Printer Friendly

Dell documents cyber criminal tactics.

Wondering what cyber attacks were most prolific last year - or what's on the horizon for mid 2014 and beyond? Well the Dell SonicWALL Threat Research Team has you covered.

Using real-time threat information collected anonymously from more than 1 million connected sensors around the world, the company's researchers have put together the "2013 Dell SonicWALL Security Threat Report," released March 2014. Key findings include that there were nearly 80 billion incidents worldwide last year of remotely accessed malware. Java was the No. 1 targeted application, followed closely by Internet Explorer and Adobe Flash Player. The SonicWALL team also documented a rise in bots relying on SSL-encrypted communication to command-and-control servers, which are attacks designed to evade detection by disguising communication in an encrypted session.

SonicWALL threat researchers also saw cyber criminals begin to deploy ransomware that leverages asymmetric key encryption to encrypt critical data on infected machines. They observed "a new Cryptolocker Trojan that, unlike traditional ransomware, leaves system access intact but encrypts various documents and executables found on the system." Sophisticated "hybrid" malware that infects both mobile and desktop systems is also expected to increase, with Android being the leading targeted platform.

The Windows XP and Windows 7/8 operating systems will also see a rise in attacks.

[ILLUSTRATION OMITTED]

Dell says that its SonicWALL security solutions detected and prevented 1.06 trillion IPS incidents and 1.78 billion malware downloads in 2013.

Download the full report at www.rsleads.com/406ht-250.

COPYRIGHT 2014 NP Communications, LLC
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2014 Gale, Cengage Learning. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback
Title Annotation:Network Vulnerabilities
Publication:Health Management Technology
Article Type:Report
Date:Jun 1, 2014
Words:243
Previous Article:Windows XP: threat to ePHI security and compliance? Don't believe everything you read.
Next Article:Hospital turns to flywheels for MRI back-up power.
Topics:

Terms of use | Copyright © 2017 Farlex, Inc. | Feedback | For webmasters