While it's true that, according to McAfee Inc.'s latest computer virus count, the number of known viruses has reached
an all-time high, the number has been increasing rapidly for the last couple years, frequently breaking records. Unfortunately, the overall number does matter because, typically, each sample requires some sort of analysis by the antimalware industry, followed by updated signatures for detection that must be sent to customers. Antimalware vendors are having a hard time keeping up with the malware increase, as it is difficult to create and push out updates to all customers in a timely manner.
Along with the drastic increase in the number of unique malware specimens identified, there have also been advancements in the effectiveness of malware at bypassing antimalware software and of monetizing the informavc tion it exploits.
The rapid rise in the number of unique malware, coupled with advances in malware sophistication, does necessitate investments in additional defenses. Some antimalware vendors are adding additional capabilities like centralized management to their core products , and some are releasing add-on products to incorporate reputation-based detection, which gauges whether an application or service is commonly used and therefore likely to be safe, or cloud-augmented detection , which can speed up detection and utilize fewer client resources.
In response, some companies are investing in application whitelisting technologies and making concerted efforts to harden their systems to decrease their vulnerability to malware. Along with these client-based protections, there have been advances in network-based protections that add a tool to prevent malware from infecting systems by identifying malicious code when it is downloaded and blocking it. Using both approaches will help provide defense-in-depth to protect your network and client systems.
Dig deeper on Security Industry Market Trends, Predictions and Forecasts
Related Q&A from Nick Lewis, Enterprise Threats
Researchers reportedly succeeded in extracting decryption keys using sound-based attacks. Is this a threat enterprises should worry about?continue reading
The amount of malware using peer-to-peer communications has increased dramatically. Enterprise threats expert Nick Lewis explains how to detect P2P ...continue reading
Cloaked malware, like DGA.Changer, can reportedly evade sandbox detection. Nick Lewis explains how to handle the risk.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.