Websense Threat Report 2015 to Emphasize on Malware Development

Websense Threat Report 2015 to Emphasize on Malware Development

Security conferences and expert reports have turned into very crucial events for the last couple of years. Malware is quickly evolving. Cyber crooks are combining old techniques with newly crafted approaches. As a result, malicious software has reached a new peak, producing highly efficient and deceptive invasions. Furthermore, the quick development of Internet of Things technologies gives yet another opportunity to cyber perpetrators to expand.

One of the most recent security campaigns is organized by the Austin-based company Websense and emphasizes on currently significant risks. The company will present their Threat Report 2015 on April 14 in a series of webcasts.

The risks are classified into two vast categories:

  • Human Behavioral Trends
  • Technique-based Trends

The purpose of that division is a detailed examination of ‘who is doing what and how they are doing it’, as organizers point out.

Researchers have focused on:

  • Malware-as-a-service (MaaS), or the opportunity to buy or subcontract fractions of a multi-level attack.

Websense experts will discuss the fact that more than 90 percent of malicious files employed a Command & Control URL that has already been used by other malware. As a result, spreading malware just becomes easier.

  • The ‘recycling’ of old techniques.

The specialists will be looking for ways to establish defense mechanisms for businesses.

  • Malware quality over quantity.

It seems like cyber criminals have concentrated on the quality of their attacks rather than their quantity. More than three billion security threats in 2014 have been observed in details. No matter how immense the number seems, the percentage is lower than 2013.

The Websense conference will also pay attention to the shortage of IT security skills, and how to improve various infrastructures against vulnerabilities.

Leave a Reply

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload the CAPTCHA.