Recent data from Kaspersky Lab show that close to 32 million internet-borne threats were detected and blocked by Kaspersky Lab among its users in the Philippines in 2018, setting out a growth of over 200 percent from 2017. Internet threats and malicious hosting incidents remain the top two attacks that the cybersecurity company has detected on computers of its users in the Philippines between 2017 and 2018.

 

The latest Kaspersky Security Bulletin (KSB) revealed that a total of 31,887,231 internet-borne threats were tracked by Kaspersky Lab to be attacking its Filipino users. There are currently 76 million active internet users in the country.

 

The KSB is a periodical report with country-specific data released to present the threat overview of each country around the world. It is based on information obtained from the Kaspersky Security Network (KSN), one of the cybersecurity company’s main cloud systems that was created to discover new and unknown cyberthreats and ensure the quickest and most effective protection for its users. KSN automatically processes completely anonymous cyberthreat-related data received from millions of devices owned by Kaspersky Lab users who have voluntarily opted to join this system.

 

Internet threats
With 41.30% of users attacked by web threats in 2018, the country now lands in Kaspersky Lab’s global list of countries with the most web threats at 11th spot, climbing several notches up from its 30th ranking in 2017. Across Southeast Asia, the Philippines currently holds the record of having the highest number of online incidents followed by Vietnam (19th) and Indonesia (20th), respectively.

 

 

Of the attacks, 71.38% were attempted against individual users while 28.62% were aimed versus business users. It was found that cybercriminals used a number of malicious programs to infect Kaspersky Lab users in the Philippines, such as:

  1. Mobile malware (malicious code designed to target smartphones and tablets)
  2. Banking Trojans (a kind of malware that steals sensitive financial credentials such as for e-payment and online banking systems from victims, intercepting one-time passwords then sending the data back to the attackers behind the Trojan)
  3. Coin miner (program for generating or mining cryptocurrency)
  4. Adware (program designed to launch ads on infected computers and/or to redirect search engine results to promotional websites)
  5. Riskware (program that is legitimate in itself but can be potentially misused by cybercriminals and lately has been used as a controlling machine for malicious activities)

 

Attacks via browsers are still the primary method for spreading malicious programs, according to Kaspersky Lab. The popular techniques among cybercriminals to penetrate systems in the country include:

  1. Drive-by download. This refers to the unintentional download of malicious code to a computer or mobile device that leaves the user open to a cyberattack. Infection in this type of attack takes place when visiting an infected website, which doesn’t rely on the user to do anything and without their knowledge to actively enable the attack. For example, you might get a link emailed to you or shared with you on a post on your social media — sources you trust — that are designed to entice you to click and open. Once the website is open, the drive-by download installs itself on your device.
  2. Social engineering. This attack requires user participation where the user has to download a malicious file to her computer. This happens when cybercriminals make the victim believe she is downloading a legitimate program under the guise of a serious problem that needs immediate attention. Attacker may use anger, guilt and sadness to convince their victims. Many employees and consumers don’t realize that with only a few pieces of information like name, date of birth or address, hackers can gain access to multiple networks.

 

Malicious hosting
In the same report, it showed that malicious hosting incidents monitored and thwarted by Kaspersky Lab on devices of Filipino users jumped from 449,297 in 2017 to 2,026.076 in 2018 showing an upsurge of more than 300 percent in 12 months. This new data places the Philippines in 35th spot, or three levels higher than its ranking in 2017 of countries worldwide with the most number of such cases. Among six countries in the region, the Philippines ranks third after Singapore (8th) and Vietnam (26th), respectively.

 

Local threats
Meanwhile, statistics revealed that local threat attacks, wherein users have been infected with malware through removable media (such as USB drives, CDs and DVDs) went down with just two million incidents detected and blocked by Kaspersky Lab.

 

This development pushed the country’s rank to slide down from 35th in 2017 to 65th place by end of 2018 in the cybersecurity company’s dynamic global listing of countries with the most number of local threat incidents. In the entire SEA region, the Philippines ranks third next to Vietnam (2nd) and Indonesia (55th), respectively.

 

 

“All countries in Southeast Asia have demonstrated unfortunate gains in detected online threats which we tie to the fact that it’s a global trend — it’s happening elsewhere in the world as every country is a target. The Philippines, regrettably, has been figuring in our list of top countries where users encounter mobile malware since 2016, and the growing population of active internet and social media users play a part in making the country highly vulnerable to attacks,” said Yeo Siang Tiong, General Manager at Kaspersky Lab Southeast Asia.

 

“Cybercriminals will keep on creating more sophisticated malware and using different tactics to trick us and steal from us. But we have the most effective and powerful tools now before us to help us mitigate the risks of threats to avoid causing us serious trouble. As Filipinos continue to embrace going digital whether for business or personal reasons, we urge them to take a more active stance in protecting their data,” he said.

 

Below are tips from Kaspersky Lab’s cybersecurity experts to keep internet users a little more safe from the dangers lurking online and offline:

  1. Keep personal information professional and limited. Share data that only your client or employer would need such as your expertise, professional background and contact information only. Beyond that, keep everything else private.
  2. Keep your privacy settings on and keep them enabled all the time. Remember that your web browser, mobile OS and social media apps have privacy-enhancing settings available.
  3. Practice safe browsing. As you would avoid strange and unfamiliar neighborhoods in real life, so should you be mindful of checking out questionable online sites. Don’t assume links are genuine.
  4. Use your own device and check that your internet connection is always secure. If you can avoid using public computers and public wifi, do so. There is a reason cybersecurity experts worry about “endpoints” or places where a private network connects to the outside world. Your vulnerable endpoint is your local internet connection. It pays a lot to wait for a better time to be able to connect to a secure network.
  5. Be careful what you download. Don’t download apps that look suspicious or come from a site you don’t trust. Hold back before opening unsolicited email attachments and accepting peer-to-peer file transfers.
  6. Choose strong passwords. Passwords are one of the biggest weak spots in the data security structure and there’s no way around them. Create unique and complex ones that are harder for cybercriminals to demystify — at least 15 characters long, mixing letters, numbers and special characters.
  7. Be careful who you meet online. Be as cautious and sensible in your online social life as you are in real life. Beware of fake communications. Even online letters from friends and families could be hacked so treat online messages with caution.
  8. Keep your internet security program up to date. Know that your antivirus program can only help protect your data and device if it’s updated. Same goes with the OS and apps you use. This practice helps eliminate vulnerabilities that can be exploited by malicious software and attacks.   8. Keep your internet security program up to date. Know that your antivirus program can only help protect your data and device if it’s updated. Same goes with the OS and apps you use. This practice helps eliminate vulnerabilities that can be exploited by malicious software and attacks.

RECOMMENDED ARTICLE FOR TECHWORLD


 
Win a Transcend DrivePro 230 Dashcam for Your Family’s Safety Travel This Christmas
Techworld Date Posted: 18 December 2018 8:48 AM | 29 Views
It’s the season of giving and Christmas is fast approaching. Transcend Information, together with Blade Auto Center, is holding “Share and WIN a DrivePro 230 dashcam” on Blade Facebook to secure your family’s safety.... See More
 
Win a Transcend DrivePro 230 Dashcam for Your Family’s Safety Travel This Christmas
Techworld Date Posted: 8:48 AM | 29 Views
It’s the season of giving and Christmas is fast approaching. Transcend Information, together with Blade Auto Center, is holding “Share and WIN a DrivePro 230 dashcam” on Blade Facebook to secure your family’s safety...See More

 
Up Close and Personal with the WORLDBEX 2019 ICONS of Interior Design
Techworld Date Posted: 1 March 2019 4:52 PM | 37 Views
  It’s not every day that the most prominent interior designers convene under one event with the sole purpose of imparting their expertise. Good thing for enthusiasts and those whose spaces are up for.... See More
 
Up Close and Personal with the WORLDBEX 2019 ICONS of Interior Design
Techworld Date Posted: 4:52 PM | 37 Views
  It’s not every day that the most prominent interior designers convene under one event with the sole purpose of imparting their expertise. Good thing for enthusiasts and those whose spaces are up for...See More

 
ADATA Sets New Overclocking Record with XPG SPECTRIX D80 RGB Memory Module at 5584MT/s
Techworld Date Posted: 9 January 2019 12:40 PM | 39 Views
ADATA Technology, a leading manufacturer of high-performance DRAM modules, and NAND Flash products has announced that it has overclocked its XPG SPECTRIX D80 RGB DDR4 memory module. See More
 
ADATA Sets New Overclocking Record with XPG SPECTRIX D80 RGB Memory Module at 5584MT/s
Techworld Date Posted: 12:40 PM | 39 Views
ADATA Technology, a leading manufacturer of high-performance DRAM modules, and NAND Flash products has announced that it has overclocked its XPG SPECTRIX D80 RGB DDR4 memory moduleSee More

 
Star Wars™: Jedi Challenges, A New Smartphone-Powered Augmented Reality Experience Is Now in the Philippines
Techworld Date Posted: 8 November 2017 5:23 PM | 43 Views
Lenovo (HKSE: 992) (ADR: LNVGY) and Disney today unveiled Star Wars: Jedi Challenges, a new augmented reality Star Wars product that allows fans to experience Star Wars in ways never before possible. See More
 
Star Wars™: Jedi Challenges, A New Smartphone-Powered Augmented Reality Experience Is Now in the Philippines
Techworld Date Posted: 5:23 PM | 43 Views
Lenovo (HKSE: 992) (ADR: LNVGY) and Disney today unveiled Star Wars: Jedi Challenges, a new augmented reality Star Wars product that allows fans to experience Star Wars in ways never before possibleSee More

 
Apacer Launches the AH336 and AC233 in Partnership with P714
Techworld Date Posted: 3 November 2017 10:45 AM | 501 Views
When pursuing a dream, we all need the support and company of friends. Apacer partnered with P714, a Taiwanese illustration brand famous for their heartwarming, adorable designs, in creating 3 special edition flash drives.... See More
 
Apacer Launches the AH336 and AC233 in Partnership with P714
Techworld Date Posted: 10:45 AM | 501 Views
When pursuing a dream, we all need the support and company of friends. Apacer partnered with P714, a Taiwanese illustration brand famous for their heartwarming, adorable designs, in creating 3 special edition flash drives...See More

 
One Call on WhatsApp Is Enough to Establish Surveillance
Techworld Date Posted: 20 May 2019 9:34 AM | 35 Views
  A recently discovered zero-day vulnerability in the world’s most popular messenger — WhatsApp — allowed hackers to eavesdrop on users, read their encrypted chats, turn on the microphone and camera, and install spyware.... See More
 
One Call on WhatsApp Is Enough to Establish Surveillance
Techworld Date Posted: 9:34 AM | 35 Views
  A recently discovered zero-day vulnerability in the world’s most popular messenger — WhatsApp — allowed hackers to eavesdrop on users, read their encrypted chats, turn on the microphone and camera, and install spyware...See More

 
Online Dating: All You Need to Bag Yourself a Business Owner or Some Company Secrets
Techworld Date Posted: 28 November 2017 9:52 AM | 342 Views
The saying goes ‘don’t mix business with pleasure’, but research from Kaspersky Lab reveals business owners and employees could be unwittingly putting their companies at risk,. See More
 
Online Dating: All You Need to Bag Yourself a Business Owner or Some Company Secrets
Techworld Date Posted: 9:52 AM | 342 Views
The saying goes ‘don’t mix business with pleasure’, but research from Kaspersky Lab reveals business owners and employees could be unwittingly putting their companies at risk,See More

 
ASUS Invites Budding Tech Aspirants in the ROG Specialist Program
Techworld Date Posted: 16 August 2017 11:52 AM | 329 Views
The Republic of Gamers is currently looking for people to join the ROG Specialist Program. The progam aims to enrich the knowledge and capabilities of new tech enthusiasts in the field of computers and.... See More
 
ASUS Invites Budding Tech Aspirants in the ROG Specialist Program
Techworld Date Posted: 11:52 AM | 329 Views
The Republic of Gamers is currently looking for people to join the ROG Specialist Program. The progam aims to enrich the knowledge and capabilities of new tech enthusiasts in the field of computers and...See More

 
Top F&B Distribution Company Multi-M Food Corporation Initiates Digital Transformation on the Cloud
Techworld Date Posted: 18 February 2019 11:05 AM | 80 Views
One of the top distribution companies of food service chains in the country, Multi-M Food Corporation (MMFC) announced that they are kicking off their digital transformation journey to transform their operations to continue their.... See More
 
Top F&B Distribution Company Multi-M Food Corporation Initiates Digital Transformation on the Cloud
Techworld Date Posted: 11:05 AM | 80 Views
One of the top distribution companies of food service chains in the country, Multi-M Food Corporation (MMFC) announced that they are kicking off their digital transformation journey to transform their operations to continue their...See More

 
Asia and Middle East a Hotbed of New Threat Actors in Q1, 2018
Techworld Date Posted: 16 April 2018 4:28 PM | 25 Views
During the first three months of the year, Kaspersky Lab researchers discovered a wave of new APT activity based mainly in Asia – more than 30% of Q1 reports were dedicated to threat operations.... See More
 
Asia and Middle East a Hotbed of New Threat Actors in Q1, 2018
Techworld Date Posted: 4:28 PM | 25 Views
During the first three months of the year, Kaspersky Lab researchers discovered a wave of new APT activity based mainly in Asia – more than 30% of Q1 reports were dedicated to threat operations...See More


Power by

Download Free AZ | Free Wordpress Themes