{"id":135,"date":"2004-01-17T00:04:44","date_gmt":"2004-01-16T17:04:44","guid":{"rendered":""},"modified":"2004-01-17T00:04:44","modified_gmt":"2004-01-16T17:04:44","slug":"2003-viruses-caused-55-billion-damage","status":"publish","type":"post","link":"https:\/\/deepquest.code511.com\/blog\/2004\/01\/2003-viruses-caused-55-billion-damage\/","title":{"rendered":"2003 Viruses Caused $55 Billion Damage"},"content":{"rendered":"<p>Trend Micro Inc., the world&#8217;s third-largest anti-virus software maker, said on Friday computer virus attacks cost global businesses an estimated $55 billion in damages in 2003, a sum that would rise this year.<br \/>\nCompanies lost roughly $20 billion to $30 billion in 2002 from the virus attacks, up from about $13 billion in 2001, according to various industry estimates.<br \/>\n&#8220;The economic and financial impact of virus attacks will continue to climb in 2004,&#8221; Lionel Phang, Trend Micro&#8217;s Managing Director told Reuters in an interview. He did not have a forecast for the year.<br \/>\nSpam threats and network viruses will likely become more prevalent in 2004, he said.<!--more--><\/p>\n<p>The spam threat will increase exponentially, and will become the hideouts for viruses and hacking programs trying to gain an entry into the network,&#8221; he added.<\/p>\n<p>&#8220;Blended threats also will remain the standard way to attack networks, where one virus file will create four to five different activities within the system.&#8221;<\/p>\n<p>Phang offered the following example of a blended threat: a spam-generating virus causes a surge in the company&#8217;s network traffic and prompts its network administrators to block the junk email, and while technicians try to fix the spam problem the virus drops a program into the system that monitors keystrokes and steals company passwords and user IDs.<\/p>\n<p>Viruses can gain entry into computer networks via instant messaging channels, such as Internet Relay Chat (IRC) programs and Time Warner Inc.&#8217;s ICQ service, Phang added.<\/p>\n<p>Natasha David, an analyst with International Data Corp (IDC), said spam would emerge as the key transmission vehicle for viruses in 2004.<\/p>\n<p>&#8220;Spammers are going to put viruses and worms in email attachments, so (junk email) will become more than just a nuisance,&#8221; she said.<\/p>\n<p>According to IDC, the global market for secure content management, which includes anti-virus solutions, message security and web filtering, is expected to hit $6.4 billion in 2007, representing a compound annual growth rate of 19 percent. ?<\/p>\n<p>from [url=http:\/\/www.reuters.com\/newsArticle.jhtml?type=technologyNews&#038;storyID=4138782]Reuters[\/url]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>2003 Viruses Caused $55 Billion Damage<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3],"tags":[],"class_list":["post-135","post","type-post","status-publish","format-standard","hentry","category-security"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4bBYZ-2b","_links":{"self":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/135","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/comments?post=135"}],"version-history":[{"count":0,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/135\/revisions"}],"wp:attachment":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/media?parent=135"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/categories?post=135"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/tags?post=135"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}