Q1 Threat Report: Surge in Malware, Drop in Spam - Slide 2

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Q1 Threat Report: Surge in Malware, Drop in Spam-2 Next

With more than six million unique malware samples in Q1, this period far exceeds any first quarter in malware history. February 2011 saw the most new malware samples of the quarter, at approximately 2.75 million. Fake anti-virus software had a very active quarter as well, reaching its highest levels in more than a year, totaling 350,000 unique fake-alert samples in March 2011.

McAfee recently released the “McAfee Threats Report: First Quarter 2011.” With six million unique samples of recorded malware, Q1 2011 was the most active first quarter in malware history. The report revealed many of the trends that had a significant impact on the threat landscape, such as the takedown of the Rustock botnet, which resulted in spam remaining at its lowest levels since 2007, and confirmed that mobile malware is the new frontier of cybercrime.

“The Q1 Threats Report indicates that it’s been a busy start to 2011 for cybercriminals,” said Vincent Weafer, senior vice president of McAfee Labs. “Even though this past quarter once again showed that spam has slowed, it doesn’t mean that cybercriminals aren’t actively pursuing alternate avenues. We’re seeing a lot of emerging threats, such as Android malware and new botnets attempting to take over where Rustock left off, that will have a significant impact on the activity we see quarter after quarter.”

More Slideshows:

Social Networking Rules of the Road, Including Facebook Tips to help you navigate the social networking landscape.

Ten Tips for Getting the Most Out of Your Laptop Quick tips and configurations to help you optimize your laptop experience.

Ten Security Tips for iPhones and iPads Recommendations from the NSA for maintaining iOS 4 security.


Related Topics : Transport Layer Security, Encryption, SEO, Switches

More Slideshows

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security118-190x128 5 Essential Incident Response Checklists

When a security breach occurs, IT teams that are armed with incident response checklists will be better prepared to execute a fast and effective response. ...  More >>

Security116-190x128.jpg 5 Common Failures Companies Make Regarding Data Breaches

Five common failures companies make when preparing for, and responding to, a data breach, as well as guidance for companies on how they can tackle these issues. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.