{"id":2129,"date":"2006-05-02T00:00:00","date_gmt":"2006-05-02T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/05\/02\/viruses-no-longer-top-security-threat\/"},"modified":"2021-12-30T11:40:44","modified_gmt":"2021-12-30T11:40:44","slug":"viruses-no-longer-top-security-threat","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/05\/02\/viruses-no-longer-top-security-threat\/","title":{"rendered":"Viruses no longer top security threat"},"content":{"rendered":"<p>Early reports of malware distribution in April show that viruses are swiftly declining as a threat in comparison with other malicious software.  Separate research from Fortinet and Sophos shows that the top viruses were mainly old timers, and that Trojans and spyware are coming to the fore in their place.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;While email worms occupy the top spots, it&#8217;s clear that Trojans represent by far the most prominent threat to IT security,&#8221; said Carole Theriault, senior security consultant at Sophos.<\/p>\n<p>Netsky is still the most common virus seen online, accounting for about one in five of all viruses despite a fix and removal tools being widely available for more than two years.<\/p>\n<p>&#8220;The expected reign of IM worms has not arrived because virus authors are confronted with a fundamental barrier when engineering an IM worm,&#8221; stated Fortinet&#8217;s report.  &#8220;While email addresses are easy to collect on the web, instant messaging IDs are generally less public, making the seeding process significantly harder to set up.&#8221;<\/p>\n<p>http:\/\/www.vnunet.com\/vnunet\/news\/2155151\/viruses-longer-top-threat-april<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2129","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2129","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2129"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2129\/revisions"}],"predecessor-version":[{"id":4616,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2129\/revisions\/4616"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2129"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2129"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2129"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}