30.05.2013 Views

internet security tHreAt rePOrt GOVernMent 2013

internet security tHreAt rePOrt GOVernMent 2013

internet security tHreAt rePOrt GOVernMent 2013

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

p. 35<br />

Symantec Corporation<br />

Internet Security Threat Report <strong>2013</strong> :: Volume 18<br />

SOCIaL NETWORkINg, MObILE, aNd ThE CLOUd<br />

Mobile Vulnerabilities by OS<br />

Source: Symantec<br />

Platform<br />

Apple iOs 387<br />

Android 13<br />

BlackBerry 13<br />

nokia 0<br />

LG electronics 0<br />

Windows Mobile 2<br />

analysis<br />

Documented Vulnerabilities<br />

Spam and Phishing Move to Social Media<br />

In the last few years, we’ve seen a significant increase in spam<br />

and phishing on social media sites. Criminals follow users to<br />

popular sites. As Facebook and Twitter have grown in popularity<br />

for users, they have also attracted more criminal activity.<br />

However, in the last year, online criminals have also started<br />

targeting newer, fast-growing sites such as Instagram,<br />

Pinterest, and Tumblr.<br />

Typical threats include fake gift cards and survey scams. These<br />

kinds of fake offer scams account for more than half (56 percent)<br />

of all social media attacks. For example, in one scam the victim<br />

sees a post on somebody’s Facebook wall or on their Pinterest<br />

feeds (where content appears from the people they follow or in<br />

specific categories) that says “Click here for a $100 gift card.”<br />

When the user clicks on the link, they go to a website where<br />

they are asked to sign up for any number of offers, turning over<br />

personal details in the process. The spammers get a fee for each<br />

registration and, of course, there’s no gift card at the<br />

end of the process.<br />

The vast majority of vulnerabilities<br />

on mobile systems were on the iOS<br />

platform. However, the higher number<br />

of vulnerabilities is not indicative of a<br />

higher level of threat, because most<br />

mobile threats have not used software<br />

vulnerabilities.<br />

Typical social media scam.<br />

Fake website with bogus survey.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!