𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Sizing up the malware threat – key malware trends for 2010

✍ Scribed by Graham Cluley


Publisher
Elsevier Science
Year
2010
Tongue
English
Weight
89 KB
Volume
2010
Category
Article
ISSN
1353-4858

No coin nor oath required. For personal study only.

✦ Synopsis


MALWARE TRENDS

anti-virus software on its own. Also, traditional desktop appliances are no longer either flexible or strong enough to keep defences running 24/7, which is required for both businesses and individuals.

Service Level Agreements are also critical. During a major spam run, for example, how many false positives does the SLA allow for before too much genuine mail is quarantined along with all of the spam?

The security community is now focused on the cloud, whether private or public, to fight cyber-criminals. Botnets are essentially private clouds working together, distributing the infected software to PCs.

Ultimately, the most effective way to beat spammers and botnets is to turn the internet against them. We can use the fabric of the cloud as a catalyst to kill botnets, making the internet safer for all of us. Security professionals are more confident and aware of opportunities to disrupt and prevail over these criminalcyber networks.