Five Places Where Malware Hides - Slide 5

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6
Next #4: Open/Mixed Content-5 Next

#4: Open/Mixed Content

These are sites with generally non-offensive content, but that also have potentially objectionable content such as adult or pornographic material. Content on these sites is usually unorganized and highly dynamic, making more precise classification of specific images difficult. The number of sites in this category grew by approximately 50 percent in 2009 as more people wished to share their multimedia content in an unregulated way. And while more traditional attacks leveraged these sites as a temporary home, the vulnerabilities in Adobe products in 2009 elevated the number of attacks on these sites.

Malware has to live somewhere. And while some Web filtering solutions can detect known malware hosts, most malware hides in sites that are otherwise benign. According to a report from Blue Coat Systems, the five most commonly compromised Web sites range from online storage to -- surprise -- adult content. Click through this slideshow for more information.
 

Related Topics : Security Breaches, Vulnerabilities and Patches, Application Security, Spyware, Pharming

 
More Slideshows

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

Security121-190x128 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.