• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Industry News   »   Cybercrime   »   Trend Micro: Android applications, APTs are major security trends

Trend Micro: Android applications, APTs are major security trends

  • Posted on:May 31, 2012
  • Posted in:Cybercrime
  • Posted by:
    Trend Micro
0

It's become vital for enterprises, government organizations and consumers to ensure their critical data remains private, as exposing intellectual property, customer information and other data can be extremely costly. IT departments have worked tirelessly to shore up vulnerabilities and eliminate security risks, but emerging business technologies and the increasing presence of more sophisticated, targeted threats have made it difficult to defend important data.

With the rise of cloud and virtualized servers, BYOD (bring-your-own-device) policies, social media and other technologies, IT professionals are tasked with monitoring business data across more channels and more remote locations than ever. Despite sophisticated cyberthreats becoming the norm, organizations can protect critical data through extensive planning, strong security policies and advanced data protection solutions. Trend Micro, a global leader in Internet and data security for businesses and consumers, recently released its first quarter Security Roundup Report, detailing the latest trends in cybercrime.

The comprehensive report provides readers with an extensive look at the mobile challenges, advanced persistent threats (APTs) and vulnerabilities impacting companies throughout numerous industries. According to the report, mobile devices like smartphones and tablets are leaving organizations vulnerable to data loss, as more cybercriminals are targeting these devices with malware and other campaigns.

All mobile users should beware of security risks, but this is especially true for Android users. Trend Micro researchers identified about 5,000 new malicious Android applications during the first quarter of 2012, making it imperative for Android users to adopt antivirus software and encrypt data on mobile devices. The report said even some legitimate smartphone and tablet applications contain security vulnerabilities.

"One big reason for the popularity of apps is their ease of use," said Robert McArdle, Trend Micro senior threat researcher. "Browsing the net on your mobile phone is not the same experience as doing it on a laptop. … The key thing to remember is to think before you give an app access to your data. … If you have any doubts about giving oversensitive information, just don’t do it."

The report also revealed that APTs are becoming more prevalent, and IT departments must adopt security systems capable of detecting and eliminating these threats across multiple devices, networks and systems. According to the source, trends like the consumerization of IT and outsourcing have broadened the IT landscape and made it more complicated for businesses to defend important information.

"It is more useful to think of highly targeted attacks as campaigns – a series of failed and successful attempts to compromise a target’s network over a certain period of time," said Trend Micro's Forward-Looking Threat Research Team. "As the attackers learn more about their targets from open source research – relying on publicly available information as well as previous attacks, the specificity of the attacks may sharply increase."

Trend Micro also found that cybercriminals used specific events and popular figures to target consumers and employees with social engineering attacks. The emergence of NBA star Jeremy Lin, Whitney Houston's death and tax season were among the events that social engineering campaigns used to extract information from Internet users.

With so many different types of threats and the trend of businesses storing data on multiple, often vulnerable devices, it's essential for IT departments to devise detailed security strategies. Although dangerous if left unsecure, companies can't ignore mobile technologies, as they have a proven ability to increase productivity and give employees more flexibility. Experts say enterprises should consider implementing an integrated mobile device management and security solution that protects data with passwords, encryption, antivirus software and remote wiping features.

Related posts:

  1. APTs, phishing scams to push cybersecurity market to $61 billion in 2012
  2. In age of APTs, companies have false sense of data security, study says
  3. FBI details major trends in cyber attacks against SMB’s
  4. In age of APTs, companies have false sense of data security, study says

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Digital Transformation is Growing but May Be Insecure for Many
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, ę—„ęœ¬, ėŒ€ķ•œėÆ¼źµ­, å°ē£
  • Latin America Region (LAR): Brasil, MĆ©xico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Ɩsterreich / Schweiz, Italia, Š Š¾ŃŃŠøŃ, EspaƱa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.