User:CA Yatendra Agrawal/sandbox

Proliferations -	The release rate of malicious code and other unwanted programs may be exceeding that of legitimate software applications.1 -	A single threat infected 600,000 Macs in 2012.2 -	Cybercriminals are doing their homework, and are aware of what's popular, and what's insecure.3 -	Malware samples in 2012 and now catalogued 100,000 new malware samples each day — that’s 69 new pieces of malware a minute. Compared with 60K new viruses average per day in 2010.4 -	As much malware produced in 2007 as in the previous 20 years altogether.5 -	Detection rates for threats had dropped from 40-50% in 2006 to 20-30% in 2007.6 -	Anti-Virus solutions do not provide adequate protection even a month after new malware threats have been detected.7 -	Malware's most common pathway from criminals to users is through the Internet; primarily by e-mail and the World Wide Web.8 -	One in every 14 downloads from the Internet may now contain malware code.9 -	Many virus scanners produce false positive results as well, identifying benign files as malware.10 Citations 1.	Symantec Internet Security Threat Report: Trends for July–December 2007 (Executive Summary) 2.	Symantec: 2013 Internet Security Threat Report, Volume 18 3.	Mike Gallagher, senior vice-president and chief technology officer of Global Threat Intelligence for McAfee 4.	McAfee: Infographic: The State of Malware 2013 5.	F-Secure Reports Amount of Malware Grew by 100% during 2007 6.	Computer Magazine c't found 7.	Malware Detection Rates for Leading AV Solutions A Cyveillance Analysis August 2010 8.	F-Secure Quarterly Security Wrap-up for the first quarter of 2008 9.	Microsoft reported in May 2011 10.	AV Comparatives (December 2013). "Whole Product Dynamic "Real World" Production Test" How antivirus programs defend from the following activities? -	Where malicious programs routinely defend themselves against removal, not merely to hide themselves? -	How to defend against new and unknown malware where signatures have not been created or installed? -	How to segregate legitimate intended written code from malicious code, i.e. the issue related to false positives? -	Where malware modified/ changed its signature without affecting its functionality? -	How to protect systems [recover itself] where malware restricts the effectiveness of the anti-virus/malware? -	Is there any algorithm that can perfectly detect/ protect all possible viruses/ attacks? Now analyse Perpetrators’ Intentions by way of some questions as without knowing intention of perpetrators we can’t move towards our objective 1.	Why are they wasting their time and money? 2.	Why are these harmful? 3.	Why they are not using their energies in a positive manner? More Serious Issues 1.	Is human life secure? 2.	Whether malware impacts organisations’ existence? 3.	Whether Security Provider are themselves secure? 4.	Does legitimate software have vulnerabilities? 5.	Whether patches for coping with vulnerabilities are released before threat? 6.	Whether all malwares are identifiable? 7.	Whether detection of malware really matters?