Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
Search
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • Database
    • Networking

    Microsoft Outlines Rogue Anti-virus, Data Breach Threats

    By
    Brian Prince
    -
    April 8, 2009
    Share
    Facebook
    Twitter
    Linkedin

      Rogue anti-virus has emerged as one of the most prevalent threats to end users in 2008, according to Microsoft’s latest Security Intelligence Report.

      Also known as scareware, bogus anti-virus programs lure users into paying for software that, unbeknownst to them, offers either little or no real protection, and is sometimes designed to steal data.

      “Of the top 25 malware or potentially unwanted software families that we had information on in the second half of 2008, seven of those had some connection to rogue security software,” said Vinny Gullotto, general manager of the Microsoft Malware Protection Center.

      Two rogue families, Win32/FakeXPA and Win32/FakeSecSen, were detected on more than 1.5 million computers by Microsoft software, placing them into the top 10 threats for the second half of the year. In addition, Win32/Renos, a threat that is used to deliver rogue security software, was detected on 4.4 million unique computers, an increase of 66.6 percent over the first half of 2008, according to Microsoft.

      Those pushing the software are preying on the public’s healthy skepticism about the Internet, he added. The findings come as little surprise. Earlier this year, Finjan reported it had uncovered a scareware affiliate network that made an average of $10,800 a day.

      “Rogue security software is clearly software that’s been making quite a big splash if you will over the past year,” Gullotto said.

      The report also showed attackers are continuing to focus on the application layer. Nearly 87 percent of vulnerabilities disclosed during the second half of 2008 involved applications. About nine percent were operating system vulnerabilities, while 4.5 percent involved browsers.

      The number of vulnerabilities the company itself addressed surged in the second half of the year by roughly 67 percent when compared with the first six months of 2008. For the full year, Microsoft released 78 security bulletins covering 155 vulnerabilities, numbers equal to the total addressed in 2006 but representing a nearly 17 percent increase over 2007.

      The report also showed that the No. 1 reason for data breaches remains lost and stolen equipment. The finding mirrors studies by groups like the Ponemon Institute and the Identity Theft Resource Center, which have shown repeatedly insiders continue to be the No. 1 point of failure when it comes to securing data.

      “For the second report in a row what we find is that stolen or lost equipment seems to account for about 50 percent of all reported data breaches,” Gullotto said. “So that’s a pretty dramatic difference when you take a look at the fact that only about 20 percent … [of the time] did a security breach come from some bit of hacking or a piece of malware specifically. I think what we find in some of this is that this information reinforces the need for appropriate governance and policies around data and procedures.”

      Avatar
      Brian Prince

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      Zeus Kerravala - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      Wayne Rash - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Information

      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×