Trend Micro Annual Report: Difference between revisions
Line 40: | Line 40: | ||
==Additional Notes and Highlights== | ==Additional Notes and Highlights== | ||
Expertise Required: Technology - | Expertise Required: Technology - /Moderate | ||
[http://us.trendmicro.com/us/trendwatch/research-and-analysis/threat-reports/index.html Trend Micro's Threat Reports] | [http://us.trendmicro.com/us/trendwatch/research-and-analysis/threat-reports/index.html Trend Micro's Threat Reports] |
Revision as of 14:20, 15 July 2010
Full Title of Reference
Trend Micro Annual Report: 2009's Most Persistent Malware Threats
Full Citation
Trend Micro Inc., Trend Micro Annual Report: 2009's Most Persistent Malware Threats (2010). Online Paper. Web
Categorization
- Overview: Industry Reports
- Threats and Actors: Financial Institutions and Networks
- Issues: Cybercrime; Economics of Cybersecurity
Key Words
Antivirus, Botnet, Crimeware, Cyber Crime, Hacker, Honeypot, Malware, Patching, Phishing, Scareware, Social Engineering, SPAM, Trojan, Whitelist, Worm, Zero-Day Exploit
Synopsis
In this report, TrendLabs, Trend Micro's research lab, discusses 2009's most persistent threats and presents why users need to be more engaged in keeping their systems secure than ever before. These five most recurring and ever-present threats effectively challenge even the more tech-savvy businesses who encounter them either through lack of network security or of education and appreciation of the severity of threats on the part of employees. At the end of each discussion, a list of security dos are recommended for large enterprises and smaller businesses alike.
Additional Notes and Highlights
Expertise Required: Technology - /Moderate