According to the report, mobile malware was the most significant statistical category for the second quarter, in both quantity and complexity. Not only are cybercriminals developing more malware targeting mobile platforms, they are also advancing the programmes’ capabilities and behaviours. In addition to mobile malware, cybercriminals’ focused heavily on implementing campaigns designed for illegal bitcoin mining and theft as the digital currency’s value rapidly increased during the second quarter. Q2 2013 Malware Statistics: The following data was obtained using the cloud-based Kaspersky Security Network (KSN). All statistics were compiled with the full consent of users participating in KSN. Kaspersky Lab products detected and neutralised a total of 983,051,408 threats in the
According to the results of Kaspersky Lab’s “The evolution of phishing attacks 2011-2013″ survey, the number of Internet users who faced phishing attacks over the last 12 months has grown from 19.9 million to 37.3 million, an increase of 87%. Facebook, Yahoo, Google and Amazon are among main targets of cybercriminals. The study, which was carried out in June 2013 based on data from the Kaspersky Security Network cloud service, shows that what was once a subset of spam has evolved into a rapidly growing cyberthreat in its own right. Phishing is a form of Internet fraud in which criminals create a fake copy of a popular site (an email service, an Internet banking website, a social networking site, etc.) and try to lure the users to these rogue web pages. The unsuspecting user enters
The Verizon or PRISM or Snowden affair marks a turning point in the history -- a very young history -- of the Internet and its governance within the international law landscape. With the facts as overwhelming as they are frightening, they show above all the mighty power of the United States over the Internet and its users. This issue not only concerns the information of American citizens, but also all 'foreigners' who have a Google account and other Internet industry heavyweights. We are talking about the very core of Internet governance currently under American domination. The rules in question, such as respect of personal information, net neutrality or digital public policies whether national, regional or international, are at the heart of an ongoing 15-year battle. During t...
The individual responsible for one of the most significant leaks in US political history is Edward Snowden, a 29-year-old former technical assistant for the CIA and current employee of the defence contractor Booz Allen Hamilton. Snowden has been working at the National Security Agency for the last four years as an employee of various outside contractors, including Booz Allen and Dell. More
The combination of telecommunication and information systems has come into one product, ICTs that dictates the direction of our lives. At this point in time, Kenya considers ICT as a bubble because the Jubilee government has adopted it as one of the engines of economic development. If this has to facilitate the government idea to see that ICT trickles down to all Kenyans and who use them in what has previously been referred to as a knowledge economy, then regulators for instance, the Communication Commission of Kenya (CCK) and information disseminators have a responsibility of drawing synergies from each other in order to coherence and provide the right direction for this services to be utilized by Kenyans. more