Tuesday, August 11, 2015

What are the main source of "malware"?

One study found that the percentage of malicious sites dedicated to technology or health is higher than those of adult content!

A study of G Data, multinational company dedicated to the development of security solutions, has removed two of the myths of security more widespread. The first concerns the alleged direct relationship ' malware 'and sites hosting pornographic content . The second is that many repeat users when, in one way or another, claim that "there is nothing important stored on their computers and if you have nothing to hide, how will they be the victim of a cyber attack?" Mantra.

The first myths, which makes the malware connects to sites with pornographic content, falls to confront the reality, according to company research. Malicious programs are hosted on all kinds of websites and regardless of its content, but precisely those related to pornography are by no means the most dangerous. The study shows that the percentage of malicious sites dedicated to technology and telecommunications (19.6%) and health (10.2%) is higher than the pornographic (5%).

As for the second myth, G DATA emphasises that each infected computer is valuable to many and very different ways. For example, they can be integrated into botnets and used as sprinklers spam or participate in DDoS attacks against other systems. In other cases, these devices can be used to undermine virtual currency Bitcoin type. In addition, you should never underestimate the value of information stored on your PC. Many of them, especially personal data and passwords can be easily sold on the black market Internet or used to blackmail the owner.

The latest report of "malware" developed by G DATA indicates that the threats to attack Windows systems increased significantly during the second half of 2014. Experts recorded 4,150,068 new types of "malware", up 125% compared with the first half, leading to nearly six million new threats throughout the year (77% more than in 2013).

No comments:

Post a Comment