{"id":1977,"date":"2010-05-18T00:00:00","date_gmt":"2010-05-18T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/05\/18\/usb-worm-no-1-malware-mcafee-report\/"},"modified":"2021-12-30T11:40:24","modified_gmt":"2021-12-30T11:40:24","slug":"usb-worm-no-1-malware-mcafee-report","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/05\/18\/usb-worm-no-1-malware-mcafee-report\/","title":{"rendered":"USB Worm No. 1 Malware: McAfee Report"},"content":{"rendered":"<p>USB worms have taken the No. 1 spot for top malware in the world, according to a McAfee threat report, released Tuesday.  In addition, the &#8220;McAfee Threats Report, First Quarter 2010&#8221; indicated a trend of diploma spam coming from China and other Asian countries, while spammers are continuing to exploit high-profile news events, such as the Haiti earthquake, by poisoning search engines.  Finally, the report found that U.S.-based servers continue to host the majority of malicious URLs.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Threats on portable storage devices rose to the top of the list as the most popular malware, evident by a rash of AutoRun infections that held the No. 1 and No. 3 spots for top five malware over the last quarter.  Security experts contend that attacks delivered via portable storage devices have experienced a revival in recent months, after being dormant for an extensive period of time.  &#8220;It&#8217;s kind of like your old-school style of malware, one device to another device&#8221; said Dave Marcus, security research and communications manager for McAfee Labs.<\/p>\n<p>All of the top five threats remained consistently popular worldwide.<\/p>\n<p>Marcus said that social-engineering attacks, particularly those targeting social networks, are continuing on a rapid upward trend.  &#8220;A lot of people don&#8217;t realize the bad guys read the same news the good guys do,&#8221; Marcus said.<\/p>\n<p>And despite reports of copious malware sourced internationally, the report also showed that the U.S hosted the vast majority of new malicious URLs, totaling 98 percent.<\/p>\n<p>http:\/\/www.crn.com\/security\/224900212<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1977","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1977","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1977"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1977\/revisions"}],"predecessor-version":[{"id":4464,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1977\/revisions\/4464"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1977"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1977"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1977"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}