Malware up, hackers bypass security safeguards, survey says

November 20, 2013
Malicious software is on the rise both on computers and mobile devices, fueled in part by hackers' ability to bypass a key security measure, researchers said Wednesday

Malicious software is on the rise both on computers and mobile devices, fueled in part by hackers' ability to bypass a key security measure, researchers said Wednesday.

McAfee Labs said in its third quarter survey that it is seeing a rise in malware which circumvents the so-called digital signature validation meant to ensure software can be trusted.

McAfee said it saw a 30 percent jump in the quarter of mobile malware that allows an attacker to bypass the digital signature validation of apps on Android devices, along with a 50 percent increase in traditional malware signed with .

"The efforts to bypass code validation on , and commandeer it altogether on PCs, both represent attempts to circumvent trust mechanisms upon which our digital ecosystems rely," said Vincent Weafer, of McAfee Labs.

"The industry must work harder to ensure the integrity of these technologies given they are becoming more pervasive in every aspect of our daily lives."

McAfee's quarterly report on threats in cyberspace also cited a rise in the use of Bitcoin for illicit activities such as the purchase of drugs, weapons, and other illegal goods on websites such as Silk Road.

"As these currencies become further integrated into our global financial system, their stability and safety will require both financial monetary controls and oversight, and the security measures our industry provide," he said.

McAfee also saw cybercriminals develop Bitcoin-mining malware to infect systems, and produce Bitcoins for commercial transactions.

Bitcoins allow the creation of new currency through a process known as mining, according to McAfee. While initially people used their own computing resources for mining, certain kinds of malware allow attackers to employ infected computers to produce Bitcoins, often without their knowledge.

Explore further: Cyber crooks targeting smartphones: McAfee

Related Stories

Cyber crooks cranking out new weapons experts warn

May 23, 2012

Cyber criminals are cranking out new weapons at a brisk pace, tailoring malicious software for a spectrum of gadgets including smartphones, tablets, and Macintosh computers, a security firm said.

Tor and Bitcoin promise online stealth

October 2, 2013

The Silk Road website that was shut down by US authorities, who branded it a black market for drugs and other illicit wares, relied on Tor and Bitcoins to protect the anonymity of users.

Recommended for you

Internet giants race to faster mobile news apps

October 4, 2015

US tech giants are turning to the news in their competition for mobile users, developing new, faster ways to deliver content, but the benefits for struggling media outlets remain unclear.

Radio frequency 'harvesting' tech unveiled in UK

September 30, 2015

An energy harvesting technology that its developers say will be able to turn ambient radio frequency waves into usable electricity to charge low power devices was unveiled in London on Wednesday.

Professors say US has fallen behind on offshore wind power

September 29, 2015

University of Delaware faculty from the College of Earth, Ocean, and Environment (CEOE), the College of Engineering and the Alfred Lerner School of Business and Economics say that the U.S. has fallen behind in offshore wind ...


Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.