Thursday, April 25, 2013
Browsers - the main entry point of malware in corporate computers
The review suggests that traditional anti-virus solutions are not able to identify the vast majority of malware infecting the network through real-time applications, including Web browsing.
According to the survey, 94% are not fully detected malware samples delivered through a web browser or via a web proxy. 70% of malicious IDs left in the execution or transmission of data that can be used for detection. 40% at first sight unique harmful programs actually are the version of the same code. The most effective method for the introduction of malware into the network analysts acknowledged FTP. 95% of malware penetrating the network via FTP and remain undetected by antivirus programs for more than 30 days. It has been revealed 30 different methods of avoiding security systems and more than half of all the methods were intended to remain undetected malicious programs.
"It is not enough to detect malicious software that can evade traditional security. Corporate enterprises should require a more comprehensive approach to prevent the infection from the producers used their funds - says a senior analyst at Palo Alto Networks Wade Williamson. - It's just that, as reported in Modern Malware Review. Analysis of the unsung traditional security malware in real networks has allowed us to arm IT security services necessary and useful information regarding the threats that they might miss. "
Modern Malware Review