Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


01:11 PM
Jim Manico
Jim Manico
Connect Directly

Malware Goes Local: Report

InformationWeek, PR Newswire

Malware authors are drilling down their attacks to local markets, taking note of the types of applications users prefer -- and then targeting them.In its "One Internet, Many Worlds" report released today, McAfee says cybercriminals are tailoring their attacks based on cultural preferences; in China, for example, where online gaming is very popular, password-stealing programs that enable looters to steal virtual goods from gamers' accounts have been an issue. Malware authors are also exploiting the viral nature of Web 2.0, particularly in the United States, the report says.

"Cybercriminals are learning to exploit the cultural uniqueness of computer users around the world," said Joe Telafici, vice president of McAfee Avert Labs, in a statement.

In 2007 malware grew 246 percent over 2006, McAfee says. By year's end, it expects to have identified 750 new pieces of malware.InformationWeek, PR Newswire

Comment  | 
Print  | 
More Insights
Threaded  |  Newest First  |  Oldest First
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-11-30
IBM Cloud Pak for Security (CP4S) could reveal sensitive information about the internal network to an authenticated user using a specially crafted HTTP request. IBM X-Force ID: 185362.
PUBLISHED: 2020-11-30
IBM Cloud Pak for Security potentially vulnerable to CVS Injection. A remote attacker could execute arbitrary commands on the system, caused by improper validation of csv file contents. IBM X-Force ID: 185367.
PUBLISHED: 2020-11-30
IBM Cloud Pak for Security does not invalidate session after logout which could allow an authenticated user to obtain sensitive information from the previous session. IBM X-Force ID: 186789.
PUBLISHED: 2020-11-30
IBM Business Automation Workflow stores potentially sensitive information in log files that could be read by a local user. IBM X-Force ID: 190991.
PUBLISHED: 2020-11-30
IBM Cloud Pak for Security (CP4S) uses weaker than expected cryptographic algorithms during negotiation could allow an attacker to decrypt sensitive information.