Pretty scary stuff. You want to read the entire post: Survival of the Fittest – honeyblog.
That’s the time it takes (in minutes) from the moment you hook up a new machine to the Interent and the minute it gets compromised. It only measures attacks originating from the outside, not being stupid and downloading some shady P2P app choke full of trojans. If you start out by downloading and installing all the recent security updates — and you’ll need an internet connection for that — you’re in a race to beat this time. And odds are not in your favor.
Well, not you personally. I bet you always quickly upgrade new installs and run them behind a firewall. But the royal you of people out there don’t always, and usually just wait for the regularly scheduled updates to download on their own.
… for sensor 1, about 90% of the attacks originate from machines within the same autonomous system. The graph can be interpreted as many attacks being local – which makes sense since autonomous spreading malware often prefers to propagate locally.
So next time you’re opening up your computer on a public WiFi at a coffee shop or the airport, make an educated guess how many of these machines are slow because of the malwares they’re running right now, on the same subnet as you. Food for thought.