Web Threats Rank As Third Most Serious Computer Security Threat

Trend Micro Inc. recently announced the results of its study into corporate end users' awareness of Web threats.

Web threats are any threat that uses the Web to do bad and unwanted things. Threats use the Internet to perform malicious and often self-perpetuating activities and typically consist of one or more malicious programs that are installed on a user's computer without their knowledge, permission or understanding when the user accesses the Internet.

Often these threats may either be invisible or seem benign to the user, but when activated individually or in combination can steal confidential information off the user's computer or use the computer's resources without the user's knowledge or permission.

The study tracked responses from 1600 corporate computer end users across the United States, UK, Germany and Japan. The study results indicated that worldwide, roughly half of the respondents (54 percent) are aware of Web threats. Awareness of Web threats is highest in Germany (63 percent), followed by UK (57 percent) and United States (54 percent), and lowest in Japan (43 percent). The low awareness of Web threats in Japan could be due to the fact that the phrase is difficult to translate into Japanese and is not often used.

Web threats are more pervasive today and are the fastest-growing threat vector. The threats are more sophisticated, comprise multiple components, and leverage the Web to update, hide, communicate and transmit stolen information. With hackers becoming more organized and increasingly motivated by profit, criminal opportunity is greater than ever.

According to the results of the Trend Micro study, Web threats ranks as the third most serious computer security threat following viruses and trojans. It is considered to be more serious than pharming, phishing and spam.

Respondents in all countries are most likely to associate Web threats with malicious activities (59 percent) and secondarily with the propagation aspects of the Web threats definition (installation without the user's knowledge (47 percent) and delivery via the Internet (44 percent)). However, German respondents are most likely to identify these aspects of Web threats. For example, 75 percent of German respondents correctly associate Web threats with malicious activities as compared to 49 percent of respondents from UK. Other noteworthy findings include:

  • No single fear or concern dominates in terms of Web threats. German respondents are most familiar with Web threats and are also most likely to express concerns about Web threats. For example, 53 percent of the German respondents are concerned about malicious downloads related to Web threats, as compared to 40 percent of the respondents from UK.
  • Respondents indicated that the installation (57 percent) and use (54 percent) of security software are the most common actions taken to protect against Web threats. U.S. respondents are also likely to become more selective and cautious with the Web sites they visit (51 percent). German respondents are also likely to pay more attention to incoming e-mails (51 percent).
  • Awareness of Web threats is higher in small companies than in larger companies in UK (60 percent vs. 53 percent) and Germany (66 percent vs. 59 percent). However, in Japan, the awareness of Web threats is significantly higher in large companies (48 percent) vs. small companies (37 percent). Organizational size has little influence on the awareness of Web threats in US.

Motivated by the lure of profits from the sale of stolen confidential information, malware writers today are shifting to the Web as the medium of their malicious activities.

"Characterized by blended techniques, an explosion of variants, and targeted and regional attacks, Web threats pose a broad range of potential costs to consumers and businesses, including identity theft, loss of confidential corporate information, damaged brand reputation, and loss of consumer confidence in Web commerce," said Raimund Genes, Trend Micro CTO for anti-malware. "It is good to see awareness for these insidious threats finally increasing. The pervasive use of the Web and the complexity of protecting against Web threats have begun to combine, forming perhaps the greatest challenge to protecting the privacy of personal information and the confidentiality of corporate information in a decade."

Featured

  • AI to Help Resolve Non-Emergency Calls Across Utah and Decrease 911 Caller Wait Times

    The Utah Communications Authority (UCA), which oversees the state’s next generation 911 technology services, recently announced that public safety answering points (PSAPs) throughout the state plan to implement Motorola Solutions’ Virtual Response technology to automate the receipt and resolution of 10-digit non-emergency line calls in Utah with the help of AI. Read Now

  • Report: 2025 Video Surveillance Market Set to Grow After Small Decline in 2024

    Novaira Insights has unveiled its latest report, “World Market for Video Surveillance Hardware and Software – 2025 Edition.” The research indicates that the global market for video surveillance hardware and software experienced a slight decline of 0.3% in 2024. This performance fell short of previous forecasts, primarily due to a significant decrease of 7.8% in the Chinese market. Conversely, the rest of the world saw a growth of 4.9%. The global market for video surveillance equipment was estimated to be worth $25.0 billion in 2024. Read Now

  • Report Reveals Local Governments Face Surge in Ransomware Attacks with Minimal Resources

    KnowBe4, the cybersecurity platform that comprehensively addresses human risk management, recently released new research highlighting the critical cybersecurity challenges facing state, local, tribal, and territorial (SLTT) governments. The report details how government organizations have become prime targets for cybercriminals while simultaneously facing severe resource constraints. Read Now

  • Video Surveillance Trends to Watch

    With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud. Read Now

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”