While it's true that, according to McAfee Inc.'s latest computer virus count, the number of known viruses has reached...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
an all-time high, the number has been increasing rapidly for the last couple years, frequently breaking records. Unfortunately, the overall number does matter because, typically, each sample requires some sort of analysis by the antimalware industry, followed by updated signatures for detection that must be sent to customers. Antimalware vendors are having a hard time keeping up with the malware increase, as it is difficult to create and push out updates to all customers in a timely manner.
Along with the drastic increase in the number of unique malware specimens identified, there have also been advancements in the effectiveness of malware at bypassing antimalware software and of monetizing the informavc tion it exploits.
The rapid rise in the number of unique malware, coupled with advances in malware sophistication, does necessitate investments in additional defenses. Some antimalware vendors are adding additional capabilities like centralized management to their core products , and some are releasing add-on products to incorporate reputation-based detection, which gauges whether an application or service is commonly used and therefore likely to be safe, or cloud-augmented detection , which can speed up detection and utilize fewer client resources.
In response, some companies are investing in application whitelisting technologies and making concerted efforts to harden their systems to decrease their vulnerability to malware. Along with these client-based protections, there have been advances in network-based protections that add a tool to prevent malware from infecting systems by identifying malicious code when it is downloaded and blocking it. Using both approaches will help provide defense-in-depth to protect your network and client systems.
Related Q&A from Nick Lewis
As the Angler exploit kit evolves and adopts new functionality, it's becoming harder to detect and defend against. Enterprise threats expert Nick ...continue reading
A proof-of-concept attack on Apple's Siri allowed researchers to steal data from iOS. Learn more about the iStegSiri attack and how to defend against...continue reading
A new global email scam has cost enterprises millions. Expert Nick Lewis explains how to defend against man-in-the-email attacks with proper training...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.