In the open forum on the cybersecuirty forum, Assistant Secretary Alan Cabanlong of the Department of Information and Communications Technology (DICT) urged the telecommunications and banking industries to adopt stronger security measures because these two sectors are the most attractive to cybercriminals
Globally, there were 430 million new malware variants discovered in 2015, a 36 percent increase from the previous year, proving that professional cybercriminals
are leveraging their vast resources in attempt to overwhelm defenses and enter corporate networks.
made active use of Tor anonymisation technology to hide command servers, and used Bitcoins for making transactions.
This year's first quarterly report sheds light into the cyber underground where creative cybercriminals
continue to find new opportunities to commit their crimes," remarked Raimund Genes, the chief technology officer for Trend Micro.
On the supply side, skilled hackers for the right price can package up and sell top grade exploits, exploit distribution networks, denial of service attacks, evasion packaging, ransomware capabilities, and stolen credentials, anything that makes cybercriminals
successful in their attack objective.
Whatever method cybercriminals
use when trying to penetrate a corporate network, they will have to confront these technologies.
The overall results provide strong evidence for the structure of cybercrimes in the context of the developing world, the existence of cybercrime laws, the nature of activities of cybercriminals
, and the public's lack of education to recognize cybercrime.
Favorites for cybercriminals
worldwide this quarter consisted of AutoRun malware (Generic
personal data online and the rise of the IoT environment, cybercriminals
Hawari pointed out that the increase of individuals connected and using mobile devices is making it easier for cybercriminals
In today's threat environment, the reach of cybercriminals
expands to more industries each year, with financial services, insurance, retailers, enterprises and government agencies especially vulnerable to new threats.
The list comprises 2010's most buzzed about platforms and services, including Google's Android, Apple's iPhone, foursquare, Google TV and the Mac OS X platform, which are all expected to become major targets for cybercriminals