How do you perform on a test that explores whether you're vulnerable to common viruses?

How are we testing?:

We use the older Zbot virus, an infamous strain that once targeted many commercial and retail banks, stealing millions of dollars. Our test only downloads enough data to trigger your network security system; it stops the virus download before it can infect your system. All anti-virus engines should detect and block this common virus at the network level or at the endpoint, even when delivered from a trusted or unknown CDN.


Why is this test important?:

Most websites, good and bad, are hosted on content delivery networks. Inline anti-virus engines using ICAP are typically setup to look only at selected content - and rarely inspect any content that is coming from a known content delivery network. Criminals take advantage of this setup by compromising legitimate websites as a way around security solutions. Without inline protection inspecting all traffic, including that from 'trusted' content delivery networks, your users are vulnerable to even old, common internet threats.


Take our security preview now

Viruses Now Demand 'Ransom'

Viruses are software malicious programs performing unauthorized functions on your devices. In 2014, a virus called Cryptolocker, one of the early Ransomware variants, extorted more than 400,000 people by encrypting their files until they paid $300 to get them back. Even with a small percentage of ransoms paid, the criminals still earned more than $4 million.Source

In the News:

Popular Antivirus Program Mistakenly IDs Windows as a Threat, Creating Chaos - NBCNews.com

25 Apr 2017
An antivirus service used by tens of thousands of businesses and millions of home users shut down an untold number of computers around the world after it mistakenly identified core parts of Microsoft Windows as threats, the company confirmed Tuesday.

Spam email virus hijacking Microsoft Word attachments: Fix expected on Tuesday - Cache Valley Daily

10 Apr 2017
Researchers with cyber security firm FireEye, say the Microsoft Word threat begins with an email infected with a malicious “booby-trapped” document. Once the file is opened, it downloads harmful computer code from “different well-known malware families.

How to Secure Your Business from Computer Viruses - BusinessZone (blog)

09 Apr 2017
The term computer virus is no new for today's era. The threat of Viruses and spyware, breaching/devastating our important information has made its space deep inside with the growing IoT. According to a recently released report by 2020, approximately ...

More »

LEADERS SELECT LEADERS