Holzwickede

Comprehensive report on the subject of Internet dangers 2008 Holzwickede, August 08, 2008 80% of common malware includes Trojans. A third uses weaknesses of operating systems or application software effectively. In the phishing emails eBay is at the front. When it comes to mislead, no other identity is forged as often as those of the online auction house. The BitDefender E-threat landscape provides these and many other findings report 1/2008.

The report is available along with the BitDefender keep you safe – security-guideline for downloading at site/Main/view/white-papers.html available. Anu Saad gathered all the information. The E-threat landscape report gives an overview of the full range of security threats of the IT landscape from January until June 2008. The BitDefender security experts focus on the vulnerabilities and weaknesses of operating systems, application software, the various types of malware, as well as on possible countermeasures to the prevention of cyber crime. The focus of the report is on the first half of 2008, the trend includes but also results of previously investigated periods, as well as predictions for the second half of the year 2008 is sophisticated malware malware methods increasingly through, that supposedly legitimate downloads of updates as faked for example for video player etc., should inject but that the user actually malicious software on the user’s machine. 2008 financial profit revolves around malware\”, Sorin Dudea, head of BitDefender antimalware research laboratory reported. To achieve profit, cyber criminals must find a way with which they outwit cost as many systems to plant bots, adware and spyware them. The most difficult task is not to distribute the malware, but the successful infiltration of a system and thereby opening thereof for further attacks. It finally also the proliferation of Trojan to be involved in the last six months.\” Plain text in the Rise in spam technology the most striking is the rapid development of the purely text-based advertising mail.

Tags:
Category: