SlideShare a Scribd company logo
1 of 41
McAfee 2010 Q1 Release Marc Vos Sr. Manager, Worldwide Product Marketing
The Consumer Security Landscape In 2009, consumers were exposed to 12.3M unique threats, up 146% from 20081 An average of 148,000 new zombie PCs created every day in the year 20091 Email (74 %) and Web pages (28.9%) were the two primary mechanisms used for fraudulent contact2 Predictions for 2010 indicate Facebook and Adobe as new targets for delivering malware1 2 Source: 1McAfee Labs 3rd QTR Threat Report, 2 2009 Internet Crime Report (IC3)
The Consumer Security Landscape- Malware Malware doubled over past few years     Growth in Password Stealing Trojans  Source: McAfee Labs Threat Report
The Consumer Security Landscape- Malware AutoRun Malware Portable storage devices continue to drive AutoRun Malware “the number-one piece of malware detected globally.”								McAfee Labs Source: McAfee Labs Threat Report
The Consumer Security Landscape- Malware Email attachments have delivered malware for years, yet the increasing number of attacks still fools users into downloading Trojans and other malware. Cybercriminals have long picked on Microsoft products due to their popularity.  In 2010 Adobe software, especially Acrobat Reader and Flash, will likely take the top spot. Source: McAfee Labs Threat Report
The Consumer Security Landscape- Social Media Phishing using URL services  like Bit.ly and Tinyurl.com  Hijacking legitimate accounts Social Media usage can lead to ID theft  Email messages with dangerous attachments that appear to be sent from a social networking site Source: McAfee Labs Threat Report
2009- A Record Year for Web-based Threats 7 Koobface, an anagram of Facebook, is a computer worm that targets the users of the social networking websites Facebook, MySpace, hi5, Bebo, Friendster and Twitter.  Koobfaceultimately attempts, upon successful infection, to gather sensitive information from the victims such as credit card numbers.  It was first detected in December 2008  Source: McAfee Labs Threat Report
The Consumer Security Landscape- Spam and Zombies In 2009 zombies and phishing grew to record levels Zombie PCs sending spam, by month  Phishing email volume changes in the last 18 months Source: McAfee Labs
9 Effective Consumers’ Needs in Security Software  Least Important Most Important Effective Fast Easy to use  Informative Comprehensive Silent Fast Adaptable Easy to use Educational 1 McAfee Market Research survey in July 2009, N=350
10 The McAfee Experience: True Versionless Software Q1 McAfee customers get automatic upgrades 2009 2010 Customer receives automatic update Customer restarts computer Customer gets the latest protection
11 McAfee 2010  Q1 Release
12 McAfee 2010, Q1 Release- Delivering What Consumers are Looking For Effective Award winning security that offers best of breed protection ¹AV-Test.org malware detection results published in ComputerBild magazine (Issue 26: 12/05/09) Improved Performance Completely re-engineered for the faster PC performance  ¹Network Testing Labs Analysis, McAfee Total Protection 2010 versus McAfee Total Protection 2009 Ease of Use Totally redesigned user interface and interaction offers a simple and intuitive PC security experience ¹Major Independent Research Agency, Study Conducted October 2009 versus Competition, N=1000
13 #1 Effective
14 t1 t2 t3 t4 t0 Malware in the wild Malware discovered Protection is available Protection is downloaded Protection is deployed Q1 The Protection Gap Protection gap with traditional solutions From the time malware is in the wild to the time protection is deployed is the protection gap
15 McAfee is the Fastest in Protection! t4 t2 t3 t1 t0 Malware in the wild Malware discovered Protection is available Protection is downloaded Protection is deployed Q1 Protection deliveredin real-time
16 AntiVirus /  AntiSpyware  Engine McAfee Labs ,[object Object],across30countries Protection Only McAfee Delivers Global Threat Intelligence Malware Research ,[object Object],identified each day AntiSpam  Engine Protection Email Security Research ,[object Object],queries each month Safe Search &  Surf Protection Protection Web Research 75 billion web reputation   queries each month More than 32 million websites rated Parental  Controls  Protection Protection
Q1 Effective Protection Active Protection (Improved)  ,[object Object]
Traditional benefits of McAfee Active Protection include:
Reduction in protection gap from hours or even days to milliseconds
Higher detection rate by leveraging Global Threat Intelligence17
Effective Protection SiteAdvisor Database 1 Web Download Protection (New & Unique) Searching the Internet with McAfee is even safer. McAfee SiteAdvisor now adds cloud-based malware protection, allowing it to scan downloads and warn about threats before they are downloaded Media Player Website “Get Latest Media Player” (link) (Hijacked) Q1 Shareware Site mplayer2.exe 1 2 Active Protection Reputation ratings Global Threat Intelligence Virus is stopped before being downloaded 18
19 Effective Protection SiteAdvisor Database Global Threat Intelligence Active Protection URL Reputation Ratings and Protection (New) Now McAfee also provides green/yellow/red ratings based upon reputation data gathered from Global Threat Intelligence Media Player Website “Get Latest Media Player” (link) Shareware Site (Hijacked) mplayer2.exe Using reputation based ratings, consumers are stopped from accessing malware on unknown sites & IP addresses Reputation ratings
20 Improved Performance
Smart Timer Key Performance Improvements in 2010 Q1 Smart Timer (New) ,[object Object],21
Faster Scans (Improved)  Scans, particularly subsequent scans, are faster thanks to improvements made in scan caching Q1 Tests completed on “Average Desktop” Intel Dual Core, 2 GB RAM, 320 GB hard drive, Windows 7;  Test lab: Network Testing Labs Individual test results may vary 22 Key Performance Improvements in 2010
Instant User Interface Load & Response Time (Improved) Now the home screen loads under a second as well as instant navigation within the product Q1 Key Performance Improvements in 2010 Tests completed on “Average Desktop” Intel Dual Core, 2 GB RAM, 320 GB hard drive, Windows 7: Test lab: Network Testing Labs Individual test results may vary 23 23
Q1 Other Key Performance Improvements in 2010 Reduced Memory Usage (Improved) ,[object Object],Impact on Boot time(Improved) ,[object Object],Rapid Installation (Improved) ,[object Object],24
25 #1 Ease of Use
New User Interface User Interface Q1 User Interface and Navigation Evolution 26
Q1 27 Key Ease of Use Improvements in 2010 One Click Installation(Improved) Scrolling Real-Time Security Brief (New) On Demand Security Report(Improved) Contextual Help (New) 27
Q1 Key Ease of Use Improvements in 2010 Streamlined Manual Scans & Updates (Improved) ,[object Object],Running a Manual Scan Running a Manual Update 28
Key Ease of Use Improvements in 2010 Q1 Simple Configuration(Improved) ,[object Object],29
Q1 Key Ease of Use Improvements in 2010 Adaptable UI size based upon PC screen size (New & Unique) ,[object Object],30
31 Additional Features and Benefits
Additional Features/Benefits in 2010 Q1 Online Backup (New) ,[object Object],Automatic backup happens while computer is idle Integrated online backup Data is encrypted and sentto an encrypted server online 32
Q1 Additional Features/Benefits in 2010 Parental Controls (Improved) ,[object Object],18 separate filter categories Add or block specific sites Internet time restrictions 33
34 Additional Features/Benefits in 2010 Q1 Home Network Defense (New & Unique) ,[object Object],Advanced Firewall Engine (Improved) ,[object Object],PC OptimisationTools (Improved & Unique)  ,[object Object],[object Object]
36 Product Summary
McAfee AntiVirus Plus 2010 Essential, award-winning PC protection for care-free computing  Features:  ,[object Object]
Anti-spyware
Anti-phishing

More Related Content

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Featured

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 

McAfee Q1 2010 Consumer Products Release

  • 1. McAfee 2010 Q1 Release Marc Vos Sr. Manager, Worldwide Product Marketing
  • 2. The Consumer Security Landscape In 2009, consumers were exposed to 12.3M unique threats, up 146% from 20081 An average of 148,000 new zombie PCs created every day in the year 20091 Email (74 %) and Web pages (28.9%) were the two primary mechanisms used for fraudulent contact2 Predictions for 2010 indicate Facebook and Adobe as new targets for delivering malware1 2 Source: 1McAfee Labs 3rd QTR Threat Report, 2 2009 Internet Crime Report (IC3)
  • 3. The Consumer Security Landscape- Malware Malware doubled over past few years Growth in Password Stealing Trojans Source: McAfee Labs Threat Report
  • 4. The Consumer Security Landscape- Malware AutoRun Malware Portable storage devices continue to drive AutoRun Malware “the number-one piece of malware detected globally.” McAfee Labs Source: McAfee Labs Threat Report
  • 5. The Consumer Security Landscape- Malware Email attachments have delivered malware for years, yet the increasing number of attacks still fools users into downloading Trojans and other malware. Cybercriminals have long picked on Microsoft products due to their popularity. In 2010 Adobe software, especially Acrobat Reader and Flash, will likely take the top spot. Source: McAfee Labs Threat Report
  • 6. The Consumer Security Landscape- Social Media Phishing using URL services like Bit.ly and Tinyurl.com Hijacking legitimate accounts Social Media usage can lead to ID theft Email messages with dangerous attachments that appear to be sent from a social networking site Source: McAfee Labs Threat Report
  • 7. 2009- A Record Year for Web-based Threats 7 Koobface, an anagram of Facebook, is a computer worm that targets the users of the social networking websites Facebook, MySpace, hi5, Bebo, Friendster and Twitter. Koobfaceultimately attempts, upon successful infection, to gather sensitive information from the victims such as credit card numbers. It was first detected in December 2008 Source: McAfee Labs Threat Report
  • 8. The Consumer Security Landscape- Spam and Zombies In 2009 zombies and phishing grew to record levels Zombie PCs sending spam, by month Phishing email volume changes in the last 18 months Source: McAfee Labs
  • 9. 9 Effective Consumers’ Needs in Security Software Least Important Most Important Effective Fast Easy to use Informative Comprehensive Silent Fast Adaptable Easy to use Educational 1 McAfee Market Research survey in July 2009, N=350
  • 10. 10 The McAfee Experience: True Versionless Software Q1 McAfee customers get automatic upgrades 2009 2010 Customer receives automatic update Customer restarts computer Customer gets the latest protection
  • 11. 11 McAfee 2010 Q1 Release
  • 12. 12 McAfee 2010, Q1 Release- Delivering What Consumers are Looking For Effective Award winning security that offers best of breed protection ¹AV-Test.org malware detection results published in ComputerBild magazine (Issue 26: 12/05/09) Improved Performance Completely re-engineered for the faster PC performance ¹Network Testing Labs Analysis, McAfee Total Protection 2010 versus McAfee Total Protection 2009 Ease of Use Totally redesigned user interface and interaction offers a simple and intuitive PC security experience ¹Major Independent Research Agency, Study Conducted October 2009 versus Competition, N=1000
  • 14. 14 t1 t2 t3 t4 t0 Malware in the wild Malware discovered Protection is available Protection is downloaded Protection is deployed Q1 The Protection Gap Protection gap with traditional solutions From the time malware is in the wild to the time protection is deployed is the protection gap
  • 15. 15 McAfee is the Fastest in Protection! t4 t2 t3 t1 t0 Malware in the wild Malware discovered Protection is available Protection is downloaded Protection is deployed Q1 Protection deliveredin real-time
  • 16.
  • 17.
  • 18. Traditional benefits of McAfee Active Protection include:
  • 19. Reduction in protection gap from hours or even days to milliseconds
  • 20. Higher detection rate by leveraging Global Threat Intelligence17
  • 21. Effective Protection SiteAdvisor Database 1 Web Download Protection (New & Unique) Searching the Internet with McAfee is even safer. McAfee SiteAdvisor now adds cloud-based malware protection, allowing it to scan downloads and warn about threats before they are downloaded Media Player Website “Get Latest Media Player” (link) (Hijacked) Q1 Shareware Site mplayer2.exe 1 2 Active Protection Reputation ratings Global Threat Intelligence Virus is stopped before being downloaded 18
  • 22. 19 Effective Protection SiteAdvisor Database Global Threat Intelligence Active Protection URL Reputation Ratings and Protection (New) Now McAfee also provides green/yellow/red ratings based upon reputation data gathered from Global Threat Intelligence Media Player Website “Get Latest Media Player” (link) Shareware Site (Hijacked) mplayer2.exe Using reputation based ratings, consumers are stopped from accessing malware on unknown sites & IP addresses Reputation ratings
  • 24.
  • 25. Faster Scans (Improved) Scans, particularly subsequent scans, are faster thanks to improvements made in scan caching Q1 Tests completed on “Average Desktop” Intel Dual Core, 2 GB RAM, 320 GB hard drive, Windows 7; Test lab: Network Testing Labs Individual test results may vary 22 Key Performance Improvements in 2010
  • 26. Instant User Interface Load & Response Time (Improved) Now the home screen loads under a second as well as instant navigation within the product Q1 Key Performance Improvements in 2010 Tests completed on “Average Desktop” Intel Dual Core, 2 GB RAM, 320 GB hard drive, Windows 7: Test lab: Network Testing Labs Individual test results may vary 23 23
  • 27.
  • 28. 25 #1 Ease of Use
  • 29. New User Interface User Interface Q1 User Interface and Navigation Evolution 26
  • 30. Q1 27 Key Ease of Use Improvements in 2010 One Click Installation(Improved) Scrolling Real-Time Security Brief (New) On Demand Security Report(Improved) Contextual Help (New) 27
  • 31.
  • 32.
  • 33.
  • 34. 31 Additional Features and Benefits
  • 35.
  • 36.
  • 37.
  • 39.
  • 45. Home Network Management (3-user version)Operating Systems: Windows 2000, XP, Vista, Windows 7 Suggested Retail Price: Euro 49.95 37
  • 46.
  • 52. Home Network Management
  • 55. Online Backup (1GB)Operating Systems: Windows 2000, XP, Vista, Windows 7 Suggested Retail Price: Euro 59.95 38
  • 56.
  • 61. Block links to risky websites through browser, email and IM
  • 63. Advanced Home Network Management
  • 67. BONUS DOWNLOAD: Includes free McAfee Anti-Theft (UK Only)Operating Systems: Windows 2000, XP, Vista, Windows 7 Suggested Retail Price: Euro 79.95 39
  • 68. 40 More Information is Available For more information, please visit the McAfee 2010, Know Better Protection microsite Site includes a virtual product tour, product videos and additional press information www.knowbetterprotection.com/press

Editor's Notes

  1. Although the distribution pattern is changing a bit, the overall growth of malware continues its unabated upward trend. 2009 surpassed 2008 in total malware growth! Trojans that steal passwords continue to be one of the favorite tools of cybercriminals. The tools to create these Trojans are commonly available on the Internet and there are many sites devoted to selling them as a service. Their function is simple: They steal passwords.
  2. McAfee Labs predicts that Adobe will overtake Microsoft as the No. 1 target for cybercriminals in 2010. Adobe products—in particular Acrobat Reader and Flash—have become two of the most widely used apps in the world, and cybercriminals go where the masses go. Cybercriminals will have a field day preying on people using Adobe software.
  3. This has been a record year for web-based threats and the fourth quarter finished with a bang. Startingin November we saw dangers on the web greatly increase, with phishing, continuous activity fromKoobface, many other Trojans and PUPs, and a sudden spike in suspicious domains registering duringthe week of December 20.Koobface activity has picked up considerably during the last half of the year. We have counted 41,582new unique variations in this quarter. And the increase in URLs that distribute Koobface shows no signof stopping. The methods have been so effective that we now see copycats making use of Koobfacetactics for distribution. We expect those attacks will increase as well.Koobfacespreads by delivering Facebook messages to people who are 'friends' of a Facebook user whose computer has already been infected. Upon receipt, the message directs the recipients to a third-party website, where they are prompted to download what is purported to be an update of the Adobe Flash player. If they download and execute the file, Koobface is able to infect their system. It can then commandeer the computer's search engine use and direct it to contaminated websites.Among the components downloaded by Koobface are a DNS filter program that blocks access to well known security websites and a proxy tool that enables the attackers to abuse the infected PC.Now let’s take a look at the geographic distribution of web threats—either on compromised machinesor on malicious servers and hosts. We found that North America continues to be the leader in hostingmalicious content, with Europe/Middle East/Africa in second place, surpassing Asia/Pacific. NorthAmerica finished first primarily due to the United States. In Europe, Germany leads, followed by theNetherlands and Italy. In Asia it’s no surprise that China is the chief host, followed by Russia and SouthKorea. Brazil is the top hosting country in Latin and South America, followed by Argentina.In North America spam URLs make up 41 percent of the total, followed by malicious sites and suspectedmalicious sites. Within Europe/Middle East/Africa, spam and phishing URLs each make up 31 percent ofthe total, with malicious sites filling out another 29 percent. This balance is similar in Latin and SouthAmerica, where we find 36 percent of the URLs associated with spam hosting, while 30 percent hostphishing sites, and 25 percent host other sorts of malicious websites. In Asia/Pacific, on the other hand,31 percent of the total is made up of questionable sites—those servers registered in such a way that thesite should be closely monitored. (We expect that figure to diminish due to the changes underway withtop-level domain registration in that region.) Spam URLs make up the next largest group at 29 percent,followed by malicious sites at 24 percent.