Symtrex Inc.

Cyber Security Specialist

Call - 866-431-8972 | Send an Email | Request a Quote
Visit Us On FacebookVisit Us On TwitterVisit Us On Linkedin

Profile

 [metaslider id=2951] … Read More

  • Home
  • Profile
    • Contact Us
    • Security News
    • White Papers
  • Services
    • Compliance Regulations
      • PCI DSS Suite of Products
      • HIPAA/Hitech
      • SOX – Sarbanes Oxley
      • DCID 6/3/NISPOM Chapter 8/JAFAN DoD
      • NERC/FERC
    • Industry Consulting and Implementation
      • Banking and Financial
      • Energy/Utilities
      • Healthcare
      • Retail/Hospitality
    • Security Assessment
  • Security Solutions
    • Sophos
    • Endpoint Security Solutions
      • Bitdefender Business Solutions
      • Sophos Endpoint Protection
    • Forensic Solution – Threat Hunter
    • Network Access Control
      • NetShield
        • NetShield
    • NGFW – UTM – Perimeter Security
      • Sophos Network Protection
    • Security Awareness Training
      • KnowBe4 – Security Awareness Training
      • Sophos Phish Threat
  • White Papers
    • Sophos Webinar Series
  • Security News
    • Blog
    • Sophos Webinar Series
  • Free Security Tools

Five Habits Of Highly Successful Malware

2013/05/06 by admin

Robert Lemos, DarkReading

The Internet frequently represents evolution on steroids, and the malware ecosystem is no different.

Malware has quickly evolved to take advantage of weaknesses in digital defenses. In 2012, more than 40 million Windows systems were infected with malware, according to data collected by Microsoft in its annual Security Intelligence Report. And Google researchers found that, of four common antivirus scanners, the best only detected 25 percent of real-world malware, and combined, the scanners only caught 40 percent of malicious downloads.

Malware writers have honed their technique to do well against current defenses, says Srinavas Kumar, chief technology officer of TaaSERA, a security-service provider.

“The malware writers know how to get around antivirus software,” he says. “They can detect that antivirus is running or that IPS/IDS is watching and make it very difficult to blacklist them.”

To defend against the latest attacks, enterprise security professionals need to know why today’s malware is so successful. Culling data from a number of recent studies and discussions with security experts identifies five strategies for success.

[Read More]

Filed Under: antivirus, byod, endpoint, industry, Security News

Let us help answer any questions you may have

requestmoreinformation.fw

Security News and Updates

  • Was my information part of a breach?
  • Phishing and stolen credentials
  • Ransomware is the Biggest Threat for Small to Medium Businesses

RSS SecurityWeek

  • US Charges 20-Year-Old Head of Hacker Site BreachForums
  • Tesla Hacked Twice at Pwn2Own Exploit Contest
  • CISA Ships ‘Untitled Goose Tool’ to Hunt for Microsoft Azure Cloud Infections

Contact

  • Contact Us

Request More Info

  • Request Quote

Site Map

  • Site Map

© Copyright 2016 Symtrex Inc. ; All Rights Reserved · Privacy Statement