Latest Comments
"Bullshit. Free speech, free speech, free speech. Bullshit. "Anonymous" is a bunch of juvenile ..."
by Clark Kent | Feb 12, 2010 2:33 AM
 
"As a citizen of australia, I condemn internet censorship. I condemn all censorship. I do, ..."
by K | Feb 12, 2010 12:03 AM
 
"Hello MI Dear Friend: museum director & Arts Investor I am HISHAM AL-SHAMMAS from Jordan I ..."
by HISHAM AL-SHAMMAS | Feb 11, 2010 11:31 PM
 
"YOU INTERESTED IN BUYING HACKING STUFF? CVV MAILER SMTP DUMPS(TRACK 1 AND 2) LEADS LOGINS ..."
by thom | Feb 11, 2010 1:32 AM
 
"It's certainly relevant, whether it's helpful or not depends on what you're looking to gain from ..."
by the real thing | Feb 10, 2010 11:17 AM
Web

One in twelve websites contain 'inappropriate content'

  • Email a Friend
  • Print Page
By SC Staff
Sep 30, 2009 11:33 AM
Tags: websites | content | social | networking | sites | malware | webroot
Rise in malware targeting social networking sites.

One in twelve web pages now contain 'inappropriate content', according to a whitepaper from Webroot.

The whitepaper on the changing nature of web security threats considers the way in which web-based attacks are evolving to target mobile users and take advantage of all forms of remote access.

Gerhard Eschelbeck, chief technology officer at Webroot, said: “Recent findings from the Webroot Threat Research Centre indicate a clear growth in the level of threats being distributed via the internet. The findings reveal that one in twelve web page addresses have been indicated as containing inappropriate content, and have therefore been blocked or questioned.”

He also predicted that following a substantial rise in malware targeted at social networking sites, this form of attack will be the driving force behind the next wave of attacks, and recommended that the end-user become educated on the types of threat.

Jon Collins, managing director of Freeform Dynamics, said: “Information technology is a two-edged sword, as every innovation – from social networking to virtualisation and cloud computing – can be employed for good or ill.

“Given that web-based threats continue to evolve and become more targeted, there's no room for complacency when it comes to implementing the right level of protection, which needs to balance policies and processes with technologies that are appropriate to the organisation and its working practices.”

See original article on scmagazineuk.com

Secure Computing Magazine

 
Ads by Google
Thoughts on this article? Add a comment below.
Be the first to comment on this article.

Report this comment as offensive:

   * Indicates information we require to process your submission.

Name: *
Email: *
Reason for offense: *
Your report will not be displayed.  
Name:
*
 
Email:
(will not be displayed)
*
 
Comment:
(HTML not permitted)
*
 
Validation
*

Enter the code you see below:

 

 
 
 
 
 
 
Vulnerabilities & Exploits Whitepapers