Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


+ - Google Analyzes Four Years of Web-Based Malware ->

Submitted by wiredmikey
wiredmikey (1824622) writes "Google has released a new threat report highlighting how a mix of social engineering, IP cloaking and other techniques are keeping attackers on step ahead of some of the most popular security mechanisms on the Web.

The report, “Trends in Circumventing Web-Malware Detection,” analyzes four years of data covering some 160 million Web pages on roughly 8 million sites. As part of their analysis, Google researchers took a look at four of the most popular malware detection technologies on the Web: virtual machine client honeypots, browser emulator client honeypots, domain reputation and antivirus. In each case, attackers have found ways to sneak their way around security defenses, marking another leg in the ongoing race between attackers and vendors.

In a joint blog post, Google Security Team members noted that while social engineering is a popular Modus operandi for attackers, drive-by downloads are much more common. According to their analysis, attackers are quick to switch to new and more reliable exploits to avoid detection, and that most vulnerabilities are exploited only for a short period of time until new ones become available."

Link to Original Source
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

Google Analyzes Four Years of Web-Based Malware

Comments Filter:

When you don't know what to do, walk fast and look worried.