A Busy Week of Security Studies: Insider, DDoS, Mobile Threats
The Vectra report noted that C&C activity is not a surprise after a breach, as that's how botnet attacks are enabled. With a botnet in place, one of the leading monetization techniques used is click fraud, found in 58.1 percent of attacks Vectra analyzed. While click fraud is common, only 3.1 percent of cases Vectra analyzed found data exfilitration as part of a post-intrusion activity. Mobile Security Among the hottest areas of security today is mobile, which the Wandera Mobile Data Report Q1 2016 examines. Wandera reported a 17 percent rise in the first quarter of this year from last year's fourth quarter in the number of analyzed apps and mobile Websites that are leaking sensitive data. So what do all the reports published just last week reveal about the security landscape? In summary, partners and insiders are a risk, mobile apps are leaking data, DDoS attacks are often repeated and Flash is a top path to exploitation.Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.
No big surprises and in many cases, the studies affirm what many IT professionals and security experts likely already suspected, but it's still always good to get numerical and empirical confirmation.