Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Webroot reports over half a million spyware sites in existence

Webroot Software : 25 September, 2007  (Technical Article)
CTO of Webroot calles on security professionals to step up vigilance in light of latest research which indicates the scale of live spyware existing on the internet.
Webroot Software highlights requirement for an ever-vigilant IT security approach as it reports on the most recent forms of attack over email and the internet at IIR Fraud World.

Gerhard Eschelbeck, the company's Chief Technology Officer and international academic presenter, outlins new methods of attack used by current-day Spyware writers and presenting IIR Fraud World visitors with annual research statistics on the state of internet security worldwide and the advice and support needed for IT security specialists to protect themselves now and in the future.



Gerhard Eschelbeck explains, 'Spyware has become the leading threat to secure computing. Webroot's dedicated Threat Research Centre in Colorado has now identified more than 500 thousand sites that host Spyware. The technology behind Spyware has become so far advanced, that departments responsible for IT security in Europe's businesses are being constantly attacked with security breaches each month.

'To maintain compliance with new laws and regulations, those responsible for IT have been forced to rethink their data security measures. Spyware writers are routing their malicious programs through countries like China or Romania where prosecution is difficult. They are also using company employees to 'plant' Spyware capable of theft and fraud. And, by using advanced encryption techniques, such as polymorphic code, along with Rootkit technology, the more malicious forms of software continue to proliferate,' he continues.

Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo