Australian public not aware of new online attack vectors: Norton
- 07 September, 2012 16:29
Consumer awareness of bad emails and dodgy attachments is high in Australia but the bad news is these are the old attack methods from five years ago, according to the latest Norton Cybercrime report.
Speaking at the media launch of the report in Sydney, Norton Asia-Pacific and Japan vice president, David Freer, told press that Australians are using basic protection such as anti-virus software and deleting suspicious emails but are not aware of the new attack vectors delivered via Web compromises such as social networking site links designed to harvest personal information.
The global report surveyed 13,018 adults aged 18 to 64. Five hundred Australians took part in the survey.
“Unfortunately your basic anti-virus software is not enough to protect you in that area,” he said. When asked what the vendor was doing to educate punters about the new threats, Freer said the vendor takes a couple of different approaches.
“The first is awareness through the media and also through software innovations such as Norton's Facebook Scanner which alerts customers to bad links on social networking sites.”
According to Freer, the vendor was providing more of these tools for free to “make certain that people will use them”.
However, security awareness was not the only area that needed improvement. For example, 25 per cent of Australians surveyed did not think they were at risk online.
According to Freer, many young people think they are anonymous online and openly flaunt what they are doing on social networking sites without using privacy settings.
This was despite the survey finding that 12 per cent of Australian social network users reported someone had hacked into their profile and pretended to be them while one in 10 social network users indicated they had fallen victim to a scam or fake link on social network platforms.
While 80 per cent of Australians surveyed believe that cybercriminals were setting their sights on social networks, only 49 per cent use a security product which protects them from social network threats while 55 per cent use the privacy settings to control what information they share, and with whom.
According to the report, 22 per cent of Australian mobile users surveyed received a text message from someone they didn’t know requesting that they click on an embedded link or dial an unknown number to retrieve a 'voicemail'.
In addition, 20 per cent of Australians surveyed did not understand the risks of cyber crime and what could happen if a criminal got hold of their email account.
“What we have discovered is the most risky area and most valued by cyber criminals is your personal email account and its password,” Freer said.
“This email has a higher value in the underground economy than buying a credit card number. That’s because this is the account you can reset every password to,” he said.
For example, 27 per cent of Australian adults reported to have been notified to change their password for a compromised email account.
“What was most surprising was that well over four in 10 Australians are putting Word documents on their personal email and sending them back and forth,” he said.
“The work environment brings a certain level of security but when it’s using a personal device and accessing the work email that’s a fairly risky thing to do.”
In addition, he said 22 per cent of Australians surveyed were accessing copies of bank statements, which contain personal details, using their personal email. Another concern was that 17 per cent of consumers surveyed sent passwords back and forth using email.
“One area that can be fixed but where consumers are falling down is password usage. The number of people who use the same password year after year on all of their accounts is phenomenal,” Freer said.
Follow Hamish Barwick on Twitter: @HamishBarwick
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spiceworks' free management software gets integrated MDM
Leading Through Connections – Insights from the Global Chief Executive Officer Study
IBM’s 2012 Global CEO study follows face-to-face discussions with more than 1,700 CEOs and senior public sector leaders from around the globe. The findings examine how CEOs are responding to the complexity of increasingly interconnected organisations, markets, societies and governments. For example, almost one-quarter of CEOs say their organisations operate below par in terms of driving value from data. CEOs have expressed frustration about their inability to capitalise on available information. This is because: “The time available to capture, interpret and act on information is getting shorter and shorter.” CEO, Chemicals and Petroleum, United States Given the need for deeper business insight, the best performing organisations are more adept at converting complex data into insights, and insights into action. Download Entire Report Now.
Mobile Load - Performance Testing for Mobile Applications
Key mobile trends and analysis on how performance testers must change their testing methodologies to ensure they are accounting for the changes caused by mobile usage. Download today.
Building a Better Mousetrap in Anti-Malware
This story is becoming frustratingly old. Cyber threats are continuously advancing in their adaptability speed, sophistication, and degree of stealthiness. At the same time, the exposed footprint is expanding. More business operations are moving online and end-user devices—corporate-issued and user-owned—are expanding in number and variety. A reasonable question asked by executives responsible for making decisions on their organisations’ security budgets is whether their money and resources are being spent wisely. Are their businesses buying and using the best mix of security technologies to meet their needs and obligations? Read on.