dcsimg
 
 

Security Slideshow: How Malware Spreads

By Ericka Chickowski  |  Posted 05-05-2010
Print this article  
Previous
How Malware Spreads
Next

How Malware Spreads

File-sharing ExecutablesUsed in 72% of attacks
Like bacteria in a petri dish of warm sugar water, malware thrives in a computing environment full of unsecured P2P networking, remotely exploitable vulnerabilities, and free-flowing e-mail attachments. According to Symantec's recent Global Internet Security Threat Report, the following means of propagation are most popular amongst malicious hackers. Because hackers usually use more than one means of propagation, the percentages add up to over 100 percent.
 
 
 
 

 

Submit a Comment

Loading Comments...
 
eWeek eWeek

Have the latest technology news and resources emailed to you everyday.

By submitting your information, you agree that cioinsight.com may send you cioinsight offers via email, phone and text message, as well as email offers about other products and services that cioinsight believes may be of interest to you. cioinsight will process your information in accordance with the Quinstreet Privacy Policy.

Click for a full list of Newsletterssubmit