The total number of security events have, however, increased. The company analysed 263,109 events from data obtained from its 10 CyberSOCs and 16 SOCs. Out of these events it identified 11.17 percent as verified security incidents. This represents a 34.4 percent increase over the previous year’s rate of 8.31 percent.
According to the report, Apple’s security measures are bypassed by malicious software developers using Google search results to target Mac users, which goes completely undetected by most virus scanning software and apps. One of the most common ways to deploy malware is using flash player download prompts.
For a second opinion, the Kaspersky Virus Removal Tool is a good security software option to have around (or keep in mind) when you suspect a malware or virus infection… It is FREE.
Facebook voice message virus – a malicious campaign that can relate in the installation of a Trojan horse if the misleading voice message is played by the victim…
Even though the message itself might not always directly launch the installation of malware, it might reroute the user to some type of potentially dangerous website where cyber threats such as trojans, ransomware viruses, cryptocurrency miners, browser hijackers, or adware are distributed.