The week in security: Breaches growing, DDoS fiercer, mobile malware “negligible” as battlefronts shift

As if it wasn't enough that security staff were playing a continuous game of catch-up – investigating an average of 1.5 security breaches per week even as research reveals institutional investors don't believe company boards have the security threat under control – it turns out Australians' world-leading love of social media has made us world-leading targets for ransomware purveyors and malware criminals that are using extremely complex techniques against us.

An analysis of DDoS attacks shows that Australian attacks are shorter but fiercer than those against other countries in the region, yet cyber-criminals are also getting stealthier – using tricks to avoid detection of banking malware, for example, finding new ways to escape detection by exploiting HTTPS security. Yet there are other threats within, according to a survey that found companies' biggest source of smartphone security compromises come from males under age 35 who are paid over $US60,000 ($A77,000) per year.

If there's any good news from that, it's that Verizon's analysis concluded that there is in fact a “negligible” amount of mobile malware out there – although mobile adware is in fact a real nuisance, if not a direct threat. Less reassuringly, it also found that security teams have less time than ever to respond to new attacks.

VMware is doing its part to help, leveraging its ubiquitous virtualisation technology to help companies securely deliver apps to mobile users. BT launched a next-generation security platform with a range of custom tools, while Akamai bolstered its managed security service offerings with anti-DDoS and Web-app protection tools.

Joining the trend to run online bug bounties, Dropbox began a bug bounty program designed to improve its ability to quickly find and repair bugs. By contrast, word emerged that a Windows vulnerability identified more than 15 years ago can still be used to steal login credentials.

There were small steps in fighting the ransomware scourge: a free tool, jointly developed by Kaspersky Lab and the Dutch police, may provide fresh hope for victims of the CoinVault ransomware. Yet even as Russian authorities arrested the leader of a gang pushing Android malware at English-speaking targets, a Chinese hacker group was reportedly targeting airgapped networks disconnected from the Internet.

A Verizon survey found that the average security breach now costs $US0.58 per record, but there were questions about how that might change as security executives began to fear the data-loss implications of the new Apple Watch. Yet it was Web application attacks, point-of-sale intrusions and cyberespionage that were the leading causes of data breaches, research found. new POS malware called Punkey emerged.

New threats are also emerging all the time, with a so-called Internet of Evil Things raising alarm bells for some researchers and new attack vectors opening as venerable ATMs get set for a cloud makeover.

Little wonder that authorities are trying to improve sharing of threat-related information – something that IBM did with the opening of its security-intelligence database – with new US cyberthreat-sharing legislation said to be potentially more friendly to privacy than previous efforts. However, the legislation held little promise for customers of failed US retailer RadioShack, which is pushing ahead with plans to sell its customer data despite opposition from several US states. Yet even that may pale in significance against WikiLeaks' publication of a trove of hacked Sony Pictures emails that is already embarrassing executives and actors alike.

Read more: Security Watch: Akamai adds new web application and DDoS protection

This article is brought to you by Enex TestLab, content directors for CSO Australia.

Join the CSO newsletter!

Error: Please check your email address.

Tags hacked Sony PicturesdropboxIBMcyber-criminalssecurity breachDDoS fiercerransomwaremalwareVMwareCSO AustraliaDDoS attackmobile malwarecyberthreatIT security staff

More about AppleCSODropboxEnex TestLabKasperskyRadioShackSonyVerizon

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by David Braue

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Market Place