Media releases are provided as is by companies and have not been edited or checked for accuracy. Any queries should be directed to the company itself.

F-Secure Q3 Security Threat Summary: Social Media Continue to Attract Criminals

F-Secure reports on major security developments, including leaner and more secure operating systems, the growing importance of safe search results, cybercriminals exploiting social networking websites and celebrity deaths and the re-emergence of past mobile threats.
  • 01 October, 2009 16:10

<p>F-Secure today released its Third Quarter 2009 Security Threat Summary. One of the notable trends during the quarter was a shift to leaner and more secure operating systems. Broadband Internet access continues to increase, but computing resources have not kept pace with software demands.</p>
<p>As a result, lighter software and optimised performance have become a focus for the software industry. The August release of Mac OSX Snow Leopard was already evidence of this trend, and also included antivirus software to protect against trojans. Microsoft’s soon to be released Windows 7 operating system is also set to be leaner and more secure than its predecessor, Windows Vista, whose insistent user access control feature actually prompted many users to turn it off completely – a potentially unsafe situation. Google announced that it is developing the forthcoming Google Chrome OS using minimalist design principles since most of the applications running on the new OS will be hosted on the web.</p>
<p>More secure browsing</p>
<p>During the third quarter, Firefox introduced its new private browsing feature, and released Firefox 3.5.3, which introduced a notification feature for outdated versions of Adobe Flash Player in an effort to reduce security vulnerabilities often created when users don’t keep this software up to date.</p>
<p>Search engine competition is good for security
On the search engine front, Microsoft and Yahoo! agreed to replace Yahoo!’s search engine with Bing. Microsoft hopes to compete with Google by offering unique features in Bing, such as adult content filtering. Safe search results are now an important feature for consumers. The deaths of Michael Jackson, Farrah Fawcett and Patrick Swayze were quickly exploited by criminals through search engine optimisation attacks, which often pointed people to rogue antivirus products. The H1N1 flu has also been used as an emotional "hook" to lead Internet users to scam sites.</p>
<p>Social media and networks under attack</p>
<p>As Facebook reached 300 million accounts in September, social media and social networks have continued to attract criminal and political interest. Personal networking connections offer trusted authentication, which criminals abuse by compromising user accounts and linking to malicious sites. F-Secure reminds Internet users about the importance of strong passwords, and that Facebook passwords should be different than passwords associated with the e-mails used to log into Facebook.</p>
<p>In August, news emerged that Twitter was used to direct botnets. Twitter accounts are also being used to push rogue AV products.</p>
<p>Politically motivated DDoS attacks</p>
<p>Also in August, a Georgian blogger’s Twitter, Facebook, LiveJournal, Google Blogger and YouTube accounts were jammed by a politically motivated DDoS attack, as reported by Elinor Mills on CNET.</p>
<p>In another coordinated DDoS attack during Malaysia’s National Day on August 31st, hackers targeted a Malaysian-based web host and defaced more than 100 websites, including those belonging to Malaysia’s national institutes, universities, media and businesses.</p>
<p>Mobile threats make a comeback</p>
<p>In the world of mobile phone security, this quarter witnessed the re-emergence of the SMS worm, Yxe (also known as Sexy View) – this time in the form of Sexy Space, which behaves much like its predecessor. The new variant, Yxe.D, is again Symbian-Signed, but with a certificate from a different company in China than the earlier version.</p>
<p>The old “missed call scam” is also making a comeback. The scam involves a call from an unknown international number, which is immediately dropped when answered. When the curious person calls the number back, she hears a busy tone audio file, when in fact the call is being charged at a premium rate. F-Secure recommends a Google or WhoCallsMe search on unusual numbers before returning unknown calls to avoid nasty surprises in the phone bill.</p>
<p>To read the full Threat summary, please visit http://www.f-secure.com/2009.</p>
<p>F-Secure – Protecting the irreplaceable</p>
<p>While you concentrate on what is important to you, we make sure you are protected and safe online whether you are using a computer or a smartphone. We also backup and enable you to share your important files. Our services are available through more than 200 operators around the world and are trusted in millions of homes and businesses. Founded in 1988, F-Secure is listed on NASDAQ OMX Helsinki Ltd. www.f-secure.com</p>

Most Popular

Essentials

Mobile

Sansai 6-Outlet Power Board + 4-Port USB Charging Station

Learn more >

Exec

Budget

Back To Business Guide

Click for more ›

Most Popular Reviews

Join the newsletter!

Or
Error: Please check your email address.

Latest Articles

Resources

PCW Evaluation Team

Louise Coady

Brother MFC-L9570CDW Multifunction Printer

The printer was convenient, produced clear and vibrant images and was very easy to use

Edwina Hargreaves

WD My Cloud Home

I would recommend this device for families and small businesses who want one safe place to store all their important digital content and a way to easily share it with friends, family, business partners, or customers.

Walid Mikhael

Brother QL-820NWB Professional Label Printer

It’s easy to set up, it’s compact and quiet when printing and to top if off, the print quality is excellent. This is hands down the best printer I’ve used for printing labels.

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?