Locations
United States
Change
All Microsoft Sites
Search
Regional Threat Assessment
Featured Articles
Managing Risk
Glossary
Introduction
Running unprotected: Measuring the Benefits of Real-Time Security Software
Going without Antimalware Protection
Real-time Protection Statistics
Operating System Statistics
Geographic Statistics
Fighting Infection with Real-Time Protection
Deceptive Downloads: Software, Music, and Movies
Detecting Malware Associated with Unsecure Supply Chains
Malware and Unsecure Software Distribution
Music, Movies, and Malware
Malware Statistics
Regional Variations
Defending Against Supply Chain Threats
Conficker Remains a Threat
Propagation Mechanisms
Results
Clean Up Tips
Determined Adversaries
Introduction
Same Old Tricks, New Era
The Role of the Internet
Targeted Attacks
Challenges
Risk Management
Prevention
Detection
Containment
Recovery
Communication and Information Sharing
The Role of Governments
Conclusion
Case Studies
TeliaSonera Removes Botnet
Evolution of Malware, 10-year
Computing & Malware Origins
TwC History
Vulnerabilities
Exploits & Security Bulletins
Malware Trends
Threats by Location
Zeroing in on Malware
Analysis and Results
Classifying Malware
Analytic Methods
Results
Insights
User Interaction
Feature Abuse
Exploit Age
Analysis Details
Using the Taxonomy
Vulnerability Subprocess
Methodology Details
Other Classifications of Malware
Conclusion
IT Pros: Social Engineering Advice
FakePAV: How to Fight Back
What is a Botnet?
History
Botnets Today
IRC Botnets
HTTP Botnets
Other Protocols
P2P Command and Control
How Botnets Are Used
Spamming
Phishing
Denial-of-Service Attacks
Installing Malware
Click Fraud
Stealing Confidential Data
Distributing Malware
Honeypots & Darknets
How Do Botnets Work?
Botnet Creation
Controlling the Botnet
Spreading Bots
Defending the Botnet
Detecting Botnets
Botnet Commerce
Botnet Special Edition Reports
Rustock
How Rustock Works
Spam
Deployment
Defeating Rustock
Rustock Statistics
Infection Statistics
Spam Statistics
Defense Guidance
Waledac
Technical Action Plan
Tackling P2P
The Legal Action Plan
Defense Guidance
Zbot
How Win32/Zbot Works
Fighting Win32/Zbot
Geographic Statistics
Defense Guidance
Qakbot
What is Qakbot?
Code & Telemetry Clues
Geographical Statistics
Chronology of an Infection
Evolution of Qakbot
Modern Functionality
Defense Guidance
Twitter
Facebook
E-mail
Community
Share this
Feedback:
Was the information in this article helpful?