{"id":2141,"date":"2006-07-06T00:00:00","date_gmt":"2006-07-06T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/07\/06\/email-gives-way-to-new-virus-distribution-tactics\/"},"modified":"2021-12-30T11:40:46","modified_gmt":"2021-12-30T11:40:46","slug":"email-gives-way-to-new-virus-distribution-tactics","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/07\/06\/email-gives-way-to-new-virus-distribution-tactics\/","title":{"rendered":"Email gives way to new virus distribution tactics"},"content":{"rendered":"<p>The number of viruses transmitted by emails dropped to a record low in June, but spam is becoming an increasing problem for businesses, according to research published this week.  Separate research carried out by research firm Vanson Bourne on behalf of Business Systems Group shows that 53 per cent of UK businesses rate junk email as the most pressing email security threat &#8212; almost twice the urgency given to virus protection.  Rather than sending a virus in an email, malware writers now send spam emails with links to malicious web sites, which download viruses to users\u2019 PCs.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;This is by no means a victory for the security industry over malware writers&#8221;, said James Kay, chief technology officer at BlackSpider.  &#8220;What we are actually seeing is a switch in virus distribution tactics rather than a drop in viruses,&#8221; he said.<\/p>\n<p>It&#8217;s more of an evolution than a new wave in internet crime,&#8221; said Thomas Raschke, senior analyst at Forrester Research.<\/p>\n<p>http:\/\/www.pcauthority.com.au\/news.aspx?CIaNID=34514<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2141","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2141","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2141"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2141\/revisions"}],"predecessor-version":[{"id":4628,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2141\/revisions\/4628"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2141"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2141"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}