{"id":17402,"date":"2015-03-03T13:00:19","date_gmt":"2015-03-03T20:00:19","guid":{"rendered":"https://www.webroot.com/blog/?p=17402"},"modified":"2018-01-30T13:16:00","modified_gmt":"2018-01-30T20:16:00","slug":"threat-landscape-expanding-ready","status":"publish","type":"post","link":"https://www.webroot.com/blog/2015\/03\/03\/threat-landscape-expanding-ready\/","title":{"rendered":"The Threat Landscape is Expanding. Are You Ready for it?"},"content":{"rendered":"<p><em>This blog is syndicated from the LabTech Software Blog:\u00a0<a href=\"http:\/\/www.labtechsoftware.com\/blog\/antivirus-and-anti-malware-tips\/\" target=\"_blank\">http:\/\/www.labtechsoftware.com\/blog\/antivirus-and-anti-malware-tips\/<\/a><\/em><\/p>\n<p>Think your clients are covered? Think again.<\/p>\n<p>This year\u2019s epic flu season isn\u2019t relegated to humans alone. The burgeoning threat landscape is better equipped than ever before to take your clients down\u2014or at the very least lighten their wallets.<\/p>\n<p>Oftentimes, clients are satisfied to keep running on last year\u2019s version of an <a href=\"http:\/\/www.labtechsoftware.com\/blog\/4-essentials-choosing-right-antivirus-solution\/\" target=\"_blank\">antivirus solution<\/a>. It saves money and is more or less the same thing, right? Wrong. The landscape is evolving, and last year\u2019s solution won\u2019t defend against this year\u2019s threats.<\/p>\n<p>Take phishing, for instance. It\u2019s a lucrative activity. Millions of people collectively lose <a href=\"http:\/\/threatsim.com\/2013\/02\/21\/1-5-billion-lost-due-phishing-2012-tip-iceberg\/\" target=\"_blank\">$1.5 billion<\/a>per year by falling victim to phishing scams.<span id=\"more-1204\"><\/span><\/p>\n<p>It\u2019s the hope of getting a piece of that growing pie that keeps hordes of hackers working around the clock to develop the next big scam. As threats evolve, your solutions have to evolve with them.<\/p>\n<p>Every antivirus solution has an expiration date. Like spoiled milk, last year\u2019s solution isn\u2019t going to deliver the results you\u2019re looking for. You must <a href=\"http:\/\/www.labtechsoftware.com\/blog\/migrating-clients-managed-antivirus\/\" target=\"_blank\">routinely update and refresh your solutions<\/a> if you want to keep clients safe.<\/p>\n<h3>Why Your Clients Are Saying \u2018Yes\u2019 To Malware<\/h3>\n<p>Malware is cleverly disguising itself as routine software updates, so more often than not, clients opt in to infections without even knowing it. These silent threats masquerade as Adobe Reader updates, virus scans, and seemingly harmless error messages.<\/p>\n<p>As if that weren\u2019t bad enough, these menaces are getting more complex. Advanced social engineering methods are spawning additive infection vectors. This means that multiple pieces of malware work in tandem to ensure the client\u2019s end point is fully compromised and exploited.<\/p>\n<h3>What You Need to Know to Offer the Best Protection<\/h3>\n<p>We will walk through four of the latest and most notorious\u00a0infectors used by malware authors\u00a0to gain access to the endpoint.\u00a0We\u2019ll wrap up with key features\u00a0of a winning antivirus\/anti-malware solution\u00a0so\u00a0you\u2019re prepared to defend against even the most cunning of tactics.<\/p>\n<p><strong>1) Advanced Keylogging Crushers. <\/strong>We\u2019re all familiar with keyloggers. And while they might sound old school, they\u2019re still evolving and sneaking through firewalls undetected.<\/p>\n<ul>\n<li><strong>Culprit: Zeus Malware. <\/strong>This keylogging troublemaker is a Trojan that runs on Microsoft operating systems. It sneaks past users in the form of a familiar Adobe Reader or Flash upgrade, and it captures everything the client types until it\u2019s removed.<\/li>\n<\/ul>\n<ul>\n<li><strong>Must-Have: <\/strong>To keep keyloggers at bay, look for a dynamic antivirus\/anti-malware solution that can penetrate and neutralize multi-layer attacks. Threats aren\u2019t one-dimensional anymore, and your client\u2019s virtual protection shouldn\u2019t be either.<\/li>\n<\/ul>\n<p><strong>2) Rogue Anti-Malware Slayers.<\/strong> Also known as \u2018rogues\u2019 or \u2018FakeAV,\u2019 these threats target inexperienced users. As the names imply, these scams masquerade as antivirus solutions.<\/p>\n<ul>\n<li><strong>Culprits: Countless Fake Antivirus Popups. <\/strong>While the names vary, the effects are the same. These threats have evolved by developing more realistic graphical user interfaces (GUIs) and \u2018action center windows\u2019 that are completely interactive and look legit to the untrained eye. If clients click through, they\u2019re asked to submit payment information, which is then sold to the highest bidder on sites like CVV2s.in and crackhackforum.com.<\/li>\n<\/ul>\n<ul>\n<li><strong>Must-Have: <\/strong>Since this is a long-standing scam, you\u2019ll want an antivirus solution that updates its FakeAV index as frequently as possible. There will always be new ones popping up, so you\u2019ll want to partner with a vendor who is committed to keeping their code current.<\/li>\n<\/ul>\n<p><strong>3) Powelik Pluggers.<\/strong> These threats hide in registries and silently pilfer client information. They can\u2019t easily be caught by scanners because they don\u2019t register as files.<\/p>\n<ul>\n<li><strong>Culprit: Any Number of Vicious Malwares. <\/strong>This type of attack is probably the worst because it keeps coming back. The malware embeds itself so deeply in the system and evolves and updates the way it exploits so quickly that anything but the latest anti-malware solution will leave your clients out in the cold.<\/li>\n<\/ul>\n<ul>\n<li><strong>Must-Have:<\/strong> The best defense here is a good offense. Once infected, it\u2019s extremely challenging to completely remove the threat. By having a solid anti-malware solution in place that prevents the infection in the first place, your clients will be much better off in the long run.<\/li>\n<\/ul>\n<p>Wondering where the fourth threat is? The <strong><em>Malware and the Modern Threat Landscape<\/em><\/strong> eBook holds the answer. Download it below!<\/p>\n<p><a href=\"http:\/\/www.labtechsoftware.com\/ebook-modern-threat-landscape.php?utm_content=021215&amp;utm_term=webrootblog\"><img decoding=\"async\" loading=\"lazy\" class=\" size-full wp-image-17403 aligncenter\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2015\/03\/3-3-2015-12-23-06-PM.png\" alt=\"3-3-2015 12-23-06 PM\" width=\"623\" height=\"233\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This blog is syndicated from the LabTech Software Blog:\u00a0http:\/\/www.labtechsoftware.com\/blog\/antivirus-and-anti-malware-tips\/ Think your clients are covered? Think again. This year\u2019s epic flu season isn\u2019t relegated to humans alone. The burgeoning threat landscape is better equipped than ever before to take your clients down\u2014or at the very least lighten their wallets. Oftentimes, clients are satisfied to keep running [&hellip;]<\/p>\n","protected":false},"author":21,"featured_media":17404,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[4787,18349,18343,4811,18337,18341,4321,3949,13345,3477,18347,5795,17771,3569,6701,3481,6517,3471,18345,18339],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/17402"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=17402"}],"version-history":[{"count":3,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/17402\/revisions"}],"predecessor-version":[{"id":17407,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/17402\/revisions\/17407"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17404"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=17402"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=17402"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=17402"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=17402"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}