The real costs of malware measured in downtimeThe most common types of malware incidentsThe latest trends in malware defense software