Número De Visitantes Visitantes

Total Page:16

File Type:pdf, Size:1020Kb

Número De Visitantes Visitantes Informe de 1&1 Estadísticas Web: 01/01/18 - 31/01/18 Proyecto: Click & Build (maca-alicante.es) ID de Cliente: 26790925 Número de visitantes Visitantes 800 600 400 200 0 01/01 08/01 15/01 22/01 29/01 Fecha Visitantes 01/01/18 219 02/01/18 377 03/01/18 315 04/01/18 294 05/01/18 319 06/01/18 276 07/01/18 306 08/01/18 439 09/01/18 420 10/01/18 327 11/01/18 458 12/01/18 721 13/01/18 404 14/01/18 380 15/01/18 450 16/01/18 378 17/01/18 615 18/01/18 425 19/01/18 423 20/01/18 355 21/01/18 353 22/01/18 544 1 Informe de 1&1 Estadísticas Web: 01/01/18 - 31/01/18 Proyecto: Click & Build (maca-alicante.es) ID de Cliente: 26790925 Fecha Visitantes 23/01/18 601 24/01/18 387 25/01/18 361 26/01/18 353 27/01/18 318 28/01/18 360 29/01/18 524 30/01/18 537 31/01/18 482 Total 12.721 Sesiones 1000 750 500 250 0 01/01 08/01 15/01 22/01 29/01 Fecha Sesiones 01/01/18 258 02/01/18 409 03/01/18 353 04/01/18 327 05/01/18 348 06/01/18 300 07/01/18 325 08/01/18 545 09/01/18 491 10/01/18 369 11/01/18 533 2 Informe de 1&1 Estadísticas Web: 01/01/18 - 31/01/18 Proyecto: Click & Build (maca-alicante.es) ID de Cliente: 26790925 Fecha Sesiones 12/01/18 803 13/01/18 492 14/01/18 438 15/01/18 540 16/01/18 471 17/01/18 711 18/01/18 497 19/01/18 465 20/01/18 405 21/01/18 428 22/01/18 646 23/01/18 672 24/01/18 446 25/01/18 419 26/01/18 416 27/01/18 361 28/01/18 414 29/01/18 577 30/01/18 604 31/01/18 551 Total 14.614 3 Informe de 1&1 Estadísticas Web: 01/01/18 - 31/01/18 Proyecto: Click & Build (maca-alicante.es) ID de Cliente: 26790925 Robots de buscadores Otros Feedly/1.0 spbot/5.0.3 bingbot/2.0 Yahoo! Slurp DotBot/1.1 MJ12bot/v1.4.8 AhrefsBot/5.2 Googlebot/2.1 Robots de buscadores Sesiones Porcentaje bingbot/2.0 29.150 42,20% Googlebot/2.1 6.558 9,49% AhrefsBot/5.2 5.750 8,32% MJ12bot/v1.4.8 4.108 5,95% DotBot/1.1 3.646 5,28% Yahoo! Slurp 3.478 5,03% spbot/5.0.3 3.000 4,34% Feedly/1.0 2.048 2,96% MJ12bot/v1.4.7 1.939 2,81% BUbiNG 1.825 2,64% Googlebot-Mobile 1.127 1,63% Yeti/1.1 935 1,35% YandexBot/3.0 600 0,87% ltx71 427 0,62% CCBot/2.0 390 0,56% SiteExplorer/1.1b 386 0,56% Baiduspider/2.0 333 0,48% YaK/1.0 316 0,46% special_archiver/3.1.1 282 0,41% Netvibes 278 0,40% Applebot/0.1 247 0,36% Googlebot-Image/1.0 244 0,35% DeuSu/5.0.2 200 0,29% 4 Informe de 1&1 Estadísticas Web: 01/01/18 - 31/01/18 Proyecto: Click & Build (maca-alicante.es) ID de Cliente: 26790925 Robots de buscadores Sesiones Porcentaje SemrushBot/1.2~bl 153 0,22% Twitterbot/1.0 146 0,21% trendictionbot 0.5.0 115 0,17% SMTBot/1.0 109 0,16% BingPreview/1.0b 94 0,14% BLEXBot/1.0 87 0,13% FlipboardProxy/1.2 84 0,12% FeedlyBot/1.0 82 0,12% Google favicon 77 0,11% SpiderLing 73 0,11% FacebookExternalHit/1.1 59 0,09% Mail.RU_Bot/2.0 56 0,08% linkdexbot/2.2 51 0,07% GroupHigh/1.0 49 0,07% MetaURI API/2.0 44 0,06% SemrushBot-SA/0.97 40 0,06% facebookexternalhit/1.1 40 0,06% LinkCheck 38 0,06% TweetmemeBot/4.0 34 0,05% Genieo/1.0 32 0,05% archive.org_bot 26 0,04% PaperLiBot/2.1 23 0,03% FlipboardRSS/1.2 22 0,03% GarlikCrawler/1.2 21 0,03% Buzzbot/1.0 20 0,03% SeznamBot/3.2 17 0,02% SEOkicks-Robot 16 0,02% Otros 208 0,30% Total 69.083 100,00% 5 Informe de 1&1 Estadísticas Web: 01/01/18 - 31/01/18 Proyecto: Click & Build (maca-alicante.es) ID de Cliente: 26790925 Análisis de páginas Páginas más visitadas /wp-content/themes/canvas/functions/thumb.php /index.php /feed/ /wp-login.php /wp-content/uploads/wysija/dividers/drop2.png 0k 10k 20k 30k Páginas Sesiones Porcentaje /wp-content/themes/canvas/functions/thumb.php 22.162 31,68% /index.php 19.927 28,49% /feed/ 4.140 5,92% /wp-login.php 3.313 4,74% /wp-content/uploads/wysija/dividers/drop2.png 2.208 3,16% /eusebio-sempere-en-el-museo-reina-sofia/ 466 0,67% /here-together-now-bloque-iii/ 401 0,57% /actividades/ 363 0,52% /pagina-ejemplo/grupos-y-visitas-guiadas/ 359 0,51% /pagina-ejemplo/horarios-y-precios/ 287 0,41% /tag/blog/feed/index.php 279 0,40% /2o-d-cuentos-en-el-maca/ 260 0,37% /balance-maca-visitas-2017/ 258 0,37% /wp-admin/admin.php 257 0,37% /wp-json/oembed/1.0/embed 254 0,36% /wp-admin/post.php 244 0,35% /wp-content/themes/canvas/functions/js/shortcode- 239 0,34% generator/js/dialog-js.php /wp-admin/load-scripts.php 234 0,33% /la-mesa-del-arquitecto-4-septiembre-2017-mayo-2018/ 223 0,32% /40-aniversario-la-coleccion-arte-siglo-xx-1977-2017/ 202 0,29% /category/exposiciones/actuales/ 195 0,28% 6 Informe de 1&1 Estadísticas Web: 01/01/18 - 31/01/18 Proyecto: Click & Build (maca-alicante.es) ID de Cliente: 26790925 Páginas Sesiones Porcentaje /wp-admin/admin-ajax.php 192 0,27% /pagina-ejemplo/como-llegar-2/ 162 0,23% /pagina-ejemplo/como-llegar/ 162 0,23% /xmlrpc.php 148 0,21% /blog/ 145 0,21% /laboratorios-de-letras-e-imagenes-2018/ 145 0,21% /wp-admin/index.php 144 0,21% /rueda-de-prensa-balance-maca-2017/ 140 0,20% /coleccion/ 135 0,19% /exposiciones/ 130 0,19% /coleccion/coleccion-arte-siglo-xx/ 127 0,18% /el-museo/de-la-asegurada-al-maca/ 125 0,18% /comments/feed/ 123 0,18% /tag/blog/ 123 0,18% /reminiscencias-2018/ 122 0,17% /pagina-ejemplo/ 117 0,17% /quiero-recibir-informacion/ 111 0,16% /tag/blog/feed/ 104 0,15% /coleccion/coleccion-arte-siglo-xx/listado-de-obras/ 96 0,14% /coleccion/coleccion-eusebio-sempere/ 96 0,14% /wp-admin/load-styles.php 83 0,12% /el-museo/identidad-corporativa/ 81 0,12% /el-museo/maca/ 80 0,11% /prensa/libro-de-visitas/ 79 0,11% /pagina-ejemplo/antes-de-la-visita/ 78 0,11% /art-futura-2017/ 72 0,10% /biblioteca-y-documentacion/ 72 0,10% /category/exposiciones/futuras/ 69 0,10% /el-museo/mision-y-funciones/ 66 0,09% /fundacion-juan-march-madrid-organo-1977/ 56 0,08% /arquitectura/casa-de-la-asegurada/ 54 0,08% /arquitectura/los-arquitectos/planos-alzadas-y- 52 0,07% fotografias/ /arquitectura/ 51 0,07% /prensa/ 51 0,07% 7 Informe de 1&1 Estadísticas Web: 01/01/18 - 31/01/18 Proyecto: Click & Build (maca-alicante.es) ID de Cliente: 26790925 Páginas Sesiones Porcentaje /coleccion/coleccion-eusebio-sempere/eusebio- 49 0,07% sempere-el-artista/ /arquitectura/los-arquitectos/ 48 0,07% /category/exposiciones/actuales/feed/ 48 0,07% /coleccionismo-coleccionar-coleccionista-paisajes- 48 0,07% secretos-de-montserrat-soto/ /components/com_b2jcontact/krd.php 48 0,07% /components/com_b2jcontact/krd.php/ 48 0,07% /category/coleccion-arte-siglo-xx/textos-coleccion-arte- 47 0,07% siglo-xx/feed/ /category/obras_destacadas/feed/ 47 0,07% /biblioteca-y-documentacion/feed/ 45 0,06% /category/actividades/se_esta_haciendo/ 45 0,06% /exposicion-colectiva-taller-de-grabado-eusebio- 45 0,06% sempere/ /category/exposiciones/anteriores/feed/ 44 0,06% /category/sin-categoria/feed/ 43 0,06% /coleccion/coleccion-juana-frances/ 43 0,06% /el-museo/transparencia/ 43 0,06% /category/actividades/se_esta_haciendo/feed/ 42 0,06% /category/coleccion-arte-siglo-xx/in-memoriam/feed/ 42 0,06% /category/coleccion-juana-frances/textos-coleccion- 42 0,06% juana-frances/feed/ /category/coleccion-caja-mediterraneo/exposiciones- 41 0,06% temporales/feed/ /category/coleccion-eusebio-sempere/sempere-en-el- 41 0,06% espacio-publico/feed/ /category/coleccion-juana-frances/textos-sobre-juana- 41 0,06% frances/feed/ /itinerarios/ 41 0,06% /up.php 41 0,06% /autorretrato-en-el-tiempo-191-1999-esther-ferrer/ 40 0,06% /el-museo/creacion-y-reconocimiento-de-museo/ 40 0,06% /category/actividades/actividades_anteriores/feed/ 39 0,06% /category/didactica/actividades_didacticas/feed/ 39 0,06% /category/exposiciones/piezas/feed/ 39 0,06% /category/didactica/actividades_didacticas/ 38 0,05% 8 Informe de 1&1 Estadísticas Web: 01/01/18 - 31/01/18 Proyecto: Click & Build (maca-alicante.es) ID de Cliente: 26790925 Páginas Sesiones Porcentaje /aprender/ 37 0,05% /category/exposiciones/anteriores/ 37 0,05% /coleccion/coleccion-caja-mediterraneo/exposiciones/ 37 0,05% /heterotopias-coleccion-circa-xx/ 37 0,05% /atencion-al-profesorado/ 36 0,05% /category/coleccion-eusebio-sempere/exposicion- 36 0,05% permanente-y-listado-obras/ /disfruta-del-maca-en-navidad/ 35 0,05% /programas-escolares/ 35 0,05% /actividades/here-togheter-now/ 34 0,05% /inauguracion/ 34 0,05% /wp-content/uploads/wysija/dividers/drop2.png/ 33 0,05% /sempere-de-puno-y-letra-fondos-de-la-fundacion-caja- 32 0,05% mediterraneo/ /wp-json/wp/v2/users/ 32 0,05% /art-futura/ 31 0,04% /balance-maca-visitas-2017/feed/ 31 0,04% /eusebio-sempere-en-el-museo-reina-sofia/feed/ 31 0,04% /category/coleccion-eusebio-sempere/ 30 0,04% obras_destacadas-coleccion-eusebio-sempere/ /obras-depositadas-por-la-diputacion-de-alicante/ 30 0,04% /category/coleccion-caja-mediterraneo/exposiciones- 29 0,04% temporales/ /el-maca-obtiene-la-distincion-sicted/ 29 0,04% /here-together-now-bloque-iii/feed/ 29 0,04% /reminiscencias-2018/feed/ 29 0,04% /category/actividades/actividades_futuras/ 28 0,04% /coleccion/prestamos/ 28 0,04% /complejo-socio-asistencial-doctor-esquerdo/ 28 0,04% /art-futura-2017/feed/ 27 0,04% /category/exposiciones/piezas/ 27 0,04% /la-mesa-del-arquitecto-4-septiembre-2017-mayo-2018/ 27 0,04% feed/ /programas-para-publico-general/talleres-didacticos/ 27 0,04% /actividades/2o-d-cuentos-en-el-maca/ 26 0,04% /actividades/salon-de-actos-y-cesion-de-otros-espacios/ 26 0,04% 9 Informe de 1&1 Estadísticas Web: 01/01/18 - 31/01/18 Proyecto: Click & Build (maca-alicante.es) ID de Cliente: 26790925 Páginas Sesiones Porcentaje /coleccion/coleccion-juana-frances/la-artista/ 26 0,04% /cuestionarios/ 26 0,04% /kiki-de-montparnasse/ 26 0,04% /prensa/boletines/ 26 0,04% /rene-magritte-y-la-publicidad/ 26 0,04% /16422/ 25 0,04% /4605/ 25 0,04% /agenda/ 25 0,04% /coleccion/coleccion-caja-mediterraneo/ 25 0,04% /esteban-vicente-la-pintura-tiene-que-ser-pobre/
Recommended publications
  • Automatic Classifying of Mac OS X Samples
    Automatic Classifying of Mac OS X Samples Spencer Hsieh, Pin Wu and Haoping Liu Trend Micro Inc., Taiwan TREND MICRO LEGAL DISCLAIMER The information provided herein is for general information Contents and educational purposes only. It is not intended and should not be construed to constitute legal advice. The information contained herein may not be applicable to all situations and may not reflect the most current situation. Nothing contained herein should be relied on or acted 4 upon without the benefit of legal advice based on the particular facts and circumstances presented and nothing Introduction herein should be construed otherwise. Trend Micro reserves the right to modify the contents of this document at any time without prior notice. Translations of any material into other languages are intended solely as a convenience. Translation accuracy 6 is not guaranteed nor implied. If any questions arise related to the accuracy of a translation, please refer to Mac OS X Samples Dataset the original language official version of the document. Any discrepancies or differences created in the translation are not binding and have no legal effect for compliance or enforcement purposes. 10 Although Trend Micro uses reasonable efforts to include accurate and up-to-date information herein, Trend Micro makes no warranties or representations of any kind as Classification of Mach-O Files to its accuracy, currency, or completeness. You agree that access to and use of and reliance on this document and the content thereof is at your own risk. Trend Micro disclaims all warranties of any kind, express or implied. 11 Neither Trend Micro nor any party involved in creating, producing, or delivering this document shall be liable for any consequence, loss, or damage, including direct, Malware Families indirect, special, consequential, loss of business profits, or special damages, whatsoever arising out of access to, use of, or inability to use, or in connection with the use of this document, or any errors or omissions in the content 15 thereof.
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • Reporte De Amenazas De ESET Q3
    INFORME DE AMENAZAS TERCER TRIMESTRE 2020 WeLiveSecurity.com @ESETresearch ESET GitHub Contenido Prólogo ¡Bienvenido a la edición del Informe de Amenazas de ESET del tercer 3 HISTORIA DESTACADA trimestre de 2020! Mientras el hemisferio norte se prepara para pasar un invierno azotado por la pandemia, el COVID-19 parece es- 5 NOTICIAS DEL LABORATORIO tar perdiendo fuerza, al menos en el ámbito del cibercrimen. Como la táctica de usar señuelos relacionados con el coronavirus ya no tiene el impacto deseado, los delincuentes parecen haber “vuelto a los modelos clásicos” durante el tercer trimestre de 2020. Sin embargo, hay un área donde persisten los efectos de la pandemia: en el 9 ACTIVIDAD DE GRUPOS DE APT trabajo remoto, con sus numerosos desafíos de seguridad. Esto es especialmente cierto para los ataques dirigidos al Protocolo de Escritorio Remoto (RDP), que crecieron 13 ESTADÍSTICAS Y TENDENCIAS durante todo el primer semestre. En el tercer trimestre, los intentos de ataques al RDP considerando el número de clientes únicos apuntados, aumentaron un 37%. Es probable que el aumento se deba al creciente número de 14 Las 10 principales detecciones de malware sistemas mal protegidos que se fueron conectando a Internet durante la pandemia, y quizá también a que otros delincuentes se inspiraron en las bandas de ransomware y comenzaron a atacar el protocolo RDP. 15 Downloaders La escena del ransomware, seguida de cerca por los especialistas de ESET, tuvo consecuencias inéditas este tri- mestre. Por ejemplo, el ataque de ransomware investigado como homicidio tras la muerte de un paciente porque 17 Malware bancario su hospital quedó inhabilitado.
    [Show full text]
  • Malware List.Numbers
    CLASS A - Tested once a month (and as significant updates and samples are available) (95% or higher detection rate) CLASS B - Tested every two months (and if many new samples or significant updates are available) (95 - 85% detection rate) CLASS C - Tested every three months (85-75% detection rate) CLASS D - Tested every six months (75% or lower detection rates) For Comparison, not an actual Antivirus CLASS F - Excluded from future testing (read notes) Notes, comments, remarks, FAQ and everything else. McAfee Endpoint Protection for Malware Family (by year) # Malware Sample Type MD5 Hash Avast 9.0 Intego VirusBarrier X8 10.8 Norman 3.0.7664 ESET 6.0 Sophos 9 F-Secure 1.0 Kaspersky Security 14 G Data AntiVirus for Mac Dr Web 9.0.0 Avira ClamXav 2.6.4 (web version) Norton 12.6 (26) Comodo Webroot 8 Thirtyseven4 Total Security eScan 5.5-7 iAntivirus 1.1.4 (282) ProtectMac 1.3.2 - 1.4 BitDefender 2.30 - 3.0.6681 McAfee Internet Security for Mac* AVG AntiVirus for Mac Dr Web Light 6.0.6 (201207050) Max Secure Antivirus MacBooster X-Protect Gatekeeper Intego VirusBarrier 2013 10.7 Intego VirusBarrier X6 VirusBarrier Express 1.1.6 (79) Panda Antivirus 1.6 Bitdefender (App Store) 2.21 MacKeeper 2.5.1 - 2.8 (476) Panda Antivirus 10.7.6 Trend Micro Titanium 3.0 McAfee Security 1.2.0 (1549) Norton 11.1.1 (2) Trend Micro Smart Sur. 1.6.1101 McAfee VirusScan for Mac 8.6.1 FortiClient 5.0.6.131 Quick Heal Total Sec 1.0 MacScan 2.9.4 McAfee Virex 7.7 (163) Magician 1.4.3 Vipre 1.0.51 Mac Malware Remover 1.1.6 MD5 Hash Mac 1 Price -> Free $39.99 (Internet
    [Show full text]
  • Discontinued Browsers List
    Discontinued Browsers List Look back into history at the fallen windows of yesteryear. Welcome to the dead pool. We include both officially discontinued, as well as those that have not updated. If you are interested in browsers that still work, try our big browser list. All links open in new windows. 1. Abaco (discontinued) http://lab-fgb.com/abaco 2. Acoo (last updated 2009) http://www.acoobrowser.com 3. Amaya (discontinued 2013) https://www.w3.org/Amaya 4. AOL Explorer (discontinued 2006) https://www.aol.com 5. AMosaic (discontinued in 2006) No website 6. Arachne (last updated 2013) http://www.glennmcc.org 7. Arena (discontinued in 1998) https://www.w3.org/Arena 8. Ariadna (discontinued in 1998) http://www.ariadna.ru 9. Arora (discontinued in 2011) https://github.com/Arora/arora 10. AWeb (last updated 2001) http://www.amitrix.com/aweb.html 11. Baidu (discontinued 2019) https://liulanqi.baidu.com 12. Beamrise (last updated 2014) http://www.sien.com 13. Beonex Communicator (discontinued in 2004) https://www.beonex.com 14. BlackHawk (last updated 2015) http://www.netgate.sk/blackhawk 15. Bolt (discontinued 2011) No website 16. Browse3d (last updated 2005) http://www.browse3d.com 17. Browzar (last updated 2013) http://www.browzar.com 18. Camino (discontinued in 2013) http://caminobrowser.org 19. Classilla (last updated 2014) https://www.floodgap.com/software/classilla 20. CometBird (discontinued 2015) http://www.cometbird.com 21. Conkeror (last updated 2016) http://conkeror.org 22. Crazy Browser (last updated 2013) No website 23. Deepnet Explorer (discontinued in 2006) http://www.deepnetexplorer.com 24. Enigma (last updated 2012) No website 25.
    [Show full text]
  • 2020 Trends & 2021 Outlook
    2020 trends w/ & 2021 outlook THREAT REPORT Q4 2020 WeLiveSecurity.com @ESETresearch ESET GitHub Contents 3 FOREWORD 4 FEATURED STORY 7 NEWS FROM THE LAB 9 APT GROUP ACTIVITY 15 STATISTICS & TRENDS 16 Top 10 malware detections 17 Downloaders 19 Banking malware 21 Ransomware 23 Cryptominers 25 Spyware & backdoors 27 Exploits 29 Mac threats 31 Android threats 33 Web threats 35 Email threats 38 IoT security 40 ESET RESEARCH CONTRIBUTIONS ESET THREAT REPORT Q4 2020 | 2 Foreword Welcome to the Q4 2020 issue of the ESET Threat Report! 2020 was many things (“typical” not being one of them), and it sure feels good to be writing The growth of ransomware might have been an important factor in the decline of banking about it in the past tense. malware; a decline that only intensified over the last quarter of the year. Ransomware and other malicious activities are simply more profitable than banking malware, the operators of As if really trying to prove a point, the pandemic picked up new steam in the last quarter, which already have to grapple with the heightening security in the banking sector. There was, bringing the largest waves of infections and further lockdowns around the world. Amid the — however, one exception to this trend: Android banking malware registered the highest detection chaos, the long-anticipated vaccine rollouts brought a collective sigh of relief or, at least, levels of 2020 in Q4, fueled by the source code leak of the trojan Cerberus. a glimmer of hope somewhere in the not-too-far-distant future. With the pandemic creating fertile ground for all kinds of malicious activities, it is all but In cyberspace, events also took a dramatic turn towards the end of the year, as news of the obvious that email scammers would not want to be left out.
    [Show full text]
  • 2016 Wrap-Up Cybercrime Tactics and Techniques
    Cybercrime tactics and techniques 2016 wrap-up TABLE OF CONTENTS 01 Executive summary 02 Windows malware 05 Early 2017 Windows malware predictions 06 Mac malware 06 Early 2017 OS X malware predictions 07 Exploit kits 08 Early 2017 exploit kit predictions 09 Phishing and malspam 10 Early 2017 phishing and malspam predictions 11 Potentially Unwanted Programs 11 Early 2017 PUP predictions 12 Tech support scams 13 Early 2017 tech support scam predictions 14 Conclusion Introduction Last year was interesting for malware distribution and development. While we still experienced a flood of ransomware and immense distribution of malware using malspam/phishing/exploit kits, some major players, such as TeslaCrypt and Angler EK, vanished, while some new names dominated. In our first wrap-up of the threat landscape, we are going to cover the trends observed during the last few months of 2016, take an analyst’s view of the threats, and offer some predictions for the beginning of 2017. Moving forward, every quarter we will bring you a view of the threat landscape through the eyes of Malwarebytes researchers and analysts. Executive summary Ransomware dominated in 2016 and continued to do so However, it’s market share and capabilities are not quite into 2017. We expect to see very little variation in this at par with Angler, though this is likely going to change in early 2017, and if anything, it is getting worse. The as we expect to observe an increase in exploit kit most notable ransomware families of the end of 2016 activity by the middle of 2017. While late 2016 showed were Locky and Cerber, two very similar ransomware a decrease in the amount of malicious spam/phishing families that took the number one slot multiple times attacks targeting users in the wild, we are seeing greater during the last part of the year.
    [Show full text]
  • Malware List.Numbers
    Actively Tested (Immediately as significant updates and samples are available) (80% or higher detection rate) Occasionally Tested (If many new samples or significant updates are available) (60 - 80% detection rate) Tested when the mood strikes (60% or lower detection rates) For Comparison, not Excluded from future testing (read notes) Notes, comments, remarks, FAQ and everything else. an actual Antivirus Malware Family (by year) Malware Sample Type MD5 Hash Intego VirusBarrier 2013 10.7 Intego VirusBarrier X6 Avira 1.0.0.64 - 2.0.1.105 MacKeeper 2.5.1 - 2.8 (476) F-Secure 1.0 Avast 8.0 ESET 5.0 VirusBarrier Express 1.1.6 (79) Kaspersky Security 14 Dr Web 9.0.0 Webroot 8 Sophos 9 Comodo G Data AntiVirus for Mac Norton 12.6 (26) iAntivirus 1.1.4 (282) ProtectMac 1.3.2 - 1.4 eScan 5.5-7 Bitdefender (App Store) 2.21 BitDefender 2.30 - 3.0.6681 ClamXav 2.6.1 McAfee Internet Security for Mac* AVG AntiVirus for Mac Dr Web Light 6.0.6 (201207050) MacScan 2.9.4 X-Protect Panda Antivirus 1.6 Panda Antivirus 10.7.6 McAfee Endpoint Protection for Trend Micro Titanium 3.0 McAfee Security 1.2.0 (1549) Norton 11.1.1 (2) Trend Micro Smart Sur. 1.6.1101 McAfee VirusScan for Mac 8.6.1 FortiClient 5.0.6.131 Quick Heal Total Sec 1.0 McAfee Virex 7.7 (163) Magician 1.4.3 Vipre 1.0.51 Mac Malware Remover 1.1.6 1 # Mac 2 Price -> $29.99 Current users only (Discontinued) Free $38.95 and up €29,99 Free $39.99 Free (App Store) $39.95 €26 $39.99 Free Free $49.99 Free $44.99 $29.95 Free $49.95 Free $79.99 (Consumer) Free Free (App Store or download) $39.99 OS X’s
    [Show full text]
  • ESET THREAT REPORT Q3 2020 | 2 ESET Researchers Reveal That Bugs Similar to Krøøk Affect More Chip Brands Than Previously Thought
    THREAT REPORT Q3 2020 WeLiveSecurity.com @ESETresearch ESET GitHub Contents Foreword Welcome to the Q3 2020 issue of the ESET Threat Report! 3 FEATURED STORY As the world braces for a pandemic-ridden winter, COVID-19 appears to be losing steam at least in the cybercrime arena. With coronavirus-related lures played out, crooks seem to 5 NEWS FROM THE LAB have gone “back to basics” in Q3 2020. An area where the effects of the pandemic persist, however, is remote work with its many security challenges. 9 APT GROUP ACTIVITY This is especially true for attacks targeting Remote Desktop Protocol (RDP), which grew throughout all H1. In Q3, RDP attack attempts climbed by a further 37% in terms of unique 13 STATISTICS & TRENDS clients targeted — likely a result of the growing number of poorly secured systems connected to the internet during the pandemic, and possibly other criminals taking inspiration from 14 Top 10 malware detections ransomware gangs in targeting RDP. 15 Downloaders The ransomware scene, closely tracked by ESET specialists, saw a first this quarter — an attack investigated as a homicide after the death of a patient at a ransomware-struck 17 Banking malware hospital. Another surprising twist was the revival of cryptominers, which had been declining for seven consecutive quarters. There was a lot more happening in Q3: Emotet returning 18 Ransomware to the scene, Android banking malware surging, new waves of emails impersonating major delivery and logistics companies…. 20 Cryptominers This quarter’s research findings were equally as rich, with ESET researchers: uncovering 21 Spyware & backdoors more Wi-Fi chips vulnerable to KrØØk-like bugs, exposing Mac malware bundled with a cryptocurrency trading application, discovering CDRThief targeting Linux VoIP softswitches, 22 Exploits and delving into KryptoCibule, a triple threat in regard to cryptocurrencies.
    [Show full text]
  • The Apple Threat Landscape
    The Apple threat landscape SECURITY RESPONSE The Apple threat landscape Dick O’Brien Version 1.02 – February 11, 2016 A rising number of threat actors have begun developing malware designed to infect devices running Mac OS X or iOS. CONTENTS OVERVIEW ..................................................................... 3 Apple ecosystem security ............................................. 5 Mac OS X malware ...................................................... 10 iOS malware ................................................................ 16 Attack vectors ............................................................. 18 Mac OS X vulnerabilities ............................................. 20 iOS vulnerabilities ....................................................... 24 Apple ID security ......................................................... 25 Conclusion ................................................................... 27 Protection .................................................................... 27 Appendix .................................................................... 29 OVERVIEW Apple devices have experienced a surge in popularity in recent years. According to IDC, the company now accounts for 13.5 percent of global smartphone shipments and 7.5 percent of global PC shipments. This increase in usage has not gone unnoticed by attackers. A rising number of threat actors have begun developing malware designed to infect devices running Mac OS X or iOS. Although the number of threats targeting Apple operating systems remains
    [Show full text]
  • Awareness Watch™ Newsletter by Marcus P
    Awareness Watch™ Newsletter By Marcus P. Zillman, M.S., A.M.H.A. http://www.AwarenessWatch.com/ V9N4 April 2011 Welcome to the V9N4 April 2011 issue of the Awareness Watch™ Newsletter. This newsletter is available as a complimentary subscription and will be issued monthly. Each newsletter will feature the following: Awareness Watch™ Featured Report Awareness Watch™ Spotters Awareness Watch™ Book/Paper/Article Review Subject Tracer™ Information Blogs I am always open to feedback from readers so please feel free to email with all suggestions, reviews and new resources that you feel would be appropriate for inclusion in an upcoming issue of Awareness Watch™. This is an ongoing work of creativity and you will be observing constant changes, constant updates knowing that “change” is the only thing that will remain constant!! Awareness Watch™ Featured Report This month’s featured report covers Deep Web Research. This is a comprehensive miniguide of reference resources covering deep web research currently available on the Internet. The below list of sources is taken from my Subject Tracer™ Information Blog titled Deep Web Research and is constantly updated with Subject Tracer™ bots at the following URL: http://www.DeepWeb.us/ These resources and sources will help you to discover the many pathways available to you through the Internet to find the latest reference deep web resources and sites. 1 Awareness Watch V9N4 April 2011 Newsletter http://www.AwarenessWatch.com/ [email protected] eVoice: 800-858-1462 © 2011 Marcus P. Zillman, M.S., A.M.H.A. Deep Web Research Bots, Blogs and News Aggregators (http://www.BotsBlogs.com/) is a keynote presentation that I have been delivering over the last several years, and much of my information comes from the extensive research that I have completed over the years into the “invisible” or what I like to call the “deep” web.
    [Show full text]
  • Apex Filters 17.2.3.0 User Guide 27 Jun 2017 Table of Contents
    Apex Filters 17.2.3.0 User Guide 27 Jun 2017 Table of Contents Chapter 1: Apex filters.................................................................................................. 4 Boolean operators used in filter expressions...........................................................................5 app........................................................................................................................................................6 browser................................................................................................................................................7 browserPlatform...............................................................................................................................8 browserVersion..................................................................................................................................9 dataSource........................................................................................................................................10 ethertype........................................................................................................................................... 11 fixRequest......................................................................................................................................... 13 fixResponse.......................................................................................................................................15 flowIdx..............................................................................................................................................
    [Show full text]