2025³â 06¿ù 22ÀÏ ÀÏ¿äÀÏ
 
 
  ÇöÀçÀ§Ä¡ > ´º½ºÁö´åÄÄ > Science & Technology

·£¼¶¿þ¾îºÎÅÍ µÅÁöµµ»ì±îÁö... ³ë·ÃÇØÁø »ç±âÇà°¢

 

Á¤Ä¡

 

°æÁ¦

 

»çȸ

 

»ýȰ

 

¹®È­

 

±¹Á¦

 

°úÇбâ¼ú

 

¿¬¿¹

 

½ºÆ÷Ã÷

 

ÀÚµ¿Â÷

 

ºÎµ¿»ê

 

°æ¿µ

 

¿µ¾÷

 

¹Ìµð¾î

 

½Å»óǰ

 

±³À°

 

ÇÐȸ

 

½Å°£

 

°øÁö»çÇ×

 

Ä®·³

 

Ä·ÆäÀÎ
Çѻ츲 ¡®¿ì¸®´Â ÇѽҸ²¡¯ ½Ò ¼Òºñ Ä·ÆäÀÎ ½Ã...
1000¸¸¿øÂ¥¸® Àΰø¿Í¿ì, °Ç°­º¸Çè Áö¿ø ¡®Æò...
- - - - - - -
 

Good Morning Monday - Hello Cyber Attack

Drop in detected malware attacks in organisations coincides perfectly with weekends
´º½ºÀÏÀÚ: 2015-05-18

SINGAPORE--(Business Wire) May 18, 2015 -- New research published earlier this week in the annual NTT 2015 Global Threat Intelligence Report shows a massive increase in malware detections on Monday mornings when users reconnect their devices to the corporate network. This trend supports the contention that the security perimeter in organisations is dissolving. This is because end users increasingly use their devices both inside and outside the corporate security perimeter. In fact, the user is today’s new organisation perimeter. What’s more, IT and security management can no longer count on well-defined network security perimeters to protect their organisations.

The Global Threat Intelligence Report contains analysis of over six billion security events worldwide gathered during 2014 by NTT Group companies including Dimension Data, Solutionary, NTT Com Security, NTT R&D, and NTT Innovation Institute (NTTi3).

Matthew Gyde, Dimension Data’s Group Executive - Security, says threats targeting end users are higher than ever. In addition, security vulnerabilities are mostly related to end-user systems and not servers. “It appears that successful exploits occurs over the weekend when end users - and their devices - are outside the security controls of the corporate network. This indicates that traditional security controls are effective at protecting the corporate network, however assets that transition between corporate and external access points are at greater risk.

Gyde says controls that address this trend must focus on the user and their devices, regardless of location, and points out that seven of the top 10 vulnerabilities identified were on end-user systems. End users become a liability and that’s because their devices often have many unpatched vulnerabilities.”

According to Gyde, the malware industry is maturing, with malware becoming commoditised and available through dark net marketplaces. This means the barrier to entry for cybercriminals is a minimal financial investment, but for a potentially large return.

“And this trend is not about to disappear As users become more accustomed to always-on, real-time access to corporate data, they also become the targets of criminals wanting those same data sources. In summary, users and their devices become the criminal’s entry point.”

Other highlights of the Global Threat Intelligence Report include:

· Finance continues to represent the number one targeted sector with 18% of all detected attacks.

· Across the world, an astounding 56% of attacks against the NTT global client base originated from IP addresses within the United States. This does not necessarily mean that the attackers reside in the US.

· 76% of identified vulnerabilities throughout all systems in the enterprise were more than two years old, and almost 9% of them were over 10 years old.

· Of the vulnerabilities discovered across enterprises worldwide, 7 of the top 10 exposed vulnerabilities resided within user systems and not on servers.

· Threats against the end user are higher than ever, attacks show a clear and continuing shift towards success in compromising the end point.

· Attacks against Business & Professional Services increased from 9% to 15%.



 Àüü´º½º¸ñ·ÏÀ¸·Î

VeriSilicon¡¯s AI-ISP Custom Chip Solution Enables Mass Production of Customer¡¯s Smartphones
ExaGrid Wins 2 New Industry Awards at the Storage Awards
Merck Presents Results on Efficacy and Safety of Enpatoran in Systemic Lupus Erythematosus (SLE) at EULAR 2025
SmartStream Brings AI-Powered Data Management to the Insurance Sector
Stellar Cyber Positioned in the Challenger Quadrant of the Gartner Magic Quadrant for Network Detection and Response
KIOXIA and Linus Media Group Set World Record for Pi Calculation
China's Center for Drug Evaluation accepts Merck's application for Pimicotinib marketing approval to treat tenosynovial giant cell tumor

 

Capvidia Expands Model-Based Definition (MBD) Interoperability with QI...
VeriSilicon¡¯s Ultra-Low Energy NPU Provides Over 40 TOPS for On-Devic...
FiberStar Selects Incognito Software Systems to Optimize Fiber Network...
Smart Factory: Ushering in a New Era of Manufacturing Open share list
Yokogawa Announces Release of Next-Generation of the CENTUM VP Integra...
Faraday Unveils FlashKit¢â-22RRAM: An eNVM-Based SoC Development Platf...
Innoviva Specialty Therapeutics Gains FDA Acceptance for Zoliflodacin,...

 


°øÁö»çÇ×
´º½ºÁö ÇÑÀÚ Ç¥±â¿¡ ´ë¸¸½Ä À½Â÷ Ç¥±â '纽ÞÙó¢ ´Ï¿ì½ÃÁö' º´±â
º£³×ÇÁ·Ò º£³×ÀÎÅõ Áß¹® Ç¥±â 宝Ò¬ÜØÙÌ 宝Ò¬ì×öõ(ÜÄÒ¬ÜØÙÌ ÜÄ...
¹Ìµð¾î¾Æ¿ì¾î Mediaour ØÚ体ä²们 ØÚô÷ä²Ùú MO ¿¥¿À ØÚä² ØÚä²
¾Ë¸®¿ìºê Alliuv ä¹备: ä¹联êó备, ¾Ë¶ã Althle ä¹÷åìÌ
¾Ë¸®¾Ë Allial Áß¹® Ç¥±â ä¹××尔 ä¹××ì³
´ºÆÛ½ºÆ® New1st Áß¹® Ç¥±â 纽ììãæ(¹øÃ¼ Òïììãæ), N1 纽1
¿£ÄÚ½º¸ð½º : À̾¾ 'EnCosmos : EC' Áß¹® Ç¥±â ì¤ñµ
¾ÆÀ̵ð¾î·Ð Idearon Áß¹® Ç¥±â ì¤îè论 ì¤îèÖå
¹ÙÀÌ¿ÀÀÌ´Ï Bioini Áß¹® Ç¥±â ù±药研 ù±å·æÚ
¿À½ºÇÁ·Ò Ausfrom 奥ÞÙÜØÙÌ, À£ÇÁ·Ò Welfrom 卫ÜØÙÌ
¿¡³ÊÇÁ·Ò Enerfrom 额ÒöÜØÙÌ ¿¡³ÊÀ¯ºñ Eneruv 额Òöêó备
¾ËÇÁ·Ò Alfrom Áß¹® Ç¥±â ä¹尔ÜØÙÌ ä¹ì³ÜØÙÌ

 

ȸ»ç¼Ò°³ | ÀÎÀçä¿ë | ÀÌ¿ë¾à°ü | °³ÀÎÁ¤º¸Ãë±Þ¹æÄ§ | û¼Ò³âº¸È£Á¤Ã¥ | Ã¥ÀÓÇѰè¿Í ¹ýÀû°íÁö | À̸ÞÀÏÁÖ¼Ò¹«´Ü¼öÁý°ÅºÎ | °í°´¼¾ÅÍ

±â»çÁ¦º¸ À̸ÞÀÏ news@newsji.com, ÀüÈ­ 050 2222 0002, ÆÑ½º 050 2222 0111, ÁÖ¼Ò : ¼­¿ï ±¸·Î±¸ °¡¸¶»ê·Î 27±æ 60 1-37È£

ÀÎÅͳݴº½º¼­ºñ½º»ç¾÷µî·Ï : ¼­¿ï ÀÚ00447, µî·ÏÀÏÀÚ : 2013.12.23., ´º½º¹è¿­ ¹× û¼Ò³âº¸È£ÀÇ Ã¥ÀÓ : ´ëÇ¥ CEO

Copyright ¨Ï All rights reserved..