{"id":2202,"date":"2013-07-02T10:11:07","date_gmt":"2013-07-02T14:11:07","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=2202"},"modified":"2020-02-26T10:40:41","modified_gmt":"2020-02-26T15:40:41","slug":"versatile-threats","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/versatile-threats\/2202\/","title":{"rendered":"Versatile Threats: Dangers Posed to any Device"},"content":{"rendered":"<p>According to Kaspersky Labs research, 34 percent of worldwide Internet users were attacked by malicious programs in 2012. As always, the most popular entries for attackers were widely used programs like Java, Acrobat Reader and Internet Explorer. But as we increasingly access online information through different means \u2014 smartphones, iPads, apps, etc. \u2014 attackers are altering their craft just as quickly to keep up with these changes in user behaviors. The threats that we face as users are found on every connected device and are more advanced and versatile than ever before.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/07\/06050349\/versatile_title.jpg\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-2203\" alt=\"versatile_title\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/07\/06050349\/versatile_title.jpg\" width=\"640\" height=\"420\"><\/a><\/p>\n<p><b>Multiple OS Threats<\/b>: It used to be that malware programs were designed for specific operating systems. It also used to be the case that Windows was targeted far more frequently than Mac OS. Neither is as true as it used to be. <a href=\"https:\/\/www.kaspersky.com\/blog\/new-malware-functions-on-multiple-operating-systems\/\" target=\"_blank\" rel=\"noopener nofollow\">Newer threats<\/a> like the Morcut Trojan disguise themselves as applets or plugins and can download onto any system because they contain scripts appropriate for each and, once activated, they identify the operating system in use and inject the respective version of their malicious code. And after years of Macs being virtually free from threats, Apple products are now <a href=\"http:\/\/www.securelist.com\/en\/blog\/8108\/Apple_of_discord\" target=\"_blank\" rel=\"noopener nofollow\">highly targeted<\/a>: Kaspersky Lab\u2019s antivirus experts created 30 percent more signatures to detect Mac Trojans in 2012 than they did in 2011. Among the most popular Mac malware programs are Trojan.OSX.FacCo.a and Jahlav, both of which are Trojans that disguise themselves as video codecs that actually are programs that steal user data and download more malicious programs.<\/p>\n<p><b>Mobile Devices<\/b>: Nearly all <a href=\"https:\/\/www.securelist.com\/en\/analysis\/204792255\/Kaspersky_Security_Bulletin_2012_The_overall_statistics_for_2012\" target=\"_blank\" rel=\"noopener nofollow\">mobile malware in 2012<\/a> was created to exploit devices running the Android platform, at least in part because there are <a href=\"http:\/\/techland.time.com\/2013\/04\/16\/ios-vs-android\/\" target=\"_blank\" rel=\"noopener nofollow\">more Android devices are sold<\/a> than iOS. but it is also because It is also because <a href=\"http:\/\/www.wired.com\/gadgetlab\/2012\/02\/google-android-malware-scanner\/\" target=\"_blank\" rel=\"noopener nofollow\">Google\u2019s open approach<\/a> to app sales opens a wider door for attackers than Apple does. There\u2019s another problem with Android: a lot of legitimate Android apps <a href=\"http:\/\/techland.time.com\/2012\/07\/11\/aggressive-android-adware-how-to-take-control\/\" target=\"_blank\" rel=\"noopener nofollow\">work with ad networks<\/a> that are that are shady at best and malicious at worst, accessing personal information like emails and phone numbers.<\/p>\n<div class=\"pullquote\">Mobile malware programs can be used to access user emails, steal address information from their phonebooks, use geolocation to track users, activate their cameras to facilitate identity theft, and even take over the phones, making them one more tentacle in massive global botnets.<\/div>\n<p>That doesn\u2019t mean that the App Store is free of malicious apps \u2014 the first suspicious application, called Find and Call \u2014 a program that sought user\u2019s email and phone number to inundate them with spam \u2014 was detected in July, 2012.<\/p>\n<p>Whatever the platform, these threats can escalate from annoying spam to identify theft. Mobile malware programs can be used to access user emails, steal address information from their phonebooks, use geolocation to track users, activate their cameras to facilitate identity theft, and even take over the phones, making them one more tentacle in massive global botnets.<\/p>\n<p>And it\u2019s not just smartphones that are the targets of attacks \u2014 tablets and <a href=\"http:\/\/arstechnica.com\/security\/2012\/12\/how-an-internet-connected-samsung-tv-can-spill-your-deepest-secrets\/\" target=\"_blank\" rel=\"noopener nofollow\">smart TVs<\/a> are also being attacked.<\/p>\n<p><b>Usual Suspects<\/b>: Traditional forms of spamming such as <a href=\"http:\/\/www.securelist.com\/en\/threats\/spam?chapter=85\" target=\"_blank\" rel=\"noopener nofollow\">phishing<\/a> that most online users have caught on to are growing in popularity on mobile devices, because what is more readily visible and identifiable as a scam on a large laptop or PC screen is harder to decipher on a small, handheld monitor \u2014 and because the address bar is rarely seen on mobile applications. Playing into this is the use of online-oriented scams \u2014 like fake emails from banks or travel sites \u2014 as well as social media sites like Twitter, where attackers can create <a href=\"https:\/\/www.kaspersky.com\/blog\/five-popular-spam-scams\/\" target=\"_blank\" rel=\"noopener nofollow\">enticing links<\/a> \u2014 and disguise them with url shorteners like bit.ly \u2014 that unwittingly send users to harmful sites.<\/p>\n<p><b>Kids Stuff<\/b>: This new wave of versatile threats can target children, and can also utilize their carelessness to spread malware.<\/p>\n<p>Apps like those from Facebook, Foursquare and Yelp that <a href=\"https:\/\/www.kaspersky.com\/blog\/risks-checking-in\/\" target=\"_blank\" rel=\"noopener nofollow\">let users \u2018check in\u2019<\/a> to various locations offer geolocational information that can put anyone at risk, but especially children \u2014 especially when those posts are made in tandem on Twitter.<\/p>\n<p>As many parents have found out the hard way, giving kids access to mobile devices and their related app stores can have pricey implications when kids download apps that aren\u2019t free. They can also be sucked in by \u2018free\u2019 games that are free to download, but then require payment for tools to help them advance further.<\/p>\n<p>Your old good antivirus for Windows cannot cover all those threats, and traditional approach to protection just doesn\u2019t work in this multi-device, home networked world. That\u2019s why you have to consider protection solution that covers all your devices, and you network as a whole.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to Kaspersky Labs research, 34 percent of worldwide Internet users were attacked by malicious programs in 2012. As always, the most popular entries for attackers were widely used programs<\/p>\n","protected":false},"author":41,"featured_media":2205,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2683],"tags":[259,423],"class_list":{"0":"post-2202","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-cross-platform-threats","9":"tag-mobile-devices"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/versatile-threats\/2202\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/versatile-threats\/1108\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/versatile-threats\/2202\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/versatile-threats\/2202\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/cross-platform-threats\/","name":"cross-platform threats"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2202","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=2202"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2202\/revisions"}],"predecessor-version":[{"id":32822,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2202\/revisions\/32822"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/2205"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=2202"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=2202"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=2202"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}