Access "Malware trends: The rise of cross-platform malware"
This article is part of the October 2012 issue of Security Readers' Choice Awards 2012: Your picks for the best security products
Conventional wisdom about malware targets is evolving with the emergence of cross-platform malware into the cybercriminal's arsenal. Over the last year, cross-platform malware, sometimes referred to as multi-platform, has grabbed attention in the industry. This particular type of malware can infect different versions of operating systems and machines and is becoming more popular in the world of cybercrime. Microsoft's Windows platform has been the biggest target for malware creators, but experts say rising market shares of other operating systems has made the cross-platform approach more attractive and logical. Experts say enterprise security teams must address this malware trend on all platforms they use, whether they are desktop computers or mobile devices. In April, the Flashback Trojan targeted computers running Mac and Windows by exploiting a security vulnerability in Java. Microsoft published a blog post in July about how it has become beneficial for cybercriminals to attack multiple operating systems through one Trojan. Also in July, security ... Access >>>
Premium Content for Free.
2012 Readers' Choice Awards
For the seventh consecutive year, Information Security readers voted to determine the best security products. More than 2,000 voters participated this year, rating products in 14 different categories.
The hacktivist threat to enterprise security
by Robert Westervelt
With their goal of damaging corporate reputations, hacktivists aren't your average cybercriminals.
- 2012 Readers' Choice Awards
Threat prevention techniques: Best practices for threat management
by Diana Kelley, Contributor
A successful threat management program requires effective processes, layered technology and user education.
Malware trends: The rise of cross-platform malware
by Moriah Sargent
Security researchers are finding more malware that attacks multiple operating systems.
- Threat prevention techniques: Best practices for threat management by Diana Kelley, Contributor
Big data issues: Big data analytics offers both rewards and risks
by Steve Durbin, Contributor
Companies are under pressure to take advantage of big data analytics but they should be aware of the risks.
The bolt-on information security trend needs to end
by Doug Jacobson and Julie A. Rursch
Unless security is viewed as a core function instead of an add-on, we're bound to repeat the mistakes of the past.
Java security problems: Is disabling Java the answer?
by Marcia Savage
In the wake of recent exploits, experts recommend disabling the programming language but that can be tricky in the enterprise.
- Big data issues: Big data analytics offers both rewards and risks by Steve Durbin, Contributor
More Premium Content Accessible For Free
The variety and sheer number of network endpoints, users and devices in the enterprise today is driving IT's demands for enhanced security features ...
Enterprises leverage open source software for the perceived quality of the code, but the Heartbleed flaw has made many question their use of ...
The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update ...