Feeds

Home PC users at risk: CA

Need to be wary of online threats

SANS - Survey on application security programs

Home PC users need to be wary of security vulnerabilities when they go online, according to software firm CA.

The 'CA Mid-Year Internet Threat Outlook Report' found that the exposure of home PC users is growing as the PC becomes the family communications and entertainment hub.

"Everyone using the internet should be aware of the nature and severity of online threats, especially gamers, social network users, seniors, tweens and their parents," said Sean O'Connell, security consultant, CA. "It's especially important to teach younger users about protecting personal information and handling cyber-bullies, because even though they may be more adept at using the internet than their parents, they tend to be far less diligent about practicing safe online computing."

The report has made several predictions for the year ahead. CA expects stealing online gaming accounts to become as profitable as stealing bank accounts. The report said the second most common malware seen this year is designed to steal gaming passwords.

Another threat to be wary of, according to the report, is 'spear-phishing', which the report predicts will grow significantly. CA said phishers are shifting from opportunism to 'spearing' specific individuals based on factors such as age or socio-economic status. Other threats to be aware of include malware, which the report predicts will increase by 132 per cent this year.

Cybercrime trends are changing, according to the study, which expects criminals to increase their targeting of low-profile software such as Adobe Acrobat Reader and Macromedia Flash to exploit security holes, while also searching for weaknesses in social networks.

CA advises home users to protect themselves by using antivirus, anti-spyware and anti-spam software on their PCs. Users are also advised to practise common sense online and not open e-mails from unfamiliar senders.

© 2007 ENN

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Arts and crafts store Michaels says 3 million credit cards exposed in breach
Meanwhile, Target investigators prepare for long process in nabbing hackers
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.