While it's true that, according to McAfee Inc.'s latest computer virus count, the number of known viruses has reached...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
an all-time high, the number has been increasing rapidly for the last couple years, frequently breaking records. Unfortunately, the overall number does matter because, typically, each sample requires some sort of analysis by the antimalware industry, followed by updated signatures for detection that must be sent to customers. Antimalware vendors are having a hard time keeping up with the malware increase, as it is difficult to create and push out updates to all customers in a timely manner.
Along with the drastic increase in the number of unique malware specimens identified, there have also been advancements in the effectiveness of malware at bypassing antimalware software and of monetizing the informavc tion it exploits.
The rapid rise in the number of unique malware, coupled with advances in malware sophistication, does necessitate investments in additional defenses. Some antimalware vendors are adding additional capabilities like centralized management to their core products , and some are releasing add-on products to incorporate reputation-based detection, which gauges whether an application or service is commonly used and therefore likely to be safe, or cloud-augmented detection , which can speed up detection and utilize fewer client resources.
In response, some companies are investing in application whitelisting technologies and making concerted efforts to harden their systems to decrease their vulnerability to malware. Along with these client-based protections, there have been advances in network-based protections that add a tool to prevent malware from infecting systems by identifying malicious code when it is downloaded and blocking it. Using both approaches will help provide defense-in-depth to protect your network and client systems.
Dig Deeper on Security industry market trends, predictions and forecasts
Related Q&A from Nick Lewis
Can Structured Threat Information eXpression improve threat intelligence sharing? Nick Lewis breaks down the evolution of the STIX security framework.continue reading
A new type of WordPress malware, WP-Base-SEO, disguises itself as an SEO plug-in that opens backdoors. Nick Lewis explains how it works and how to ...continue reading
A new exploit of CLDAP servers can be used for a DDoS reflection attack that gives attackers a 70x boost. Nick Lewis explains how to defend against ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.