Ads pose one of the biggest security threats in 2015

Trend Micro's Q1 security roundup shows malware hidden in desktop and mobile ads is one of the biggest security threat this year

security key on keyboard

Online and mobile ads are one of the biggest threats IT security this year, Trend Micro has revealed in its Q1 2015 roundup.

The company's latest report, Bad Ads and Zero-Days: Reemerging Threats Challenge Trust in Supply Chains and Best Practices, has revealed that adware on mobile devices is the top threat in the mobile category - although Trend Micro has identified a mammoth five million Android threats to date. It is, however, predicting this will rise to eight million by the end of this year.

Zero-day exploits are the biggest threat to desktop systems, but again, these are related to advertising and, in particular, are being used on adverts in Adobe software. This means victims don't even need to head to a malicious site for their computer to be infected.

Raimund Genes, CTO at Trend Micro said: "It is clear 2015 is shaping up to be noteworthy in terms of volume, ingenuity and sophistication of attacks... It is clear businesses and individuals alike need to be proactive in protecting against threats. As a business, how would your IT-Security policies look like in a Zero Trust Environment? An aggressive and different security posture is critical to keep financial, personal and intellectual property safe."

In the enterprise space, Trend Micro said the healthcare sector was most at risk of cyber attacks, specifically in iOS and POS system applications. However, these types of threats have existed for the last few years and it would appear that their widespread nature is down to companies not being prepared for such assaults.

Genes finished: "The question we have to ask is, are we doing enough to protect ourselves from security threats? While we need to constantly update our systems to protect against new attacks, the first quarter of 2015 clearly showed we need to also watch out for older threats, and how no industry or system should feel exempt."

Featured Resources

B2B under quarantine

Key B2C e-commerce features B2B need to adopt to survive

Download now

The top three IT pains of the new reality and how to solve them

Driving more resiliency with unified operations and service management

Download now

The five essentials from your endpoint security partner

Empower your MSP business to operate efficiently

Download now

How fashion retailers are redesigning their digital future

Fashion retail guide

Download now

Recommended

What is a botnet?
botnets

What is a botnet?

14 Jul 2021
Trend Micro home network security flaws could let hackers take over PCs
Security

Trend Micro home network security flaws could let hackers take over PCs

26 May 2021
The secure cloud configuration imperative
Whitepaper

The secure cloud configuration imperative

26 May 2021
Trend Micro and Snyk team up to combat open source flaws
vulnerability

Trend Micro and Snyk team up to combat open source flaws

10 May 2021

Most Popular

The benefits of workload optimisation
Sponsored

The benefits of workload optimisation

16 Jul 2021
Samsung Galaxy S21 5G review: A rose-tinted experience
Mobile Phones

Samsung Galaxy S21 5G review: A rose-tinted experience

14 Jul 2021
IT Pro Panel: Why IT leaders need soft skills
professional development

IT Pro Panel: Why IT leaders need soft skills

26 Jul 2021