Recently, the global server security, virtualization and cloud computing security leader Trend technology issued the "China Region 2014 third quarter network security threat report." The report showed that in the third quarter of 2014, trend technology in China added about 530,000 virus code, customer terminals detect and intercept malicious programs about 69.88 million times, in China, the number of malicious URLs intercepted a total of more than 15.53 million, the data show that the network security threat is still growing. At the same time, trend technology has also looked forward to the 2015 mobile security situation, pointing out that the exploit tool will focus on Android, while new payment methods such as Apple Pay will bring new risks to mobile information life.
Mobile security threat continues to rise the number of malware infections in advertising
The report shows that the mobile security threat is growing at a high level in the third quarter of 2014. By the end of September 2014, trend technology for apk treatment of more than 10 million, more than the last quarter of 2 million growth, more than the early forecast. Trend Technology predicts that mobile platform threats will continue to grow at a high rate in the fourth quarter of 2014.
"Trend Technology 2014 Androping Taiwan APK processing Quantity Growth Trend Chart"
Trend Technology (China) Senior product manager Liu Jingping pointed out: "Mobile smart devices are more and more used in network applications, in the dual 11-day cat 57.11 billion of the turnover, the mobile end of consumption accounted for 42.6%." High earnings expectations drive cyber criminals to focus on mobile devices, and mobile security threats have grown rapidly. To counter consumer security measures, cyber criminals are constantly seeking new ways to improve the success rate of attacks. "According to statistics, in different types of mobile phone malware, there is a rapid increase in the number of high-risk advertising software, as the most infected Android platform malicious program," suction Software "and" steal data Information "malicious program is classified 二、三位. A August outbreak of the "XX artifact" of the mobile phone virus has aroused widespread concern, the virus will be through the text of large-scale transmission of virus links to infect mobile phones and make users a large number of communications costs.
"The main malware program type of Android system"
While mobile malware is primarily aimed at Android, this does not mean that iOS users can sleep safely. In fact, attacks on iOS systems are also rapidly improving. In September 2014, a iCloud Hollywood movie star was leaked, and a phishing attack by hackers led to the disclosure of the privacy information of many celebrities, causing a great deal of panic. This type of attack, while not causing the user's mobile device to infect malicious software, takes advantage of a specific flaw in the default browser on the device to not obtain sensitive data from the victim, and poses a significant security threat to the user.
Trojan virus remains the hacker's favorite vulnerability threat continues to become a hot spot in the industry
Among the traditional viruses detected in the third quarter of 2014, the number of PE-type virus infections accounted for the largest proportion of all types, accounting for 51% of the total number of detections. Similar to surveillance in previous quarters, PE virus pe_patched. ASA
is still the most detected virus. The virus file is a modified system file Sfc_os.dll, which will cause the system to lose File Protection function after infection. Other viruses that detect more are malware (11%) and Worms (10%).
"Virus type detected in the third quarter of 2014"
In the new virus, in the third quarter of 2014 the Trojan virus increased by 350,008, the largest increase in all virus types. In China, virus producers are more likely to create this type of virus and spread it across the internet in a variety of ways to reach the victim's computer for illegal gains. followed by the Trojan virus type, the increased number of virus types in turn are backdoor, Trojan spyware, worm, JavaScript virus and hacker tools.
"New virus category in the third quarter of 2014"
In the third quarter, the vulnerability threat continued to be a hot spot in the industry. Following last quarter's "heart bleed" loophole, this quarter also has a serious loophole-"shell loophole" (Shellshock), the flaw has been long and far-reaching scope, allowing hackers to remotely execute instructions, gain control of the system, collect and steal data, tamper with web sites, is more dangerous than a heart bleed leak.
Technological advances pose new risks to mobile devices
There are many exciting developments in the field of mobile technology in the 2014, with more powerful mobile devices, more wearable products and more diversified payment methods. However, these advances not only provide more new avenues for security threats, but also increase the level of threat to known risks. Trend technology predicts that in 2015, the three major mobile security threats will be particularly prominent:
1, the vulnerability to use tools will focus on Android, the threat will continue to improve
In the 2015, cyber criminals will tend to exploit vulnerabilities to attack mobile devices, and the Android platform, with its open system and fragmentation, becomes the preferred target. In addition to the increasing number of Android platform threats, we will see more vulnerabilities in mobile device platforms and applications in the coming year. The hacker will target the data in the device. Attackers use tools such as blackhole exploit kits to exploit the vulnerabilities of the Android system's fragmentation. At the same time, traditional threats, such as extortion software, will continue to cause trouble.
2. New Modes of payment
The introduction of Apple Pay in the iphone 6 and iphone 6 Plus could be the start of many users using mobile payments. Other companies and institutions will also launch their own payment platform. None of these platforms is tested by a real-world security threat. In addition, the extensive use of NFC functionality may pose new risks to mobile payments. 2015, we may see attacks against mobile payments.
3, Ioe/iot equipment data will continue to be threatened
In 2015, Ioe/iot equipment will be greatly developed, and the user community will increase rapidly. The Internet of Things is made up of a variety of devices, from wearable equipment to smart home equipment, and the layering of things will continue to be refined. Such diversity provides a degree of security because it is difficult to have an attack that covers all of these devices. However, when the device is compromised, the data stored in it is still difficult to escape.