Trend Micro Marks 2011 "The Year Of Data Breaches"Trend Micro Marks 2011 "The Year Of Data Breaches"
Report revisits past predictions, and summarizes notable threat incidents and security wins throughout 2011
January 21, 2012
CUPERTINO, Calif., Jan. 17, 2012 /PRNewswire/ -- Having spent much of the year battling data breaches that led to huge information and financial loss, the security industry was likely relieved to see 2011 come to a close. In its annual threat roundup report, Trend Micro (TYO: 4704; TSE: 4704) wraps 2011 as "The Year of Data Breaches," after witnessing large, well-known companies succumb to targeted data breach attacks that not only stained reputations, but caused them significant collateral damage.
Authored by Trend Micro threat researchers, this year's report revisits past predictions, and summarizes notable threat incidents and security wins throughout 2011. Highlights include:
-- The mobile threat landscape reached new levels of maturity in 2011. Trend Micro threat researchers tracked a staggering spike in the volume of mobile malware, especially those targeting the Android platform. RuFraud and DroidDreamLight -- just two of the most notorious Android malware variants -- took much of the spotlight, causing millions of users lost data and money. -- 2011 was a profitable year for social media threats, spammers and scammers who leveraged the trending topics of social networking sites to improve upon their social engineering and hacking tactics, stealing the data of millions of social networkers worldwide. Consequently, regulators have started demanding that social networking sites implement policies and mechanisms to protect the privacy of their users. -- While the number of publicly reported vulnerabilities decreased from 4,651 in 2010 to 4,155 in 2011, exploit attacks evolved with higher complexity and sophistication. Exploit attacks in 2011 were targeted, original, and well controlled, the most notable of which set their sights on CVE-2011-3402, CVE-2011-3544, and CVE-2011-3414, along with a couple of Adobe product zero-day vulnerabilities that were exploited in the wild. -- Finally, despite an aggressive cybercriminal landscape, Trend Micro, along with its industry partners and law enforcement authorities achieved some remarkable and strategic wins this year. One of them - Operation Ghost Click - reached success after 5 years of stealth tracking and working closely with the FBI. Trend Micro, the only security company that was involved, was able to assist the FBI in what was noted as the biggest cybercriminal takedown in history. "Reflecting back on 2011, I am very proud of what we've achieved. But our work is never done. With 3.5 new threats created every second, and as businesses and consumers take the journey to the cloud, the risk of data and financial loss are greater than ever," said Raimund Genes, CTO. "As a company (and as an industry), we must continue to evolve and create better, data-centric security products for the post-PC era where users need greater visibility and assurance into who is accessing their data, when, where and how."
-- The full round-up report can be found here: http://us.trendmicro.com/us/trendwatch/research-and-analysis/threat-reports/index.html About Trend Micro
Trend Micro Incorporated (TYO: 4704;TSE: 4704), a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over 20 years' experience, we deliver top-ranked client, server and cloud-based security that fits our customers' and partners' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro(TM) Smart Protection Network(TM) cloud computing security infrastructure, our products and services stop threats where they emerge - from the Internet. They are supported by 1,000+ threat intelligence experts around the globe.
Additional information about Trend Micro Incorporated and the products and services are available at Trend Micro.com. This Trend Micro news release and other announcements are available at http://trendmicro.mediaroom.com/ and as part of an RSS feed at www.trendmicro.com/rss. Or follow our news on Twitter at @TrendMicro.
You May Also Like
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
What's In Your Cloud?Nov 30, 2023
Everything You Need to Know About DNS AttacksNov 30, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
How to Use Threat Intelligence to Mitigate Third-Party Risk
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
Everything You Need to Know About DNS Attacks
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
The Evolving Ransomware Threat: What Business Leaders Should Know About Data Leakage
Building Immunity: The 2021 Healthcare and Pharmaceutical Industry Cyber Threat Landscape Report
Supply Chain Cyber Risk Management Whitepaper