
{"id":584,"date":"2009-09-01T09:26:20","date_gmt":"2009-09-01T12:26:20","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=584"},"modified":"2009-09-01T09:26:20","modified_gmt":"2009-09-01T12:26:20","slug":"g-data-informe-sobre-software-malicioso-semestral-enero-junio-2009","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/g-data-informe-sobre-software-malicioso-semestral-enero-junio-2009\/","title":{"rendered":"G Data Informe sobre software malicioso &#8211; Semestral enero-junio 2009"},"content":{"rendered":"<p><span style=\"font-weight: bold; color: #009900; font-size: 130%;\">Cifras y datos<\/span><br \/>\n\u2022 En el primer semestre de 2009, G Data identific\u00f3 663.952 nuevos programas maliciosos.<\/p>\n<div style=\"text-align: justify;\">Esto significa m\u00e1s del doble de los detectados durante el mismo per\u00edodo del a\u00f1o anterior.<\/div>\n<p>En comparaci\u00f3n con el segundo semestre de 2008 s\u00f3lo se obtuvo un ligero incremento del 15%. No obstante, el n\u00famero de familias activas de programas maliciosos descendi\u00f3 en un 7%.<br \/>\n\u2022 Las categor\u00edas m\u00e1s frecuentes de programas maliciosos son los troyanos, descargadores y backdoors. Mientras que los troyanos y descargadores escalaron posiciones, la proporci\u00f3n de backdoors retrocedi\u00f3. Los rootkits siguieron consolid\u00e1ndose. Su n\u00famero se octuplic\u00f3 con creces frente al mismo per\u00edodo del a\u00f1o anterior.<br \/>\n\u2022 Los programas maliciosos con rutinas de propagaci\u00f3n propias tan s\u00f3lo constituyen un 4,0% del total de los programas inform\u00e1ticos maliciosos.<br \/>\n\u2022 Entre los tipos de programa malicioso m\u00e1s activos se encuentran los troyanos, los backdoors y los ladrones de cuentas de juegos online. Igualmente han aumentado notablemente la familia de gusanos &#8220;Autorun&#8221;. Su n\u00famero pr\u00e1cticamente se ha quintuplicado en comparaci\u00f3n al primer semestre de 2008 y su parte en el total aument\u00f3 hasta alcanzar un 1,6%.<br \/>\n\u2022 En el 99,3% de los casos, todos los programas maliciosos del segundo semestre funcionaron en el entorno de Windows. La concentraci\u00f3n en el sistema operativo l\u00edder en el mercado contin\u00faa.<br \/>\n\u2022 El c\u00f3digo malicioso para plataformas m\u00f3viles ha conseguido entrar esta vez en el Top 5 de las plataformas. Pero, con tan solo 106 elementos da\u00f1inos, su proporci\u00f3n sigue siendo m\u00ednima.<br \/>\n\u2022 Tambi\u00e9n los usuarios de MacOS X reciben ataques de programas maliciosos. El n\u00famero de nuevos programas maliciosos para MacOSX es de 15. En abril se descubri\u00f3 una primera botnet procedente de los ordenadores Apple.<\/p>\n<p><span style=\"font-weight: bold; color: #009900; font-size: 130%;\">Eventos y tendencias<\/span><br \/>\n\u2022 Las redes sociales se utilizan cada vez con m\u00e1s frecuencia para la distribuci\u00f3n de spam y programas maliciosos.<br \/>\n\u2022 Conficker se convierte en el eterno caballo de batalla. Infecta varios millones de PC y el 1 de abril da que hablar por su nueva rutina de actualizaci\u00f3n. A partir de ah\u00ed desaparece.<\/p>\n<p><span style=\"font-weight: bold; color: #009900; font-size: 130%;\">Pron\u00f3sticos<\/span><br \/>\n\u2022 Internet alberga cada vez un mayor n\u00famero de c\u00f3digos maliciosos. Los m\u00e9todos de infecci\u00f3n se hacen cada vez m\u00e1s sofisticados.<br \/>\n\u2022 La ola de programas maliciosos seguir\u00e1 creciendo en los pr\u00f3ximos meses, aunque en menor medida y a trav\u00e9s de un menor n\u00famero de familias de programas maliciosos.<br \/>\n\u2022 Los usuarios de MacOSX y Smartphones pasar\u00e1n a estar con mayor frecuencia en la mira de los autores de programas maliciosos.<\/p>\n<p><span style=\"font-size: 130%;\"><a href=\"http:\/\/www.gdata.es\/uploads\/media\/MalwareReport_2009_1-6_ES.pdf\">Descarga del reporte completo &#8211; Espa\u00f1ol<\/a><\/span><\/p>\n<p><span style=\"font-size: 130%;\">Fuente: Cryptex<br \/>\n<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cifras y datos \u2022 En el primer semestre de 2009, G Data identific\u00f3 663.952 nuevos programas maliciosos. Esto significa m\u00e1s del doble de los detectados durante el mismo per\u00edodo del a\u00f1o anterior. En comparaci\u00f3n con el segundo semestre de 2008 s\u00f3lo se obtuvo un ligero incremento del 15%. No obstante, el n\u00famero de familias activas [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-584","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - G Data Informe sobre software malicioso - Semestral enero-junio 2009<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/g-data-informe-sobre-software-malicioso-semestral-enero-junio-2009\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/g-data-informe-sobre-software-malicioso-semestral-enero-junio-2009\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/g-data-informe-sobre-software-malicioso-semestral-enero-junio-2009\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"G Data Informe sobre software malicioso &#8211; Semestral enero-junio 2009\",\"datePublished\":\"2009-09-01T12:26:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/g-data-informe-sobre-software-malicioso-semestral-enero-junio-2009\/\"},\"wordCount\":444,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/g-data-informe-sobre-software-malicioso-semestral-enero-junio-2009\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/g-data-informe-sobre-software-malicioso-semestral-enero-junio-2009\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - G Data Informe sobre software malicioso - Semestral enero-junio 2009\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2009-09-01T12:26:20+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/g-data-informe-sobre-software-malicioso-semestral-enero-junio-2009\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - G Data Informe sobre software malicioso - Semestral enero-junio 2009","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/g-data-informe-sobre-software-malicioso-semestral-enero-junio-2009\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/g-data-informe-sobre-software-malicioso-semestral-enero-junio-2009\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/g-data-informe-sobre-software-malicioso-semestral-enero-junio-2009\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"G Data Informe sobre software malicioso &#8211; Semestral enero-junio 2009","datePublished":"2009-09-01T12:26:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/g-data-informe-sobre-software-malicioso-semestral-enero-junio-2009\/"},"wordCount":444,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/g-data-informe-sobre-software-malicioso-semestral-enero-junio-2009\/","url":"https:\/\/www.talsoft-security.com\/site\/g-data-informe-sobre-software-malicioso-semestral-enero-junio-2009\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - G Data Informe sobre software malicioso - Semestral enero-junio 2009","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2009-09-01T12:26:20+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/g-data-informe-sobre-software-malicioso-semestral-enero-junio-2009\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/584","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=584"}],"version-history":[{"count":0,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/584\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=584"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=584"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=584"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}