Be Prepared for 2010’s Malware – PC Tools Malware Trends in 2010

image All the signposts point to 2010 being a banner year for cyber-criminals. Being prepared and being aware, while not a panacea, will continue to be a key element in mitigating risk exposure.

We’ve said it many times here, but it bears repeating – “Being aware of Internet threats is critical to your security on the Internet, so that you can protect yourself and stay ahead of the curve. Knowledge is a critical ingredient in ensuring your personal safety on the Internet”.

In this article, guest writer Sergei Shevchenko, Senior Malware Analyst at PC Tools, offers a peek into the 2010 malware landscape.

Cybercriminals operate in the same way as legitimate organizations – they’re looking for the best return on their investment. It’s therefore inevitable that as we move in to 2010 there will continue to be increased interest in producing malware that brings swift and healthy dividends, with a focus on new and diversified rogue security solutions and in continuing to employ social engineering techniques.

Malware authors will continue to shift their focus towards the services, platforms and architectures that are the most popular and offer the largest market share.

We can expect to see more attacks against Windows 7 and other new operating systems as their installed-base grows, such as Apple customers running Mac OS X. Users must ensure that they have comprehensive security solutions to protect them against new and unknown threats.

Traditional techniques were aimed at causing system shutdowns and denial of service attacks. Now Cybercriminals are more focused on data loss, financial fraud and identity theft and as such threats are becoming increasingly sophisticated.

Old techniques are unlikely to become completely obsolete – because often the greatest threats materialize when the least expected malware techniques re-emerge.

We expect future trends to blend existing malware techniques with new inventive schemes that assume tighter social interaction with the public and look less-underground related.

When the initial “accumulation” phase of the rogue security software businesses comes to completion, we might expect cybercriminals to start using their budgets for establishing call centers, support lines, virtual offices, registering off-shore companies, and even launching advertising campaigns.

Attacks will also be designed to exploit vulnerable systems and users by evading the latest detection systems and why behavior-based software is so integral to comprehensive protection. It recognizes that a threat is present and works to neutralize it.

Methods such as virtualization, behavioral analysis, cloud-based detection and remediation will all become increasingly important in detecting, repelling and removing the latest malware.

Users who keep an eye on the range of security software solutions on the market will be aware that many vendors already provide at least one of these services. The difficulty lies with making an informed choice on which offers the best protection – and that’s where the independent anti-malware testing labs come to the fore.

Stay tuned – in the next few days we will be reviewing PC Tools Internet Security Suite 2010, and we will be offering you an opportunity to win one of ten free licenses in a contest give away.

In recent independent tests performed by AV-Test GmbH, a leading service provider for IT security testing, PC Tools Internet Security 2010, scored the highest of the 12 products tested in blocking malware, with a a success rate of 94.8 percent.

Followed by Symantec Norton Internet Security Suite 2010, with 92.8 percent; Kaspersky Internet Security 2010, 89.8 percent; Panda Internet Security 2010, 88.7 percent; Avira Premium Security Suite 9.0, 87.2 percent.

As well, we are currently running a contest give away in which you have an opportunity to win one of ten free licenses for PC Tools Spyware Doctor with Anti-Virus. Go to, Spyware Doctor with Anti-Virus 2010 – Worth the Money? on this site, and and get your entry in.

If you enjoyed this article, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

4 Comments

Filed under Anti-Malware Tools, Antivirus Applications, cybercrime, Don't Get Scammed, Don't Get Hacked, Guest Writers, Internet Safety, Internet Security Alerts, Malware Advisories, PC Tools, Software, Windows 7, Windows Tips and Tools