Security software showdown! 9 antivirus suites empirically tested

We tested security suites on PCs, tablets, and phones to evaluate how well they protect against viruses and other threats.

By Nick Mediati and Sarah Jacobsson Purewal, PC World |  Security, antivirus

Watering-hole attacks A drive-by download is a twist on the concept of browser-based attacks. In this sort of attack, cybercriminals post malicious content on a Web page, and then try to figure out some way to lure you to visit the website. If the PC you use to visit the website is vulnerable to the exploit used by the attack, malware is downloaded and the system is compromised. In 2013, though, attackers will continue to hone in with more precise attacks known as "watering hole" attacks. Rather than casting a wide net (as attackers do with drive-by downloads), the watering hole attack is more precise.

Data breaches In 2013, attackers will continue to target weak security on Internet-facing database systems to acquire thousands or millions of compromised records at once rather than going after individual users. Unfortunately, there isn't much you can do to prevent this sort of attack, but you can go on the defensive by being vigilant. Monitor your bank and credit card statements and report anything suspicious to your financial institution.

  Note: Click on the chart image below to see a summary of our findings.


Originally published on PC World |  Click here to read the original story.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Answers - Powered by ITworld

ITworld Answers helps you solve problems and share expertise. Ask a question or take a crack at answering the new questions below.

Ask a Question