{"id":4782,"date":"2011-08-23T21:28:00","date_gmt":"2011-08-23T21:28:00","guid":{"rendered":"https:\/\/evssolutions.com\/highlights-for-mcafees-q2-threats-report\/"},"modified":"2011-08-23T21:28:00","modified_gmt":"2011-08-23T21:28:00","slug":"highlights-for-mcafees-q2-threats-report","status":"publish","type":"post","link":"https:\/\/evssolutions.com\/insights\/highlights-for-mcafees-q2-threats-report\/","title":{"rendered":"Highlights for McAfees Q2 Threats Report"},"content":{"rendered":"
Today, McAfee<\/a> *Stealth malware is the tactic of hiding <\/p>\n","protected":false},"excerpt":{"rendered":" Today,McAfee\u00a0released the\u00a0McAfee Threats Report: Second Quarter 2011,which focuses on the latest facts and trends of malware, cybercriminal activity, and\u00a0knowledge-based authentication.The report is 24 pages in length, so we have compiled the highlights for you to be able to apply to your\u00a0fraud prevention solutions.<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[37],"tags":[],"class_list":["post-4782","post","type-post","status-publish","format-standard","hentry","category-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4782","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/comments?post=4782"}],"version-history":[{"count":0,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4782\/revisions"}],"wp:attachment":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/media?parent=4782"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/categories?post=4782"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/tags?post=4782"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}
\nreleased the McAfee
\nThreats Report: Second Quarter 2011, <\/em>which focuses on the latest facts
\nand trends of malware, cybercriminal activity, and knowledge-based
\nauthentication. <\/span>The report is
\n24 pages in length, so we have compiled the highlights for you to be able to
\napply to your fraud
\nprevention solutions<\/a>.
<\/p>\n
<\/p>\n\n
\n since last quarter<\/li>\n
\n million unique malware samples<\/li>\n
\n anti-virus)<\/li>\n
\n growth: up almost 38% over 2010<\/li>\n
\n emails. See graphic.<\/em><\/li>\n<\/ul>\n
<\/p>\n
\nmalware in a rootkit, which is used by cybercriminals to make it harder to
\ndetect and more persistent.
<\/p>\n