• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • The Internet: Beyond the Wild, Wild West; Think Stone Age

    January 12, 2009 Timothy Prickett Morgan

    The PandaLabs malware detection and analysis lab maintained by security software maker Panda Security has announced its annual security report for the just-ended 2008. And man, is it ugly out there on the Internet, or rather, in there on the PCs and servers of the world.

    In 2008, PandaLabs says that it detected an average of 35,000 malware samples a day, and 22,000 of those detected were new infections launched by hackers. (No wonder antivirus software eats so much resources, eh?) PandaLabs says that the total count of malware threats in 2008 was above 15 million, which is more than three times the projected level the lab estimated for 2008 as 2007 was ending. In the first eight months of 2008, in fact, more new bits of malware were launched than in the prior 17 years that Panda Security has been tracking malware combined.

    By Panda Security’s assessment, 67.7 percent of the malware launched in 2008 was of the Trojan horse type, meaning it was created to run on your machine by pretending to be something else, or lurking on a Web page, and then to steal your passwords, bank account information, and so forth. Not surprisingly, given their prevalence, Trojans were the most common infection on computers, at 70.1 percent, compared to 19.9 percent for adware, and only 4.22 percent for worms. Ironically–or maybe just sadistically–rogue antivirus programs that trick end users into thinking they are infected and then try to sell them a solution to the infection, are on the rise.

    If you want to get the low-down on all the different kinds of malware, check out PandaLabs’ 2008 annual malware report for yourself.

    RELATED STORIES

    Security Outlook Poor as 2008 Winds to Close

    Patches? We Don’t Need No Stinkin’ Patches: Survey

    Symantec Combats Phishing with New Services Offering

    Decline In Vulnerabilities Belies Threat Increase, Microsoft Says in New Security Report

    Surf’s Up for Web-Based Organized Crime, IBM X-Force Says

    Bleak Outlook for Information Security, According to Researchers

    In Search Of a More Secure Internet

    Security Attacks and Breaches on the Rise

    MPack Hacker Tool Claims 10,000 Compromised Web Sites



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: mtfh_rc, Volume 18, Number 2 -- January 12, 2009

    Sponsored by
    ARCAD Software

    Embrace VS Code for IBM i Development

    The IBM i development landscape is evolving with modern tools that enhance efficiency and collaboration. Ready to make the move to VS Code for IBM i?

    Watch this webinar where we showcase how VS Code can serve as a powerful editor for native IBM i code and explore the essential extensions that make it possible.

    In this session, you’ll discover:

    • How ARCAD’s integration with VS Code provides deep metadata insights, allowing developers to assess the impact of their changes upfront.
    • The role of Git in enabling seamless collaboration between developers using tools like SEU, RDi, and VS Code.
    • Powerful extensions for code quality, security, impact analysis, smart build, and automated RPG conversion to Free Form.
    • How non-IBM i developers can now contribute to IBM i projects without prior knowledge of its specifics, while ensuring full control over their changes.

    The future of IBM i development is here. Let ARCAD be your guide!

    Watch the replay now!

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Admin Alert: Looking for i5/OS Trouble, Part I IBM Throws Apple a Bone with Notes-Domino 8.5

    Leave a Reply Cancel reply

TFH Volume: 18 Issue: 2

This Issue Sponsored By

    Table of Contents

    • There’s No i in Barack Obama, But There Is One in Bailout
    • Layoff Rumors Panic IBM Workers; Nothing Confirmed
    • Application Modernization: Money in the Bank
    • Mad Dog 21/21: Shoes for Cheeses
    • IT Jobs 2009: The Dot-Com Bubble Burst Was ‘A Cake Walk’
    • Jack Kuehler, Former IBM President and Vice Chairman, Dies at 76
    • VAI Nets U.K.-Based Kingfisher for Reseller Partnership
    • Lawson Sales Hit by Economic Downturn in Fiscal Q2
    • Infinite Software Buys Another HP Reseller
    • The Internet: Beyond the Wild, Wild West; Think Stone Age

    Content archive

    • The Four Hundred
    • Four Hundred Stuff
    • Four Hundred Guru

    Recent Posts

    • POWERUp 2025 –Your Source For IBM i 7.6 Information
    • Maxava Consulting Services Does More Than HA/DR Project Management – A Lot More
    • Guru: Creating An SQL Stored Procedure That Returns A Result Set
    • As I See It: At Any Cost
    • IBM i PTF Guide, Volume 27, Number 19
    • IBM Unveils Manzan, A New Open Source Event Monitor For IBM i
    • Say Goodbye To Downtime: Update Your Database Without Taking Your Business Offline
    • i-Rays Brings Observability To IBM i Performance Problems
    • Another Non-TR “Technology Refresh” Happens With IBM i TR6
    • IBM i PTF Guide, Volume 27, Number 18

    Subscribe

    To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

    Pages

    • About Us
    • Contact
    • Contributors
    • Four Hundred Monitor
    • IBM i PTF Guide
    • Media Kit
    • Subscribe

    Search

    Copyright © 2025 IT Jungle