Five Places Where Malware Hides - Slide 6

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6
#5: Hacking-6

#5: Hacking

Next

These are sites that distribute, promote or provide hacking tools and information to help others gain unauthorized access to computer systems and computerized communication systems. These sites offer instructions on illegal or questionable tactics, such as creating viruses, distributing cracked or pirated software, or distributing other protected intellectual property. The number of sites in this category grew by approximately 30 percent in 2009 and, by their very nature, should be considered suspicious. While there are several sites in this category with relatively admirable codes of ethics, those tend to be the exception. In addition to information, many sites provide services that are easily leveraged for malware hosting.

Next
Malware has to live somewhere. And while some Web filtering solutions can detect known malware hosts, most malware hides in sites that are otherwise benign. According to a report from Blue Coat Systems, the five most commonly compromised Web sites range from online storage to -- surprise -- adult content. Click through this slideshow for more information.
 

Related Topics : Security Breaches, Vulnerabilities and Patches, Application Security, Spyware, Pharming

 
More Slideshows

Shadow IT Security How Risky Behaviors Hurt Shadow IT Security

Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices. ...  More >>

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

Security121-190x128 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.