• Español
  •  
  • Ashburn, VA
    Ashburn, VA

    Let us know the location you'd like to browse.

    or

    Already a Cox Residential customer?

    Looking for Business services? Go to Cox Business home

Internet

The Internet should add convenience, not headaches. From step-by-step instructions to helpful tips, we'll help you install your equipment, troubleshoot problems, and get the most out of your online experience – minus the migraine.

Back Print Article

Viewing Virus Threat Maps With McAfee Security Center

Last Updated: Thu, 04 Sep 2014 > Related Articles

2 rated this

Summary

Discover the origins of worldwide virus attacks and how to prevent them from infecting your computer.

Solution

What is McAfee Security Center?

The Security Center on your computer desktop is part of your free Cox Security Suite Powered by McAfee®. It is a powerful security solution that allows you to monitor the security status on your computer and to know instantly whether virus, spyware, email, and firewall protection services are up-to-date.


How can it help me?

You can use this tool to view the origins of each virus type and how to identify them.
 

For additional help with any Security Center feature visit the McAfee Community. Click Home and Home Office, then under Communities on the left, click Security Center.

  1. To begin, click the McAfee Security Center icon in your taskbar or on your desktop.

security center icon
 

  1. On the Security Center console click any item on the left, twice. This brings up the View Reports and View Threat Map links on the right.

highlights View Reports, View Threat Map
 

  1. Click View Threat Map.
  2. Next to Show: click the down arrow to display the menu.
  3. Choose the threat map you want to see.

From the map you can see your location and proximity to the most common malware threats and spam message outbreaks. You can also see where the most active spam hosts and attackers are in the world.

Tip: Below the map you can see the top 5 most infectious malware threats in the world. In the table below is a breakdown of each threat:
 

ThreatDescription
Malware

Shows where most new malware detection takes place in the world.

  • Red - More than 5% of new malware detections take place here
  • Orange - 0-5% of new malware detections take place here
  • Yellow - No malware detection

highlights Malware dropdown item

Spam

Shows most active spam hosts in the world. A spam host is associated with an IP address that sends spam messages. Each dot on the map represents a spam host. The size of the dot shows the amount of spam messages sent. The larger the dot the more spam sent. The color shows the volume of spam.

  • Red - High
  • Orange - Moderate
  • Yellow - Low

highlights Spam dropdown item

Attacks

Shows where intrusion attacks take place most frequently in the world.

  • Red - More than 10% occur here
  • Orange - 0-10% occur here
  • Yellow - No attacks occur here

highlights Attacks dropdown item

Attackers

Shows the most active attackers in the world. An attacker is associated with an IP address that is used to track hacking intrusions. The size of the dot shows the number of attacks. The larger the dot the more attacks. The color shows the number of attacks.

  • Red - HIgh
  • Orange - Moderate
  • Yellow - Low

highlights Attackers dropdown item

 

Rate this Article:

Related Topics:

Give us your feedback:

Feedback

Maximum 500 characters

Back Print Article

Need More Help?