Skip to content
The Times USA
Menu
  • ABOUT
  • CONTACT
  • LIFESTYLE
  • NATIONAL NEWS
  • BUSINESS
  • INTERNATIONAL NEWS
  • TECHNOLOGY
  • PRICE OF BUSINESS SHOW AUDIOS
Menu

40 Percent of Malicious URLS Can Be Found on Good URLS

Posted on March 11, 2019March 5, 2019 by admin

 Webroot, the Smarter Cybersecurity® company, revealed the results of the 2019 Webroot Threat Report, showcasing that while tried-and-true attack methods are still going strong, new threats emerge daily, and new vectors are being tested by cybercriminals. The report is derived from metrics captured and analyzed by Webroot’s advanced, cloud-based machine learning architecture: the Webroot® Platform.

Notable Findings:
  • 40 percent of malicious URLs were found on good domains. Legitimate websites are frequently compromised to host malicious content. To protect users, cybersecurity solutions need URL-level visibility or, when unavailable, domain-level metrics, that accurately represent the dangers.
  • Home user devices are more than twice as likely to get infected as business devices. Sixty-eight percent of infections are seen on consumer endpoints, versus 32 percent on business endpoints.
  • Phishing attacks increased 36 percent, with the number of phishing sites growing 220 percent over the course of 2018. Phishing sites now use SSL certificates and HTTPS to trick internet users into believing they are secure, legitimate pages. Seventy-seven percent of phishing attacks impersonated financial institutions, and were much more likely to use HTTPS than other types of targets. In fact, for some of the targeted financial institutions, over 80 percent of the phishing pages used HTTPS. Google was found to be the most impersonated brand in phishing overall.
  • After 12 months of security awareness training, end users are 70 percent less likely to fall for a phishing attempt. Webroot found that organizations that combine phishing simulation campaigns with regular training saw a 70 percent drop in phishing link click-through.
  • Nearly a third of malware tries to install itself in %appdata% folders. Although malware can hide almost anywhere, Webroot found several common locations, including %appdata% (29.4 percent), %temp% (24.5 percent), and %cache% (17.5 percent), among others. These locations are prime for hiding malware because these paths are in every user directory with full user permissions to install there. These folders also are hidden by default on Windows® Vista and up.
  • Devices that use Windows 10 are at least twice as secure as those running Windows 7.Webroot has seen a relatively steady decline in malware on Windows 10 machines for both consumer and business.
  • Despite the decrease in cryptocurrency prices, cryptomining and cryptojacking are on the rise. The number of cryptojacking URLs Webroot saw each month in the first half of the year more than doubled in the period from September through December 2018. These techniques can be more lucrative than ransomware attacks, since they don’t require waiting for the user to pay the ransom, and they have a smaller footprint. As far as web-based cryptojacking, Coinhive still dominates with more than 80 percent market share, though some new copycat cryptojacking scripts are gaining in popularity.
  • While ransomware was less of a problem in 2018, it became more targeted. We expect major commodity ransomware to decline further in 2019; however, new ransomware families will emerge as malware authors turn to more targeted attacks, and companies will still fall victim to ransomware. Many ransomware attacks in 2018 used the Remote Desktop Protocol (RDP) as an attack vector, leveraging tools such as Shodan to scan for systems with inadequate RDP settings. These unsecured RDP connections may be used to gain access to a given system and browse all its data as well as shared drives, providing criminals enough intel to decide whether to deploy ransomware or some other type of malware.

You Might Also Like...

  • Consumers and Their Relationship with Smart Phones

    With an estimated 270 million Americans viewing their smartphones about 14 billion times per day,…

  • Very Large Breaches

    By the Price of Business Show, Hosted by Kevin Price.  The Price of Business is a media…

  • Ways To Find The Right Technology Partner For Your Business

    Finding a technology partner to help support you and your company can be a hard…

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Celebrating 25 Years of the Price of Business Show

https://www.youtube.com/watch?v=5ViFPGoK-ks

VIDEO: This Week’s Best of our Network

https://www.youtube.com/watch?v=1yHKJaJejy4

GDPR Compliance

USABR does not collect data on its visitors.  For more information visit: https://www.usabusinessradio.com/contact-us/

Contact

Contact articles@usabusinessradio.net for more information on articles on this site. BMuyco@usabusinessradio.net for all other information.

Recent Articles

  • Long Term Care Planning When You Have Special Needs Children
  • Are Fireworks Stores in Hammond Open Year-Round?
  • When Is the Best Time to Shop for Fireworks in Hammond to Get the Best Selection?
  • Winning on the Sidelines: How to Curate the Perfect Mother’s Day Shop for Your Team
  • Setting Up Your Future: How to Smartly Finance Your Post-Grad Life

Also in TTUSA

  • Wooden Phones Cases vs. Average Ones: Which One Is Better?
  • Hurricane Michael is a Monster Storm
  • A Crippling Issue That Mimics Complacency
  • The Legacy of MLK
  • Understanding No-Fault Insurance Laws After a Fort Lauderdale Car Accident

RSS The Daily Blaze

  • Skepticism Grows Over White House Strategy in Strait of Hormuz Crisis
  • Chasing the Right Jobs: Knowing When to Bid and When to Walk Away
  • Upgrading Teacher Appreciation Week: How to Do End-of-Year Rewards Right
  • Building a Culture of Care Keeping Outdoor Crews Safe Through Positive Reinforcement
  • Beat the Heat: Why You Should Never Wait Until Summer to Fix Your AC

RSS USA Business Radio

  • Trade Secrets After the Prototype: When the Real Secret Is the Integration
  • Publishing in a World of AI
  • Tariffs After the Supreme Court’s February Decision
  • Emerging Economies and the Business Knowledge Gap Addressed by Zlibrary
  • Succession & Inheritance Lessons From the Murdoch Case

RSS USA Daily Times

  • Get Organized Day Is April 26. But if We Aren’t Organized Yet, What Are the Chances This Year Will Be Different?
  • Kwong v. United States: A New Legal Precedent for Taxpayers
  • Culture Scholar – Part Two: From Survival to Systems
  • Why Sugar Is So Hard To Quit
  • The Ides of March Is Fast Approaching; Take Heed of Any Warnings in Your Enterprise Data

RSS USA Daily Chronicles.

  • Reclaiming Every Dollar: The Pandemic-Era Interest Freeze
  • The Value Acceleration Journey: How Privately Held Businesses Intentionally Build Enterprise Value
  • Smart Food Choices To Prevent Diabetes
  • When Empathy Backfires: The Leadership Relational Trap
  • How To Make Doula Services Affordable

RSS Price of Business

  • Trade Secrets After the Prototype: When the Real Secret Is the Integration
  • Skepticism Grows Over White House Strategy in Strait of Hormuz Crisis
  • Weekend Wrap-Up: Highlights from the Price of Business Network — April 17, 2026
  • Daily News Wrap-Up: Highlights from the Price of Business Network — April 17, 2026
  • How To Finance a Rental Property With a DSCR Loan

RSS US Daily Review

  • Building Stronger Women, Stronger Communities: The Vision Behind WOVI
  • 164 Acres Permanently Protected in French Creek Watershed With Support From Colcom Foundation
  • Federal Court Mandate: IRS Must Refund Pandemic Charges
  • Heroic Relationship Tips for Men
  • What Is a UFO Research Website? Guide for Curious Minds

PoB Digital Network

US Daily Review

USA Business Radio

USA Daily Chronicles

USA Daily Times

The Daily Blaze

The Times USA

Price of Business

Privacy Policy

https://www.thetimesusa.com/privacy-policy-2/

© 2026 The Times USA | Powered by Superbs Personal Blog theme