Cyber security threats grow in sophistication, subtlety

15.10.2008

As an example, the report described an exploit that sends a Facebook message from one friend to another, about a YouTube video, including a link to the clip. The recipient clicks on the link, sees a prompt to download an updated version of Flash player to run the clip. When he clicks on the update, it actually installs malware on his computer.

Another weakness that malware continues to exploit is the delay in patching and updating software on enterprise computers. Kaspersky's Naraine says the average corporation takes three to five months to apply a Windows patch everywhere, giving that much more time for malware programs and the botnets that they call into being to take advantage of known weaknesses.

Botnets

Researchers at GTISC estimate that 15% of all online computers in 2008 will become part of botnets -- infected with code that effectively puts them under the control of a remote botmaster. That's up from an estimated 10% in .

One massive recent botnet was created by an .