Skip to main content

U.S. Still Biggest Source of Malware

Computer security firm Sophos has released its Security Threat Report 2009 (PDF), summarizing the battle against malware and ticking off the top threats against computers, operating systems, Web sites, and consumers out there in the wild. And, despite massive increases in spam and malware that originate internationally, the United States still claims the top spot for hosting malware and sending spam. According to Sophos, some 37 percent of malware is hosted in the United States,. China (including Hong Kong) came in second at 27.7 percent and Russia ran a distant third at 9.1 percent.

Conversely, in 2007, China played host to more than half the world’s malware—although, to be sure, in 2007 the U.S. was a major malware host as well, accounting for 23.4 percent of the world’s malware hosting. A new upstart on the malware hosting scene is the Czech Republic, which now hosts just over 1 percent of the world’s malware.

Recommended Videos

Sophos also notes a tremendous increase in threats delivered to users as email attachments, with the number of threats delivered as email attachments increasing five-fold during the course of 2008. @008 also saw an increase in "scareware," sites and applications which attempted to trick visitors and users into purchasing bogus computer security software…which, in turn, often compromised their systems.

On the positive side, Sophos notes that the shutdown of spam-friendly hosting companies Atrivo, ESTDomains, and (especially) McColo have had a substantial impact global spam levels, with the shutdown of McColo having a larger impact than any spammer arrest made by authorities. Although spam levels are still lower than they were before the McColo shutdown, most industry watchers see these gains as temporary as scammers shift to new harbors.

And how much mail was spam in 2008? According to Sophos, some 97 percent of all email received by businesses was spam.

Geoff Duncan
Former Digital Trends Contributor
Geoff Duncan writes, programs, edits, plays music, and delights in making software misbehave. He's probably the only member…
As ransomware hits this U.S. hospital, lives could be at risk
The CommonSpirit Health’s logo appears over the silhouette of a hacker.

A large U.S. hospital chain has been suffering from a serious security breach that has led to its computer records being taken offline. What seems to be a ransomware attack could be affecting the quality of health care provided, possibly even putting lives at risk.
According to the industry-focused news site HealthCareDive, the attack was described as an IT incident by CommonSpirit Health and reported on October 3, 2022. This is a huge hospital chain with 1,000 care sites and 140 hospitals nationwide so thousands of patients are affected. The current solution, according to a statement on CommonSpirit Health’s website, has been to take certain systems offline.

Like the rest of us, doctors and nurses are accustomed to the technology of the 21st century and have come to rely on computer records to take care of patients, plan care options, and organize data. Reverting to paper in an already hectic healthcare system must make the job torturous. We'll never know how many critical details slip through the cracks during a busy day.

Read more
Nreal’s Air AR glasses head to the U.S., ready to rock with iPhones
Nreal Air AR glasses

Nreal is bringing its augmented reality (AR) glasses to the U.S., and this time the company is porting over all that immersive fun to the iOS ecosystem. The Nreal Air, which have been available in the U.K. since May, carry a price tag of $379 and will be available via Amazon and authorized retail outlets starting today.

The Nreal Air is a watered-down version of the Light AR glasses, but the package is still quite compelling for the asking price. Rocking a more consumer-friendly wayfarer design similar to Facebook’s Ray-Ban Stories, the Nreal Air feature an OLED display offering an effective resolution of 3840 x 1080, the same as the pricier Light version.

Read more
Hackers are using fake WordPress DDoS pages to launch malware
A digital depiction of a laptop being hacked by a hacker.

Hackers are pushing the distribution of dangerous malware via WordPress websites through bogus Cloudflare distributed denial of service (DDoS) protection pages, a new report has found.

As reported by PCMag and Bleeping Computer, websites based on the WordPress format are being hacked by threat actors, with NetSupport RAT and a password-stealing trojan (RaccoonStealer) being installed if victims fall for the trick.

Read more