Australian computers more likely to be infected with Trojans: Microsoft security expert

September 20, 2012

The most common threats to cyber security facing Australia today are Trojans, exploits, and password stealers and monitoring tools, a new post published September 13 on the Microsoft Security Blog has confirmed.

In the latest edition of his series on the current threat landscape in Asia and Oceania, director of product management in Microsoft’s Trustworthy Computing group Tim Rains has revealed some interesting new information about the state of vulnerability management in Australia and New Zealand.

Mr Rains writes that while the malware infection rate in Australia is typically below the global average, this is balanced out by an above average level of Trojans.

In cyber security terms a Trojan – a reference to the famous Trojan Horse of Greek Mythology – is malware which disguises itself as a legitimate or useful file, which a user might choose to download and install of their own free will.

Trojans are commonly used by cybercriminals in order to steal data or information, monitor a computer user s activity or hijack a computer to be used as part of a botnet.

Australian computers also exceed the worldwide detection rate for adware, exploits, backdoors, and password stealers and monitoring tools.

The best way to defend your business against cyber threats such as Trojans and computer hackers is to undergo regular security audit and penetration testing evaluations, in order to determine any potential backdoors or vulnerabilities a cybercriminal might choose to exploit.

According to Microsoft’s chief security advisor in Australia James Kavanagh, cyber security has .

Mr Kavanagh notes that comprehensive analysis has determined that 85 per cent of the targeted cyber intrusions that the Defence Signals Directorate responded to in 2010 could have been prevented by simple mitigation precautions.

These include patching applications and operating systems which have been identified as having vulnerabilities and limiting administrative privileges to certain users.

Leave a Reply

Your email address will not be published. Required fields are marked *