Australian computers more likely to be infected with Trojans: Microsoft security expert

The most common threats to cyber security facing Australia today are Trojans, exploits, and password stealers and monitoring tools, a new post published September 13 on the Microsoft Security Blog has confirmed.

In the latest edition of his series on the current threat landscape in Asia and Oceania, director of product management in Microsoft’s Trustworthy Computing group Tim Rains has revealed some interesting new information about the state of vulnerability management in Australia and New Zealand.

Mr Rains writes that while the malware infection rate in Australia is typically below the global average, this is balanced out by an above average level of Trojans.

In cyber security terms a Trojan – a reference to the famous Trojan Horse of Greek Mythology – is malware which disguises itself as a legitimate or useful file, which a user might choose to download and install of their own free will.

Trojans are commonly used by cybercriminals in order to steal data or information, monitor a computer user s activity or hijack a computer to be used as part of a botnet.

Australian computers also exceed the worldwide detection rate for adware, exploits, backdoors, and password stealers and monitoring tools.

The best way to defend your business against cyber threats such as Trojans and computer hackers is to undergo regular security audit and penetration testing evaluations, in order to determine any potential backdoors or vulnerabilities a cybercriminal might choose to exploit.

According to Microsoft’s chief security advisor in Australia James Kavanagh, cyber security has .

Mr Kavanagh notes that comprehensive analysis has determined that 85 per cent of the targeted cyber intrusions that the Defence Signals Directorate responded to in 2010 could have been prevented by simple mitigation precautions.

These include patching applications and operating systems which have been identified as having vulnerabilities and limiting administrative privileges to certain users.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s