ThreatFire Protection Statistics
When you use your computer, dozens of programs run in the background telling your computer what to do. Most of these programs and processes are not harmful, but any one of them could be malware if your PC has been attacked. ThreatFire's patent-pending ActiveDefense technology continuously monitors all such events and analyzes the actions they launch for signs of malicious behavior.
When ActiveDefense detects malicious or highly suspicious computer activity, it immediately terminates the activity and isolates the offending program before it can harm your system or compromise your privacy. In the case of a known virus or other threat, ThreatFire immediately terminates the threat and notifies you that the threat has been disabled. In the case of a threat that is potentially malicious, ThreatFire immediately blocks the activity and presents a clear and informative alert that provides guidance on how to proceed.
The following statistics represent the total protection counts to date throughout the ThreatFire Secure Community. The ThreatFire Secure Community is comprised of active ThreatFire users who have volunteered to participate in this program. You will also see these statistics in the Security Status section of ThreatFire.
- Events Analyzed - represents a count of the total number of times ThreatFire has evaluated an action on individual PCs worldwide that ThreatFire has carefully and intelligently analyzed for signs of malicious behavior.
- Programs Examined - total number of processes that ThreatFire has monitored or examined for signs of suspicious behaviors.
- Suspicious Activities Detected - number of times ThreatFire has flagged a potentially risky process.
- Malware Blocked - number of times ThreatFire has discovered and blocked malware.
ThreatFire Research Blog
Visit the ThreatFire Research Blog for in-depth malware research. Threats on the internet surface every day, and our threat research is ongoing. The ThreatFire blog serves up interesting thoughts on malware that our research team encounters. Readers with an interest in the field of malware research can expect to find both easily accessible information and more advanced low level technical information.