Get on-the-go access to the latest insights featured on our Trustworthy Computing blogs.
Since 2006, we have released ten volumes of the Security Intelligence Report, providing customers with unparalleled insight into the software threat landscape and guidance to better protect themselves. The threat landscape has changed significantly during those years with advancements in security and privacy technology and general awareness of cybercrime. However, cybercriminals have gotten more sophisticated and continue to evolve their attack methods.
Today's release of Microsoft's Security Intelligence Report volume 10 is our most comprehensive global threat report to date, with in-depth regional threat intelligence for 117 countries based on data from more than 600 million machines worldwide. The report highlights a polarization of cybercriminal behavior and an increasing trend of cybercriminals using "marketing-like" approaches and deception methods to target consumers.
Across the threat landscape, we see a definite polarization in terms of criminal behavior. On one side are a small number of sophisticated criminals, whose motives vary from large payoffs to targeted attacks. These attackers may have special intelligence about a target's environment, use customized social engineering to trick the intended victims, or exploit newly-discovered vulnerabilities in software to compromise networks and systems.
On the other side, there are those who leverage more accessible attack methods, in some cases originally created by the more skilled cybercriminals, along with social engineering to take a small amount of money from a large number of people. Social engineering tactics include fooling people with rogue security software that pose as legitimate protection products, impersonating friends to steal passwords to online gaming accounts, conducting phishing using social networking as the lure, and tricking users to download adware.
From the latest report, we see these attacks being run like marketing campaigns and fake product promotions, especially during significant events that generate a lot of media attention. In the report, there are some key data points that indicate these tactics are on the rise:
Advancements in security and general awareness of threats have a positive impact in protecting the broader online community. According to the National Vulnerability Database, vulnerability disclosures (counted by CVE) in 2010 across the industry are down 16.5 percent from 2009. Additionally, we continue to see that newer products are less susceptible to attack – computers running Windows 7 and Windows Server 2008 R2 showed the lowest infection rates. Overall, machines with more recent and complete service packs installed fared better than those with earlier versions. It's also notable that Windows 7 operating systems are infected only about half as often as Vista, and Vista half as often as Windows XP. This data emphasizes the importance of upgrading to the latest software.
Finally, I am pleased to see the rapid the adoption of Microsoft Security Essentials, which surpassed 30 million active subscribers after one year of availability. It continues to grow. This demonstrates a continued proactive approach to security, and we're proud to welcome all these MSE users to our global family.
We continue to advance our security processes, technologies and resources to keep customers protected from the changing threat landscape. However, we know this cannot be done alone. Through collective efforts – such as the sharing of threat intelligence and guidance, software providers making advancements in security protections and customers keeping their systems up to date - we can help minimize cybercrime and create a safer, more trusted computing experience for everyone.
- Vinny Gullotto General Manager, Microsoft Malware Protection Center