Malware Goes Local: Report

<a href="http://www.informationweek.com/story/showArticle.jhtml?articleID=206800898">InformationWeek</a>, <a href="http://www.prnewswire.com/cgi-bin/stories.pl?ACCT=109&STORY=/www/story/02-21-2008/0004759889&EDATE=">PR Newswire</a>

Jim Manico, OWASP Global Board Member

February 21, 2008

1 Min Read
Dark Reading logo in a gray background | Dark Reading

Malware authors are drilling down their attacks to local markets, taking note of the types of applications users prefer -- and then targeting them.In its "One Internet, Many Worlds" report released today, McAfee says cybercriminals are tailoring their attacks based on cultural preferences; in China, for example, where online gaming is very popular, password-stealing programs that enable looters to steal virtual goods from gamers' accounts have been an issue. Malware authors are also exploiting the viral nature of Web 2.0, particularly in the United States, the report says.

"Cybercriminals are learning to exploit the cultural uniqueness of computer users around the world," said Joe Telafici, vice president of McAfee Avert Labs, in a statement.

In 2007 malware grew 246 percent over 2006, McAfee says. By year's end, it expects to have identified 750 new pieces of malware.InformationWeek, PR Newswire

Read more about:

2008

About the Author

Jim Manico

OWASP Global Board Member

Jim Manico is a Global Board Member for the OWASP foundation where he helps drive the strategic vision for the organization. OWASP's mission is to make software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks. OWASP's AppSecUSA<https://2015.appsecusa.org/c/> conferences represent the nonprofit's largest outreach efforts to advance its mission of spreading security knowledge, for more information and to register, see here<https://2015.appsecusa.org/c/?page_id=534>. Jim is also the founder of Manicode Security where he trains software developers on secure coding and security engineering. He has a 18 year history building software as a developer and architect. Jim is a frequent speaker on secure software practices and is a member of the JavaOne rockstar speaker community. He is the author of Iron-Clad Java: Building Secure Web Applications<http://www.amazon.com/Iron-Clad-Java-Building-Secure-Applications/dp/0071835881> from McGraw-Hill and founder of Brakeman Pro. Investor/Advisor for Signal Sciences.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights