DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Archive

Spam was the most common way for cybercriminals to spread malware in 2018

DigitalCIO Bureau by DigitalCIO Bureau
December 11, 2018
in Archive
0
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Source: Indo-Asian News Service

Global cybersecurity firm F-Secure on Tuesday said spam emerged as the most common method for cybercriminals to spread malware in 2018, accounting for nine out of every 10 infection attempts throughout the year.

Spam campaigns disguised as delivery notifications or online shopping invoices have been popular with cybercriminals all year long, the cybersecurity firm found in a research.

The findings suggest that these tactics can prove even more effective around the holidays.

“The kind of spam that criminals use doesn’t seem so spammy to a lot of people this time of year. More people are just more open to the commercial messages spammers like to spoof, which makes individuals more vulnerable at home and at work,” said F-Secure Behavioral Science Lead Adam Sheehan in a blog post on Tuesday.

“Tests we performed using simulated Black Friday and Cyber Monday phishing emails saw about 39 percent more people click than similar tactics we use at other times during the year, which isn’t a trend we like to see,” Sheehan added.

Roughly 69 per cent of spam campaigns attempted to trick users into visiting malicious URLs and download a malware-laden file or commit another action that results in an infection.

Malicious attachments were used in the remaining 31 per cent of campaigns.

Downloaders, bots and backdoors together account for 52 per cent of malware delivered through spam, followed by banking trojans (42 percent) and then ransomware (six percent).

The Emotet, Trickbot, and Panda banking trojans are the most frequently seen malware families delivered through spam, the research showed.

* Lead image used for representational purposes only.

Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

SE Labs Award Validates NetApp’s Status as the World’s Most Secure Storage

by DigitalCIO Bureau
July 8, 2025
0

NetApp has announced that it was recognized as a standout performer in cybersecurity in the SE LABS  Awards 2025. NetApp won the 2025 SE Labs Award for Enterprise...

Read moreDetails

India’s Digital Identity Surge Comes with Rising Concerns Around AI and Trust: Okta Report

by DigitalCIO Bureau
July 3, 2025
0
The Evolving Role of AI in Data Protection

Indian consumers continue to rapidly adopt digital technologies while navigating unique challenges in trust and security, reveals the 2025 Customer Identity Trends Report from Okta, The World’s Identity...

Read moreDetails

Pax8 Introduces Era of Managed Intelligence

by DigitalCIO Bureau
June 19, 2025
0
Pax8 Introduces Era of Managed Intelligence

Pax8 has released its inaugural research report, The Agentic Inflection Point: And the Rise of the Managed Intelligence Provider. The comprehensive study defines the future of small-to-midsized business (SMB) operations, transformed...

Read moreDetails

Barracuda Unveils AI-Powered Cybersecurity Platform BarracudaONE in India

by DigitalCIO Bureau
June 3, 2025
0

Barracuda Networks has unveiled the BarracudaONE AI-powered cybersecurity platform. BarracudaONE maximizes threat protection and cyber resilience by unifying layered security defenses and providing deep, intelligent threat detection and response for...

Read moreDetails

Check Point Acquires Veriti To Minimize Digital Vulnerabilities

by DigitalCIO Bureau
May 28, 2025
0
Check Point Acquires Veriti To Minimize Digital Vulnerabilities

Check Point Software Technologies has announced a definitive agreement to acquire Veriti Cybersecurity, the first fully automated, multi-vendor pre-emptive threat exposure and mitigation platform. “The acquisition of Veriti...

Read moreDetails
Next Post

Average Indian smartphone user installs around 50 apps on their phone

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Google’s Latest Privacy Tools for Users

May 9, 2019
UST Opens New Office and Generative AI Experience Center in Cyberjaya, Malaysia

UST Opens New Office and Generative AI Experience Center in Cyberjaya, Malaysia

November 18, 2024

VIAVI Selected to Test 5G for Brazilian Spectrum Auction

August 21, 2019

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Barracuda Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud HCLTech Honeywell IBM Infographics Internet of Things (IoT) Kaspersky Microsoft Netskope NTT DATA Palo Alto Networks Panel Discussion Qlik Salesforce ServiceNow Sophos Tenable Trend Micro Veeam Veeam Software Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?