Data theft – The Grinch who stole data

The internet is a whole other world for most of us. We may all do our work and major communication acts with the help of it but after a couple of pioneers, we’re still the new settlers– which means we haven’t really chalked out the surroundings of this land yet. And there are alien species too. Many of them much like the Grinch we’ve read about from childhood stories. The whole purpose of a Grinch is to steal happiness and Christmas gifts. But in the world of the cloud, these goodies and gifts are all in the form of data. Well now that the year is ending, many of these Grinch like scoundrels have saved up a lot of goodies, comprising of our personal and private data. Keylogger, malware, spyware, backdoor exploits have all been used for data theft one after the other. Let’s take a look at the list of spoils.
Click to see more
Read more!

Malware is Everywhere!

The Prevalence of Malware

Interacting on the Internet keeps getting riskier in terms of potential Malicious Software Infection. Malware is defined as viruses, trojans, worms, spyware, adware and malicious applications, and can damage the infected computer, compromise software, not to mention steal personal information. Additionally, malware can slow the computer to a crawl, making web surfing a chore and causing applications to take a long time to open. Incidents of malware infection rose nearly 41 percent between 2010 and 2011.

The country that hosts the majority of malware applications is the United States. Approximately 38 percent of all malware is hosted in the U.S. Not surprisingly, the source of most malware infections come from web pages that are infected and pass the code to a computer when the web page is accessed. Another source of malware is through email. One in ever 239 emails contains some type of malware. Malware is spread through email via attachments.

Though larger companies are often affected by malware, small businesses are targeted as well. Each year, millions of individuals have their computers compromised and/or their identities stolen as the result of malware infections.
Read more!