Security holes in software
File infector families
Timely subject headings
Botnet applications are untraceable
Botnets are inherently difficult to identify
Talented IT professionals in countries with organized crime develop botnets
Many users are unaware that their system has been compromised
They originate from outside the network
They use or damage computer resources.
They enter computer systems, usually without the user’s knowledge or intent.
They release hidden payloads designed to damage hard drives and corrupt data files
They appear to be harmless but hide malicious intent.
They are not intended to cause harm and only make fun of the user.
They replicate and attach themselves to host files.
They do not require user intervention to spread or function.
Worms do not replicate.
Worms do not spread to other computer systems.
Worms do not require a host file to spread.
Worms do not carry payloads.
Create a copy of itself in a directory
Create a registry entry
Get email addresses
Executes a program
Lost productivity, recovery and cleanup costs, lost data, and damaged reputations
Lost productivity, increased vulnerability to future virus attacks, loss of confidential data, loss of other data
Network downtime, decreased availability of computer resources, disk damage, and problems in virus isolation
Network disconnection, increased errors in the network, and damaged reputation due to loss of customer data
Browser Helper Object
Browser Helper Object
Additional programs are also being installed at the time of installation
ActiveX is being used as an installer
A Browser Helper Object (BHO) plug-in gets installed on the browser
The browser security settings remain the same
Advertising banners are displayed
The computer performs an auto-restart
The system becomes unstable
The computer disconnects from the Internet
The message could contain malware attachments that cause problems if the user clicks on it.
The message may be delayed.
The error may actually be a Man-in-the-Middle attack.
The email message automatically poses a threat.
The user is asked to click on an attachment to view false account information.
The user will not be able to identify the threat.
The user is asked to click on a link that takes them to a site intended to get account information.
The user downloads account software and infects the computer with malware.
Graphical User Interface (GUI)
A browser plug-in
Greeting does not have a first and last name
Typing errors in the messages from businesses
Alarmist tone in the message
That is where the threats are located
Threats can be scanned more quickly there
The technologies are developed for in-the-cloud locations
It is faster to use Trend Micro’s updated solutions in the cloud, than to perform the daily updates on a machine to protect against the new Web threats of the day
File reputation technology
Web reputation technology
Email reputation technology
HouseCall Server Edition
Network VirusWall Enforcer
Web pages with unwanted content
Web pages that require too much bandwidth
Web pages with downloads
Web pages with hidden threats