While it's true that, according to McAfee Inc.'s latest computer virus count, the number of known viruses has reached...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
an all-time high, the number has been increasing rapidly for the last couple years, frequently breaking records. Unfortunately, the overall number does matter because, typically, each sample requires some sort of analysis by the antimalware industry, followed by updated signatures for detection that must be sent to customers. Antimalware vendors are having a hard time keeping up with the malware increase, as it is difficult to create and push out updates to all customers in a timely manner.
Along with the drastic increase in the number of unique malware specimens identified, there have also been advancements in the effectiveness of malware at bypassing antimalware software and of monetizing the informavc tion it exploits.
The rapid rise in the number of unique malware, coupled with advances in malware sophistication, does necessitate investments in additional defenses. Some antimalware vendors are adding additional capabilities like centralized management to their core products , and some are releasing add-on products to incorporate reputation-based detection, which gauges whether an application or service is commonly used and therefore likely to be safe, or cloud-augmented detection , which can speed up detection and utilize fewer client resources.
In response, some companies are investing in application whitelisting technologies and making concerted efforts to harden their systems to decrease their vulnerability to malware. Along with these client-based protections, there have been advances in network-based protections that add a tool to prevent malware from infecting systems by identifying malicious code when it is downloaded and blocking it. Using both approaches will help provide defense-in-depth to protect your network and client systems.
Dig Deeper on Security Industry Market Trends, Predictions and Forecasts
Related Q&A from Nick Lewis
An HTTPS session with a reused nonce is vulnerable to the Forbidden attack. Expert Nick Lewis explains how the attack works, and how to properly ...continue reading
The Irongate malware has been discovered to have similar functionality to Stuxnet. Expert Nick Lewis explains how enterprises can protect their ICS ...continue reading
APT groups have been continuously exploiting a flaw in Microsoft Office, despite it having been patched. Expert Nick Lewis explains how these attacks...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.