All tricks in this blog are only for educational purpose. Learn these tricks only for your knowledge. Please donot try these to harm any one. We will not take any responsibility in any case. All softwares and tools on this site are here for private purposes only and If you want to use a software for business purpose, please purchase it. I do not host many of these tools. I Post links that I have found from numerous Search engines. I will not be responsible for any of harm you will do by using these tools.


Friday, May 27, 2011

The Evolution of Malware and Information Security

Despite years of investment and research by the security industry, malware continues to play a significant role in the theft of sensitive data. In fact, according to a recent report from the Verizon Business Risk Team, malware was present in around 80% of breaches.
So, if malware presents such an obvious risk in data breaches, why haven’t security organizations done something to prevent its use?

The fact is that traditional approaches to stopping malware, such as relying on signature-based anti-virus, no longer provide sufficient protection. It’s too easy for malware authors to write code that is able to avoid detection and operate successfully well below the anti-virus radar. Attackers can modify existing malware slightly, add new functionality where needed, and enhance their ability to avoid detection with little effort using readily available tools......

This was certainly the case with the Zeus family of malware, estimated to have now infected millions of computers in the U.S. and around the world. Zeus is potentially responsible for thefts measured in the tens of millions of dollars.


Post a Comment