The Internet should add convenience, not headaches. From step-by-step instructions to helpful tips, we'll help you install your equipment, troubleshoot problems, and get the most out of your online experience – minus the migraine.
Viewing Virus Threat Maps With McAfee Security Console in Version 12.8
Last Updated: Mon, 10 Mar 2014 > Related Articles
Discover the origins of worldwide virus attacks and how to prevent them from infecting your computer.
What is McAfee Security Console?
The Security Console on your computer desktop is part of your free Cox Security Suite Powered by McAfee®. It is a powerful security solution that allows you to monitor the security status on your computer and to know instantly whether virus, spyware, email, and firewall protection services are up-to-date.
How can it help me?
You can use this tool to view the origins of each virus type and how to identify them.
For additional help with any Security Console feature visit the McAfee Community. Click Home and Home Office, then under Communities on the left, click Security Console.
To begin, click the McAfee Security Console icon in your taskbar or on your desktop.
- On the Security Console, click the Threat Map link on the right.
- Click View Threat Map.
- Next to Show: click the down arrow to display the menu.
- Choose the threat map you want to see.
From the map you can see your location and proximity to the most common malware threats and spam message outbreaks. You can also see where the most active spam hosts and attackers are in the world.
Tip: Below the map you can see the top 5 most infectious malware threats in the world. In the table below is a breakdown of each threat:
Shows where most new malware detection takes place in the world.
Shows most active spam hosts in the world. A spam host is associated with an IP address that sends spam messages. Each dot on the map represents a spam host. The size of the dot shows the amount of spam messages sent. The larger the dot the more spam sent. The color shows the volume of spam.
Shows where intrusion attacks take place most frequently in the world.
Shows the most active attackers in the world. An attacker is associated with an IP address that is used to track hacking intrusions. The size of the dot shows the number of attacks. The larger the dot the more attacks. The color shows the number of attacks.