Press release BoxID: 420245 (Imperva Inc.)
  • Imperva Inc.
  • 3400 Bridge Parkway, Suite 101
  • 94065 Redwood Shores, CA
  • Contact person
  • Darshna Kamani
  • +44 (20) 7183-2834

Royal Wedding presents commercial opportunity as hackers abuse the forthcoming nuptials

(PresseBox) (London (UK), ) Everyone seems to be jumping on the Royal Wedding bandwagon including hackers who are using it as a revenue generating opportunity. A poll conducted by Imperva - the leader in data security, amongst visitors to this year's Infosecurity Europe reveals a 38 percent of security professionals have witnessed the nuptials being used for malvertising, 34 percent have seen wedding related spam and 20 percent incidents of search engine poisoning.

Imperva's CTO - Amichai Shulman, said, "Everyone loves a good wedding and it appears hackers are no different. While we're not surprised by the results it is worrying that criminals are systematically jumping on every opportunity to illegally make money by identifying, and utilising, revenue generating opportunities that utilise stolen credentials or inject malware."

Individuals can protect themselves, and steer clear of attacks, by:

- Not responding to emails from people they don't know offering leaked information or sharing secrets from someone 'close to the happy couple'

- Make sure their computer's security software is up to date

Shulman concludes "The royal wedding is another reminder that organisations need to be vigilant to hosting phishing sites and act promptly to take them down if non-security savvy individuals are to be protected. ."

Imperva Inc.

Imperva is the global leader in data security. With more than 1,300 direct customers and 25,000 cloud customers, Imperva's customers include leading enterprises, government organizations, and managed service providers who rely on Imperva to prevent sensitive data theft from hackers and insiders. The award-winning Imperva SecureSphere is the only solution that delivers full activity monitoring for databases, applications and file systems. For more information, visit , follow us on Twitter or visit our blog.