Avast products were the most used antivirus globally, but when it comes to North America – Norton rules. A recent report from OPSWAT on quarterly market share and usage data for antivirus software for Q4 2010, said that avast antivirus product line were the most used antivirus products globally with 17.53% of market share. ESET Software and Symantec products were in following positions with 12.05% and 10.04% ofContinue Reading
A recent report from Symantec declared that spam volumes in January 2011 fell to the lowest levels, since March 2009. The spam volumes seemed to drop dramatically since 25th December of 2010 and continued its phase in January. The only time that spam volumes dropped by such a remarkable extent was after the closure of McColo, a California-based ISP in 2008, for being implicated in criminal and botnetContinue Reading
Unites States stands as a major hosting hub of phishing sites, according to a report from OpenDns. According to the report, more than 60,000 separate attempts came from websites hosted in the U.S.
The following are top countries hosting phishing websites in 2010:
- United States — 53.8%
- Germany — 6.3%
- Canada — 5.2%
- United Kingdom — 4.8%
Secunia has recently released an security advisory on Google Chrome asking users to update to the latest version (8.0.552.237) of the browser. According to the advisory, multiple vulnerabilities have been found on the browser that can be exploited by malicious people to manipulate certain data and potentially compromise a user’s system.
The vulnerabilities are as follows:
1) An unspecified error exists within the extensions notification handling.
Adobe Reader 9 was known for its vulnerabilities in the year 2010, which kept evolving despite the number of security patches released by Adobe. In orderContinue Reading
Despite high levels of investment on security tools like firewall, anti-malware, etc and precaution measures like safe browsing, etc many Internet users still fail to keep their PCs from getting infected. This can be attributed to the lower awareness levels on the increasing types of malware which evolve with new tactics and also negligence in updating the application software of PC regularly. Drive-by malware is one suchContinue Reading
Flash has enabled the addition of animation, interactivity and video to web pages. According to a report, Flash as a format is used in around 95% of the PCs worldwide. Adobe Flash Player is very popular among the flash players with Adobe claiming that around 99.3% of the US web users having installed it in their webContinue Reading
The trend of internet exploitation has moved away from viruses and trojans. Hackers are no more interested in just deploying these small infectious agents in others PCs unless there is any economic benefit in doing it. Getting access to the computers using technologies like malware, spambots, etc has become widely prevalent today.
Getting access to the computer of a well settled person is like getting accessContinue Reading
Internet transactions today are highly vulnerable to exploitation by cyber criminals. Online transactions in the current situation must be dealt very sensitively and sensibly in order to avoid any kind of data theft. The Secure Sockets Layer (SSL) enables encryption of sensitive data during online transactions through advanced encryption methods and validation processes. Encryption of data makes it very difficult for unauthorized people to view the information duringContinue Reading
Website spoofing is one of the deceptive snare used by cyber criminals for phishing. Internet is still a highly vulnerable place for transactions. Cyber-criminals keep finding different ways to exploit a user online. The only way to survive them is through conventional awareness and credible preventive measures.
What are Spoofed Websites?
A spoofed website is usually a replica of a legitimate website. Almost all the features