Antivirus Market Share – Q4 2010

Avast products were the most used antivirus globally, but when it comes to North America – Norton rules. A recent report from OPSWAT on quarterly market share and usage data for antivirus software for Q4 2010, said that avast antivirus product line were the most used antivirus products globally with 17.53% of market share. ESET Software and Symantec products were in following positions with 12.05% and 10.04% of

Continue Reading

Email Spam Volumes Fall to Lowest Level in Two Years: Symantec

A recent report from Symantec declared that spam volumes in January 2011 fell to the lowest levels, since March 2009. The spam volumes seemed to drop dramatically since 25th December of 2010 and continued its phase in January. The only time that spam volumes dropped by such a remarkable extent was after the closure of McColo, a California-based ISP in 2008, for being implicated in criminal and botnet

Continue Reading

Top Countries Hosting Phishing Websites – 2010

Unites States stands as a major hosting hub of phishing sites, according to a report from OpenDns. According to the report, more than 60,000 separate attempts came from websites hosted in the U.S.

The following are top countries hosting phishing websites in 2010:

  1. United States — 53.8%
  2. Germany — 6.3%
  3. Canada — 5.2%
  4. United Kingdom — 4.8%
Continue Reading

Vulnerabilities Found in Google Chrome

Secunia has recently released an security advisory on Google Chrome asking users to update to the latest version (8.0.552.237) of the browser. According to the advisory, multiple vulnerabilities have been found on the browser that can be exploited by malicious people to manipulate certain data and potentially compromise a user’s system.

The vulnerabilities are as follows:
1) An unspecified error exists within the extensions notification handling.

2)

Continue Reading

Being Secure from Drive-by Malware

Despite high levels of investment on security tools like firewall, anti-malware, etc and precaution measures like safe browsing, etc many Internet users still fail to keep their PCs from getting infected. This can be attributed to the lower awareness levels on the increasing types of malware which evolve with new tactics and also negligence in updating the application software of PC regularly. Drive-by malware is one such

Continue Reading

Email Spoofing – Commonly faced problem online

The trend of internet exploitation has moved away from viruses and trojans. Hackers are no more interested in just deploying these small infectious agents in others PCs unless there is any economic benefit in doing it. Getting access to the computers using technologies like malware, spambots, etc has become widely prevalent today.

Getting access to the computer of a well settled person is like getting access

Continue Reading

Secure Online Transactions Through SSL/TLS

Internet transactions today are highly vulnerable to exploitation by cyber criminals. Online transactions in the current situation must be dealt very sensitively and sensibly in order to avoid any kind of data theft. The Secure Sockets Layer (SSL) enables encryption of sensitive data during online transactions through advanced encryption methods and validation processes. Encryption of data makes it very difficult for unauthorized people to view the information during

Continue Reading

Beware of Spoofed Websites Online

Website spoofing is one of the deceptive snare used by cyber criminals for phishing. Internet is still a highly vulnerable place for transactions. Cyber-criminals keep finding different ways to exploit a user online. The only way to survive them is through conventional awareness and credible preventive measures.

What are Spoofed Websites?
A spoofed website is usually a replica of a legitimate website. Almost all the features

Continue Reading