
{"id":472,"date":"2009-02-13T12:08:46","date_gmt":"2009-02-13T15:08:46","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=472"},"modified":"2009-02-13T12:08:46","modified_gmt":"2009-02-13T15:08:46","slug":"%c2%bfcuanto-malware-detecta-una-empresa-antivirus","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/%c2%bfcuanto-malware-detecta-una-empresa-antivirus\/","title":{"rendered":"\u00c2\u00bfCu\u00c3\u00a1nto malware detecta una empresa antivirus?"},"content":{"rendered":"<p>El malware contin\u00c3\u00baa aumentando a un r\u00c3\u00a1pido veloz. El 4 de febrero de 2009, <a href=\"http:\/\/www.avertlabs.com\/research\/blog\/index.php\/2009\/02\/05\/half-a-million-malware\/\">Mcafee sobrepas\u00c3\u00b3 los 500.000<\/a>. Medio mill\u00c3\u00b3n es una cantidad enorme. Recuerdo mi primer programa antivirus, all\u00c3\u00a1 por los &#8217;80, que ten\u00c3\u00ada unos 80. No puedo recordar el n\u00c3\u00bamero exacto, pero es f\u00c3\u00a1cil ponerlo en perspectiva. Ahora agregamos muchos m\u00c3\u00a1s diariamente.<\/p>\n<p>Sin embargo, nuestra cantidad actual no es el n\u00c3\u00bamero absoluto de archivos detectados de malware: esto podr\u00c3\u00ada confundir a mucha gente.<\/p>\n<p>Las detecciones pueden ser escritas muy espec\u00c3\u00adficamente, digamos uno por cada muestra, pero eso no es muy efectivo. La mayor\u00c3\u00ada de las detecciones son escritas para que, gen\u00c3\u00a9ricamente, detecten muchas muestras.<br \/>\n<span style=\"font-weight: bold;\">Por ejemplo, un driver puede detectar 50 muestras o miles de archivos de malware. Por lo tanto, el numero de archivos de malware detectados es mucho mayor que el medio mill\u00c3\u00b3n reflejado.<\/span><br \/>\nPara tener otra mirada sobre la complejidad de la deteccion del malware, vean tambi\u00c3\u00a9n el <a href=\"http:\/\/www.avertlabs.com\/research\/blog\/index.php\/2008\/06\/19\/i-say-we-are-detecting-between-400-000-and-10-000-000-malware\/\">blog de Fran\u00c3\u00a7ois Paget<\/a>.<\/p>\n<p>Inicialmente VirusScan estuvo enfocado s\u00c3\u00b3lo en los virus de auto-replicaci\u00c3\u00b3n aut\u00c3\u00a9nticos, principalmente virus de MS-DOS de 8 bit (.com\/.exe), que eran los importantes en ese momento (y algunos lo son hoy tambi\u00c3\u00a9n).<\/p>\n<p>El malware evolucion\u00c3\u00b3 en muchas \u00c3\u00a1reas, no limitado a estas: VBA, VBScript, JavaScript, 32-bit (.exe, binarios tipo PE), de env\u00c3\u00ado masivo de correo, infectores de archivos de 32-bit, malware para m\u00c3\u00b3vil, adware, keyloggers, ladrones de claves, y otros. Hoy d\u00c3\u00ada la mayor\u00c3\u00ada del malware son troyanos est\u00c3\u00a1ticos.<\/p>\n<p>Tambi\u00c3\u00a9n ha habido una gran cambio de los autores del malware. Los primeros autores de malware era aficionados, los escrib\u00c3\u00adan para probar que se pod\u00c3\u00ada hacer, pero lo que vemos hoy principalmente es malware que va tras el robo de claves y dinero, etc.<\/p>\n<p>El malware a menudo es desarrollado en ambientes profesionales, muy parecido a un proyecto de negocios con un plan.<\/p>\n<p>Aunque hay malware para sistemas operativos como Mac OSX y las variadas versiones de Linux\/Unix, la mayor\u00c3\u00ada del malware a\u00c3\u00ban apunta al Windows de Microsoft y sus aplicaciones.<\/p>\n<p><span style=\"font-weight: bold;\">Traducido para blog de <\/span><a style=\"font-weight: bold;\" href=\"http:\/\/www.segu-info.com.ar\/\">Segu-info<\/a><span style=\"font-weight: bold;\"> por Ra\u00c3\u00bal Batista<\/span><br \/>\nAutor: <a href=\"http:\/\/www.avertlabs.com\/research\/blog\/index.php\/2009\/02\/05\/half-a-million-malware\">Marius van Oers de Avert Labs<\/a><\/p>\n<p>Fuente: DiarioTi<\/p>\n","protected":false},"excerpt":{"rendered":"<p>El malware contin\u00c3\u00baa aumentando a un r\u00c3\u00a1pido veloz. El 4 de febrero de 2009, Mcafee sobrepas\u00c3\u00b3 los 500.000. Medio mill\u00c3\u00b3n es una cantidad enorme. Recuerdo mi primer programa antivirus, all\u00c3\u00a1 por los &#8217;80, que ten\u00c3\u00ada unos 80. No puedo recordar el n\u00c3\u00bamero exacto, pero es f\u00c3\u00a1cil ponerlo en perspectiva. Ahora agregamos muchos m\u00c3\u00a1s diariamente. Sin [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-472","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - \u00c2\u00bfCu\u00c3\u00a1nto malware detecta una empresa antivirus?<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/\u00bfcuanto-malware-detecta-una-empresa-antivirus\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfcuanto-malware-detecta-una-empresa-antivirus\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfcuanto-malware-detecta-una-empresa-antivirus\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"\u00c2\u00bfCu\u00c3\u00a1nto malware detecta una empresa antivirus?\",\"datePublished\":\"2009-02-13T15:08:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfcuanto-malware-detecta-una-empresa-antivirus\/\"},\"wordCount\":377,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfcuanto-malware-detecta-una-empresa-antivirus\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfcuanto-malware-detecta-una-empresa-antivirus\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - \u00c2\u00bfCu\u00c3\u00a1nto malware detecta una empresa antivirus?\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2009-02-13T15:08:46+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/%c2%bfcuanto-malware-detecta-una-empresa-antivirus\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - \u00c2\u00bfCu\u00c3\u00a1nto malware detecta una empresa antivirus?","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/\u00bfcuanto-malware-detecta-una-empresa-antivirus\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/%c2%bfcuanto-malware-detecta-una-empresa-antivirus\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/%c2%bfcuanto-malware-detecta-una-empresa-antivirus\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"\u00c2\u00bfCu\u00c3\u00a1nto malware detecta una empresa antivirus?","datePublished":"2009-02-13T15:08:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/%c2%bfcuanto-malware-detecta-una-empresa-antivirus\/"},"wordCount":377,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/%c2%bfcuanto-malware-detecta-una-empresa-antivirus\/","url":"https:\/\/www.talsoft-security.com\/site\/%c2%bfcuanto-malware-detecta-una-empresa-antivirus\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - \u00c2\u00bfCu\u00c3\u00a1nto malware detecta una empresa antivirus?","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2009-02-13T15:08:46+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/%c2%bfcuanto-malware-detecta-una-empresa-antivirus\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/472","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=472"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/472\/revisions"}],"predecessor-version":[{"id":473,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/472\/revisions\/473"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=472"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=472"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=472"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}