Skip to content

Stumbled apon a nice post to assist you as to why.



Microsoft has released its latest July – December 2007 volume of the Security Intelligence Report.

Among the findings are :

  • There was a 300% increase in the number of trojan downloaders and droppers.
  • Adware remained the most prevalent category of potentially unwanted sotware.
  • The top potentially unwanted sotware family detected in the second half of 2007 was Win32/Hotbar.
  • The most prevalent rogue security sotware detected in the second half of 2007 was Win32/Winixer.
  • During 2H07 the MSRT proportionally cleaned malware from 60% less Windows Vista-based computers, compared to computers running Windows XP Service Pack 2.
  • Phishing is still predominantly an English-language phenomenon.

Details: WinVistaClub

There are two basic popular types of malware infection these days: the Trojan horse program marketed through links in an e-mail and drive-by browser hijackings. I have a hard time getting my hands around how effective one or the other is.

The drive-by method uses a bag of JavaScript that throws a stream of attacks at the browser, one after another, hoping one will compromise it. At almost all times these attacks are patched vulnerabilities, meaning that you’re basically safe from them if you keep your browser and other software up to date. Some of that software, like Flash, Acrobat and RealPlayer, are more likely to linger in old, unpatched versions, so you need to be assiduous.

A big part of the consideration for vulnerability exploits is, if they happen to execute, how much damage can they do? Microsoft has done a lot of work in this area over the last few years, aiming to restrict the ability of exploits to do much damage if they get through initial defences.

One of my favorite Microsoft bloggers, Robert Hensing, who works in the Security Vulnerability Research and Defense group, argues that these second-level defenses are good and getting better.

Read all here at……...

No comments yet

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: