Global enterprises are expected to spend about $114bn to address the impact of a malware-induced cyberattacks, according to anIDC report commissioned by Microsoft.
The report reveals that users will spend 1.5 billion hours and invest about $22bn in detecting, repairing and recovering from the impact of malware.
According to "The Dangerous World of Counterfeit and Pirated Software," report, about 45% of counterfeit software comes from the Internet and 78% of software is downloaded through websites or peer-to-peer networks included spyware.
Microsoft Cybercrime Center associate general counsel, David Finn, said that the reality is that counterfeiters are tampering with the software code and lacing it with malware.
"Some of this malware records a person's every keystroke -- allowing cybercriminals to steal a victim's personal and financial information -- or remotely switches on an infected computer's microphone and video camera, giving cybercriminals eyes and ears in boardrooms and living rooms," Finn said.
"The best way to secure yourself and your property from these malware threats when you buy a computer is to demand genuine software."
According to the consumer survey conducted as part of study, about 64% respondents experienced security issues when they used counterfeit software.
The surveyed respondents revealed that 45% of the time, counterfeit software reduced their PC performance, while 48% reported that the usage of counterfeit software lead to data loss.
IDC chief researcher, John Gantz, said that the research is unequivocal: Inherent dangers lurk for consumers and businesses that take a chance on counterfeit software.
"Some people choose counterfeit to save money, but this 'ride-along' malware ends up putting a financial and emotional strain on both the enterprise and casual computer users alike," Gantz said.
Qualys is the leading provider of on demand IT security risk and compliance solutions - delivered as a service. Qualys solutions enable...
Absolute® Software specialises in technology and services for the management and security of mobile computers and smartphones.