Malware up, hackers bypass security safeguards, survey says

Nov 20, 2013
Malicious software is on the rise both on computers and mobile devices, fueled in part by hackers' ability to bypass a key security measure, researchers said Wednesday

Malicious software is on the rise both on computers and mobile devices, fueled in part by hackers' ability to bypass a key security measure, researchers said Wednesday.

McAfee Labs said in its third quarter survey that it is seeing a rise in malware which circumvents the so-called digital signature validation meant to ensure software can be trusted.

McAfee said it saw a 30 percent jump in the quarter of mobile malware that allows an attacker to bypass the digital signature validation of apps on Android devices, along with a 50 percent increase in traditional malware signed with .

"The efforts to bypass code validation on , and commandeer it altogether on PCs, both represent attempts to circumvent trust mechanisms upon which our digital ecosystems rely," said Vincent Weafer, of McAfee Labs.

"The industry must work harder to ensure the integrity of these technologies given they are becoming more pervasive in every aspect of our daily lives."

McAfee's quarterly report on threats in cyberspace also cited a rise in the use of Bitcoin for illicit activities such as the purchase of drugs, weapons, and other illegal goods on websites such as Silk Road.

"As these currencies become further integrated into our global financial system, their stability and safety will require both financial monetary controls and oversight, and the security measures our industry provide," he said.

McAfee also saw cybercriminals develop Bitcoin-mining malware to infect systems, and produce Bitcoins for commercial transactions.

Bitcoins allow the creation of new currency through a process known as mining, according to McAfee. While initially people used their own computing resources for mining, certain kinds of malware allow attackers to employ infected computers to produce Bitcoins, often without their knowledge.

Explore further: Social networks hot targets for hackers: McAfee

add to favorites email to friend print save as pdf

Related Stories

Cyber crooks cranking out new weapons experts warn

May 23, 2012

Cyber criminals are cranking out new weapons at a brisk pace, tailoring malicious software for a spectrum of gadgets including smartphones, tablets, and Macintosh computers, a security firm said.

Tor and Bitcoin promise online stealth

Oct 02, 2013

The Silk Road website that was shut down by US authorities, who branded it a black market for drugs and other illicit wares, relied on Tor and Bitcoins to protect the anonymity of users. ...

Recommended for you

User comments : 0

More news stories

Under some LED bulbs whites aren't 'whiter than white'

For years, companies have been adding whiteners to laundry detergent, paints, plastics, paper and fabrics to make whites look "whiter than white," but now, with a switch away from incandescent and fluorescent lighting, different ...

Vietnam battles fatal measles outbreak

Vietnam is scrambling to contain a deadly outbreak of measles that has killed more than 100 people, mostly young children, and infected thousands more this year, the government said Friday.