Trend Micro Annual Report: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
 
(10 intermediate revisions by the same user not shown)
Line 9: Line 9:


==Categorization==
==Categorization==
 
* Resource by Type: [[Industry Reports]]
* Overview: [[Industry Reports]]
* Issues: [[Cybercrime]]
 
* Threats and Actors: [[Financial Institutions and Networks]]
 
* Issues: [[Cybercrime]]; [[Economics of Cybersecurity]]


==Key Words==  
==Key Words==  
[[Keyword_Index_and_Glossary_of_Core_Ideas#Antivirus | Antivirus]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Antivirus | Antivirus]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Botnet | Botnet]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Botnet | Botnet]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Crimeware | Crimeware]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Cyber_Crime | Cyber Crime]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Cyber_Crime | Cyber Crime]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Hacker | Hacker]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Honeypot | Honeypot]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Malware | Malware]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Malware | Malware]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Patching | Patching]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Patching | Patching]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Phishing | Phishing]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Phishing | Phishing]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Scareware | Scareware]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Social_Engineering | Social Engineering]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Social_Engineering | Social Engineering]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#SPAM | SPAM]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#SPAM | SPAM]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Trojan | Trojan]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Trojan | Trojan]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Whitelist | Whitelist]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Worm | Worm]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Worm | Worm]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Zero-Day_Exploit | Zero-Day Exploit]]
[[Keyword_Index_and_Glossary_of_Core_Ideas#Zero-Day_Exploit | Zero-Day Exploit]]
Line 36: Line 27:
==Synopsis==
==Synopsis==


In this report, TrendLabs, Trend Micro's research lab, discusses 2009's most persistent threats and presents why users need to be more engaged in keeping their systems secure than ever before. These five most recurring and ever-present threats effectively challenge even the more tech-savvy businesses who encounter them either through lack of network security or of education and appreciation of the severity of threats on the part of employees. At the end of each discussion, a list of security dos are recommended for large enterprises and smaller businesses alike.
In this report, TrendLabs, Trend Micro's research lab, discusses 2009's most persistent threats and presents why users need to be more engaged in keeping their systems secure than ever before. These five most recurring and ever-present threats effectively challenge even the more tech-savvy businesses who encounter them either through lack of network security or of education and appreciation of the severity of threats on the part of employees. At the end of each discussion, a list of security dos are recommended for large enterprises and smaller businesses alike.  The threats discussed are:
 
* Downad/Conficker Network Worm
* Koobface Social Network Worm
* Zeus/Zbot Crimeware
* Rogue Antivirus Applications
* Zero-Day Exploits
 
Unlike the [[Symantec Global Internet Security Threat Report]], trend Trend Micro report is primarily concerned with the threats themselves and does not provide an extensive statistical or financial discussion of cybercrime or its prevalence.


==Additional Notes and Highlights==
==Additional Notes and Highlights==


[http://us.trendmicro.com/us/trendwatch/research-and-analysis/threat-reports/index.html  Trend Micro's Threat Reports]
Expertise Required: Technology - Moderate
 
Link to the latest [http://us.trendmicro.com/us/trendwatch/research-and-analysis/threat-reports/index.html  Trend Micro's Threat Reports].

Latest revision as of 15:18, 23 July 2010

Full Title of Reference

Trend Micro Annual Report: 2009's Most Persistent Malware Threats

Full Citation

Trend Micro Inc., Trend Micro Annual Report: 2009's Most Persistent Malware Threats (2010). Online Paper. Web

BibTeX

Categorization

Key Words

Antivirus, Botnet, Cyber Crime, Malware, Patching, Phishing, Social Engineering, SPAM, Trojan, Worm, Zero-Day Exploit

Synopsis

In this report, TrendLabs, Trend Micro's research lab, discusses 2009's most persistent threats and presents why users need to be more engaged in keeping their systems secure than ever before. These five most recurring and ever-present threats effectively challenge even the more tech-savvy businesses who encounter them either through lack of network security or of education and appreciation of the severity of threats on the part of employees. At the end of each discussion, a list of security dos are recommended for large enterprises and smaller businesses alike. The threats discussed are:

  • Downad/Conficker Network Worm
  • Koobface Social Network Worm
  • Zeus/Zbot Crimeware
  • Rogue Antivirus Applications
  • Zero-Day Exploits

Unlike the Symantec Global Internet Security Threat Report, trend Trend Micro report is primarily concerned with the threats themselves and does not provide an extensive statistical or financial discussion of cybercrime or its prevalence.

Additional Notes and Highlights

Expertise Required: Technology - Moderate

Link to the latest Trend Micro's Threat Reports.