blue coat web security 300x95 2011 Web Security ReportThe dynamic Web link is the most powerful tool for cyber crime and Web threat delivery next to social engineering human nature. Every lure has a dynamic Web link that allows cyber crime to change out payload servers, making it difficult to detect and block malware delivery. Last year, malware Web delivery infrastructure migrated to popular and trusted domains using hacking and acquired access credentials that provide a trusted veil from reputation filters and commonly blocked Web categories.

In the first few hours of a Web attack common defenses such as desktop AV are providing little protection, as shown by studies in this report and specific case examples. Real-time Web defenses, using large user communities that provide real-time awareness of new Web links and content, are finding threats more quickly. They leverage a wider range of defenses and analysis, tuned by security experts.

The dynamic Web link moves the attack challenge to Web location detection, obfuscation uncloaking, sand boxing and call-home analysis. For over a decade, the file hash value or signature has been the core element of a threat defense. Now the Web URI comes into the defense picture, as sophisticated Web constructs deliver malware, exploit kits, phishing, scams and fake software. The message is simple: keep your AV active to close the door on known threats – but add a real-time Web defense to address the dynamic Web link threat.

This security report provides an overview of the changing ways in which people are using the Internet and the new methods cybercrime is using to target their attacks.

This security report examines Web behavior and the malware to which users are most frequently exposed. Analyzing Web requests from the Blue Coat WebPulse service, which weekly rates nearly three billion requests in real-time, this report provides an overview of the changing ways in which people are using the Internet and the new methods cybercrime is using to target their attacks.

The 2011 Web-based threat landscape continues to become more sophisticated, utilizing a combination of techniques and multiple stages to launch attacks. Read on to find out about some of the biggest shifts since 2010 including:

  • Social Networking Becoming The Newest Malware Vector
  • Legitimate Sites Becoming Park of The Attack Infrastructure
  • Malware Hiding in Acceptable Web Categories

DOWNLOAD THIS FREE REPORT NOW

Hottest IT Skills in 2013 – Cloud, Mobile and BI
In 2012, more than 1.7 million jobs in the field of cloud computing remained unoccupied, according to analysts firm IDC. READ MORE
How Cloud Computing Influences Digital Marketing
Cloud marketing has the ability to drastically change the ways in which they reach and engage their audience, particularly with regard to distributing and storing mission-critical data. READ MORE
Gartner: BYOD to Take Center Stage For Mobile App Use by 2017
More and more companies encourage their employees to work on their devices, thus reducing the cost of computer equipment, but also increase the cost to maintain licenses and safety. READ MORE
Maturity in the Cloud: Start Thinking Like a Grown-Up
Despite the inclination to wait until all of the cloud’s kinks have been worked out, holding off on cloud initiatives until the industry matures won’t guarantee success. READ MORE
PwC: Cloud, SaaS and Mobile Are Changing Software Industry
The software industry is undergoing major changes by trends such as cloud, SaaS, mobile technology and the “consumerization of IT”. READ MORE
10 Cloud Computing Game Changers
Here are the ten most influential cloud computing companies, and the reason why. READ MORE