This gallery offers insights into the consumer security industry, the Freemium business model, details some of the current trends within the antivirus industry, and explains the Avast! Antivirus business model, user demographics and market share.
Latest from Dancho Danchev
With Avast! Antivirus 5.1 scheduled for release in Q4, 2010, the following slides offer a perspective into some of the new features, and improvements to be introduced in version 5.1.
With over 100 million users internationally, Avast! Antivirus reliance on the Freemium business model, has offered the company an unprecedented opportunity for a cost-effective worldwide market penetration. At a recent PR event in Prague, the Czech Republic, Avast! executives explained this business model, and offered insights into some of the current trends within the antivirus market.
June's cyber threat landscape gallery, features images from the malware, spam, phishing and crimeware campaigns that took place during the month. See also: Image Gallery: April's cyber threat landscape
Facebook phishing campaigns serving ZeuS crimeware, new Mac OS X malware variant, yet another cyber espionage network exposed, next to several reports detailing Opt-In botnets and how outdated vulnerabilities drive the growth of cybercrime - April, 2010 was a busy month for the security community.
In need of a fresh example that cybercriminals are actively looking for ways to monetize infected Mac OS X hosts? Early-stage discussions at several web forums, including a PoC (proof of concept, source code included) as well as the following potential layouts speak for themselves.Read the article: Mac OS X SMS ransomware - hype or real threat?
The gang behind the Koobface botnet is periodically updating the template it relies on for infecting new years. Here are some of the most popular ones introduced by the gang throughout the year.
Taking into consideration the fact that 99% of ongoing scareware campaigns rely on "visual social engineering", this gallery presents some of the most popular templates used by cybercrime gangs in an attempt to trick the end user into installing the fake security software.
This gallery offers an inside view of those "beneath the radar" botnets that never make the news. The images have been collected throughout the past year by using open source intelligence, namely, by either joining the command and control IRC channel upon infection, or monitoring ongoing communications between the botnet masters.If you ever wanted to take an inside view of targeted-botnets primarily run by novice cybercriminals sometimes utilizing outdated, but very effective methods - this gallery is for you.