{"id":2403,"date":"2007-01-17T00:00:00","date_gmt":"2007-01-17T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/01\/17\/malware-creates-new-challenges-for-anti-virus-vendors\/"},"modified":"2021-12-30T11:41:16","modified_gmt":"2021-12-30T11:41:16","slug":"malware-creates-new-challenges-for-anti-virus-vendors","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/01\/17\/malware-creates-new-challenges-for-anti-virus-vendors\/","title":{"rendered":"Malware creates new challenges for anti virus vendors"},"content":{"rendered":"<p>We are seeing a sizeable decrease in the media grabbing pandemic outbreaks of malicious software. Yet with less headlines on high risk infectors we are still seeing an increasing overall number of malware infections, it is this new breed of malware that is costing industry millions every year \u2013 yet no-one seems to know about them  One might be fooled into thinking that the lack of media attention on virus outbreaks &#8211; like Melissa, LoveLetter, Sobig.F etc- means the casual Internet user is less exposed to infections from malicious software.  Long standing customers of antivirus vendor Norman, will have seen that in the past 18 months we have released more signatures than in the previous 15 years.  The recent family of worms called W32\/Stration by Norman was also given names like Email-Worm.Win32.Warezov; W32\/Spamta.worm by other antivirus vendors.  The large scale outbreaks we have seen previously have shown that malware can indeed be a very powerful tool in the right hands.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Whilst we still have the odd occasion where the so called &#8220;script kiddies&#8221; are intent on creating havoc and making a name for themselves, the majority of malware now comes from persons or organizations involved in criminal activity with significantly more resources at their disposal.  In this environment the malware is often created to target one specific company or group of companies making it very hard for the antivirus industry to obtain a sample of the threat and provide signature updates to protect against it.<\/p>\n<p>Users likely to be targeted by special attacks Particular organizations are considered more attractive for targeted attacks using malicious code to infiltrate their systems.<\/p>\n<p>The need for protection software that is less dependant on signature-based techniques is seen as paramount.<\/p>\n<p>http:\/\/www.it-observer.com\/articles\/1297\/malware_creates_new_challenges_anti_virus_vendors\/<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-2403","post","type-post","status-publish","format-standard","hentry","category-warnings"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2403","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2403"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2403\/revisions"}],"predecessor-version":[{"id":4890,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2403\/revisions\/4890"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2403"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2403"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2403"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}