Subscribe

Malware never sleeps

By Simon Campbell-Young, CEO of Phoenix Distribution.


Johannesburg, 05 Jun 2013

Malware is always changing, adapting, being rewritten and re-released in a seemingly infinite number of ways, with the express intention of making your life difficult - and making the writers or owners of the code as much money as possible. Security threats have increasingly come from new directions and that won't change in 2013, as exploits of popular applications, increasingly sophisticated phishing attacks, malware, scams targeting our love of social networks and photo sharing, and threats associated with viewing online videos grow.

"Internet security violators in 2012 ranged from teen 'hacktivists' to big data companies, foreign governments and corporate employees," says Simon Campbell-Young, CEO of Phoenix Distribution. "The threats will just keep on coming this year. As long as there is digital technology and money, cyber criminals will attempt to use one to get their hands on the other."

According to research and predictions from leading security vendors such as Kaspersky and Symantec, the volume of advanced malware that evades signature-based detection increased by almost 400% in 2012, and attackers will continue to remain a step ahead of traditional defences. "Organisations must rethink their IT security architecture and implement appropriate security measures to prevent advanced cyber attacks such as zero-day attacks and advanced persistent threats (APTs). Since on-premise IT infrastructure is more likely to be attacked than cloud-based infrastructure, this is more important than ever," says Campbell-Young.

In addition, cyber criminals are increasingly targeting mobile devices. "Cyber criminals are changing their tactics to target fast-growing mobile platforms and social networks where consumers are less aware of security risks," says Campbell-Young. "According to research, more than one in six mobile apps have high-risk code that can compromise user security, and 44% of adults aren't aware that security solutions for mobile devices exist. The integrity of mobile apps can be easily compromised through new tampering/reverse-engineering attack vectors, so mobile device owners must be increasingly aware of these vulnerabilities."

He adds that the bring your own device (BYOD) trend is fuelling the vulnerabilities on mobile devices. "Attackers are beginning to launch so-called 'blended attacks' involving the exploitation of employees' phones. Cyber criminals are going to the Android Marketplace, pulling down an app, building a backdoor into it, and selling it in another Android app store for a lower price. Or they'll take the backdoor, grab an icon from an application someone wants to buy, and sell it in another app store for a lower price. While it's typically harder to sneak an app into Apple's App Store, it can be done."

According to Campbell-Young, awareness is your first and best tool. "Anti-virus, anti-malware and anti-spam tools are just that: tools to help you remove any infection or threat. Apart from the traditional methods of detecting and blocking particular malware samples based on their signatures, new, smart techniques are constantly being developed to block even previously unknown exploits or those that utilise newly discovered, or 'zero-day', software vulnerabilities, but staying aware is the first step to keeping the cyber criminals at bay."

Share

Phoenix Distribution

Phoenix Distribution is currently the leading value-added software distributor across the African continent, covering software publishing, localisation and distribution across multiple territories in multiple languages. The business is segmented into two divisions, namely corporate licensing and retail, and Phoenix Distribution dominates the consumer and SME security sectors through three key brands: Norton/Symantec, AVG and Kaspersky.

The corporate licensing division sells volume licensing into the enterprise and SME reseller environments, as well as covers architecture and implementation. The ESD division delivers download content into all channels, including B2B and B2C.

The retail division delivers physical product into the retail environment, covering all mainstream ICT and CES outlets, independents and online stores. This division also distributes mobile accessories, wireless networking products, headsets and specialist high-end video and audio cables. Tier one brands in this arena include Beats by Dre, Monster, Carbon Audio, Trendnet Wireless and Odoyo.

Phoenix Distribution is growing at 65% per annum, with additional acceleration coming from development within the greater African marketplace, as well as the acquisition of significant high-end product lines within the enterprise arena. In addition, the company's UK business, PX Security, is firmly entrenched within the UK retail and SME reseller environments, shipping product through trusted distribution partners into mainstream retail outlets and direct engagement with B2B resellers. The UK operation publishes and distributes Bitdefender and Avira.

Additional bespoke services offered to partners include electronic software distribution within the B2B and B2C environments, category management, training and end-to-end merchandising.

Phoenix Distribution, including the UK subsidiary PX Security, was recently acquired by First Technology Holdings.

For more information, visit www.phoenixsoftware.co.za, www.pxsecurity.co.uk and www.pxsoftware.co.za.

For purchasing information in Africa, visit www.kasperskyafrica.com, www.kasperskyangola.com, www.kasperskybotswana.com, www.kasperskymozambique.com, www.kasperskynamibia.com, www.kasperskysouthafrica.com, www.kasperskydrcongo.com, www.kasperskyzimbabwe.com, www.kasperskyzambia.com, www.antivirusangola.com, www.antivirusbotswana.com, www.antivirusmozambique.com, www.antivirusnamibia.com, www.antivirussouthafrica.com, www.antivirusdrcongo.com, www.antiviruszimbabwe.com and www.antiviruszambia.com.

Editorial contacts

Simon Campbell-Young
Phoenix Distribution
(+27) 21 487 4640
simon@phoenixsoftware.co.za