Ads pose one of the biggest security threats in 2015

Trend Micro's Q1 security roundup shows malware hidden in desktop and mobile ads is one of the biggest security threat this year

security key on keyboard

Online and mobile ads are one of the biggest threats IT security this year, Trend Micro has revealed in its Q1 2015 roundup.

The company's latest report, Bad Ads and Zero-Days: Reemerging Threats Challenge Trust in Supply Chains and Best Practices, has revealed that adware on mobile devices is the top threat in the mobile category - although Trend Micro has identified a mammoth five million Android threats to date. It is, however, predicting this will rise to eight million by the end of this year.

Zero-day exploits are the biggest threat to desktop systems, but again, these are related to advertising and, in particular, are being used on adverts in Adobe software. This means victims don't even need to head to a malicious site for their computer to be infected.

Raimund Genes, CTO at Trend Micro said: "It is clear 2015 is shaping up to be noteworthy in terms of volume, ingenuity and sophistication of attacks... It is clear businesses and individuals alike need to be proactive in protecting against threats. As a business, how would your IT-Security policies look like in a Zero Trust Environment? An aggressive and different security posture is critical to keep financial, personal and intellectual property safe."

In the enterprise space, Trend Micro said the healthcare sector was most at risk of cyber attacks, specifically in iOS and POS system applications. However, these types of threats have existed for the last few years and it would appear that their widespread nature is down to companies not being prepared for such assaults.

Genes finished: "The question we have to ask is, are we doing enough to protect ourselves from security threats? While we need to constantly update our systems to protect against new attacks, the first quarter of 2015 clearly showed we need to also watch out for older threats, and how no industry or system should feel exempt."

Featured Resources

How to scale your organisation in the cloud

How to overcome common scaling challenges and choose the right scalable cloud service

Download now

The people factor: A critical ingredient for intelligent communications

How to improve communication within your business

Download now

Future of video conferencing

Optimising video conferencing features to achieve business goals

Download now

Improving cyber security for remote working

13 recommendations for security from any location

Download now

Recommended

Microsoft Exchange targeted by China-linked hackers
zero-day exploit

Microsoft Exchange targeted by China-linked hackers

3 Mar 2021
Malicious ‘dependency confusion’ packages are stealing password files
hacking

Malicious ‘dependency confusion’ packages are stealing password files

2 Mar 2021
What is the Computer Misuse Act?
Policy & legislation

What is the Computer Misuse Act?

2 Mar 2021
What is cloud-to-cloud backup?
cloud backup

What is cloud-to-cloud backup?

1 Mar 2021

Most Popular

How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

26 Feb 2021
How to connect one, two or more monitors to your laptop
Laptops

How to connect one, two or more monitors to your laptop

25 Feb 2021
Ransomware operators are exploiting VMware ESXi flaws
ransomware

Ransomware operators are exploiting VMware ESXi flaws

1 Mar 2021