Trend Micro Annual Report: Difference between revisions
(10 intermediate revisions by the same user not shown) | |||
Line 9: | Line 9: | ||
==Categorization== | ==Categorization== | ||
* Resource by Type: [[Industry Reports]] | |||
* | * Issues: [[Cybercrime]] | ||
* Issues: [[Cybercrime | |||
==Key Words== | ==Key Words== | ||
[[Keyword_Index_and_Glossary_of_Core_Ideas#Antivirus | Antivirus]], | [[Keyword_Index_and_Glossary_of_Core_Ideas#Antivirus | Antivirus]], | ||
[[Keyword_Index_and_Glossary_of_Core_Ideas#Botnet | Botnet]], | [[Keyword_Index_and_Glossary_of_Core_Ideas#Botnet | Botnet]], | ||
[[Keyword_Index_and_Glossary_of_Core_Ideas#Cyber_Crime | Cyber Crime]], | [[Keyword_Index_and_Glossary_of_Core_Ideas#Cyber_Crime | Cyber Crime]], | ||
[[Keyword_Index_and_Glossary_of_Core_Ideas#Malware | Malware]], | [[Keyword_Index_and_Glossary_of_Core_Ideas#Malware | Malware]], | ||
[[Keyword_Index_and_Glossary_of_Core_Ideas#Patching | Patching]], | [[Keyword_Index_and_Glossary_of_Core_Ideas#Patching | Patching]], | ||
[[Keyword_Index_and_Glossary_of_Core_Ideas#Phishing | Phishing]], | [[Keyword_Index_and_Glossary_of_Core_Ideas#Phishing | Phishing]], | ||
[[Keyword_Index_and_Glossary_of_Core_Ideas#Social_Engineering | Social Engineering]], | [[Keyword_Index_and_Glossary_of_Core_Ideas#Social_Engineering | Social Engineering]], | ||
[[Keyword_Index_and_Glossary_of_Core_Ideas#SPAM | SPAM]], | [[Keyword_Index_and_Glossary_of_Core_Ideas#SPAM | SPAM]], | ||
[[Keyword_Index_and_Glossary_of_Core_Ideas#Trojan | Trojan]], | [[Keyword_Index_and_Glossary_of_Core_Ideas#Trojan | Trojan]], | ||
[[Keyword_Index_and_Glossary_of_Core_Ideas#Worm | Worm]], | [[Keyword_Index_and_Glossary_of_Core_Ideas#Worm | Worm]], | ||
[[Keyword_Index_and_Glossary_of_Core_Ideas#Zero-Day_Exploit | Zero-Day Exploit]] | [[Keyword_Index_and_Glossary_of_Core_Ideas#Zero-Day_Exploit | Zero-Day Exploit]] | ||
Line 36: | Line 27: | ||
==Synopsis== | ==Synopsis== | ||
In this report, TrendLabs, Trend Micro's research lab, discusses 2009's most persistent threats and presents why users need to be more engaged in keeping their systems secure than ever before. These five most recurring and ever-present threats effectively challenge even the more tech-savvy businesses who encounter them either through lack of network security or of education and appreciation of the severity of threats on the part of employees. At the end of each discussion, a list of security dos are recommended for large enterprises and smaller businesses alike. | In this report, TrendLabs, Trend Micro's research lab, discusses 2009's most persistent threats and presents why users need to be more engaged in keeping their systems secure than ever before. These five most recurring and ever-present threats effectively challenge even the more tech-savvy businesses who encounter them either through lack of network security or of education and appreciation of the severity of threats on the part of employees. At the end of each discussion, a list of security dos are recommended for large enterprises and smaller businesses alike. The threats discussed are: | ||
* Downad/Conficker Network Worm | |||
* Koobface Social Network Worm | |||
* Zeus/Zbot Crimeware | |||
* Rogue Antivirus Applications | |||
* Zero-Day Exploits | |||
Unlike the [[Symantec Global Internet Security Threat Report]], trend Trend Micro report is primarily concerned with the threats themselves and does not provide an extensive statistical or financial discussion of cybercrime or its prevalence. | |||
==Additional Notes and Highlights== | ==Additional Notes and Highlights== | ||
[http://us.trendmicro.com/us/trendwatch/research-and-analysis/threat-reports/index.html Trend Micro's Threat Reports] | Expertise Required: Technology - Moderate | ||
Link to the latest [http://us.trendmicro.com/us/trendwatch/research-and-analysis/threat-reports/index.html Trend Micro's Threat Reports]. |
Latest revision as of 15:18, 23 July 2010
Full Title of Reference
Trend Micro Annual Report: 2009's Most Persistent Malware Threats
Full Citation
Trend Micro Inc., Trend Micro Annual Report: 2009's Most Persistent Malware Threats (2010). Online Paper. Web
Categorization
- Resource by Type: Industry Reports
- Issues: Cybercrime
Key Words
Antivirus, Botnet, Cyber Crime, Malware, Patching, Phishing, Social Engineering, SPAM, Trojan, Worm, Zero-Day Exploit
Synopsis
In this report, TrendLabs, Trend Micro's research lab, discusses 2009's most persistent threats and presents why users need to be more engaged in keeping their systems secure than ever before. These five most recurring and ever-present threats effectively challenge even the more tech-savvy businesses who encounter them either through lack of network security or of education and appreciation of the severity of threats on the part of employees. At the end of each discussion, a list of security dos are recommended for large enterprises and smaller businesses alike. The threats discussed are:
- Downad/Conficker Network Worm
- Koobface Social Network Worm
- Zeus/Zbot Crimeware
- Rogue Antivirus Applications
- Zero-Day Exploits
Unlike the Symantec Global Internet Security Threat Report, trend Trend Micro report is primarily concerned with the threats themselves and does not provide an extensive statistical or financial discussion of cybercrime or its prevalence.
Additional Notes and Highlights
Expertise Required: Technology - Moderate
Link to the latest Trend Micro's Threat Reports.