in search of a quick return appear to have
Kaspersky Lab experts believe the demand for new malicious programs has reached a saturation point, as coding new malware has become expensive and cybercriminals
have realized the benefits of using intrusive advertising programs or legitimate digital signatures in their attacks.
Most resemble backalley muggings more than elaborately designed robberies, and cybercriminals
most often take the path of least resistance.
Greed is motivating cybercriminals
to take a non-traditional approach in the selection of unlikely targets, such as advanced threats to Point-of-Sale (PoS) terminals and the exploitation of disasters.
It used to be that cybercriminals
needed skills at all stages of the attack: reconnaissance, exploitation, evasion, etc.
invest heavily on purchasing and/or developing malware that can bypass most existing security solutions.
Yet they fail to protect their prized devices from cybercriminals
In addition, the report provides insight into the world of Russian-speaking cybercriminals
and how they interact with one another, describing the work of a virus expert, using the example of the latest version of Gpcode.
With the adoption of so many new mobile platforms, combined with the lack of security awareness and mobile safeguards, McAfee Labs expects cybercriminals
to use botnet infections to target mobile devices.
Research revealed that nearly 1 in 3 security professionals recommend negotiating with cybercriminals
for the return of stolen data or the restoration of encrypted files.
According a report by cybersecurity firm Trend Micro, Australia has become the main location of 'command and control' servers, which are used by cybercriminals
when they attack governments and businesses.
In today's threat environment, the reach of cybercriminals
expands to more industries each year, with financial services, insurance, retailers, enterprises and government agencies especially vulnerable to new threats.