{"id":2101,"date":"2005-07-17T00:00:00","date_gmt":"2005-07-17T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/07\/17\/computer-virus-infections-on-the-rise-globally\/"},"modified":"2021-12-30T11:40:39","modified_gmt":"2021-12-30T11:40:39","slug":"computer-virus-infections-on-the-rise-globally","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/07\/17\/computer-virus-infections-on-the-rise-globally\/","title":{"rendered":"Computer virus infections on the rise globally"},"content":{"rendered":"<p>During the second quarter (April-June) of this year, more than 10 million virus infections have happened worldwide, according to trend micro, a leading anti virus and internet content security software services provider.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The trend in the last four years saw the number of infections increase slightly after the first quarter, then decrease to lower levels in the last quarter.<\/p>\n<p>But this quarter&#8217;s 10,248,989 infections is a big leap from the last quarter and this number is expected to increase in the next two quarters.<\/p>\n<p>North America, which is the home to many large and prominent industries, remains as the favourite target of Malware authors in the past quarters.  This may be due to the new trend of Malware slanting on profit more than destructiveness, it said.<\/p>\n<p>http:\/\/www.zeenews.com\/znnew\/articles.asp?aid=229353&#038;ssid=29&#038;sid=env<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2101","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2101","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2101"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2101\/revisions"}],"predecessor-version":[{"id":4588,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2101\/revisions\/4588"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2101"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2101"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2101"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}