Spyware Statistics -- Whats New in May 2005?

Although statistics often is blamed for various deadly sins -- from being biased to being inaccurate -- there is nothing left to those who are anyhow connected with IT but to keep up with fresh data. Since spyware is literally ubiquitous, nobody who owns or uses a PC can say that it is none of his business. So general public also has to keep an eye on the news about spyware.

On May 3 Webroot Software, a privately held anti-spyware company based in Boulder, Colorado, released a comprehensive report on spyware, The State of Spyware Report, -- an in-depth review and analysis of the impact of spyware, adware and other types of unwanted software on consumers and enterprises.

The results of Spy Audit survey made by ISP Earthlink and Webroot Software are still fresh in memory of IT security experts. The study lasted for the whole last year; more than 4.6 million system scans were made in 2004. What's new in 2005?

"Industry experts suggest that these types of programs [i.e. spyware in general] may reside on up to 90 percent of all Internet-connected computers" that's the quote from the last year's Spy Audit survey. The first quarter of 2005, alas, confirmed these suggestions.

During Q1, 2005, 88% of scans made with Webroot's SpyAudit software found some form of unwanted program (Trojan, system monitor, cookie or adware) on consumers' computers. The majority (87%) of corporate PCs also had unwanted programs or cookies.

Excluding cookies, which are not such a serious problem as key logger programs or Trojan horses, more than 55% of corporate PCs contained unwanted programs. There were an average of 7.2 non-cookie infections per PC.

System monitors (key logger programs) were found in 7% cent of consumer and enterprise PCs scanned by Webroot's software. In Q4 2004 there were 19%. Trojan horse programs were found on 19% of consumer PCs and 7% of enterprise PCs, the same figures as in Q4 2004.

This year's State of Spyware Report data come from Webroot's SpyAudit results and from online research made by Phileas, Webroot's automated spyware research system. Phileas has identified 4,294 sites (with almost 90,000 pages) containing some form of spyware.

This report for the first quarter of 2005 entirely confirmed the concept that had become as clear as day in 2004 -- from being not much more than a nuisance for PC users, spyware turned into one of the major threats to information security.

Since the Internet has become a part of daily life and business, rapid growth of such kinds of cybercrime as identity theft and phishing endanger the whole society. Some types of spyware, namely software capable of stealing passwords, SSNs and other valuable information (keyloggers and keylogger-containing malware), certainly facilitate these crimes.

The complete report for Q1 2005 is available at http://www.webroot.com/stateofspyware (Registration is required) In the future an updated version of Webroot's State of Spyware Report will be released at the end of each quarter. Keep an eye on the news!

Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company that provides various solutions for information security. The company's R&D department created an innovative technology, which disables the very processes of information capturing -- keylogging, screenshoting, etc. Anti-keylogging software from Raytown Corporation, LLC doesn't detect spy programs or information-stealing Trojans one by one -- they all simply can't work.

Learn more -- visit the company's website http://www.anti-keyloggers.com

spotless home service Buffalo Grove ...
In The News:

New research shows Americans increasingly trust AI for wellness guidance over social media, with 63% finding artificial intelligence reliable for health.
Luxury fashion brand Dior experienced a January 2025 data breach affecting customer personal information, and notifications were sent months after the discovery.
The commercial Unitree H1 humanoid robot weighs 104 pounds with 365 pound-feet torque per joint and demonstrates dangerous potential when software glitches occur.
Americans average 10-plus hours online daily, according to recent survey, splitting time between streaming shows on TV and browsing websites on multiple devices.
Boost your smartphone privacy instantly with these security tweaks for iPhone and Android that limit ad tracking, hide notifications and prevent unauthorized access.
Platforms like Hoax Tech and JS Click Cloaker help cybercriminals bypass detection systems using machine learning to selectively display scam content to victims.
A new battery recycling technique transforms old lithium-ion batteries into high-performance components that retain 88% capacity after 500 cycles with minimal waste.
Google's Android operating system can warn users about earthquakes before the shaking even begins – and there are ways to do it on your iPhone, too.
Meta's new gesture control wristband might just be the most seamless way to control a computer yet. And no, it doesn't require surgery, a camera, or even a touchscreen. All it needs is your wrist.
Long-haul trucks are now being upgraded with a surprising twist, thanks to California-based startup Revoy. Their electric boost doesn't replace diesel but works alongside it to cut emissions and fuel costs without major disruption.
PayPal and Venmo just rolled out something big: AI-powered scam alerts for Friends and Family payments.
As data centers multiply across the United States, energy demand is increasing at a rapid pace. This has not escaped the notice of large investment firms from Wall Street.
The Unicode Consortium, the nonprofit organization that maintains the Unicode Standard to ensure emojis work across devices, has announced Unicode 17.0, which includes nine new emojis slated for release this fall, in September 2025.
OpenAI is one of the world's leading AI research labs. Founded in 2015, it's behind some of today's most talked-about tools, including GPT, DALL·E, and ChatGPT.
Ever catch your dog staring at the screen during movie night and wonder if they're actually watching? Turns out, they might be. A new scientific study from Auburn University found that many dogs really do engage with television, and not all pups react the same way.
Stop the scammers from making contact in the first place. They're getting your parents' contact information and much more personal data besides, from somewhere.
The Walker S2 robot from UBTech autonomously exchanges its batteries in just three minutes, allowing continuous operation in car factories operated by BYD, Nio and Zeekr.
The FX Super One electric MPV from Faraday Future offers flexible seating, zero-gravity recliners and an AI system that creates a personal connection between driver and vehicle.
Practical solutions for reducing unwanted charity mail, political texts and email spam by opting out of shared lists, replying "STOP" and using data removal services.
Delta's new AI pricing system eliminates static airfares for personalized rates based on individual data, raising questions about fairness while promising optimized revenue.
AI data centers are straining the power grid across 13 states, contributing to a $9 billion increase in electricity costs, and PJM customers face monthly bill increases of $25 or more.
Artificial intelligence is transforming the music industry as AI-generated bands like The Velvet Sundown earn substantial streaming revenue, prompting lawsuits from major record labels.
Microsoft phishing scams use fake security alerts and links that redirect to credential-stealing pages with warning signs, including urgent language and unusual senders.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Tesla vehicles manufactured since mid-2021 with AMD Ryzen processors can now access Grok 4, xAI's witty conversational assistant designed to make drives more engaging.

Does Microsoft have any real competition?

Does Microsoft Have any Real Competition? Copyright (c) 2003 Gregory... Read More

Microsoft CRM in Latin America: Implementation, Customization, Support ? Overview for Consultant

Microsoft Business Solutions CRM is present several years on the... Read More

Software Automation Helps Increase your Bottom Line

When you own a small business, time is money. And... Read More

Microsoft Navision Database Selection: C/SIDE or MS SQL Server - Overview For IT Specialist

There are certain pluses and minuses in both cases and... Read More

An Easy Way to Deal with Email Viruses and Worms

If you feel intimidated when someone tries to teach you... Read More

Instant Messenger Clients

If you have been using the Internet for any amount... Read More

MicroWorld Releases New Version of MailScan Ver. 4.5 - Antivirus and Content Security Software

MicroWorld Technologies, Inc. the leading solutions provider in the area... Read More

C++ Tutorial 2, Input and Variables

This is the tutorial where we really get into programming.... Read More

What To Do When Windows Wont Boot

When Windows fails to boot it is normally caused by... Read More

10 Programming Tips

(1) Avoid using the same variable again and again for... Read More

MultiNational Corporation ERP Implementation ? Microsoft Business Solutions Great Plains

If you look back to the history, you will see... Read More

Adware and Spyware Blockers

The most important things you can do for your computer... Read More

Oracle Development: JDeveloper 10G ? Java, J2EE, EJB, MVC, XML - Overview For Programmer

In 2004 Oracle, Inc. made its new step toward J2EE... Read More

Microsoft Great Plains Data Conversion ? Overview For Developer

Looks like Microsoft Great Plains becomes more and more popular,... Read More

Microsoft Great Plains FA: Fixed Assets ? Overview For Consultant

Great Plains Fixed Assets Management module is a robust tool... Read More

Microsoft Retail Management System (RMS) SQL Customization ? Overview for Programmer

Microsoft Retail Management System serves retail single store as well... Read More

Rapid Application Development - Is it Really a Need of Today?

Rapid Application Development (RAD) is a software development methodology. In... Read More

Dreamweaver vs FrontPage

There are two major WYSIWYG(What You See Is What You... Read More

Microsoft Axapta, Navision or Great Plains: ERP Selection for Large Corporation

If you would like to pick something from Microsoft, or... Read More

Microsoft Great Plains implementation: Restaurants Supply Chain Management Example

Microsoft Great Plains serves majority of US based horizontal and... Read More

Microsoft CRM ? Typical Customizations

Microsoft CRM was designed to be easily customizable. Microsoft CRM... Read More

Microsoft CRM Programming Secrets ? Tips For Developers

This article is for advanced Microsoft CRM SDK C# developers.... Read More

Beware of Spyware

One day, you suddenly realize that your computer started to... Read More

Implementing ERP for Large Publicly Traded Corporation ? Microsoft Great Plains

We would like first emphasize the change in the paradigm.... Read More

Online PowerPoint Presentation ? Convert PowerPoint to Flash

Although we don't know whether Microsoft ever envisioned such a... Read More

full-service cleaning Park Ridge ...