How to Protect Business From Malware at the Endpoint and the Perimeter
Source: Webroot Software
Financial motives are triggering a massive explosion of malware variants and spam designed to evade traditional signature-based detection mechanisms. In the early days, it was all about the destructive nature of virus. Today, however, IT management must contend with highly sophisticated spyware. Keyloggers, rootkits and Trojans are the fundamental building blocks of third generation malware that is delivered via spam and infected Web sites. The number of possible variants created for this malware is unlimited and is contributing to exponential growth that is clogging both computers and networks. Computers running slower than usual, rapidly shrinking free space on the hard disk, slower Internet connection due to increased network traffic, or applications starting themselves could be signs of an infection.