Enterprises to spend $114bn on malware defences: report

Security

by CBR Staff Writer| 06 March 2013

Users will spend 1.5 billion hours and invest about $22bn in detecting, repairing and recovering from malware.

Global enterprises are expected to spend about $114bn to address the impact of a malware-induced cyberattacks, according to anIDC report commissioned by Microsoft.

The report reveals that users will spend 1.5 billion hours and invest about $22bn in detecting, repairing and recovering from the impact of malware.

According to "The Dangerous World of Counterfeit and Pirated Software," report, about 45% of counterfeit software comes from the Internet and 78% of software is downloaded through websites or peer-to-peer networks included spyware.

Microsoft Cybercrime Center associate general counsel, David Finn, said that the reality is that counterfeiters are tampering with the software code and lacing it with malware.

"Some of this malware records a person's every keystroke -- allowing cybercriminals to steal a victim's personal and financial information -- or remotely switches on an infected computer's microphone and video camera, giving cybercriminals eyes and ears in boardrooms and living rooms," Finn said.

"The best way to secure yourself and your property from these malware threats when you buy a computer is to demand genuine software."

According to the consumer survey conducted as part of study, about 64% respondents experienced security issues when they used counterfeit software.

The surveyed respondents revealed that 45% of the time, counterfeit software reduced their PC performance, while 48% reported that the usage of counterfeit software lead to data loss.

IDC chief researcher, John Gantz, said that the research is unequivocal: Inherent dangers lurk for consumers and businesses that take a chance on counterfeit software.

"Some people choose counterfeit to save money, but this 'ride-along' malware ends up putting a financial and emotional strain on both the enterprise and casual computer users alike," Gantz said.

Comments
Post a comment

Comments may be moderated for spam, obscenities or defamation.

Join our network

756 people like this.
0 people follow this.

Security Intelligence

Privcy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.