{"id":1982,"date":"2013-02-04T00:00:00","date_gmt":"2013-02-04T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/02\/04\/most-attacked-computer-ports-revealed\/"},"modified":"2021-12-30T11:40:24","modified_gmt":"2021-12-30T11:40:24","slug":"most-attacked-computer-ports-revealed","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/02\/04\/most-attacked-computer-ports-revealed\/","title":{"rendered":"Most attacked computer ports revealed"},"content":{"rendered":"<p>Akamai released its Q3 2012 State of the Internet report recently, revealing that port 445 (Microsoft-DS) has been the top targeted port amoung cyber attackers.The report showed that during the third quarter of 2012, Akamai observed attack traffic originating from 180 unique countries or regions, down from 188 in the prior quarter.  Nearly 51% of observed attack traffic originated in the Asia Pacific\/Oceania region, just under 25% in Europe, just over 23% in North and South America, and slightly more than 1% from Africa.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The report drew data collected by Akamai\u2019s distributed set of agents deployed across the Internet that monitors attack traffic.<\/p>\n<p>According to the report, Port 445 (Microsoft-DS) remained the most targeted port since mid-2008, receiving 30 percent of observed attack traffic.  \u201cPort 445 remained the most targeted port in eight of the top 10 countries, accounting for as many as 109 times (in Romania) the number of attacks seen by the next most targeted port,\u201d the report stated.<\/p>\n<p>Link: http:\/\/mybroadband.co.za\/news\/security\/69230-most-attacked-computer-ports-revealed.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1982","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1982","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1982"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1982\/revisions"}],"predecessor-version":[{"id":4469,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1982\/revisions\/4469"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1982"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1982"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1982"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}