2011 was a record-setting year for attacks on smart phones and tablet computers. Content scrapers, hacking tools, content spammers and an array of other “spies” make up nearly a third of all traffic at most websites, according to a new report. The report, from web security firm Incapsula, says that non-human traffic makes up 51 percent of the total traffic to a site. Some of that is benign – two-fifths of the non-human stuff is good bots like search engines. The rest is designed to damage your site or steal your information. The data was compiled from a sample of one thousand websites of Incapsula customers, with an average of 50,000 to 100,000 monthly visitors. There’s less spam and PC malware. The last quarter of 2011 saw spam levels at their lowest point in years, especially in the United Kingdom, Brazil, Argentina and South Korea, according to McAfee. Also, PC-based malware actually declined during the last three months of the year, and is significantly lower than in 2010. Unfortunately … Last year saw increased malware for smart phones and tablets. Reports by both McAfee and Juniper Networks found last year was a record-setting year for mobile malware. No surprise that as Android has the biggest market share it is also the most popular target. SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe According to the McAfee report: Contributing to the rise in malware were rootkits, or stealth malware. Though rootkits are some of the most sophisticated classifications of malware, designed to evade detection and “live” on a system for a prolonged period, they showed a slight decline in Q4. Fake AV dropped considerably from Q3, while AutoRun and password-stealing Trojan malware show modest declines. Companies can’t keep up with malware threat. Ninety five percent of all enterprises are exposed to malware on a daily basis, according to security firm FireEye. The volume and sophistication of threats is outpacing businesses’ ability to counteract these risks despite an estimated $20 billion spent annually on IT security. Related content opinion Why Bitcoins are Just as Viable as Any Other Currency The true value of any currency is a reflection of how much people believe it's worth, according to CIO blogger Constantine von Hoffman. But it's wise to remember just how fast beliefs can change. By Constantine von Hoffman Apr 15, 2013 4 mins Government Technology Industry opinion No Surprise: Docs Show Obama Administration Lying About Drones President Obama has repeatedly said drones would only be used against members of al Qaida and allied groups. However, leaked intelligence documents show the administration has been using them to settle political and tribal feuds for at least four yea By Constantine von Hoffman Apr 10, 2013 3 mins Regulation Government opinion How Big Data Can Quickly Become Big Garbage The bigger the data the bigger the chance of mistakes or inaccuracies. In that vein, a large database used by retailers to screen people accused of stealing from employers is identifying innocent people and could result in major lawsuits, according t By Constantine von Hoffman Apr 04, 2013 2 mins Big Data opinion Why Crazy Trumps Logic on the Internet The earth is flat. Vaccines cause autism. 9/11 was a government conspiracy. These are just a few of the many ideas that continue to find adherents online despite overwhelming proof that they're not based on fact. CIO.com blogger Constantine von By Constantine von Hoffman Apr 02, 2013 3 mins Government Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe