A look back: 2011 put a heavy price on data, and the security industry was challenged more than ever to protect this new currency.

/ --Having spent much of the year battling data breaches that led to huge information and financial loss, the security industry was likely relieved to see 2011 come to a close. In its annual threat roundup report, Trend Micro (TYO: 4704; TSE: 4704) wraps 2011 as "The Year of Data Breaches," after witnessing large, well-known companies succumb to targeted data breach attacks that not only stained reputations, but caused them significant collateral damage.

, this year's report revisits past predictions, and summarizes notable threat incidents and security wins throughout 2011. Highlights include:

  • The mobile threat landscape reached new levels of maturity in 2011. Trend Micro threat researchers tracked a staggering spike in the volume of mobile malware, especially those targeting the Android -- just two of the most notorious Android malware variants -- took much of the spotlight, causing millions of users lost data and money.
  • , spammers and scammers who leveraged the trending topics of social networking sites to improve upon their social engineering and hacking tactics, stealing the data of millions of social networkers worldwide. Consequently, regulators have started demanding that social networking sites implement policies and mechanisms to protect the privacy of their users.
  • While the number of publicly reported vulnerabilities decreased from 4,651 in 2010 to 4,155 in 2011, exploit attacks evolved with higher complexity and sophistication. Exploit attacks in 2011 were targeted, original, and well controlled, the most notable of which set their sights on , along with a couple of Adobe product zero-day vulnerabilities that were exploited in the wild.
  • Finally, despite an aggressive cybercriminal landscape, Trend Micro, along with its industry partners and law enforcement authorities achieved some remarkable and strategic wins this year. One of them - reached success after 5 years of stealth tracking and working closely with the FBI. Trend Micro, the only security company that was involved, was able to assist the FBI in what was noted as the biggest cybercriminal takedown in history.

"Reflecting back on 2011, I am very proud of what we've achieved. But our work is never done. With 3.5 new threats created every second, and as businesses and consumers take the journey to the cloud, the risk of data and financial loss are greater than ever," said .  "As a company (and as an industry), we must continue to evolve and create better, data-centric security products for the post-PC era where users need greater visibility and assurance into who is accessing their data, when, where and how."

Supporting assets:

About Trend Micro

Trend Micro Incorporated (TYO: 4704;TSE: 4704), a global leader, creates a world safe for exchanging digital information with its Internet  and threat management solutions for businesses and consumers.  A pioneer in server security with over 20 years' experience, we deliver top-ranked client, server and cloud-based security that fits our customers' and partners' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro™ Smart Protection Network™ infrastructure, our products and services stop threats where they emerge - from the Internet. They are supported by 1,000+ threat intelligence experts around the globe. 

Additional information about Trend Micro Incorporated and the products and services are available at . This Trend Micro news release and other announcements are available at .   Or follow our news on Twitter at @TrendMicro.

distribué par

Ce noodl a été diffusé par Trend Micro Inc. et initialement mise en ligne sur le site http://www.trendmicro.com. La version originale est disponible ici.

Ce noodl a été distribué par noodls dans son format d'origine et sans modification sur 2012-01-17 22:02:19 PM et restera accessible depuis ce lien permanent.

Cette annonce est protégée par les règles du droit d'auteur et toute autre loi applicable, et son propriétaire est seul responsable de sa véracité et de son originalité.