Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News
SYS-CON.TV
Cloud Expo & Virtualization 2009 East
PLATINUM SPONSORS:
IBM
Smarter Business Solutions Through Dynamic Infrastructure
IBM
Smarter Insights: How the CIO Becomes a Hero Again
Microsoft
Windows Azure
GOLD SPONSORS:
Appsense
Why VDI?
CA
Maximizing the Business Value of Virtualization in Enterprise and Cloud Computing Environments
ExactTarget
Messaging in the Cloud - Email, SMS and Voice
Freedom OSS
Stairway to the Cloud
Sun
Sun's Incubation Platform: Helping Startups Serve the Enterprise
POWER PANELS:
Cloud Computing & Enterprise IT: Cost & Operational Benefits
How and Why is a Flexible IT Infrastructure the Key To the Future?
Click For 2008 West
Event Webcasts
Confidential Business Information Prime Target for Cyber-Thieves, According to PandaLabs Q3 Report
Report shows that theft of confidential business information is on the rise; three out of every four malware infections are caused by Trojans

ORLANDO, Fla., Dec. 3, 2012 /PRNewswire/ -- PandaLabs, Panda Security's anti-malware laboratory, today published its Quarterly Report for Q3, analyzing the IT security events and incidents from July through September 2012. The third quarter of the year has seen an increase in the number of hacking attacks on major companies aimed to gain access to confidential and personal information. The quarterly report can be downloaded from: http://press.pandasecurity.com/press-room/reports/.

There are many instances of cybercriminal activity from the past quarter. Dropbox suffered a huge security breach that led to theft of usernames and passwords from thousands of users. American video game developer Blizzard confirmed in August that it had suffered a security breach where hackers were able to obtain users' email addresses and encrypted passwords. The company urged users to change the login credentials to its online gaming service Battle.net. In September, it was revealed that Adobe had also been attacked by hackers. In this case, the attackers accessed one of Adobe's internal servers to be able to sign their malware with a valid digital certificate from the company.

Three Out of Every Four Malware Infections Are Caused by Trojans
Trojans continued to account for most of the new threats created this quarter, by far. Trojans constituted 72.58 percent of all new malware, while viruses constituted 14.47 percent and worms 10.53 percent. When it comes to the number of infections caused by each malware category, the ranking supports the hierarchy of new samples in circulation, with Trojans accounting for three out of every four infections, followed by worms and viruses. Here are visuals depicting these trends: http://press.pandasecurity.com/wp-content/uploads/2012/11/NEWMALWARE.jpg and http://press.pandasecurity.com/wp-content/uploads/2012/11/MALWARE-INFECTIONS.jpg.

"It is obvious that malware writers have standardized their infection techniques, since what we have seen in Q3 is a continuation of the trends we saw over the first half of the year," said Luis Corrons, technical director of PandaLabs. "Trojans once again have accounted for almost 80 percent of infections, and continue to be the preferred category for cyber-criminals to carry out information theft. All this confirms cyber-crooks' first objective: to make money from their creations."

China Tops List of Infections per Country
The average number of infected PCs across the globe stands at 30.68 percent. China once again takes the top spot of most infections per country (53.17 percent of infected PCs), followed by South Korea (52.77 percent), comprising the only nations with more than 50 percent of computers infected. The list of top ten most infected countries is made up of nations from almost every part of the world: Asia, Europe, South America, and Africa. Here's a graph representing the countries with most malware-infected computers:
http://press.pandasecurity.com/wp-content/uploads/2012/11/COUNTRIESINFECTED.jpg.

Eight of the ten least infected countries are in Europe with the only exceptions being Canada and Australia. The country with the fewest infections is Ireland (20 percent of infected PCs), followed by Norway (20.16 percent), and Sweden (22.46).Here's a graph representing the countries with the fewest infections: http://press.pandasecurity.com/wp-content/uploads/2012/11/COUNTRIESLESSINFECTED.jpg.

"The list of least infected countries is dominated by some of the world's most technologically advanced nations," said Corrons. "This is due to the fact that these countries are more aware of the importance of the fight against cyber-crime and are more willing to take the measures necessary to stop infections."

The Quarter at-a-Glance
In the report, PandaLabs highlights several top security incidents that occurred during Q3, including a number of cyber-espionage attacks aimed at journalists in different parts of the world. The report also covers the latest hacker attacks on mobile platforms. Android has become a prime target as Google announced that users have activated half a billion Android devices. It is obvious that profit-motivated hackers will increasingly turn their attention to this platform due to its growing installed base.

PandaLabs advises all users to keep their computers adequately protected with a solution like Panda Security's free Panda Cloud Antivirus.

About PandaLabs
Since 1990, PandaLabs, Panda Security's malware research laboratory, has been working to detect and classify malware in order to protect consumers and companies against new Internet threats. To do so, PandaLabs uses Collective Intelligence, a cloud-based proprietary system that leverages the knowledge gathered from Panda's user community to automatically detect, analyze and classify the more than 73,000 new malware strains that appear every day. This automated malware classification is complemented through the work of an international team with researchers specialized each in a specific type of malware (viruses, worms, Trojans, spyware and other attacks) to provide global coverage. Get more information about PandaLabs and subscribe to its blog news feed at http://www.pandalabs.com/. Follow Panda on Twitter at http://twitter.com/Panda_Security and on Facebook at http://www.facebook.com/PandaSecurity.

SOURCE Panda Security

About PR Newswire
Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Cloud Developer Stories
Companies today struggle to manage the types and volume of data their customers and employees generate and use every day. With billions of requests daily, operational consistency can be elusive. In his session at Big Data Expo, Dave McCrory, CTO at Basho Technologies, will expl...
Code Halos - aka "digital fingerprints" - are the key organizing principle to understand a) how dumb things become smart and b) how to monetize this dynamic. In his session at @ThingsExpo, Robert Brown, AVP, Center for the Future of Work at Cognizant Technology Solutions, outlin...
The move in recent years to cloud computing services and architectures has added significant pace to the application development and deployment environment. When enterprise IT can spin up large computing instances in just minutes, developers can also design and deploy in small ti...
In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect at GE, and Ibrahim Gokcen, who leads GE's advanced IoT analytics, focused on the Internet of Things / Industrial Internet and how to make it operational for business end-users. Learn about the challenges posed...
SYS-CON Media announced that Splunk, a provider of the leading software platform for real-time Operational Intelligence, has launched an ad campaign on Big Data Journal. Splunk software and cloud services enable organizations to search, monitor, analyze and visualize machine-gene...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021



SYS-CON Featured Whitepapers
ADS BY GOOGLE