Security Threat Report: July 2009 Update
Today, most companies have guarded their email gateways and broadened their defenses against email-borne malware and malicious spam. Consequently, cybercriminals are developing techniques to infect machines behind-the-scenes by embedding malicious code on innocent websites and luring victims to them.
2009 has proven attacks are continuing to broaden. While the number of web-based attacks outweighs the attacks through email, financially motivated cybercriminals are turning their attention to Web 2.0 platforms such as Facebook and Twitter and alternative programs and tools such as Adobe Flash and PDFs.
Read this paper to see a carefully documented discussion of recent security threats and attempts by cybercriminals to exploit social networking sites, email, mobile devices, and legitimate websites throughout the first half of 2009.