If you would really like to be infected by malware, the best place to go these days is amazon.com! According to a quarterly report for Q2 2014 by Solutionary’s Security Expert Research Team (SERT), Amazon hosts 41% of all malware identified by SERT’s honeynet.
A honeynet is a network configured in ways to invite attacks so that threats can be analyzed. Servers on such a network are called honeypots.
Shockingly, the percent of malware hosted by Amazon has increased from 16% to 41% in just one year. Malware on an e-commerce site like Amazon can be used to steal your login credentials and your credit card information, exposing you to financial fraud.
The report indicated that hackers have focused their attention on large targets with 52% of malware hosted on the top 10 Internet Service Providers. This is another proof of the Pareto Rule, aka 80-20 rule that says that for most situations a high percentage of results can be explained by a small number of variables.
Why is that important?
In this case it means that if only a small number of internet businesses would focus more on their user’s security there could be a significant improvement in network and website security. It can happen. For example, GoDaddy dropped on this report from second to the 9th on the list because their percent of trapped malware declined from 14% to 2%.
Brute Force on the Rise
The report identified an increase in brute force attempts to identify user login credentials. Any password can be found by attempting all possible combinations, given a specific length.
Top many organizations and users do not understand the importance of using strong passwords, ones that include combinations of letters, numbers, special characters and mixed cases. The longer the password and the more character combinations the more possible combinations that a brute force attack has to deal with.
What can you do?
If internet users do not want to rely on the security of the sites they visit, they should use Comodo Internet Security (CIS). CIS differs from other malware protection because it focuses on threat prevention and not just detection. With its unique Default Deny architecture and auto sandbox, even if you do download malware the worst that can happen is that it will run safely in a secured system area called a sandbox.TEST YOUR EMAIL SECURITY GET YOUR INSTANT SECURITY SCORECARD FOR FREE