[governance] Symantec Report
Martial Bavou[Private Business Account]
bavouc at gmail.com
Sat Oct 6 14:15:56 EDT 2012
HI Charity,
Thanks sharing this with us, look great, but just few unclear points for me,
what do they mean by:
- **There were 55,294 malicious domains in 2011 versus 42,296 in
2010.
- It took Symantec 18 seconds to hack an Android phone.
Thanks
From: governance-request at lists.igcaucus.org
[mailto:governance-request at lists.igcaucus.org] On Behalf Of Charity Gamboa
Sent: Friday, October 05, 2012 8:14 PM
To: governance at lists.igcaucus.org
Cc: charity.g.embley at ttu.edu
Subject: [governance] Symantec Report
Hi all,
I attended a Symantec Security workshop/lecture at Texas Tech University
last Thursday. The following report was presented by Nivk L. Kael, Senior
Principal Security Strategist. Here are a few things I was able to note
down:
**Mr. Kael started by saying that there is a large number of hacking in
universities globally. The main reason for this is selling everyone's
information (Identity Theft). It might be old news but the reason behind it
is money.
**There were 5.5 billion attacks in 2011 compared to 3 billion attacks in
2010.
**Number in spamming dropped to 6.2 million in 2011 compared to 2010's 4.2
million - but that's just to say that anybody shouldn't be fooled by that
number.
**There were 403 million malware in 2011 compared to 2010's 28.6 million.
**There were 55,294 malicious domains in 2011 versus 42,296 in 2010.
**There were 315 million MOBILE vulnerabilities in 2011 versus 163 million
in 2010.
**It was noted that the US and China topped first and second, respectively,
on malicious activity by source overall.
**The following sites were cosnidered vulnerable to a lot of malicious
attacks:
1. religious/ideologies
2. hosting/personal sites
3. pornography
4. entertainment/music
5. economy
6. technology/computer/Internet
7. travel
8. sports
9. automobile
10. shopping
**Malware will continue to rise because cybercriminals are taking advantage
of social media. Social media is viral in nature and people are less
suspicious of content from friends.
**QR codes are being used as an attack tool aka attack tagging - usually
deliver trojans and other malware. Read more about the Jester hacker.
**Symantec did a study called "Project Honey Stick" where they left iphones
intentionally in several cities like Los Angeles, San Francisco and
Washington D.C. Symantec tracked the phone's activities. They found out that
only 50% tried or even attempted to return; and 96% attempted personal and
app access.
**Be careful of the wifi pineapple.
**It took Symantec 18 seconds to hack an Android phone.
Have a great weekend!
Regards,
Charity Gamboa-Embley
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.igcaucus.org/pipermail/governance/attachments/20121006/c541f76d/attachment.htm>
-------------- next part --------------
____________________________________________________________
You received this message as a subscriber on the list:
governance at lists.igcaucus.org
To be removed from the list, visit:
http://www.igcaucus.org/unsubscribing
For all other list information and functions, see:
http://lists.igcaucus.org/info/governance
To edit your profile and to find the IGC's charter, see:
http://www.igcaucus.org/
Translate this email: http://translate.google.com/translate_t
More information about the Governance
mailing list