Security experts found that the proliferation of malware for Windows7

In the "2020 Webroot Threat Report", the researchers analyzed 37 billion URLs from around the world, 842 million domains, four billion IP addresses, 31 million mobile applications and 36 billion records file behavior of the sample.

2019 phishing Web sites grew 640%

  • A quarter of non-malicious URL is hosted on malicious domain.

  • It found that 8.9 million hosted an encrypted URL hijacking script.

  • They were posing as criminals phishing sites or popular web site Facebook, Microsoft, Apple, Google, PayPal and Dropbox.

  • Phishing sites posing as the former five sites were encrypted exchange (55%), games (50%), network e-mail (40%), financial institutions (40%) and payment services (32%).

 

Surge in malware for Windows 7

  • 93.6% of malware appear only on the PC, which is the highest ever rate of discovery.

  • 85% of the threats hidden in one of the following four locations: temp%,% appdata%,% cache% and% windir%, more than half of the threat (54.4%) hidden in the% temp% folder. By setting a policy to prohibit Windows from running temp directory, you can easily reduce this risk.

  • Windows exploits associated with the IP address of an increase of 360%, the goal of most vulnerability is outdated operating system.

 

The possibility of private PC infection is twice the commercial PC

  • Data show that the ratio of the area using an older version of the operating system most likely to be infected highest.

  • Private device infected, more than 35 percent of computers were infected more than three times, nearly 10% of computers are six or more infections.

  • Continued insecurity personal PC highlights the risks companies face when allowing employees to connect personal devices to business networks.

 

"In the field of network security, the only certainty is that no definite solution, nor a panacea," Hal Lonas OpenText consumer technical director and chief security officer said. "" 2020 Webroot Threat Report "The results emphasize: Businesses of all sizes need to protect themselves and users of data security, but also should have a fast network disaster recovery capabilities, and to protect the network and port security by recording user actions.

发布了20 篇原创文章 · 获赞 0 · 访问量 2191

Guess you like

Origin blog.csdn.net/jojo705/article/details/104667791