{"id":1983,"date":"2013-02-07T00:00:00","date_gmt":"2013-02-07T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/02\/07\/nearly-a-third-of-all-computers-are-infected-with-malware\/"},"modified":"2021-12-30T11:40:24","modified_gmt":"2021-12-30T11:40:24","slug":"nearly-a-third-of-all-computers-are-infected-with-malware","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/02\/07\/nearly-a-third-of-all-computers-are-infected-with-malware\/","title":{"rendered":"Nearly a third of all computers are infected with malware"},"content":{"rendered":"<p>With the addition of 2012&#8217;s numbers, the grand total of all malware samples in PandaLabs&#8217; database has reached approximately 125 million and researchers estimated that at least 27 million new strains of malware were created in 2012 alone. Trojans continued to account for most of the new threats, comprising three out of every four new malware strains created in 2012. One of the reasons for this growth was the increased use of exploit kits such as Black Hole, which are capable of exploiting multiple system vulnerabilities to infect computers automatically without user intervention.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The countries leading the list of most infections are China, South Korea and Taiwan, with 54.89, 54.15 and 42.14 percent of infected computers respectively. &#8230;  In China, the number of infected computers dropped from 56 percent in 2011 to 54.89 percent in 2012, and in Taiwan, the decrease was even larger (from 52 percent to 42.14 percent).<\/p>\n<p>Facebook and Twitter continue to be among the most popular social media sites, and are exploited by cyber-crooks to trick users, infect their computers and steal their confidential information.   LinkedIn, a tool that is increasingly becoming a key part of job searches, also suffered a massive breach that led to the theft of 6.5 million user passwords.<\/p>\n<p>Special care will have to be taken to protect networks against operating system and application vulnerabilities, as it has become increasingly common for cyber-criminals and national intelligence agencies to exploit security flaws to silently compromise systems. <\/p>\n<p>Cyber-espionage and cyber-war will also be on the rise in a year that presents itself full of challenges in the computer security world.<\/p>\n<p>Link: http:\/\/www.net-security.org\/malware_news.php?id=2404<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1983","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1983","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1983"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1983\/revisions"}],"predecessor-version":[{"id":4470,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1983\/revisions\/4470"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1983"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1983"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1983"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}