Upload
elon
View
47
Download
0
Tags:
Embed Size (px)
DESCRIPTION
Security Trends and Update—The Microsoft Security Intelligence Report v7. Joanie Rhine Senior Security Technology Specialist Microsoft Corporation [email protected]. Security Intelligence Report (SIR). - PowerPoint PPT Presentation
Citation preview
Vulnerability disclosures for Microsoft and non-Microsoft products, 1H04-1H09
Non-Microsoft
Microsoft
Operating system, browser & application vulnerabilities as a percentage of all disclosures, 1H04-1H09
Responsible disclosures as a percentage of all disclosures involving Microsoft software, 1H05-1H09
Number of computers cleaned for every 1,000 MSRT executions, by operating system, 1H09
Computers cleaned by threat category, in percentages, 2H06-1H09
FamilyFamily Most Significant CategoryMost Significant Category 1H091H09 2H082H08
1 Win32/Conficker Worms 5,217,862 3,719
2 Win32/Taterf Worms 4,911,865 1,916,446
3 Win32/Renos Trojan Downloaders & Droppers 3,323,198 4,371,508
4 Win32/ZangoSearchAssistant Adware 2,933,627 3,326,275
5 Win32/Frethog Password Stealers & Monitoring Tools 2,754,226 1,037,451
6 Win32/FakeXPA Miscellaneous Trojans 2,384,497 1,691,393
7 Win32/Vundo Miscellaneous Trojans 2,119,606 3,635,207
8 Win32/Alureon Miscellaneous Trojans 1,976,735 510,281
9 Win32/ZangoShoppingReports Adware 1,412,476 1,752,252
10 Win32/Agent Miscellaneous Trojans 1,361,667 1,289,178
Top 15 malware and potentially unwanted software families detected by Microsoft anti-malware desktop products worldwide, by number of unique infected computers, in 1H09
Usage of Windows Update and Microsoft Update, 2H06-1H09, indexed to 2H06 total usage
Daily Windows error reports caused by Win32/Renos on Windows Vista computers in February and March 2007
Percentage of incoming messages blocked by FOPE using edge-blocking and content filtering, 1H06-1H09
Inbound messages blocked by FOPE content filters, by category, in 1H09
Geographic origins of spam, by percentage of total spam sent, in 1H09
Outbound spam sent through FOPE, by type of organization, in 1H09
Phishing impressions tracked each month in 2H08 and 1H09, indexed to January 2009
Impressions for each type of phishing site each month in 1H09
Browser-based exploits targeting Microsoft and third-party software on computers running Windows XP in1H09
Browser-based exploits targeting Microsoft and third-party software on computers running Windows Vista in 1H09
The 10 browser-based vulnerabilities exploited most often on computers running Windows XP, by percentage of all exploits in 1H09
The 10 browser-based vulnerabilities exploited most often on computers running Windows Vista, by percentage of all exploits in1H09
Security breach incidents, by incident type, 2H07 – 1H09
High quality consumer AV protection for Genuine Windows PCs available at no cost
High QualityHigh Quality QuietQuiet
Trusted downloadTrusted download
No registrationNo registration
No trial conversions or No trial conversions or expirationsexpirations
Automatic updatesAutomatic updates
Simple user interfaceSimple user interface
Easy to get, Easy to get, Easy to useEasy to use
Runs in the backgroundRuns in the backgroundSmart scheduling and Smart scheduling and resource utilization resource utilization
Lightweight designLightweight design
Limited impact on PC Limited impact on PC performanceperformance
Real-time protectionReal-time protection
Industry certifiedIndustry certified
Same AV/AM engine Same AV/AM engine trusted by enterprisestrusted by enterprises
Broad network of PCs Broad network of PCs providing telemetryproviding telemetry
Backed by Microsoft Backed by Microsoft Security Response CenterSecurity Response Center