Just In
- 6 hrs ago HONOR Pad 9 With Bluetooth Keyboard Up For Grabs At Rs 22,499 in India
- 6 hrs ago Report: Apple’s Foldable iPhone May Get Cancelled
- 7 hrs ago Deal Alert: Grab the Samsung Galaxy S23 Ultra for Under ₹90,000 on Flipkart – Here’s How
- 9 hrs ago OPPO F25 Pro New Coral Purple Colour Variant Launched in India; Where to Buy?
Don't Miss
- Lifestyle Aditi Rao Hydari's 8 Tips for Glowing Skin: A Celebrity Skincare Routine Unveiled, Bonus Tips Included!
- Sports RCB vs KKR, IPL 2024 Match Prediction: Who Will Win Today's Royal Challengers Bengaluru vs Kolkata Knight Riders Match?
- Movies Krishn Mohini Promo: Fahmaan Khan's New Show, Debattama Saha On Colors Channel
- Finance 1,190% Dividend Payout Soon: UBS Optimistic On Electrical Stock ABB, Recommends Buy For Rs 7,550 TP
- News Jailed Gangster-Turned-Politician Mukhtar Ansari Dies Of Heart Attack
- Automobiles Xiaomi SU7 Electric Car Launched – May End Apple Inc.
- Education RSMSSB Junior Instructor Recruitment 2024; Apply online for 2500 Posts, Check out for more details
- Travel Explore Tamil Nadu's Diverse Wedding Venues
Major Security Flaws in Email, Mobile, Cloud, And Supply Chain: Check Point Report
Check Point Software Technologies, a provider of cyber-security solutions globally has released its "Cyber Attack Trends: 2019 Mid-Year Report." The report reveals that no environment is immune to cyber-attacks. Threat actors continue to develop new toolsets and techniques, targeting corporate assets stored on cloud infrastructure, individuals' mobile devices, trusted third-party supplier applications and even popular mail platforms.
According to the report, this year there is over 50 per cent increase in mobile banking attacks compared to 2018. Banking malware is capable of stealing payment data, credentials and funds from victims' bank accounts, and new versions of this malware are ready for massive distribution by anyone willing to pay.
Threat actors are extending their attack vectors such as focusing on the supply chain. In software supply chain attacks, the threat actor typically implant a malicious code into legitimate software, by modifying and infecting one of the building blocks the software relies upon.
The report also suggests that there is a rise in email attacks. Email scammers have started employing various techniques which are specially designed to bypass security solutions and anti-spam filters such as encoded emails, images of the message embedded in the email body.
Apart from that, it also bypasses complex underlying code which mixes plain text letters with HTML characters. That's not it, this also allows scammers to remain under the radar of Anti-Spam filters and attack their targets.
As per the report, the cloud is equally vulnerable to cyber-attacks. Public cloud environments have witnessed an increase in cyber-attacks targeting enormous resources and sensitive data residing within these platforms.
Top Botnet Malware During H1 2019
1. Emotet (29%) - Emotet was first used to employ as a banking Trojan and recently is used as a distributor to other malware or malicious campaigns.
2. Dorkbot (18%) - IRC-based Worm designed to allow remote code execution by its operator, as well as the download of additional malware to the infected system, with the primary motivation being to steal sensitive information and launch denial-of-service attacks.
3. Trickbot (11%) - First appeared in 2016, since then it has been targeting banks mostly in Australia and the U.K, and lately, it has started appearing also in India, Singapore and Malesia.
Top Mobile Malware During H1 2019
1. Triada (30%) - A Modular backdoor for Android which grants superuser privileges to downloaded malware, as it helps it to get embedded into system processes.
2. Lotoor (11%) - Lotoor is a hack tool that exploits vulnerabilities on the Android operating system to gain root privileges on compromised mobile devices.
3. Hidad (7%) - Android malware which repackages legitimate apps and then releases them to a third-party store. It can gain access to key security details built into the OS, allowing an attacker to obtain sensitive user data.
-
99,999
-
1,29,999
-
69,999
-
41,999
-
64,999
-
99,999
-
29,999
-
63,999
-
39,999
-
1,56,900
-
1,39,900
-
1,29,900
-
79,900
-
65,900
-
12,999
-
96,949
-
16,499
-
38,999
-
49,999
-
30,700
-
23,990
-
1,25,999
-
36,999
-
38,999
-
1,17,840
-
35,000
-
23,960
-
82,510
-
11,999
-
25,999