Security Trends and Update—The Microsoft Security Intelligence Report v7
description
Transcript of Security Trends and Update—The Microsoft Security Intelligence Report v7
![Page 1: Security Trends and Update—The Microsoft Security Intelligence Report v7](https://reader035.fdocuments.net/reader035/viewer/2022062315/56815be6550346895dc9d9f5/html5/thumbnails/1.jpg)
![Page 2: Security Trends and Update—The Microsoft Security Intelligence Report v7](https://reader035.fdocuments.net/reader035/viewer/2022062315/56815be6550346895dc9d9f5/html5/thumbnails/2.jpg)
![Page 3: Security Trends and Update—The Microsoft Security Intelligence Report v7](https://reader035.fdocuments.net/reader035/viewer/2022062315/56815be6550346895dc9d9f5/html5/thumbnails/3.jpg)
![Page 4: Security Trends and Update—The Microsoft Security Intelligence Report v7](https://reader035.fdocuments.net/reader035/viewer/2022062315/56815be6550346895dc9d9f5/html5/thumbnails/4.jpg)
![Page 5: Security Trends and Update—The Microsoft Security Intelligence Report v7](https://reader035.fdocuments.net/reader035/viewer/2022062315/56815be6550346895dc9d9f5/html5/thumbnails/5.jpg)
Vulnerability disclosures for Microsoft and non-Microsoft products, 1H04-1H09
Non-Microsoft
Microsoft
![Page 6: Security Trends and Update—The Microsoft Security Intelligence Report v7](https://reader035.fdocuments.net/reader035/viewer/2022062315/56815be6550346895dc9d9f5/html5/thumbnails/6.jpg)
Operating system, browser & application vulnerabilities as a percentage of all disclosures, 1H04-1H09
![Page 7: Security Trends and Update—The Microsoft Security Intelligence Report v7](https://reader035.fdocuments.net/reader035/viewer/2022062315/56815be6550346895dc9d9f5/html5/thumbnails/7.jpg)
Responsible disclosures as a percentage of all disclosures involving Microsoft software, 1H05-1H09
![Page 8: Security Trends and Update—The Microsoft Security Intelligence Report v7](https://reader035.fdocuments.net/reader035/viewer/2022062315/56815be6550346895dc9d9f5/html5/thumbnails/8.jpg)
![Page 9: Security Trends and Update—The Microsoft Security Intelligence Report v7](https://reader035.fdocuments.net/reader035/viewer/2022062315/56815be6550346895dc9d9f5/html5/thumbnails/9.jpg)
Number of computers cleaned for every 1,000 MSRT executions, by operating system, 1H09
![Page 10: Security Trends and Update—The Microsoft Security Intelligence Report v7](https://reader035.fdocuments.net/reader035/viewer/2022062315/56815be6550346895dc9d9f5/html5/thumbnails/10.jpg)
Computers cleaned by threat category, in percentages, 2H06-1H09
![Page 11: Security Trends and Update—The Microsoft Security Intelligence Report v7](https://reader035.fdocuments.net/reader035/viewer/2022062315/56815be6550346895dc9d9f5/html5/thumbnails/11.jpg)
FamilyFamily Most Significant CategoryMost Significant Category 1H091H09 2H082H08
1 Win32/Conficker Worms 5,217,862 3,719
2 Win32/Taterf Worms 4,911,865 1,916,446
3 Win32/Renos Trojan Downloaders & Droppers 3,323,198 4,371,508
4 Win32/ZangoSearchAssistant Adware 2,933,627 3,326,275
5 Win32/Frethog Password Stealers & Monitoring Tools 2,754,226 1,037,451
6 Win32/FakeXPA Miscellaneous Trojans 2,384,497 1,691,393
7 Win32/Vundo Miscellaneous Trojans 2,119,606 3,635,207
8 Win32/Alureon Miscellaneous Trojans 1,976,735 510,281
9 Win32/ZangoShoppingReports Adware 1,412,476 1,752,252
10 Win32/Agent Miscellaneous Trojans 1,361,667 1,289,178
Top 15 malware and potentially unwanted software families detected by Microsoft anti-malware desktop products worldwide, by number of unique infected computers, in 1H09
![Page 12: Security Trends and Update—The Microsoft Security Intelligence Report v7](https://reader035.fdocuments.net/reader035/viewer/2022062315/56815be6550346895dc9d9f5/html5/thumbnails/12.jpg)
Usage of Windows Update and Microsoft Update, 2H06-1H09, indexed to 2H06 total usage
![Page 13: Security Trends and Update—The Microsoft Security Intelligence Report v7](https://reader035.fdocuments.net/reader035/viewer/2022062315/56815be6550346895dc9d9f5/html5/thumbnails/13.jpg)
Daily Windows error reports caused by Win32/Renos on Windows Vista computers in February and March 2007
![Page 14: Security Trends and Update—The Microsoft Security Intelligence Report v7](https://reader035.fdocuments.net/reader035/viewer/2022062315/56815be6550346895dc9d9f5/html5/thumbnails/14.jpg)
Percentage of incoming messages blocked by FOPE using edge-blocking and content filtering, 1H06-1H09
![Page 15: Security Trends and Update—The Microsoft Security Intelligence Report v7](https://reader035.fdocuments.net/reader035/viewer/2022062315/56815be6550346895dc9d9f5/html5/thumbnails/15.jpg)
Inbound messages blocked by FOPE content filters, by category, in 1H09
![Page 16: Security Trends and Update—The Microsoft Security Intelligence Report v7](https://reader035.fdocuments.net/reader035/viewer/2022062315/56815be6550346895dc9d9f5/html5/thumbnails/16.jpg)
Geographic origins of spam, by percentage of total spam sent, in 1H09
![Page 17: Security Trends and Update—The Microsoft Security Intelligence Report v7](https://reader035.fdocuments.net/reader035/viewer/2022062315/56815be6550346895dc9d9f5/html5/thumbnails/17.jpg)
Outbound spam sent through FOPE, by type of organization, in 1H09
![Page 18: Security Trends and Update—The Microsoft Security Intelligence Report v7](https://reader035.fdocuments.net/reader035/viewer/2022062315/56815be6550346895dc9d9f5/html5/thumbnails/18.jpg)
Phishing impressions tracked each month in 2H08 and 1H09, indexed to January 2009
![Page 19: Security Trends and Update—The Microsoft Security Intelligence Report v7](https://reader035.fdocuments.net/reader035/viewer/2022062315/56815be6550346895dc9d9f5/html5/thumbnails/19.jpg)
Impressions for each type of phishing site each month in 1H09
![Page 20: Security Trends and Update—The Microsoft Security Intelligence Report v7](https://reader035.fdocuments.net/reader035/viewer/2022062315/56815be6550346895dc9d9f5/html5/thumbnails/20.jpg)
![Page 21: Security Trends and Update—The Microsoft Security Intelligence Report v7](https://reader035.fdocuments.net/reader035/viewer/2022062315/56815be6550346895dc9d9f5/html5/thumbnails/21.jpg)
![Page 22: Security Trends and Update—The Microsoft Security Intelligence Report v7](https://reader035.fdocuments.net/reader035/viewer/2022062315/56815be6550346895dc9d9f5/html5/thumbnails/22.jpg)
Browser-based exploits targeting Microsoft and third-party software on computers running Windows XP in1H09
Browser-based exploits targeting Microsoft and third-party software on computers running Windows Vista in 1H09
![Page 23: Security Trends and Update—The Microsoft Security Intelligence Report v7](https://reader035.fdocuments.net/reader035/viewer/2022062315/56815be6550346895dc9d9f5/html5/thumbnails/23.jpg)
The 10 browser-based vulnerabilities exploited most often on computers running Windows XP, by percentage of all exploits in 1H09
![Page 24: Security Trends and Update—The Microsoft Security Intelligence Report v7](https://reader035.fdocuments.net/reader035/viewer/2022062315/56815be6550346895dc9d9f5/html5/thumbnails/24.jpg)
The 10 browser-based vulnerabilities exploited most often on computers running Windows Vista, by percentage of all exploits in1H09
![Page 25: Security Trends and Update—The Microsoft Security Intelligence Report v7](https://reader035.fdocuments.net/reader035/viewer/2022062315/56815be6550346895dc9d9f5/html5/thumbnails/25.jpg)
![Page 26: Security Trends and Update—The Microsoft Security Intelligence Report v7](https://reader035.fdocuments.net/reader035/viewer/2022062315/56815be6550346895dc9d9f5/html5/thumbnails/26.jpg)
Security breach incidents, by incident type, 2H07 – 1H09
![Page 27: Security Trends and Update—The Microsoft Security Intelligence Report v7](https://reader035.fdocuments.net/reader035/viewer/2022062315/56815be6550346895dc9d9f5/html5/thumbnails/27.jpg)
High quality consumer AV protection for Genuine Windows PCs available at no cost
High QualityHigh Quality QuietQuiet
Trusted downloadTrusted download
No registrationNo registration
No trial conversions or No trial conversions or expirationsexpirations
Automatic updatesAutomatic updates
Simple user interfaceSimple user interface
Easy to get, Easy to get, Easy to useEasy to use
Runs in the backgroundRuns in the backgroundSmart scheduling and Smart scheduling and resource utilization resource utilization
Lightweight designLightweight design
Limited impact on PC Limited impact on PC performanceperformance
Real-time protectionReal-time protection
Industry certifiedIndustry certified
Same AV/AM engine Same AV/AM engine trusted by enterprisestrusted by enterprises
Broad network of PCs Broad network of PCs providing telemetryproviding telemetry
Backed by Microsoft Backed by Microsoft Security Response CenterSecurity Response Center
![Page 28: Security Trends and Update—The Microsoft Security Intelligence Report v7](https://reader035.fdocuments.net/reader035/viewer/2022062315/56815be6550346895dc9d9f5/html5/thumbnails/28.jpg)