Expired security software are open invitation for Malware

Microsoft released research this week to prove the point in the most recent version of its Security Intelligence Report. They also highlighted the data in a blog entry from the MMPC (Microsoft Malware Protection Center).
The data in the report is collected from telemetry from the Malicious Software Removal Tool which runs each month with Windows Update. The MSRT collects the information from the Action Center API. 

Microsoft has defined the categories for the systems that are vulnerable for malware attacks. First category is that if users used anti-malware software and their trial period has been ended. Then their system is open for malware attack. The second category is if anti-malware in your system is disabled.
The third category is if the system has no anti-malware software installed.And the fourth category is the snoozed, that means the update is temperory. It can happen only if the user is not monitoring and it updated automatically. 
See the chart below, which is based on data from the second half of 2013
and the first half of 2014. The data is all for Windows 8 and 8.1 and
so shows an interesting effect: The percentage of systems with expired
anti-malware grows rapidly in the early months of 2013. Note that
Windows 8 became generally available in October 2012, so one would
expect the expirations to begin one month or later. The climb rapidly
and then peaks at 10.1 percent of all systems in August 2013. The number
has dropped some, but leveled off just below 10 percent.

There are some action taken in china related to Malware attacks when the Beijing police arrested three people who they suspected developed the “WireLurker” Malware that has infected the thousands of Apple users. 
The suspects developed WireLurker for illegal profit and then use an application store name Maiyadi for spreading the malware. 
360 Technology traced the malware back to Maiyadi, a Chinese site
devoted to Apple news that also offers downloads of iOS apps and Mac
In Ohio an financial analyst has been charge for installing the malware in his former company. Company named Eaton Corp. terminated his employment and on the same day he installed malware in the company’s system.
Malware spreads when users download an infected application and the connect external devices on that systems.

News from ZDNET

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

Security Against Hacks: A Simple Game of Economics

One of the cold hard truths behind cybersecurity is that it's impossible to prevent a hack 100% of the time. It only takes one...

Certain Things That You Must Know About Microsoft MS-500 Exam and Its Practice Tests

If you want to be a Microsoft 365 security administrator, then there would be a number of responsibilities that will fall on your shoulders,...

Quick Ways to Avoid Being Watched by the NSA’s PRISM Program

Big brother is on the watch online. Today, a week hardly passes without news of government spying, whistleblowers, cell phone hacking, or even private photos...

Android Post Exploitation: Exploit ADB using Ghost Framework in Kali Linux

This article is the part of Android Hacking tutorial; it covers step by step guide to exploit Android ADB to get the persistent connection...


Then sign up for FREE to the ehacking’s exclusive group. You will get the exclusive tips/tricks, tutorials, webinars & courses that I ONLY share with my fellow on this exclusive newsletter.