Media releases are provided as is by companies and have not been edited or checked for accuracy. Any queries should be directed to the company itself.

F-Secure Security Wrap-up for the Second Quarter of 2009

Highlights in this quarter include President Barack Obama’s major speech on cybersecurity, the huge interest in the Conficker worm and social networking sites, as well as growth in PDF exploits.
  • 26 June, 2009 12:00

<p>President Obama puts spotlight on cybersecurity
“So cyberspace is real. And so are the risks that come with it.” These were the words of President Barack Obama on May 29, 2009 as he announced a new strategy to secure America's information and communications networks. F-Secure welcomes the fact that the United States is taking cybersecurity seriously on the national level and welcomes the new Cybersecurity Coordinator as a partner in the fight against eCrime. As a strong advocate of establishing ‘Internetpol’, 
F-Secure is committed to international cooperation and would also like to see a focus on developing an offensive capability against online criminals.</p>
<p>Conficker worm</p>
<p>The threat landscape in the first half of 2009 has been dominated by the Conficker worm, which has proved to be the most significant malware outbreak in recent years. The Conficker Working Group’s collaboration has been a great success and an example of international cooperation within the Internet security industry. Conficker created a great deal of media interest especially around April 1, 2009, when the Conficker C variant was due to activate. In fact, it was the Conficker B variant which spread most widely and infected millions of computers worldwide. The Conficker case once again demonstrated the emotional interest in virus outbreaks. Despite the subsequent loss of media interest, the Conficker worm is still out there and there are no answers as to what it was designed to do.</p>
<p>News, tweets and malware</p>
<p>Social networking websites have continued to grow in the first half of 2009 which makes them increasingly attractive targets. The first Twitter worm and spam outbreak occurred in April, created by a hobbyist calling himself Mikeyy. With online criminals quickly seizing the opportunity, Google searches for “Twitter worm” or “Mikeyy” soon led people to malware sites. Malicious search results about popular news stories are very common. More than ever, social networking sites are both making the news and breaking the news – and in the process creating fast-spreading security problems that need to be addressed.</p>
<p>PDF files used for targeted attacks</p>
<p>F-Secure’s research shows that PDF files have become the most popular file type in targeted attacks during the first half of 2009. Last year the most commonly used file type for targeted attacks was Microsoft Word’s DOC. Adobe has responded with a quarterly response cycle due to the growth in pdf exploits.</p>
<p>For the full F-Secure IT security threat summary for the 2nd quarter of 2009 go</p>
<p>For the latest security news from F-Secure, visit our blog at</p>
<p>You can follow Chief Research Officer Mikko Hypponen on Twitter at , Chief Security Advisor for the North American Labs Patrik Runald at, and Security Response Manager in APAC, Wing Fei Chia, at .</p>
<p>About F-Secure Corporation</p>
<p>Innovation, reliability and speed of response - these are the qualities that have made F-Secure one of the world’s leading IT security providers since the company was founded in 1988. Today F-Secure’s award-winning and easy-to-use products are trusted in millions of homes and businesses around the world. We provide powerful real-time protection that works quietly and smoothly in the background, so computer and smartphone users can enjoy the benefits of connected life to the full. F-Secure’s solutions are available as a service subscription through more than 180 Internet service providers and mobile operator partners around the world, making F-Secure the global leader in this market. F-Secure has been listed on the NASDAQ OMX Helsinki Ltd since 1999. The company has consistently been one of the fastest growing publicly listed companies in the industry. The latest news on real-time virus threat scenarios is available at the F-Secure Data Security Lab weblog at</p>

Most Popular

Editor's Recommendations

Solution Centres


View all events Submit your own security event

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Media Release

More media release

Market Place