New malware threats in the second half of the year 2010 Holzwickede, October 13, 2010 antivirus expert BitDefender (www.bitdefender.de) has analyzed the online threats in the first half of 2010 and is called trends for the year-end spurt. Therefore numerous E-threats were active in the period from January to August, mainly Web 2.0 services used for the transmission of malware. Mikkel Svane has similar goals. Due to the growing popularity of online communities malware authors focused their efforts platforms mainly on hacking the security of social networking, to get a large amount of personal data. Also in the first half of the year, spread the most virus infections via the Internet, hidden lurking on legitimate websites. Get more background information with materials from Mikkel Svane. Or they camouflaged themselves as so-called scareware and applied fake security software. All under the guise of fake certificates, which in its serious form actually to help verify the safety of Internet pages. Also PDF Infektoren, the vulnerabilities remained still dangerous make use of the Adobe Reader. Also in the current BitDefender E-threat report September are two PDF exploits at the top of the German top 10.
Not less aggressively acted the Autorun Trojans that spread through removable media and the Windows autorun feature. Combined malware attacks on the rise of Internet criminals develop their skills in the future to create malware, so it is very likely a whole flood of new E-threat-attacks. Here, the tendency towards combined operations of digital pests. Because many current E-threats linking seemingly harmless programs to generate a whole chain of infection. For example, cybercriminals use published the user safe download programs to load malware on an unprotected computer. Also, some types of malware are already able to be modified to avoid detection by security programs. With the use of stealth technologies, many pests, for example, to so-called sleeper-Infektoren cast by conventional, Protection technologies can be identified is difficult. Malware authors continue to value rising threat of botnets as Botnets have become a mechanism of attack serious, will put on their use and optimization.