devices. For more information, please visit:
nsauditor.com/bluetooth_network_scanner.html