Subscribe free to our newsletters via your
. Nuclear Energy News .




CYBER WARS
Cyber crooks step up weapons production: report
by Staff Writers
San Francisco (AFP) May 22, 2012


Cyber criminals are cranking out new weapons at a brisk pace, tailoring malicious software for a spectrum of gadgets including smartphones, tablets, and Macintosh computers, a security firm said.

A "threats report" released late Monday by McAfee showed that the number of new pieces of malicious code, or "malware," targeting Windows machines in the first three months of this year was the highest in four years.

There was also a rise in malware aimed at mobile gadgets running on Google-backed Android software and at Macintosh computers based on Apple operating systems, according to the report.

"In the first quarter of 2012, we have already detected eight million new malware samples, showing that malware authors are continuing their unrelenting development," said McAfee Labs senior vice president Vincent Weafer.

"The same skills and techniques that were sharpened on the PC platform are increasingly being extended to other platforms, such as mobile and Mac."

For a long time cyber criminals concentrated their attention on getting into Windows-powered personal computers (PCs) because the popularity of the operating system meant a wealth of potential victims.

But as Apple and Android devices have caught on around the world, they have emerged as a new target.

"As more homes and businesses use these platforms, the attacks will spread," Weafer said.

While Mac malware has been steadily proliferating, it is still a small fraction of what has been developed for PCs, according to McAfee.

The amount of spam in the quarter dropped to slightly more than a trillion trash messages monthly, with significant decreases in Brazil, Russia, and Indonesia and increases in China, Britain, Germany, Poland, and Spain.

The number of networks of virus-infected computers, referred to as "botnets," rose to nearly five million, with Colombia, Japan, Poland, Spain and the United States seeing the biggest increases.

Hackers use ploys such as booby-trapped emails or links to secretly infect machines with malware that can let them not only steal data or track keystrokes but use the infected machines to launch further attacks.

The United States was the primary address for botnets and cyber attacks in the quarter, McAfee reported.

Cyber crooks sell malware software kits and rent out use of botnets, according to Internet security specialists and law enforcement.

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Armenia jails Russian computer virus 'mastermind'
Yerevan (AFP) May 22, 2012
A court in Armenia on Tuesday gave a four-year jail sentence to the alleged Russian mastermind behind a computer virus crime group which infected some 30 million computers worldwide. Hacker Georgiy Avanesov was convicted of computer sabotage, Armenian prosecutor's office spokeswoman Sonia Truzian told AFP. "According to the evidence presented to the court, Avanesov, using a Botnet comput ... read more


CYBER WARS
Maps of Miscanthus genome offer insight into grass evolution

Relative reference: Foxtail millet offers clues for assembling the switchgrass genome

Lawrence Livermore work may improve the efficiency of the biofuel production cycle

Discovery of plant proteins may boost agricultural yields and biofuel production

CYBER WARS
China criticizes solar anti-dumping ruling

New DuPont Solamet PV51G Provides Better Adhesion

Hanwha Solar Launches Three New Modules at SNEC Power Expo 2012

First Light Technologies launches WLB Series Solar LED Bollard

CYBER WARS
US DoI Approves Ocotillo Express Wind Project

Opening Day Draws Close for Janneby Wind Testing Site

NASA Satellite Measurements Imply Texas Wind Farm Impact on Surface Temperature

Scientists find night-warming effect over large wind farms in Texas

CYBER WARS
Japan urges lower energy use amid shortage fears

A practical guide to green products and services

The quick and easy way to measure power consumption

China posed for carbon emissions scheme

CYBER WARS
Paraguay renews efforts to find oil

Sudan war planes bomb South Sudan: South minister

Iraq seeks drones to protect oil facilities

Oxygen-separation membranes could aid in CO2 reduction

CYBER WARS
Newfound exoplanet may turn to dust

Cosmic dust rings no guarantee of planets

In search of new 'Earths' beyond our Solar System

Free-floating planets in the Milky Way outnumber stars by factors of thousands

CYBER WARS
Britain's first female warship commander takes up post

Lockheed Martin's Aegis Computer Program Development Approved by U.S. Navy for Australian Warfare Destroyer

Taiwan says China to build two aircraft carriers

Chile advances plan to build submarine

CYBER WARS
NASA Goddard Delivers Magnetometers for NASA's Next Mission to Mars

To the Highlands of Mars

Opportunity Rolling Again After Fifth Mars Winter

Mojave Desert Tests Prepare for NASA Mars Roving




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement