background preloader

Malware Protection Center

Malware Protection Center

Web Threat, Malware and Spam Center | Sophos Threat Dashboard Welcome to SophosLabs. We’re the people behind the scenes, collecting, correlating and analyzing data to provide the best protection for every Sophos customer. We’ve developed a state of the art big data analytics system so we can efficiently process the millions of emails, URLs, files, and other data points that come into the labs each day. We draw upon this data and extensive experience to develop new definitions that detect entire classes of threats, even new variants. We investigate edge cases, monitor trends and tune our products for ever better protection. And, with Live Protection and Live Anti-spam, you benefit from all our data and analysis in real time. With all this work, you may wonder if we ever sleep. Free Mac Antivirus Stops all threats, even those designed for Windows. Sophos Anti-Virus for Mac Home Edition is free and easy to install and use. Download Requires at least Mac OS 10.5 (Leopard) Protect and secure your Android devices Free Virus Removal Tool Free UTM Home Edition

Threat Center | New Malware Threats Report Malware writers are driven by profit motives and political agendas and show no sign of slowing down. Spyware, trojans, worms, rootkits, bots and phishing attacks are all on the rise, accounting for more than two thirds of all data breaches. In order to steal your business' valuable information or disrupt your business activities cybercriminals are constantly changing their malicious code or tactics to evade security defenses. 69% of data breach incidents in 2011 involved malware and these led to the exposure of over 165 million records, that’s 95% of all records exposed (Verizon Data Breach Investigations Report) Companies can expect costs of around $200 per record exposed in a data breach and in 2011 the median annualized cost of cybercrime incurred by a representative sample of organizations was $5.9 million per year.

Security Intelligence Research – Web Threat Analysis Connect with our security intelligence community. Get the latest security news, understand threat trends, get insight and analysis, and learn best practices from Trend Micro cyber security experts. They're an elite security intelligence team with specialties in threat detection and analysis, cloud and virtualization security, data encryption and more. With Trend Micro at your side, you can safely navigate the changing cyber security landscape. Size Matters “When it comes to threat intelligence, of course size matters.”

IT Threat Evolution: Q3 2012 Contents Q3 in figures According to KSN data, Kaspersky Lab products detected and neutralized 1,347,231,728 threats in Q3 2012. 28% of all mobile devices attacked run Android OS version 2.3.6, which was released in September 2011. 56% of exploits blocked in Q3 use Java vulnerabilities. A total of 91.9 million URLs serving malicious code were detected, a 3% increase compared to Q2 2012. Overview Mobile malware and operating systems During Q3 2012, over 9,000 new malicious .dex files were added to our malware collection. This is due to the fact that in Q2 files that had been detected heuristically for some time were added to our malware collection. The number of malware modifications targeting Android OS It is curious to see which Android versions become targets for cyber-attacks most often. Distribution of the malware detected by Android OS version, Q3 2012 Android 2.3.6 “Gingerbread”, which accounts for 28% of all blocked attempts to install malware, was the most commonly attacked version.

Global

Related: