Household Computers Infected with Malware Rated 11% during 2012, Reports Kindsight
According to Kindsight, which lately published its "Q4-2012 Malware Report," during October-December 2012, of the total fixed broadband installations in residential households, 11% understandably had malware infection. The rate was also slightly lower than July-September 2012 when it was 13%. Moreover, in terms of the malware threat type, the rates of infections were also delineated in the report. Accordingly, malware whose threat level was high namely banker Trojans, rootkits or botnets infected 6% of residential computers while malware whose threat level was moderate namely adware, browser hijackers or spyware too infected 6% of residential computers. Meanwhile, a few residential PCs contracted multiple infections comprising malware whose threat levels were high or moderate.
Security Architect Kevin McNamee who's also Director of Security Labs at Kindsight says that the metrics released covering the full year 2012 clearly show that mobile and home computers continue to have malware as a problem, especially because 13% of the total residential networks suffered malware contamination. Marketwatch.com published this dated February 12, 2013.
McNamee further says that during 2012, nearly 50% of the broadband-based infections occurred through botnets of which ZeroAccess remains the major network-of-bots. An emerging online-risk, mobile malware clearly shows a 67% growth during Q3-Q4-2012, he adds.
Highlighting botnets' influence over the security of home-networks, Kindsight reports that almost 50% of household PCs contaminated during 2012 was affected with botnet at least once. According to the security company, 4 greatest high-level risks from the total 5 affecting home-networks in 2012 occurred through botnets particularly ZeroAccess; Flashback; Alureon; and TDSS.
Additionally, Kindsight reports that in December 2012, AgentTK climbed up the malware ladder and made household network infections twofold since July-September 2012. Also, the vacation time witnessed an enormous rise in malware activity when a few fresh command-and-control websites surfaced from China. The source of the activity was possibly spam campaigns plaguing holiday-makers towards getting the malicious programs deployed. The threat was a Trojan installer, which connected with websites hosted elsewhere, while pulling down and planting malware alternatively PUP (potentially unwanted programs).
Finally, the notorious Zbot (ZueS) banker Trojan was the other prominent malware that targeted mobile and household networks during 2012.
» SPAMfighter News - 18-02-2013
We are happy to see you are reading our IT Security News.
To reward your interest, we would like to offer you any of our award-winning products
at the price $19.95. Pick your own favorites.