
{"id":1471,"date":"2011-09-04T20:26:09","date_gmt":"2011-09-04T23:26:09","guid":{"rendered":"http:\/\/www.talsoft.com.ar\/?p=1471"},"modified":"2011-09-04T20:26:09","modified_gmt":"2011-09-04T23:26:09","slug":"50-familias-de-malware-generan-el-80-de-los-ataques-con-exito","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/50-familias-de-malware-generan-el-80-de-los-ataques-con-exito\/","title":{"rendered":"50 familias de malware generan el 80% de los ataques con \u00e9xito"},"content":{"rendered":"<p><strong>La \u00faltima investigaci\u00f3n de la empresa FireEye asegura que el 99% de las redes empresariales tiene fallos serios en sus defensas de seguridad TI.<\/strong><\/p>\n<p><strong><\/strong><strong>FireEye<\/strong> ha presentado su informe anual,\u00a0 <a href=\"http:\/\/www.fireeye.com\/resources\/pdfs\/FireEye_Advanced_Threat_Report_1H2011.pdf\" target=\"_blank\">Advanced Threat Report \u2013 1H 2011<\/a>, en el que asegura no s\u00f3lo que el 99% de las empresas tienen fallos de seguridad serios, sino que s\u00f3lo <strong>50 familias de malware son capaces de generar el 80% de las infecciones con \u00e9xito.<\/strong><\/p>\n<p>Los ataques m\u00e1s comunes son los realizados por falsos antivirus y el malware de robo de informaci\u00f3n, que act\u00faa como conducto para infecciones de malware m\u00e1s serias que buscan credenciales y las claves para el robo de propiedad intelectual y datos sensibles.<\/p>\n<p>FireEye asegura que a los cibercriminales les resulta <strong>relativamente f\u00e1cil burlar las defensas tradicionales y comprometer la gran mayor\u00eda de las redes empresariales. <\/strong>La empresa asegura que el problema se debe a la diferencia que existe entre la protecci\u00f3n establecida y un malware cada vez m\u00e1s sofisticado capaz de superar esas defensas, como los firewalls, sistemas de prevenci\u00f3n de intrusiones, antivirus o gateways.<\/p>\n<p>La investigaci\u00f3n apunta a que <strong>el 99% de las empresas se han visto afectadas por infecciones en la red cada semana<\/strong>, y que el 80% de las empresas se enfrentan a m\u00e1s de un centenar de nuevos casos por semana.<\/p>\n<p>La defensa tradicional de las empresas no es capaz de enfrentarse con los <strong>ataques din\u00e1micos y en varias etapas<\/strong> que utilizan ahora los cibercriminales para atacar a las empresas y las agencias federales, asegura FireEye, que pide una revisi\u00f3n de las pol\u00edticas y sistemas de seguridad.<\/p>\n<p>Autor: <strong>Rosal\u00eda Arroyo<\/strong><br \/>\nFuente: <a href=\"http:\/\/www.itespresso.es\/50-familias-de-malware-generan-el-80-de-los-ataques-con-exito-52744.html\"><strong>ITespresso.es<\/strong><\/a><\/p>\n<p>Visto : Segu-info<\/p>\n<div>Under Creative Commons License: <a href=\"http:\/\/creativecommons.org\/licenses\/by-nc-sa\/3.0\">Attribution Non-Commercial Share Alike<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>La \u00faltima investigaci\u00f3n de la empresa FireEye asegura que el 99% de las redes empresariales tiene fallos serios en sus defensas de seguridad TI. FireEye ha presentado su informe anual,\u00a0 Advanced Threat Report \u2013 1H 2011, en el que asegura no s\u00f3lo que el 99% de las empresas tienen fallos de seguridad serios, sino que [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-1471","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - 50 familias de malware generan el 80% de los ataques con \u00e9xito<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/50-familias-de-malware-generan-el-80-de-los-ataques-con-exito\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/50-familias-de-malware-generan-el-80-de-los-ataques-con-exito\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/50-familias-de-malware-generan-el-80-de-los-ataques-con-exito\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"50 familias de malware generan el 80% de los ataques con \u00e9xito\",\"datePublished\":\"2011-09-04T23:26:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/50-familias-de-malware-generan-el-80-de-los-ataques-con-exito\/\"},\"wordCount\":298,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/50-familias-de-malware-generan-el-80-de-los-ataques-con-exito\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/50-familias-de-malware-generan-el-80-de-los-ataques-con-exito\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - 50 familias de malware generan el 80% de los ataques con \u00e9xito\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2011-09-04T23:26:09+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/50-familias-de-malware-generan-el-80-de-los-ataques-con-exito\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - 50 familias de malware generan el 80% de los ataques con \u00e9xito","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/50-familias-de-malware-generan-el-80-de-los-ataques-con-exito\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/50-familias-de-malware-generan-el-80-de-los-ataques-con-exito\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/50-familias-de-malware-generan-el-80-de-los-ataques-con-exito\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"50 familias de malware generan el 80% de los ataques con \u00e9xito","datePublished":"2011-09-04T23:26:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/50-familias-de-malware-generan-el-80-de-los-ataques-con-exito\/"},"wordCount":298,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/50-familias-de-malware-generan-el-80-de-los-ataques-con-exito\/","url":"https:\/\/www.talsoft-security.com\/site\/50-familias-de-malware-generan-el-80-de-los-ataques-con-exito\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - 50 familias de malware generan el 80% de los ataques con \u00e9xito","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2011-09-04T23:26:09+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/50-familias-de-malware-generan-el-80-de-los-ataques-con-exito\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1471","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=1471"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1471\/revisions"}],"predecessor-version":[{"id":1472,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1471\/revisions\/1472"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=1471"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=1471"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=1471"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}