Secure Computing Reports Threats

Secure Computing announces top threats in 2Q08 and predicts trends for remainder of year

August 12, 2008

2 Min Read
Network Computing logo

SAN JOSE, Calif. -- Secure Computing Corporation (Nasdaq: SCUR), a leading enterprise gateway security company, today published the companys Q2 Internet Threat Report containing data and analysis from the Secure Computing research team. Among other findings, the report shows that while spam volume and new zombies have decreased in the past quarter, enterprises and home users are increasingly being attacked through malicious Web content and blended security attacks.

The Secure Computing report states that even though the overall spam volume is up 280 percent from Q2 2007 to Q2 2008, spam volumes have decreased by 40 percent this quarter. In addition, Q2 of 2007 witnessed over 300,000 new zombies per day, and during the second quarter of 2008 Secure saw half that amount. Even though both spam and new zombies are down this year, Secure Computing researchers point to other areas that are increasingly problematic, including:

  • Over 16 percent of all spam originates from the U.S., more than twice the amount of the No. 2 country, Russia.

  • Male enhancement, product replica and prescription drug spam hold the top three places of types of spam, proving that you can’t beat the oldies but goodies.

  • Swizzor, a rapidly growing ad/spyware family, now makes up more than 30 percent of all new malware in Q2 of 2008.

  • The ZBot spyware family is another such ad/spyware family that has grown significantly this quarter. ZBot steals users’ sensitive data while establishing a backdoor on infected computers to give the attackers full control over compromised systems.

  • 50 percent of all websites are now published in languages other than English

“We are witnessing change every single day in how the cybercriminals are developing new vectors of attack through spam, malicious Web content, spyware and botnet deployments,” said Dmitri Alperovitch, director of intelligence analysis at Secure Computing. “Through our advanced TrustedSource™ global reputation system and our research team’s ability to analyze and classify terabytes of email, Web and network traffic in real-time, we are in an excellent position to identify new trends and protect our customers from new insidious threats.”

Secure Computing Corp.

SUBSCRIBE TO OUR NEWSLETTER
Stay informed! Sign up to get expert advice and insight delivered direct to your inbox

You May Also Like


More Insights