Web Hosting Security

  Home arrow Web Hosting Security arrow Report Notes Malware Strong in Third Q...
Web Hosting Articles  
Web Hosting FAQs  
Web Hosting How-Tos  
Web Hosting News  
Web Hosting Reviews  
Web Hosting Security  
Weekly Newsletter 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
  >>> SIGN UP!  
  Lost Password? 

Report Notes Malware Strong in Third Quarter 2010
By: wubayou
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 5 stars5 stars5 stars5 stars5 stars / 1

    Table of Contents:

    Rate this Article: Poor Best 
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article



    A quarterly report released last week by Panda Security detailed malware trends for the months of July through September of 2010. The details released were not exactly reassuring in terms of Internet security, either, as they noted that threats to users around the world are continuing to grow.

    One particularly troubling statistic concerned email and spam. According the the report, spam comprised 95 percent of all email sent across the globe during the third quarter of this year. Botnets, or computers infected by hackers, are prime sources of email distribution. Many users with infected computers do not even know that they are sending out these spam emails. Despite their lack of knowledge about being infected, the fact that their computers and accounts are being used as avenues for spam distribution points to them directly as sources of the crime.

    Of all the spam being circulated, ten countries were responsible for 55 percent of it. India topped the list of spamming offenders, and the rest of the top five included Brazil, Russia, Ukraine, and Romania, in that order. The United States, meanwhile, came in eighth on the list. The United Kingdom, which had recently secured an unfavorable spot in the top ten, did not make the list this time around. Perhaps improved security measures within the nation have helped them combat spam.

    Panda Security's report also noted the distribution of infections by malware type, of which Trojan viruses dominated the list by accounting for 54 percent of all malware threats. The 54 percent was a four point increase from the previous quarter. Adware came in second, while worms, viruses, and other malware rounded out the list. 

    Trojan attacks are supposedly the most lucrative of all types of malware, which could easily account for why they are so numerous and dominate the malware distribution list. Due to their lucrative nature, Trojans offer a high return on investment, and are a savory target for hackers to create in the aim of stealing data to compromise financial accounts to pad their own pockets. 

    The countries with the highest proportion of infections were also released in the report. Taiwan led the way, with Russia, Brazil, Argentina, and Poland completing the top five. The United States came in eighth once again. Brazil moved up from sixth place in the previous quarter to third in the past quarter. Meanwhile, Chile moved into the rankings with the seventh spot, despite not being ranked at all in the previous report.

    Another interesting find by the Panda report was the increased popularity of social networking sites among hackers. Due to a growing number of users participating in social networks, they have become a chosen target for malware distribution. Facebook, for example, was victim of clickjacking attempts that controlled its “Like” button. Many fake profiles pretending to be celebrities were also used to dupe users into helping hackers spread viruses. Twitter was victimized as well by MouseOver worms that secretly hovered over compromised parts of account pages. When users hovered over these compromised parts of pages, they unknowingly triggered redirections and other unintended actions.

    For more, visit http://news.cnet.com/8301-1009_3-20018140-83.html?tag=mncol;title

    DISCLAIMER: The content provided in this article is not warranted or guaranteed by Developer Shed, Inc. The content provided is intended for entertainment and/or educational purposes in order to introduce to the reader key ideas, concepts, and/or product reviews. As such it is incumbent upon the reader to employ real-world tactics for security and implementation of best practices. We are not liable for any negative consequences that may result from implementing any information covered in our articles or tutorials. If this is a hardware review, it is not recommended to open and/or modify your hardware.

    More Web Hosting Security Articles
    More By wubayou


    - For Online Security, Invest in People
    - World`s Third-Largest Botnet Bites the Dust
    - Yahoo Security Breach Highlights Poor Practi...
    - How to Prevent Mobile Malware
    - FBI Issues Internet Security for Travelers a...
    - More of the Top Internet Scams
    - How to Stop Phishing Scams
    - Social Networking Safety Tips
    - How to Avoid Financial Fraud Online
    - Android`s Most Notorious Trojans and Viruses
    - GFI Report Details Top 10 Threat Detections ...
    - Sophos Releases Security Threat Report 2012
    - Facebook Safety Tips for 2012
    - Email Scam Hits Apple Users
    - Tips for Mobile Security

    Developer Shed Affiliates


    © 2003-2019 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap