Threat Analysis of Security Related Risks…

Have you ever wondered where the security threats (such as viruses, worms, trojans, adware, spyware, etc.), we are exposed to, are being generated from?  I recently visited a site called ThreatExpert that specializes in the analysis of computer security related risks and how those threats are distirbuted; and from what origin (Country).  As of the date of this post, the percentage of threats captured for analysis came from the following Countries:

ThreatExpert

China – 31.6%
Russian Federation – 23.77%
United States – 7.79%
Brazil – 6.77%
United Kingdom – 5.53%
Ukraine – 5.02%
Spain – 4.02%

Threat Expert

ThreatExpert (patent pending) is an advanced automated threat analysis system (ATAS) designed to analyze and report the behavior of computer viruses, worms, trojans, adware, spyware, and other security-related risks in a fully automated mode.

[CLICK HERE TO LEAVE A COMMENT]

3 thoughts on “Threat Analysis of Security Related Risks…

Add yours

  1. It is no surprise that China and the former USSR are the #1 and #2.

    China has an active cyber-warfare element in the People’s Army and it is using cyber-criminal techniques to learn how to cripple computers and computer networks.

    The former USSR is full of un-employed top-tier programmers who develop for who ever will pay them… like cyber-criminals.

    Like

  2. TechPaul,

    You must have been reading my mind… Especially the point you make about China. It is almost like we’re in that “cyber – war” mode now… Objective, see what damage can be made and what can be penetrated… Interesting…

    Rick

    Like

  3. Give you an example.. Everything is being manufactured in China, right?
    So we have them build our USB-connected digital picture frames (just like everything else) and they decide to test a USB virus (USB is autoplay) which does something innocuous.. it stole the logon passwords to a certain fantasy game.

    Yes. It was detected (see http://techpaul.wordpress.com/2008/02/16/cyber-crime-news/) and people squawked.
    But no one really noticed the implications…

    I mean, I am not a devious type, nor a malicious type, nor “crafty” or “sly”.. but I can see what a well-written, serious USB-delivered trojan might do. Lay dormant and undetected…

    Like

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Powered by WordPress.com.

Up ↑

%d bloggers like this: