70% toxic use for stealing purposes
Panda Software has announced the results of a study showing that up to 70% of malicious software is used for stealing purposes.
Panda Software has announced the results of a study showing that up to 70% of malicious software is used for stealing purposes.
Besides, the research results conducted in the first quarter of 2006 also showed that the financial benefits have now become a top priority in the world of 'creative' people of type malware. like viruses, worms, trojans or spyware.
Panda Software's research also contributes to confirming the conversion of malicious software. A few years ago, these types of software were often used to create buzz that could attract or contribute to a certain vulnerability.
' But now malware has become a nefarious tool ,' Panda said.
Behaviors seeking fame or demonstrating the technical capabilities of some subjects like before are no longer available. Now those behaviors are done to serve a single goal: fraud to make a profit by taking advantage of the latest technologies.
Panda Software also warned hackers are also tending to switch from using email-attached viruses to using other forms of malicious code that are harder to detect.
Up to 40% of Panda's security problems are related to spyware. This is a malicious piece of code designed to collect data information from users' Internet activities.
17% are Trojans, including 'banker trojan' for the purpose of stealing confidential data related to banking services or helping to download spyware onto users' systems.
8% are 'dialers' - a kind of malicious code that allows dial-up use beyond the allowable level - or bots - a system of PC personal computers captured by hackers control.
Computer worms attached to e-mail currently only account for 4%. ' The waves of computer worms spreading via email can attract a lot of public attention but are not used to financial goals ,' said Luis Corrons, PandaLabs' director.
Currently, the most used forms of malware are spyware, Trojans or bots - software that automatically installs and hides on the system without users' knowledge.
Hoang Dung
- 4 most horrific robberies of all time
- Why was the month of December called the root of the month?
- Surprisingly, the way of fighting against grave robbery of the ancient people
- Types of account hijacking attacks
- Serious snake
- Detecting a number of toxic metals has a high rate in autistic children
- Strange purposes when training animals
- Heron bird was attacked because ...
- Poisonous algae attack the US coast
- Video: Breathing in toxic New Delhi like smoking 50 cigarettes
What is the Snapdragon SiP chip? How to create a yellow circle around the mouse cursor on Windows Edit the Boot.ini file in Windows XP 3 ways to restart the remote computer via the Internet Vietnam computer market: Looking back a year How to restore deleted applications on Android How to increase the capacity of C drive on Windows 10, 8, 7 ... 8 security features of Windows operating system