Volut-ID | World News Articles
All news of interest and can provide an info for you, and so can assist in the search for new news.
About news gadgets, mobile phones
info about the latest mobile phone, from news, features, and the most mobile phone models in search of the world.
PandaLabs Annual Report 2010
In 2010, cyber-criminals have created and distributed a third of all existing viruses. That is, in just 12 months, they have created 34 percent of all malware that has ever existed and has been classified by the company. Furthermore, the Collective Intelligence system, which automatically detects, analyzes and classifies 99.4 percent of all malware received, currently stores 134 million unique files, out of which 60 million are malware (viruses, worms, Trojans and other computer threats).
Trojans still dominate the ranking of new malware that has appeared in 2010 (56 percent of all samples), followed by viruses and worms. It is interesting to note that 11.6 percent of all the malware gathered in the Collective Intelligence database is rogueware or fake antivirus software, a malware category that despite appearing only four years ago is creating much havoc among users.
Download: PDF
Related Post
Malware
- YARA v.1.5 released
- YARA v.1.5 released
- Botnets: Measurement, Detection, Disinfection and Defence
- Botnets: Measurement, Detection, Disinfection and Defence
- Symantec Report on Attack Kits and Malicious Websites
- Symantec Report on Attack Kits and Malicious Websites
- THE CYBER-CRIME BLACK MARKET: UNCOVERED
- THE CYBER-CRIME BLACK MARKET: UNCOVERED
- REMnux v.2.0 Released
- REMnux v.2.0 Released
- PandaLabs Annual Report 2010
- Zozzle: Low-overhead Mostly Static JavaScript Malware Detection
- Zozzle: Low-overhead Mostly Static JavaScript Malware Detection
- Koobface: Inside a Crimeware Network
- Koobface: Inside a Crimeware Network
- The Zeus malware R&D program
- The Zeus malware R&D program
- Kaspersky download site hacked to spread fake AV
- Kaspersky download site hacked to spread fake AV
- W32.Stuxnet Dossier
- W32.Stuxnet Dossier
- Stuxnet Under the Microscope
- Stuxnet Under the Microscope
- The Rise of PDF Malware
security
- Securing The Kernel via Static Binary Rewriting and Program Shepherding
- Securing The Kernel via Static Binary Rewriting and Program Shepherding
- PacketFence v.2.2 Released
- PacketFence v.2.2 Released
- Updates: ZoomIt v4.2, Process Explorer v14.11, ProcDump v3.04, and Mark Live: Zero Day Malware Cleaning with the Sysinternals Tools
- Updates: ZoomIt v4.2, Process Explorer v14.11, ProcDump v3.04, and Mark Live: Zero Day Malware Cleaning with the Sysinternals Tools
- AntiXSS v.4.0 Released
- AntiXSS v.4.0 Released
- ESET NOD32 Antivirus comes to Linux
- Nmap, scans your computer ports
- YARA v.1.5 released
- YARA v.1.5 released
- Preventing XSS Attacks
- Preventing XSS Attacks
- Credit Card skimming and PIN harvesting in an EMV world
- Credit Card skimming and PIN harvesting in an EMV world
- Book - Configuring IPCop Firewalls
- Tip: Solution to Bug in Flash on YouTube
- How To install ESET NOD32 Antivirus 4 for Linux
- OWASP AntiSamy v.1.4.4 Released
- OWASP AntiSamy v.1.4.4 Released
- About 40 security problems discovered in the kernel of Ubuntu 10.04 LTS
- Comitari : Web Protection Suite
- Comitari : Web Protection Suite
- The Open Source Pentest Bookmarks Collection
Papers
- Securing The Kernel via Static Binary Rewriting and Program Shepherding
- Securing The Kernel via Static Binary Rewriting and Program Shepherding
- 2011 Data Breach Investigations Report
- 2011 Data Breach Investigations Report
- Mozilla Firefox Internals & Attack Strategies
- Mozilla Firefox Internals & Attack Strategies
- Web application vulnerabilities in context of browser extensions
- Web application vulnerabilities in context of browser extensions
- PHP LFI to arbitratry code execution via rfc1867 file upload temporary files
- PHP LFI to arbitratry code execution via rfc1867 file upload temporary files
- Credit Card skimming and PIN harvesting in an EMV world
- Credit Card skimming and PIN harvesting in an EMV world
- Exposing the Lack of Privacy in File Hosting Services
- Exposing the Lack of Privacy in File Hosting Services
- Botnets: Measurement, Detection, Disinfection and Defence
- Botnets: Measurement, Detection, Disinfection and Defence
- Leaking browsing history via user interaction and side channel attacks
- Leaking browsing history via user interaction and side channel attacks
- HTTP Geolocation
- HTTP Geolocation
- HITB Magazine Issue 005 released
- HITB Magazine Issue 005 released
- Symantec Report on Attack Kits and Malicious Websites
- Symantec Report on Attack Kits and Malicious Websites
- Trustwave's Global Security Report 2011: Web Application Risks
No response to “PandaLabs Annual Report 2010”
Leave a reply