Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Security Response
Showing posts tagged with Endpoint Protection (AntiVirus)
Showing posts in English
Dean Turner | 22 Mar 2007 07:00:00 GMT | 0 comments

Predicting the future of Internet threat activity is a bit likepredicting the weather; it is primarily accomplished with theapplication of science and technology, but it also includes the skillof human observation. The "Future Watch" section of the recentlyreleased Internet Security Threat Report, Volume XI, uses allof the resources available to Symantec, some of which include theSymantec™ Global Intelligence Network, the BugTraq™ mailing list, theSymantec Probe Network, as well as malicious code data gathered alongwith spyware and adware reports from over 120 million client, server,and gateway systems that have deployed Symantec’s antivirus products.We also consult with our numerous security experts who, like goodweather forecasters, don't have to wait for the clouds to know a stormis coming.

Between July 1 and December 31, 2006, Symantec blocked over 1.5billion phishing messages, an increase of 19 percent over the firsthalf of 2006. One of the predictions...

Dean Turner | 22 Mar 2007 07:00:00 GMT | 0 comments

Predicting the future of Internet threat activity is a bit likepredicting the weather; it is primarily accomplished with theapplication of science and technology, but it also includes the skillof human observation. The "Future Watch" section of the recentlyreleased Internet Security Threat Report, Volume XI, uses allof the resources available to Symantec, some of which include theSymantec™ Global Intelligence Network, the BugTraq™ mailing list, theSymantec Probe Network, as well as malicious code data gathered alongwith spyware and adware reports from over 120 million client, server,and gateway systems that have deployed Symantec’s antivirus products.We also consult with our numerous security experts who, like goodweather forecasters, don't have to wait for the clouds to know a stormis coming.

Between July 1 and December 31, 2006, Symantec blocked over 1.5billion phishing messages, an increase of 19 percent over the firsthalf of 2006. One of the predictions...

Joseph Blackbird | 21 Mar 2007 07:00:00 GMT | 0 comments

As spring quickly approaches, the Internet continues to grow into amore and more complex world driven by commerce. Businesses have longsince moved in and millions of dollars change hands every day online.Along with big business comes organized crime. Perhaps not necessarilythe organized crime immortalized in stories like The Godfather or The Sopranos,but Internet crimes are carried out in an organized way designed toconnect the theft of a single person’s user account credentials to abuyer on the mass market for illegal information. Throughout thisorganization, bots play the leading role.

Bots, once used primarily by their owners to carry out denial ofservice attacks driven by grudges, bragging rights, or politicalmotives, have been firmly incorporated into the toolkit of organizedcrime on the Internet. Bots can do pretty much anything: carry outattacks, host spam relays, carry out DoS attacks, host phishing sites,and log keystrokes on the computer they...

Joseph Blackbird | 21 Mar 2007 07:00:00 GMT | 0 comments

As spring quickly approaches, the Internet continues to grow into amore and more complex world driven by commerce. Businesses have longsince moved in and millions of dollars change hands every day online.Along with big business comes organized crime. Perhaps not necessarilythe organized crime immortalized in stories like The Godfather or The Sopranos,but Internet crimes are carried out in an organized way designed toconnect the theft of a single person’s user account credentials to abuyer on the mass market for illegal information. Throughout thisorganization, bots play the leading role.

Bots, once used primarily by their owners to carry out denial ofservice attacks driven by grudges, bragging rights, or politicalmotives, have been firmly incorporated into the toolkit of organizedcrime on the Internet. Bots can do pretty much anything: carry outattacks, host spam relays, carry out DoS attacks, host phishing sites,and log keystrokes on the computer they...

Ron Bowes | 20 Mar 2007 07:00:00 GMT | 0 comments

The default install of OpenBSD is well known to have one of the mostsecure default installations available. The OpenBSD team hastraditionally enjoyed the luxury of claiming to have only a singleremotely exploitable vulnerability the past 10 years. However, CoreSecurity recently discovered a new vulnerability in the IPv6 stack of OpenBSD. As a result, the OpenBSD project had to change the text on their main page to: “Only two remote holes in the default install, in more than 10 years!”

A buffer overflow may be triggered when a fragmented IPv6 packet isreceived. Although this was originally thought by the vendor to be nomore than a denial of service issue, a proof of concept exploit wasdeveloped, proving that the vulnerability is exploitable. The totaltime elapsed between the vulnerability being initially disclosed...

Marc Fossi | 20 Mar 2007 07:00:00 GMT | 0 comments

Six months ago, in the previous volume of Symantec's Internet Security Threat Report,I wrote that we were seeing a shift away from “noisy” worms towardstargeted Trojans that attract less attention. In the second half of2006, this trend remained true, as the volume of Trojans reported bySymantec customers increased and the volume of worms decreased. At thesame time, a lot of these Trojans are becoming more sophisticated.

In the latest edition of the Internet Security Threat Report,we note that multi-stage downloaders, also referred to as modularTrojans, are becoming more prevalent most likely because of theirversatility. The first stage of these downloaders is usually a smallTrojan that disables your security and antivirus applications thendownloads a more complex threat. Since the initial stage disablessecurity applications, the second stage can be almost...

Marc Fossi | 20 Mar 2007 07:00:00 GMT | 0 comments

Six months ago, in the previous volume of Symantec's Internet Security Threat Report,I wrote that we were seeing a shift away from “noisy” worms towardstargeted Trojans that attract less attention. In the second half of2006, this trend remained true, as the volume of Trojans reported bySymantec customers increased and the volume of worms decreased. At thesame time, a lot of these Trojans are becoming more sophisticated.

In the latest edition of the Internet Security Threat Report,we note that multi-stage downloaders, also referred to as modularTrojans, are becoming more prevalent most likely because of theirversatility. The first stage of these downloaders is usually a smallTrojan that disables your security and antivirus applications thendownloads a more complex threat. Since the initial stage disablessecurity applications, the second stage can be almost...

Dean Turner | 19 Mar 2007 07:00:00 GMT | 0 comments

Twice yearly, Symantec publishes a comprehensive report on theoverall worldwide Internet threat landscape. With a dedicated team ofresearchers, authors, and the support of over 1,800 analysts worldwide,the Symantec Internet Security Threat Report has become oneof the largest publicly available reports of its kind.The reportprovides a window into the world of malicious code, network attacks,vulnerabilities, phishing, and spam. With a threat landscape dominatedby data theft, data leakage, fraud, and coordinated criminal activity,the team behind the report recognized the importance of looking notjust at the types and volume of the attacks, but how, where, and whythey take place. For the first time in this report, we discuss not onlythe root causes behind these types of activities, but where theseactivities take place in the world and what they’re worth in anunderground economy.

We’ve seen a gradual process where blended threats have morphed froma single attack...

Dean Turner | 19 Mar 2007 07:00:00 GMT | 0 comments

Twice yearly, Symantec publishes a comprehensive report on theoverall worldwide Internet threat landscape. With a dedicated team ofresearchers, authors, and the support of over 1,800 analysts worldwide,the Symantec Internet Security Threat Report has become oneof the largest publicly available reports of its kind.The reportprovides a window into the world of malicious code, network attacks,vulnerabilities, phishing, and spam. With a threat landscape dominatedby data theft, data leakage, fraud, and coordinated criminal activity,the team behind the report recognized the importance of looking notjust at the types and volume of the attacks, but how, where, and whythey take place. For the first time in this report, we discuss not onlythe root causes behind these types of activities, but where theseactivities take place in the world and what they’re worth in anunderground economy.

We’ve seen a gradual process where blended threats have morphed froma single attack...

Eric Chien | 16 Mar 2007 07:00:00 GMT | 0 comments

One of the principles behind malware is that it follows technologyand mainstream culture. If ninety percent of the world was using theEricOS, the vast majority of threats would be designed to run on theEricOS because otherwise the threat would have nothing to infect.

In China, online computer usage patterns affect the types of malwareSymantec sees there. In particular, if you walk into an Internet cafein China, rarely do you see people using search engines like Google oron Web sites like MySpace. Instead, the vast majority of people haveheadphones on and are playing online games such as Lineage or World ofWarcraft.

Thus, Symantec sees a lot of Infostealers that attempt to stealcredentials for these types of online games. Once credentials arestolen, the hacker logs into the account, steals the virtual items, andthen attempts to sell them for real money through various boardsoutside the virtual gaming world.

An example of this threat is Lingling (...