Subscribe free to our newsletters via your
. Solar Energy News .




CYBER WARS
Cyber crooks step up weapons production: report
by Staff Writers
San Francisco (AFP) May 22, 2012


Cyber criminals are cranking out new weapons at a brisk pace, tailoring malicious software for a spectrum of gadgets including smartphones, tablets, and Macintosh computers, a security firm said.

A "threats report" released late Monday by McAfee showed that the number of new pieces of malicious code, or "malware," targeting Windows machines in the first three months of this year was the highest in four years.

There was also a rise in malware aimed at mobile gadgets running on Google-backed Android software and at Macintosh computers based on Apple operating systems, according to the report.

"In the first quarter of 2012, we have already detected eight million new malware samples, showing that malware authors are continuing their unrelenting development," said McAfee Labs senior vice president Vincent Weafer.

"The same skills and techniques that were sharpened on the PC platform are increasingly being extended to other platforms, such as mobile and Mac."

For a long time cyber criminals concentrated their attention on getting into Windows-powered personal computers (PCs) because the popularity of the operating system meant a wealth of potential victims.

But as Apple and Android devices have caught on around the world, they have emerged as a new target.

"As more homes and businesses use these platforms, the attacks will spread," Weafer said.

While Mac malware has been steadily proliferating, it is still a small fraction of what has been developed for PCs, according to McAfee.

The amount of spam in the quarter dropped to slightly more than a trillion trash messages monthly, with significant decreases in Brazil, Russia, and Indonesia and increases in China, Britain, Germany, Poland, and Spain.

The number of networks of virus-infected computers, referred to as "botnets," rose to nearly five million, with Colombia, Japan, Poland, Spain and the United States seeing the biggest increases.

Hackers use ploys such as booby-trapped emails or links to secretly infect machines with malware that can let them not only steal data or track keystrokes but use the infected machines to launch further attacks.

The United States was the primary address for botnets and cyber attacks in the quarter, McAfee reported.

Cyber crooks sell malware software kits and rent out use of botnets, according to Internet security specialists and law enforcement.

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Armenia jails Russian computer virus 'mastermind'
Yerevan (AFP) May 22, 2012
A court in Armenia on Tuesday gave a four-year jail sentence to the alleged Russian mastermind behind a computer virus crime group which infected some 30 million computers worldwide. Hacker Georgiy Avanesov was convicted of computer sabotage, Armenian prosecutor's office spokeswoman Sonia Truzian told AFP. "According to the evidence presented to the court, Avanesov, using a Botnet comput ... read more


CYBER WARS
Maps of Miscanthus genome offer insight into grass evolution

Relative reference: Foxtail millet offers clues for assembling the switchgrass genome

Lawrence Livermore work may improve the efficiency of the biofuel production cycle

Discovery of plant proteins may boost agricultural yields and biofuel production

CYBER WARS
Paralyzed individuals use thought-controlled robotic arm to reach and grasp

Paralysed woman's thoughts control a DLR robot

People with paralysis control robotic arms to reach and grasp using brain computer interface

Japan firm unveils gesture controlling device

CYBER WARS
US DoI Approves Ocotillo Express Wind Project

Opening Day Draws Close for Janneby Wind Testing Site

NASA Satellite Measurements Imply Texas Wind Farm Impact on Surface Temperature

Scientists find night-warming effect over large wind farms in Texas

CYBER WARS
Toyota overtakes GM, regains number one spot

Calif. passes 'self-driving' cars bill

Tesla to launch electric sedan in US on June 22

Tilting Cars On The Assembly Line: A New Angle On Protecting Autoworkers

CYBER WARS
Paraguay renews efforts to find oil

Sudan war planes bomb South Sudan: South minister

Iraq seeks drones to protect oil facilities

Oxygen-separation membranes could aid in CO2 reduction

CYBER WARS
UK proposes energy market overhaul to boost nuclear

US nuclear chief resigns after safety spat

AREVA and Mitsubishi partner in mining exploration

Japan to control up to 76% of TEPCO voting rights

CYBER WARS
Japan urges lower energy use amid shortage fears

A practical guide to green products and services

The quick and easy way to measure power consumption

China posed for carbon emissions scheme

CYBER WARS
Brazil fights illegal logging to protect Amazon natives

UF study finds logging of tropical forests needn't devastate environment

Brazil's threatened Awa tribe outnumbered, group says

Model Forecasts Long-Term Impacts of Forest Land-Use Decisions




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement