SHARE
Facebook X Pinterest WhatsApp

Symantec: Fake Security Software Still Top Problem

(Reuters) – Fake security software was the No. 1 cybersecurity woe afflicting computer users in 2009, and Apple users lost some of their immunity to cybercrime as they stored more data online instead of on hard drives, according to the cybersecurity firm Symantec. In a report released on Tuesday, Symantec noted that Brazil had risen […]

Apr 20, 2010
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

(Reuters) – Fake security software was the No. 1 cybersecurity woe afflicting computer users in 2009, and Apple users lost some of their immunity to cybercrime as they stored more data online instead of on hard drives, according to the cybersecurity firm Symantec.

In a report released on Tuesday, Symantec noted that Brazil had risen to third place in the list of countries with "malicious activity," defined as spam, online scam attempts and other types of cybercrime. The United States remained in first place at 19 percent, with China second at 8 percent, and Brazil third at 6 percent.

Conficker — a malicious software program all over the news last April — and sophisticated attacks on websites of Google Inc and other large companies in December and reported in January were the most publicized cyber events of the year.

But the single most prevalent form of cybercrime was fake security software, which computer users normally see as a flashing notice that their computer is infected with a virus, said Vincent Weafer, a Symantec vice president.

The notice often provides a link to software that can be downloaded after payment, but the user does not get security software but rather, a virus or worse, Weafer said.

"Virtually everything we see today is fake AV (anti-virus)," he told Reuters. "It’s such a money-making racket."

The scam is popular is because victims willingly hand over their credit card numbers, thinking that they are purchasing legitimate software, and those credit cards can then be used at will.

Weafer also warned that Apple users, as they move their computer activities like storing photographs in remote servers managed by online companies, will have to take the same precautions that savvy PC owners have used for years to avoid identity theft. These precautions include keeping credit card and other key numbers secret and being suspicious of offers that seem too good to be true.

"It’s the notion of ‘I’m on a Mac.’ Yes, you’re on a Mac but you’re in the cloud," said Weafer. "They’ve got to be as careful as anybody else."

(Reporting by Diane Bartz; Editing by Richard Chang)

Recommended for you...

SailPoint Intros Accelerated Application Management Solution
Jordan Smith
Aug 22, 2025
ConnectWise Partners with Proofpoint on Security in Asio
Jordan Smith
Aug 22, 2025
RegScale CRO on Channel Growth in Risk & Compliance
Victoria Durgin
Aug 22, 2025
Manny Rivelo on Evolving Channel & How MSPs Can Get Ahead
Victoria Durgin
Aug 20, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.