USB top method to spread malware

Despite living in an online age, the USB worm has made a comeback according to McAfee’s latest security report.

USB

The technique of spreading malware has reverted to an old school method, using USB ports as a point of entry.

This was the finding of McAfee's latest quarterly threat report, which showed USB worms as the top offender for the start of 2010.

"Go back 20 years and malware used USBs to spread," said Greg Day, director of security strategy in EMEA for McAfee, in an interview with IT PRO. "But we have been living in an age of internet and networking malware."

Advertisement - Article continues below

"The report has [shown that] this old technique, that was long forgotten, has come back."

Day said the increase of remote working, with more people using their own devices in and out of the office be it USB sticks, laptops, tablets or smartphones is making security even more challenging.

However, it was not all bad news as the number of malware infections had actually decreased compared to the same quarter last year, from 4.5 million to 3.75 million.

"It is a small dent in a big number so we can't rush around and celebrate," said Day. "But it may mean we are seeing some of the malware toolkits reach maturity and slow down."

Trends in spam had stayed pretty similar to previous years. The "embarrassment factor" was still playing a part in online sales of pharmaceuticals or male enhancement treatments, while "smart, socially engineered" spamming was having more of an effect, playing on people's fears and concerns such as emails about tax scams or fake anti-virus software.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

The global trends are echoed in the UK, Day noted.

"By the nature of the fact the UK uses the English language, we overlap with a lot of the problems," said Day, as the majority of malicious malware is written in our native tongue.

He noted there were a few more specific areas where Britons were falling victim, such as email bounce backs tricking you into giving away your password for a "reset" product sales and social networking scams.

Featured Resources

The case for a marketing content hub

Transform your digital marketing to deliver customer expectations

Download now

Fast, flexible and compliant e-signatures for global businesses

Be at the forefront of digital transformation with electronic signatures

Download now

Why CEOS should care about the move to SAP S/4HANA

And how they can accelerate business value

Download now

IT faces new security challenges in the wake of COVID-19

Beat the crisis by learning how to secure your network

Download now
Advertisement

Recommended

Visit/mobile/mobile-security/355889/parachute-introduces-superlock-feature
mobile security

Parachute's Superlock feature keeps your phone recording in an emergency

2 Jun 2020
Visit/security/encryption/355820/k2view-innovates-in-data-management-with-new-encryption-patent
encryption

K2View innovates in data management with new encryption patent

28 May 2020
Visit/software/video-conferencing/355410/zoom-50-adds-256-bit-encryption-and-ui-refresh
video conferencing

Zoom 5.0 adds 256-bit encryption to address security concerns

23 Apr 2020
Visit/security/hacking/355382/whatsapps-flaw-shoulder-surfing
hacking

WhatsApp flaw leaves users open to 'shoulder surfing' attacks

21 Apr 2020

Most Popular

Visit/operating-systems/ios/355935/apple-confirms-serious-bugs-in-ios-135
iOS

Apple confirms serious bugs in iOS 13.5

4 Jun 2020
Visit/mobile/5g/355911/the-uk-pivots-to-japan-for-5g-equipment
5G

The UK looks to Japan and South Korea for 5G equipment

4 Jun 2020
Visit/security/ransomware/355945/new-ransomware-uses-java-to-target-software-organisations
ransomware

Tycoon ransomware discovered using Java image files to target software firms

5 Jun 2020