https://www.channelfutures.com/wp-content/themes/channelfutures_child/assets/images/logo/footer-new-logo.png
  • Home
  • Technologies
    • Back
    • Analytics
    • Artificial Intelligence
    • Cloud
    • Data Centers
    • Desktop
    • IoT
    • Mobility
    • Networking
    • Open Source
    • RMM/PSA
    • Security
    • Virtualization
    • Voice/Connectivity
  • Strategy
    • Back
    • Best Practices
    • Business Models
    • Channel 101
    • Channel Programs
    • Channel Research
    • Digital Transformation
    • Diversity & Inclusion
    • Leadership
    • Mergers and Acquisitions
    • Sales & Marketing
    • Specialty Practices
  • MSSP Insider
    • Back
    • Business of Security
    • Cloud and Edge
    • Endpoint
    • Network
    • People and Careers
    • Training and Policies
  • MSP 501
    • Back
    • 2020 MSP 501 Rankings
    • 2020 Hot 101 Rankings
    • 2020 MSP 501 Report
  • Intelligence
    • Back
    • Our Sponsors
    • From the Industry
    • Content Resources
    • COVID-19 Partner Help
    • Galleries
    • Podcasts
    • Reports
    • Videos
    • Webinars
    • White Papers
  • EMEA
  • Awards
    • Back
    • Excellence in Digital Services
    • 2020 MSP 501
    • Top Gun 51
  • Events
    • Back
    • CP Conference & Expo
    • Channel Partners Evolution
    • Channel Evolution Europe
    • Channel Partners Event Coverage
    • Webinars
  • Channel Mentor
    • Back
    • Channel Market Intelligence
    • Channel Educational Series
Channel Futures
  • NEWSLETTER
  • Home
  • Technologies
    • Back
    • Analytics
    • Artificial Intelligence
    • Cloud
    • Data Centers
    • Desktop
    • IoT
    • Mobility
    • Networking
    • Open Source
    • RMM/PSA
    • Security
    • Virtualization
    • Voice/Connectivity
  • Strategy
    • Back
    • Best Practices
    • Business Models
    • Channel 101
    • Channel Programs
    • Channel Research
    • Digital Transformation
    • Diversity & Inclusion
    • Leadership
    • Mergers and Acquisitions
    • Sales & Marketing
    • Specialty Practices
  • MSSP Insider
    • Back
    • Business of Security
    • Cloud and Edge
    • Endpoint
    • Network
    • People and Careers
    • Training and Policies
  • MSP 501
    • Back
    • 2020 MSP 501 Rankings
    • 2020 Hot 101 Rankings
    • 2020 MSP 501 Report
  • Intelligence
    • Back
    • Our Sponsors
    • From the Industry
    • Content Resources
    • COVID-19 Partner Help
    • Galleries
    • Podcasts
    • Reports
    • Videos
    • Webinars
    • White Papers
  • EMEA
  • Awards
    • Back
    • Excellence in Digital Services
    • 2020 MSP 501
    • Top Gun 51
  • Events
    • Back
    • CP Conference & Expo
    • Channel Partners Evolution
    • Channel Evolution Europe
    • Channel Partners Event Coverage
    • Webinars
  • Channel Mentor
    • Back
    • Channel Market Intelligence
    • Channel Educational Series
    • Newsletter
  • REGISTER
  • MSPs
  • VARs / SIs
  • Digital Service Providers
  • Cloud Service Providers
  • CHANNEL PARTNERS ONLINE
 Channel Futures

From the Industry


Sponsor Content

Webroot survey

Five Key Things Webroot Learned in Its 2018 Cybersecurity Threat Report

  • April 20, 2018
Here are a handful of the most important trends we saw emerge over the course of 2017, and what they may mean for the year ahead.

A team of Webroot analysts and threat researchers recently put the finishing touches on an annual report examining some of the most salient cyber threat trends to emerge in 2017, plus a few predictions for the year ahead. Given the more than 40 million licensed endpoints we protect–and a threat intelligence platform capable of integrating information from billions of URLs, domains, IP addresses, files and mobile apps–Webroot has no shortage of data to analyze when it comes to interpreting an ever-shifting threat landscape.

Here are a handful of the most important trends we saw emerge over the course of 2017, and what they may mean for the year ahead.

1. Ransomware on a Rampage

Ransomware ruled in 2017. Two attacks in particular, WannaCry and NotPetya, infected more than 200,000 devices in more than 100 countries for more than $4 billion in losses. All in under 24 hours. While both attacks were cited by cybersecurity experts as among the most damaging in history, NotPetya was especially wicked in its intent to damage infrastructure, as well as extort its victims. Ransomware, especially when it’s widespread and successful, tends to grab headlines. After a series of high-profile instances in a still-young 2018, it’s bound to continue as a favored tool of hackers in the year ahead.

Spam email campaigns have long been a favorite delivery mechanism for hackers. To find out about the new strategy gaining favor among cybercriminals, check out the full report. 

2. Users Are Taking the Bait on Phishing Attacks

A report released by Verizon in 2017 contained some shocking statistics concerning success rates for phishing attacks. Webroot’s research points to why. While more than 1.5 million phishing attacks were carried out over the course of the year, most of the sites they directed were live for no more than eight hours. IP masking and frequently changing domain names to evade static lists were favored techniques for covering hackers’ tracks, reminding us that static lists are all but completely ineffective at protecting against phishing attacks and that user education is increasingly important for successful threat prevention.

Want to know why Webroot isn’t celebrating another year of decline in the average number of malware files per device? Read the full report to find out.

3. Same Malware, Many Forms: Polymorphism is Here to Stay

Static lists were once the preferred method of keeping known malicious files from being downloaded onto machines. But polymorphism’s popularity has retired static lists as a workable way of defending against malware. Tiny variations in malware binaries, ones that otherwise do not change their core functions, now prevent now these lists from reliably filtering out threats. Of the hundreds of millions of executable files Webroot analyzes each year, all but 6% of malicious executables were polymorphic. This serves to reinforce the lesson learned from modern phishing attacks: Static lists belong to a bygone era.

Webroot isn’t quite ready to celebrate another year of decline in the average number of malware files per device, though. Download the report to learn why.

4. Cryptojacking Means Easy Money for Cybercriminals

The best cons leave their victims blissfully unaware they’ve been had. Or so we learned from watching “The Sting,” at least. Obliviousness is an added benefit of a tactic surging in popularity among cybercriminals. Cryptojacking comprises the hijacking of a machine’s computing power for the purpose of cryptomining, the process of adding transactions to a blockchain leger in exchange for small transaction fees that accumulate over time. In the long run, these efforts lead to steady returns with little effort for cryptojackers.

Which cryptocurrency was most popular among cryptojackers? Check out the report.

5. More Mobile Banking Apps, More Problems

The total number of smartphone users is expected to eclipse the 2 billion mark by 2019. The coming year will undoubtedly see mobile devices increasingly within the crosshairs of hackers. Malicious apps are the preferred method for hacking smartphones by a large margin. Webroot has analyzed more than 62 million mobile apps to date, and found a concerning 32% of those analyzed in 2017 to be malicious in nature.

What’s the most common type of malware delivered via malicious app? Download the full 2018 Webroot Threat Report to find out.

For a guided tour of the 2018 Threat Report, be sure to join our webinar, “2018 Threat Report and Top Malware,” with Channel Futures contributor Charlie Cooper and Tyler Moffitt, senior threat analyst at Webroot, on May 17 at 2:00 p.m. ET. Register here.

This guest blog is part of a Channel Futures sponsorship.

Tags: Cloud Service Providers Digital Service Providers MSPs VARs/SIs Channel Research From the Industry Security Webroot Sponsor Content

Related


  • Tactical Threat Intelligence Has a Critical Place in a Layered Cybersecurity Strategy
    Tactical threat intelligence typically focuses on the latest methods threat actors are using to execute attacks.
  • cybersecurity predictions
    Cybersecurity: What to Expect in 2021
    Remote work is here to stay (and other cybersecurity predictions for the year ahead).
  • Security shield on digital background
    Lockdown Lessons: Securing Your Business First
    When you consider modern attacks, it’s pretty obvious that all businesses—managed service providers (MSPs), small- to medium-sized businesses (SMBs), etc.—need a strong lineup of cyber-defense tools, not just a barebones firewall and old-fashioned antivirus. You need to protect your business first, and to do that, you have to build out a strong cybersecurity stack that […]
  • Five Key Things Webroot Learned in Its 2018 Cybersecurity Threat Report
    Lockdown Lessons: Shoring up Your Network and Security Policies
    Ultimately, every business wants to do what they can to best serve their clients and customers. They also want to grow successfully, increase profits and create lasting relationships for long-term recurring revenue. But in today’s, if you don’t have a good security setup, the chances you’ll get breached get higher every day. That means all […]

One comment

  1. Avatar Mac Support April 22, 2018 @ 12:10 am
    Reply

    after reading this article I
    after reading this article I am interested in this topic, I want to know more about the article. and I also take a help on this website also https://appletechsupportnumber.net/mac-support/ you can also take a help of this website.

Leave a comment Cancel reply

-or-

Log in with your Channel Futures account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

Related Content

  • Lockdown Lessons: Why Hackers Hack - The Profile
  • Lockdown Lessons: Why Hackers Hack - The Stereotype
  • Implementing a Layered Cybersecurity Strategy
  • 16 Questions to Ask Clients in a Vulnerability Assessment

Galleries

View all

Channel Partners Virtual 2021 Is the Hottest Ticket in Town

February 26, 2021

Industry Perspectives

View all

The “Roaring 20s” Are Coming

February 25, 2021

Three Ways MSPs Can Improve Supply Chain Security

February 24, 2021

SASE: The Key to Mitigating Business Transformation Risk

February 22, 2021

Webinars

View all

A Partner’s Perspective on Channel Success in 2021

March 17, 2021

XDR and Why it Matters to MSPs

March 24, 2021

Top Security Trends Impacting Technology Security Providers In 2021

March 25, 2021

White Papers

View all

Ready To Add Cutting Edge IoT Solutions To Your Portfolio?

  • 1
February 25, 2021

What Is The Value Of Distribution For The Internet Of Things?

February 25, 2021

The Internet of Things (IoT): Where do You Begin?

  • 1
February 25, 2021

Upcoming Events

View all

Channel Partners Virtual

March 2, 2021 - March 4, 2021

Channel Partners Conference & Expo

November 1, 2021 - November 4, 2021

Videos and Fastchats

View all

FASTCHAT: How SOAR Eliminates Security Challenges and Elevates Service Provider Revenues

January 6, 2021

Happy Holidays from Channel Partners & Channel Futures!

December 21, 2020

FASTCHAT: How Old, Unpatched Technologies Are Creating New Security Threats for MSPs and Their Customers

December 3, 2020

Twitter

ChannelFutures

Amazon WorkSpaces @awscloud DaaS client will be available on @IGEL_Technology virtual endpoint client OS.… twitter.com/i/web/status/1…

February 26, 2021
ChannelFutures

.@VMware cutting more workers in California as part of ongoing #workforcerebalancing. #layoffs… twitter.com/i/web/status/1…

February 26, 2021
ChannelFutures

#CPVirtual is March 2-4. It’s the hottest ticket in town — any town, since it’s 100% online — so make sure you have… twitter.com/i/web/status/1…

February 26, 2021
ChannelFutures

.@datto, @ThreatLocker partner to streamline #MSP secure business operations. dlvr.it/RtYvJK https://t.co/nKGnwbblNO

February 26, 2021
ChannelFutures

Infographic: Why Partner with Sierra Wireless and GetWireless? dlvr.it/RtYh1m https://t.co/KcBFzXIx7l

February 26, 2021
ChannelFutures

Infographic: The Sierra Wireless Essential Series dlvr.it/RtYgxv https://t.co/CatxbRHzXr

February 26, 2021
ChannelFutures

#Threatprotection is no small matter for #MSSPs. Find out what vendors say you have to do this year to protect your… twitter.com/i/web/status/1…

February 26, 2021
ChannelFutures

Cloud strategies and cybersecurity are key, and #COVID19 will have more impact than #Brexit on U.K. channel, says… twitter.com/i/web/status/1…

February 26, 2021

MSSP Insider

Newsletters and Updates

Sign up for The Channel Report, Channel Futures Update, MSP 501 Newsletter and more.

Live Channel Events

Get the latest information on the next industry-leading Channel Partners event.

Channel Partners Online

Want more? Find more channel news and analysis on our sister site, Channel Partners.

Media Kit And Advertising

Want to reach our audience? Access our media kit

DISCOVER MORE FROM INFORMA TECH

  • Channel Partners Online
  • Channel Partners Events
  • MSP 501
  • MSSP Insider
  • IoT World Today
  • Webhostingtalk

WORKING WITH US

  • Contact
  • About us
  • Advertise
  • Newsletter

FOLLOW Channel Futures ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2021 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X