{"id":1862,"date":"2006-04-20T00:00:00","date_gmt":"2006-04-20T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/04\/20\/more-internet-threats-expected-this-year\/"},"modified":"2021-12-30T11:40:10","modified_gmt":"2021-12-30T11:40:10","slug":"more-internet-threats-expected-this-year","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/04\/20\/more-internet-threats-expected-this-year\/","title":{"rendered":"More Internet Threats Expected This Year"},"content":{"rendered":"<p>According to Trend Micro&#8217;s report, called Virus and Spam Roundup 2005 and Predictions for 2006, this year will see more spy phishing and spear phishing on the Internet.  Another prediction for this year is the rise of bots with increased functionality through rootkits and vulnerability exploits, says Trend Micro&#8217;s senior technical consultant Chong Yu Nam.   Last year, zombie networks contributed to more than 33 percent of all spam resources, and 65 percent of the top 15 threats included some form of spyware, adware, backdoor, rootkit, and bot systems.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;A botnet is an army of bots, or a bot network, and a bot virus-infected computer is called a zombie.<\/p>\n<p>2005 saw a rise in profit-driven attacks.  These were reflected by phishing, which now represents as much as one percent of the global e-mail traffic and is far more effective than spamming.<\/p>\n<p>Chong believes education and awareness will be the best way to address the rise in such cyber threats, albeit being a long-term strategy.<\/p>\n<p>http:\/\/www.cio-today.com\/news\/More-Net-Threats-Expected-This-Year\/story.xhtml?story_id=110003SIN756<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1862","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1862","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1862"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1862\/revisions"}],"predecessor-version":[{"id":4349,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1862\/revisions\/4349"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1862"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1862"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1862"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}