Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Gov't urged to put up customized defense to combat cyber attacks

Edison Dy Ong | Aug. 14, 2013
Investing in anti-virus software is no longer enough to counter cyber attacks on vital data systems, especially if national security is at stake.

Q1 2013 Report
Meanwhile, Trend Micro's Q1 2013 Security Roundup Report prominently featured the Philippines in its the top 10 lists for the following: Top 10 risk of privacy exposure due to app use, Top 10 malicious android app download volumes, and Top 10 with the highest battery-draining app download volumes.

"Mobile Internet continues to be strong in the Philippines," said Myla Pilao, Trend Micro's director for Core technology. "With the Internet becoming more and more accessible, and the with unlimited number of free apps available, Trend Micro recommends that users practice a stronger sense of discernment in downloading. This is the first step in ensuring their data privacy protection."

Trend Micro's Q1 2013 Security Roundup also highlighted multiple zero-day exploits found targeting popular applications like Java, Adobe Flash Player, Acrobat and Reader.

The roundup also identified zero-day attacks among prominent Q1 threats. According to the roundup, new attacks against Oracle's Java and Adobe's Flash Player, Acrobat and Reader reveal that vulnerabilities are emerging faster than they can be patched and are quickly being incorporated into professional attack kits such as the "Black Hole Exploit Kit."

"Of course Java is cross-platform and that is somewhat attractive to criminals, but what is really attractive is it's vulnerabilities and it's ubiquity," said Rik Ferguson, Trend Micro's vice president for security research. "This definitely won't be the last zero-day vulnerability in Java and it won't be the end of the vast attack surface that it currently offers to criminals."

Attacks on South Korea
The high-profile attacks executed in South Korea last March reinforced that theft is no longer the sole focus of hacking efforts, Trend Micro said. These breaches, according to the company, were also designed to cripple critical networks via innovative techniques including:

Multiplatform focus such as Unix and Linux;

Specific countermeasures for installed security software; and

Hijacking of patch management systems.

"Given what took place in South Korea, it is likely that increasingly destructive attacks will continue to be a threat," said Tom Kellermann, Trend Micro vice president for cyber security. "With each quarter, attacks are becoming bolder and more targeted, pointing to concerns far beyond the compromise of personal data." -- 30


Previous Page  1  2 

Sign up for CIO Asia eNewsletters.