• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • The Internet: Beyond the Wild, Wild West; Think Stone Age

    January 12, 2009 Timothy Prickett Morgan

    The PandaLabs malware detection and analysis lab maintained by security software maker Panda Security has announced its annual security report for the just-ended 2008. And man, is it ugly out there on the Internet, or rather, in there on the PCs and servers of the world.

    In 2008, PandaLabs says that it detected an average of 35,000 malware samples a day, and 22,000 of those detected were new infections launched by hackers. (No wonder antivirus software eats so much resources, eh?) PandaLabs says that the total count of malware threats in 2008 was above 15 million, which is more than three times the projected level the lab estimated for 2008 as 2007 was ending. In the first eight months of 2008, in fact, more new bits of malware were launched than in the prior 17 years that Panda Security has been tracking malware combined.

    By Panda Security’s assessment, 67.7 percent of the malware launched in 2008 was of the Trojan horse type, meaning it was created to run on your machine by pretending to be something else, or lurking on a Web page, and then to steal your passwords, bank account information, and so forth. Not surprisingly, given their prevalence, Trojans were the most common infection on computers, at 70.1 percent, compared to 19.9 percent for adware, and only 4.22 percent for worms. Ironically–or maybe just sadistically–rogue antivirus programs that trick end users into thinking they are infected and then try to sell them a solution to the infection, are on the rise.

    If you want to get the low-down on all the different kinds of malware, check out PandaLabs’ 2008 annual malware report for yourself.

    RELATED STORIES

    Security Outlook Poor as 2008 Winds to Close

    Patches? We Don’t Need No Stinkin’ Patches: Survey

    Symantec Combats Phishing with New Services Offering

    Decline In Vulnerabilities Belies Threat Increase, Microsoft Says in New Security Report

    Surf’s Up for Web-Based Organized Crime, IBM X-Force Says

    Bleak Outlook for Information Security, According to Researchers

    In Search Of a More Secure Internet

    Security Attacks and Breaches on the Rise

    MPack Hacker Tool Claims 10,000 Compromised Web Sites



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: mtfh_rc, Volume 18, Number 2 -- January 12, 2009

    Sponsored by
    Maxava

    Migrate IBM i with Confidence

    Tired of costly and risky migrations? Maxava Migrate Live minimizes disruption with seamless transitions. Upgrading to Power10 or cloud hosted system, Maxava has you covered!

    Learn More

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Admin Alert: Looking for i5/OS Trouble, Part I IBM Throws Apple a Bone with Notes-Domino 8.5

    Leave a Reply Cancel reply

TFH Volume: 18 Issue: 2

This Issue Sponsored By

    Table of Contents

    • There’s No i in Barack Obama, But There Is One in Bailout
    • Layoff Rumors Panic IBM Workers; Nothing Confirmed
    • Application Modernization: Money in the Bank
    • Mad Dog 21/21: Shoes for Cheeses
    • IT Jobs 2009: The Dot-Com Bubble Burst Was ‘A Cake Walk’
    • Jack Kuehler, Former IBM President and Vice Chairman, Dies at 76
    • VAI Nets U.K.-Based Kingfisher for Reseller Partnership
    • Lawson Sales Hit by Economic Downturn in Fiscal Q2
    • Infinite Software Buys Another HP Reseller
    • The Internet: Beyond the Wild, Wild West; Think Stone Age

    Content archive

    • The Four Hundred
    • Four Hundred Stuff
    • Four Hundred Guru

    Recent Posts

    • Public Preview For Watson Code Assistant for i Available Soon
    • COMMON Youth Movement Continues at POWERUp 2025
    • IBM Preserves Memory Investments Across Power10 And Power11
    • Eradani Uses AI For New EDI And API Service
    • Picking Apart IBM’s $150 Billion In US Manufacturing And R&D
    • FAX/400 And CICS For i Are Dead. What Will IBM Kill Next?
    • Fresche Overhauls X-Analysis With Web UI, AI Smarts
    • Is It Time To Add The Rust Programming Language To IBM i?
    • Is IBM Going To Raise Prices On Power10 Expert Care?
    • IBM i PTF Guide, Volume 27, Number 20

    Subscribe

    To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

    Pages

    • About Us
    • Contact
    • Contributors
    • Four Hundred Monitor
    • IBM i PTF Guide
    • Media Kit
    • Subscribe

    Search

    Copyright © 2025 IT Jungle