{"id":1935,"date":"2008-04-23T00:00:00","date_gmt":"2008-04-23T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2008\/04\/23\/microsoft-vulnerabilities-down-threats-up\/"},"modified":"2021-12-30T11:40:19","modified_gmt":"2021-12-30T11:40:19","slug":"microsoft-vulnerabilities-down-threats-up","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2008\/04\/23\/microsoft-vulnerabilities-down-threats-up\/","title":{"rendered":"Microsoft: Vulnerabilities down, threats up"},"content":{"rendered":"<p>The total number of vulnerabilities disclosed in 2007 fell nearly 5 percent, while the amount of malicious code detected jumped more than 40 percent, according to Microsoft&#8217;s latest Security Intelligence Report released on Tuesday.   The report, released twice a year by Microsoft, found that vulnerability disclosures sank approximately 15 percent in the second half of 2007, and 5 percent for the year as a whole.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The amount of malware removed from PCs by Microsoft&#8217;s Malicious Software Removal Tool (MSRT) jumped 40 percent during the last six months of 2007.<\/p>\n<p>Microsoft&#8217;s semi-annual report uses data from various public sources as well as Microsoft&#8217;s Malicious Software Removal Tool (MSRT), Windows Defender, Windows Live OneCare, and Exchange Hosted Services.<\/p>\n<p>At the RSA conference earlier this month, Microsoft called for an information-technology industry strategy to increase trust in the Internet.  While Microsoft issued fewer bulletins and patched fewer flaws in 2007, the number of flaws in Microsoft Office jumped, though the company pointed out that most only seriously affected earlier versions of the program.<\/p>\n<p>http:\/\/www.securityfocus.com\/brief\/727?ref=rss<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1935","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1935","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1935"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1935\/revisions"}],"predecessor-version":[{"id":4422,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1935\/revisions\/4422"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1935"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1935"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1935"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}