Spyware Statistics -- Whats New in May 2005?

Although statistics often is blamed for various deadly sins -- from being biased to being inaccurate -- there is nothing left to those who are anyhow connected with IT but to keep up with fresh data. Since spyware is literally ubiquitous, nobody who owns or uses a PC can say that it is none of his business. So general public also has to keep an eye on the news about spyware.

On May 3 Webroot Software, a privately held anti-spyware company based in Boulder, Colorado, released a comprehensive report on spyware, The State of Spyware Report, -- an in-depth review and analysis of the impact of spyware, adware and other types of unwanted software on consumers and enterprises.

The results of Spy Audit survey made by ISP Earthlink and Webroot Software are still fresh in memory of IT security experts. The study lasted for the whole last year; more than 4.6 million system scans were made in 2004. What's new in 2005?

"Industry experts suggest that these types of programs [i.e. spyware in general] may reside on up to 90 percent of all Internet-connected computers" that's the quote from the last year's Spy Audit survey. The first quarter of 2005, alas, confirmed these suggestions.

During Q1, 2005, 88% of scans made with Webroot's SpyAudit software found some form of unwanted program (Trojan, system monitor, cookie or adware) on consumers' computers. The majority (87%) of corporate PCs also had unwanted programs or cookies.

Excluding cookies, which are not such a serious problem as key logger programs or Trojan horses, more than 55% of corporate PCs contained unwanted programs. There were an average of 7.2 non-cookie infections per PC.

System monitors (key logger programs) were found in 7% cent of consumer and enterprise PCs scanned by Webroot's software. In Q4 2004 there were 19%. Trojan horse programs were found on 19% of consumer PCs and 7% of enterprise PCs, the same figures as in Q4 2004.

This year's State of Spyware Report data come from Webroot's SpyAudit results and from online research made by Phileas, Webroot's automated spyware research system. Phileas has identified 4,294 sites (with almost 90,000 pages) containing some form of spyware.

This report for the first quarter of 2005 entirely confirmed the concept that had become as clear as day in 2004 -- from being not much more than a nuisance for PC users, spyware turned into one of the major threats to information security.

Since the Internet has become a part of daily life and business, rapid growth of such kinds of cybercrime as identity theft and phishing endanger the whole society. Some types of spyware, namely software capable of stealing passwords, SSNs and other valuable information (keyloggers and keylogger-containing malware), certainly facilitate these crimes.

The complete report for Q1 2005 is available at http://www.webroot.com/stateofspyware (Registration is required) In the future an updated version of Webroot's State of Spyware Report will be released at the end of each quarter. Keep an eye on the news!

Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company that provides various solutions for information security. The company's R&D department created an innovative technology, which disables the very processes of information capturing -- keylogging, screenshoting, etc. Anti-keylogging software from Raytown Corporation, LLC doesn't detect spy programs or information-stealing Trojans one by one -- they all simply can't work.

Learn more -- visit the company's website http://www.anti-keyloggers.com

In The News:


pen paper and inkwell


cat break through


Can You Calculate Complex Financial Calculations?

Are you a whiz at calculating financial information? Not the... Read More

Spyware: What It Is and How to Combat It

Spyware is software or hardware installed on a computer without... Read More

RFID: Strengthen the Position for SAP; United States

SAP Inc., a global leader in client/server enterprise application software... Read More

Benefits of Integrating Online Chat Software with CRM

Customer Relationship Management (CRM) is a strategy and processes used... Read More

Fast Car Knoppix

Small can be beautiful! Working with Knoppix for the past... Read More

The XP Firewall Isnt Enough

You might think you don't need a firewall... Read More

Five Tips For A Great Software Demo

Whether you need to close a sale, gather end-user feedback,... Read More

Microsoft Great Plains: Data Conversion & Migration Scenarios ? Overview for Consultant

Microsoft Business Solutions Great Plains serves multiple industries in the... Read More

10 Ways to Learn a Software

Following tips help you to learn a software in lesser... Read More

Adware, What Is It?

Adware is a type of Spyware program that displays some... Read More

10 Programming Tips

(1) Avoid using the same variable again and again for... Read More

Windows x: Basic Windows ?Security? Issues

Language development computer: Computer-based method for aiding language development seems... Read More

Understanding XML Server

XML Server can be a Web Server that stores the... Read More

Microsoft Great Plains, Navision, Axapta ? Selection Considerations

During the years of our consulting practice, which comes back... Read More

Crystal Reports For Microsoft RMS ? Overview For Developer/Report Designer

If you are software developer or database administrator - we... Read More

OLAP, An Alternative Technology Over Spreadsheets

Are Spreadsheets Robbing your Enterprise of Competitive Advantage?'90% of "average"... Read More

Exactly What Does FTP Stand for and What Can it do for Me?

FTP stands for "file transfer protocol". FTP is basically a... Read More

Spyware Statistics -- Whats New in May 2005?

Although statistics often is blamed for various deadly sins --... Read More

PHP On-The-Fly!

IntroductionPHP can be used for a lot of different things,... Read More

Corporate ERP: Microsoft Great Plains For The Plant In Brazil ? Overview For CIO

Microsoft Business Solutions Great Plains as new ERP for multinational... Read More

Do You Want Your Own Fully Programmable ERP? - Part 1

We are in a transition phase in the Managerial Administration... Read More

Selecting Corporate ERP: Microsoft Business Solutions Great Plains ? Estimation Parameters

As we could imagine, if you are reading this article... Read More

Free Program Removes Spyware not Detected by Premium Security Scan

What is Spyware?Spyware monitors your surfing habits and sends the... Read More

Free PDF Publishing Software

In a previous article, I wrote about OpenOffice... Read More

Great Plains Accounting Migration to Microsoft Great Plains - Overview for IT Specialist

This is a short article, written in question/answer/FAQ style to... Read More

Assertion in Java

Assertion facility is added in J2SE 1.4. In order to... Read More

Great Plains Dynamics on Pervasive/Ctree support ? overview for consultant

All of us know that Microsoft bought former Great Plains... Read More

Great Plains Dexterity Programming ? Overview For Developer

Looks like Microsoft Great Plains becomes more and more popular,... Read More

Microsoft CRM Conversation Gateway: VoIP - Implementation & Customization

Microsoft CRM is winning market share step-by-step from such the... Read More

How to Tell You Have Spyware, Ad-ware or Viruses

Usually, the easiest way to tell you have spyware is... Read More

Microsoft Great Plains Implementation for Large Corporation ? Overview for VP IT

Microsoft Business Solutions Great Plains was historically designed to serve... Read More

Microsoft CRM Custom Design & Development: SDK, C#, SQL, Exchange, Integration, Crystal Reports

Microsoft CRM is new player on the CRM software... Read More

Introduction To ISDN, Part III: PAP

Introduction To ISDN, Part III: Configuring PPP PAP AuthenticationNow we... Read More